Advances in Information, Communication and Cybersecurity: Proceedings of ICI2C’21 First Edition Yassine Maleh – Ebook Instant Download/Delivery ISBN(s): 9783030917371,3030917371, 9783030917388, 303091738X
Product details:
- ISBN 10: 303091738X
- ISBN 13: 9783030917388
- Author: Yassine Maleh
This book gathers the proceedings of the International Conference on Information, Communication and Cybersecurity, held on November 10–11, 2021, in Khouribga, Morocco. The conference was jointly coorganized by The National School of Applied Sciences of Sultan Moulay Slimane University, Morocco, and Charles Darwin University, Australia. This book provides an opportunity to account for state-of-the-art works, future trends impacting information technology, communications, and cybersecurity, focusing on elucidating the challenges, opportunities, and inter-dependencies that are just around the corner. This book is helpful for students and researchers as well as practitioners. ICI2C 2021 was devoted to advances in smart information technologies, communication, and cybersecurity. It was considered a meeting point for researchers and practitioners to implement advanced information technologies into various industries. There were 159 paper submissions from 24 countries. Each submission was reviewed by at least three chairs or PC members. We accepted 54 regular papers (34\%). Unfortunately, due to limitations of conference topics and edited volumes, the Program Committee was forced to reject some interesting papers, which did not satisfy these topics or publisher requirements. We would like to thank all authors and reviewers for their work and valuable contributions. The friendly and welcoming attitude of conference supporters and contributors made this event a success!
Table contents:
Advances in Machine Intelligence and Information Retrieval
Adaptive Learning Algorithms and Platforms: A Concise Overview
A Minimum and Maximum of Regional Information Method to Improve the Sobel Edge Detector
Hybrid Mammogram Segmentation Using Watershed and Region Growing
Human Activity Recognition Using Stacked LSTM
Optimized Influencers Profiling from Social Media Based on Machine Learning
Natural Language Processing Based Approach to Overcome Arabizi and Code Switching in Social Media Moroccan Dialect
Towards a New Lexicon-Based Features Vector for Sentiment Analysis: Application to Moroccan Arabic Tweets
Enhanced Word Embeddings with Sentiment Contextualized Vectors for Sentiment Analysis
Arabic Topic Modeling-Based Sentiment Analysis on COVID-19 Feedback Comments
Parallel Feature Selection Approaches for High Dimensional Data: A Survey
Metadata Quality in the Era of Big Data and Unstructured Content
Weather Forecast Using Sliding Window Algorithm Based on Hadoop and MapReduce
Semantic Web Technologies for Internet of Things Semantic Interoperability
Composition of Large Modular Ontologies Based on Structure
Detection and Prediction Using Similar Trajectory Measurements
Classification of Arrhythmias from ECG Using Fractal Dimensions and Wavelet Theory
Benchmarking Classification Algorithms for Measuring the Performance on Maintainable Applications
Application of Machine Learning Techniques for Credit Risk Management: A Survey
Advances in Smart Systems and Networks
Applying Advanced IoT Network Topologies to Enhance Intelligent City Transportation Cost Based on a Constrained and Secured Applicative IoT CoAP Protocol
Applying Lightweight Elliptic Curve Cryptography ECC to Smart Energy IoT Platforms Based on the CoAP Protocol
Service Selection in Cloud Computing Environment by Using Cuckoo Search
Markov Decision Processes with Discounted Rewards: Improved Successive Over-Relaxation Method
Speech Spectral Subtraction in Modulation Domain
COBIT 5 Concepts: Towards the Development of an Ontology Model
Advances in Online Learning
A Systematic Study on Tertiary Level Student Tuition Fee Waiver Management During Pandemic Using Machine Learning Approaches
Towards a Model of Self-regulated e-learning and Personalization of Resources
The Preferences and Expectation of Moroccan Teachers from Learning Analytics Dashboards in a Blended Learning Environment: Empirical Study
Towards a Smart City Stakeholders Classification: Case of Casablanca Smart City Project
Emerging Learning Environments and Technologies Post Covid-19 Pandemic: What’s Next?
What Drives Digital Library User’s Satisfaction Behavior? Investigating the Level and Its Determinants
Managing Individual Online Learning Experience: The Roles of Perceived Engagement and Perceived Performance
Consumer’s Organic Food Buying Intention in COVID-19 Pandemic: Evidence from Vietnam
Students’ Performance and Engagement in Discrete Mathematics Online Learning During COVID-19 Pandemic
Advances in Smat Healthcare
A Smart Health Monitoring Application for Patients to Improve Health
Early Detection of the Alzheimer’s Disease: A Novel Cognitive Feature Selection Approach Using Machine Learning
An Artificial Neural Network-Based System to Predict Cardiovascular Disease
Hybrid Machine and Deep Transfer Learning Based Classification Models for Covid 19 and Pneumonia Diagnosis Using X-ray Images
Applying Advanced IoT Network Topologies to Optimize COVID-19 Sanitary Passport Platform Based on CoAP Protocol
An Approach Based on Multi-agent and Artificial Immune Algorithm for the Vehicle Routing Problem in Home-Health Care
Ontology-Based Machine Learning to Predict Diabetes Patients
Advances in Cybersecurity and Information Assurance
Automatic Static Vulnerability Detection Approaches and Tools: State of the Art
Machine Learning Techniques for Intrusion Detection in SDN: A Survey
A Suricata and Machine Learning Based Hybrid Network Intrusion Detection System
Experimental Study on the Effectiveness of Machine Learning Methods in Web Intrusion Detection
A Review of Indoor Positioning Systems (IPS) and Their Different Use-Cases
Towards Automatic Rule Conflict Detection in Snort
A Study of Connection Speeds in Transport Layer Security Version 1.3 (TLS 1.3) Using Different Handshake Modes
Robust Secret Share to Reinforce the Security of IBE’s Master Key
Single Sign-On Revocation Access
New Way to Enumerate Large Quadratic Residue Codes Based on Hash and Automorphism Group
Two-Stage Pipelining Implementation of the Secure Hash Algorithm SHA-3 on Virtex-5 and Virtex-6 FPGAs
Securing MQTT Architecture Using a Blockchain
The Human Factor Capabilities in Security Operation Center (SOC)
A Systematic Review on Software Defined Networks Security: Threats and Mitigations
Correction to: Ontology-Based Machine Learning to Predict Diabetes Patients
People also search:
advances in cybersecurity
advances in communication
advances in information and communication
advances in computer and communication
communication advances
giac information security fundamentals