<span>This book describes the potential contributions of emerging technologies in different fields as well as the opportunities and challenges related to the integration of these technologies in the socio-economic sector. In this book, many latest technologies are addressed, particularly in the fiel
International Conference on Advanced Intelligent Systems for Sustainable Development: Volume 2 - Advanced Intelligent Systems on Network, Security, ... (Lecture Notes in Networks and Systems)
â Scribed by Janusz Kacprzyk (editor), Mostafa Ezziyyani (editor), Valentina Emilia Balas (editor)
- Publisher
- Springer
- Year
- 2023
- Tongue
- English
- Leaves
- 454
- Category
- Library
No coin nor oath required. For personal study only.
⌠Synopsis
This book describes the potential contributions of emerging technologies in different fields as well as the opportunities and challenges related to the integration of these technologies in the socio-economic sector. In this book, many latest technologies are addressed, particularly in the fields of computer science and engineering. The expected scientific papers covered state-of-the-art technologies, theoretical concepts, standards, product implementation, ongoing research projects, and innovative applications of Sustainable Development. This new technology highlights, the guiding principle of innovation for harnessing frontier technologies and taking full profit from the current technological revolution to reduce gaps that hold back truly inclusive and sustainable development. The fundamental and specific topics are Big Data Analytics, Wireless sensors, IoT, Geospatial technology, Engineering and Mechanization, Modeling Tools, Risk analytics, and preventive systems.
⌠Table of Contents
Foreword
Preface
Organization
Acknowledgement
Contents
Two Levels Feature Selection Approach for Intrusion Detection System
1 Introduction
2 Related Work
3 Background on Feature Selection
4 Proposed Approach
5 Experimental Setup
6 Results and Comparative Analysis
6.1 Results and Discussion
6.2 Comparative Analysis
7 Conclusions and Future Work
References
Method of Detecting Denial of Service Attacks in WSNs While Optimizing Network Life Span
1 Introduction
2 Related Works
2.1 Protocol LEACH-EDE
2.2 Denial of Service Attack
3 Approach
3.1 Problematic
3.2 Proposed System (LTMN Protocol)
4 Conclusion
References
Numerical Investigation into the Vertical Dynamic Behavior of Railway Tracks
1 Introduction
2 Numerical Study on the Railway Tracks Dynamic Response
3 Validation of the Calculation Results
4 The Dynamic Properties of the Non-ballasted Railway Track
5 Conclusion
References
AÂ Lightweight, Multi-layered Internet Filtering System
1 Introduction
2 Internet Filtering Methods
3 Problematic
4 Project Presentation
4.1 Filtering Equipment
4.2 Servers on the Cloud
4.3 The Mobile Control Application
5 The Filtering Process
5.1 The Web Filtering Module
5.2 The Service Filtering Module
5.3 The Filtering Module of an Application
6 The Deployment of the Solution
7 Conclusion
Tracking Methods: Comprehensive Vision and Multiple Approaches
1 Introduction
2 Elucidation Tracking
3 Related Work
4 Analysis and Discussion
5 Conclusion and Future Work
References
Multi-blockchain Scheme Based on IoT and Smart Contracts in the Agricultural Field for Data Management
1 Introduction
2 Previous Work
3 The Proposed Architecture
4 Conclusion
References
A Geometry-Based Analytical Model for Vehicular Visible Light Communication Channels
1 Introduction
1.1 Related Works
2 System Model
2.1 Atmospheric Attenuation ha
2.2 The Geometrical Propagation Path Loss hg
3 Simulation Results and Analysis
4 Conclusion
References
Mapping Review of Research on Supply Chains Relocation
1 Introduction
2 Different Business Strategies Related To SCM
3 Definition of Relocation in Literature
3.1 Existing Definitions of Relocation
3.2 Types of Relocation
4 Motivations Behind Relocation Across Literature
5 Literature Review: Dimensions of the Relocation Decision Model and Its Different Variables
5.1 Mapping Review of Supply Chains Relocation
5.2 Mapping Strategy
5.3 Yearly Contribution Trend and Main Authors
5.4 Subject Area and Fileds of Research
5.5 Geographical Position and Contributing Affiliations
6 Financial Factors in SCRM
7 Conclusion
References
A Predictive Maintenance System Based on Vibration Analysis for Rotating Machinery Using Wireless Sensor Network (WSN)
1 Introduction
2 Predictive Maintenance for Rotating Machinery
2.1 Concept and Functioning of the Predictive Maintenance (PdM)
2.2 Predictive Maintenance Technologies
2.3 Predictive Maintenance - Process (CBM-PHM)
3 Detection, Diagnosis, and Prognosis for Rotating Machinery
3.1 Detecting Faults of Rotating Machines
3.2 Commonly Witnessed Machinery Faults Diagnosed by Vibration Analysis
3.3 Vibration Signal Analysis and Measurement
3.4 The Accelerometer Sensor
3.5 Classification of Diagnostic Methods
4 Wireless Sensor Network (WSN)
5 Results and Discussions
6 Conclusion and Perspectives
References
A Comparative Study of Vulnerabilities Scanners for Web Applications: Nexpose vs Acunetix
1 Introduction
2 Description of XSS, SQL Injection (Second Order) and CSRF
2.1 Cross Site Scripting (XSS)
2.2 SQL Injection (Second-Order)
2.3 CSRF (Giant-Cross Site Request Forgery)
3 Penetration Testing Concept
3.1 Acunetix
3.2 Nexpose
4 Application and Comparison
4.1 Proposed Architecture
4.2 Benchmarking
5 Conclusion
References
The Pulse-Shaping Filter Influence over the GFDM-Based System
1 Introduction
2 System Model-Based OFDM
3 System Model-Based GFDM
3.1 GFDM Transmitter
3.2 GFDM Receiver
3.3 Rectangular Filter
3.4 Raised-Cosinise (RC)
3.5 Root Raised-Cosinise (RRC)
4 Numerical Results
4.1 The Impact of the the Designed Pulse-Shaping Filter
4.2 Influence of the Number of Sub-carriers
5 Conclusion
References
Intrusion Detection Systems in Internet of Things Using Machine Learning Algorithms: A Comparative Study
1 Introduction
2 Relevant Terms
2.1 Intrusion Detection System
2.2 Internet of Things
2.3 Machine Learning
3 Preliminary
3.1 The Algorithms Used
3.2 The Parameters Used
3.3 The Dataset Used
4 Experiment
4.1 Experiment Setup
4.2 Results and Discussion
5 Conclusion
References
Generative Adversarial Networks for IoT Devices and Mobile Applications Security
1 Introduction
2 Mobile Applications' Vulnerabilities
3 Solutions for Protecting Mobile Applications
3.1 Hardware Level Protections
3.2 Generative Adversarial Networks for Software Level Protection
4 Conclusion and Perspectives
References
The Indoor Localization System Based on Federated Learning and RSS Using UWB-OFDM
1 Introduction
2 Indoor Localization Based on Federated Learning FL and RSS Method
3 Evaluation of Results
3.1 System Parameters
3.2 Simulation Setup
3.3 Discussion
4 Tools Performance
5 Conclusion
References
Artificial Intelligence for Smart Decision-Making in the Cities of the Future
1 Introduction
2 Proposed Methodology
2.1 Formal Concept Analysis
2.2 Concept Lattices
2.3 Data Extraction Environment
3 Results and Discussion
4 Conclusion and Perspectives
References
Performance Comparison of Localization Techniques in Term of Accuracy in Wireless Sensor Networks
1 Introduction
2 Wireless Sensor Network (WSN)
3 Localization Algorithm
3.1 Range-Based Technique
3.2 Range-Free Technique
4 Simulation and Results
4.1 Placement Model
4.2 System Parameters
4.3 Results
5 Conclusion and Future Works
References
Fog Computing Model Based on Queuing Theory
1 Introduction
2 Vehicular Fog Computing Architecture
3 Model Description
4 Problem Analytical Model
4.1 The Mobile and Static Fog Nodes Models
4.2 QoS Performance Parameters
5 Numerical Results
6 Discussion
7 Conclusion
References
From Firewall and Proxy to IBM QRadar SIEM
1 Introduction
2 SIEM IBM QRADAR
References
IoT-Based Approach for Wildfire Monitoring and Detection
1 Introduction
2 Background
2.1 Internet of Things
2.2 Sensors
2.3 LoRaWAN
2.4 ESP32
2.5 MQTT
3 Related Work
4 Proposed Methodology
4.1 Proposed Prototype
5 Results and Discussions
6 Conclusion
References
A Decision-Making Model Based on a High-Level Ontology in Context of a Smart Home
1 Introduction
2 Ontology Context and Smart Home
3 Related Work
4 Proposed Model
5 Conclusion
References
Integration of the Human Factor in the Management and Improvement of Performance of Production Systems: An Exploratory Literature Review
1 Introduction
2 Industry 4.0: Overview from History
2.1 Web and Mobile Applications
2.2 3D Printing
2.3 Internet of Things (IoT)
2.4 Cloud Computing
3 Human Factors
4 Literature Review
5 Challenges of Human Factor
6 Challenges of New Technologies
7 Analysis and Discussions
8 Conclusions
References
Securing Caesar Cryptography Using the 2D Geometry
1 Introduction
2 Related Work
3 Proposed Method
3.1 Explanation of the Method
3.2 Encryption Process
3.3 Decryption Process
4 Resistance Against Attacks
4.1 Brute Force Attack
4.2 Frequency Analysis Attack
5 Experimentation
5.1 Encrypting the Original Text
5.2 Securing the Text with the Proposed Algorithm
5.3 Decryption of the Received Text
6 Conclusion
References
A Comparative Study of Neural Networks Algorithms in Cyber-Security to Detect Domain Generation Algorithms Based on Mixed Classes of Data
1 Introduction
2 Domain Generation Algorithms
2.1 DGA Structures and Types
2.2 DGAs Features
3 Neural Network Methods to Detect DGAs
3.1 Data Collection
3.2 Architectures of the Compared Models
4 Evaluation
4.1 Implementation Details
4.2 Resultat
5 Conclusion and Feature Works
References
A Literature Review of Digital Technologies in Supply Chains
1 Introduction
2 Literature Review and Background
2.1 Digital Technologies of the Supply Chain
3 Methodological Procedures
4 Results and Discussions
5 Conclusion
References
IoT Systems Security Based on Deep Learning: An Overview
1 Introduction
2 IoT Security Threats Per Layer
3 History of IoT Security Attacks
4 Deep Learning and IoT Security
5 Conclusion
References
Deep Learning for Intrusion Detection in WoT
1 Introduction
2 Related Work
3 Proposed Work
4 Conclusion
References
Artificial Intelligence Applications in the Global Supply Chain: Benefits and Challenges
1 Introduction
2 Understanding of Artificial Intelligence Technology
2.1 Definition and History
2.2 Enabling Drivers and Technologies of Artificial Intelligence
3 Benefits of Artificial Intelligence in Supply Chain Management:
3.1 Artificial Intelligence and Forecast Demand Optimization
3.2 Artificial Intelligence Between Manufacturing and Smart Manufacturing
3.3 Artificial Intelligence and Warehousing
3.4 Artificial Intelligence and Distribution
4 Artificial Intelligence Risks and Challenges
5 Conclusion
References
Fault Detection and Diagnosis in Condition-Based Predictive Maintenance
1 Introduction
2 Terminology and Concepts
2.1 Fault, Failure, and Malfunction
2.2 Predictive Maintenance and Condition Monitoring
2.3 Fault Detection, Diagnosis, and Prognosis
3 Machine Fault Diagnosis
3.1 Model-Based Approach
4 Conclusion and Future Research
References
Agile Practices in Iteration Planning Process of Global Software Development
1 Introduction
2 Background and Related Work
2.1 Challenges of Global Software Development Projects
2.2 Iteration Planning in Software Development Project
3 Iteration Planning in GSD: Activities and Repositories
3.1 Iteration Planning in GSD Project: Activities
3.2 Iteration Planning Repositories
4 Conclusion
References
Sensitive Infrastructure Control Systems Cyber-Security: Literature Review
1 Introduction
2 An Over View About Cyber-Security
2.1 Cyber-Security
2.2 Cyber-Attacks
2.3 Cyber-Defense
2.4 Impact of Cyber-Attacks
2.5 Consequences of Cyber-Attacks
3 Critical Infrastructures:
4 Research Perspectives
4.1 Social Dimension
4.2 Political Dimension
4.3 Technical Dimension
5 Conclusion
References
Design of SCMA Codebook Based on QAM Segmentation Constellation
1 Introduction
2 System Model
3 Sparse Mapping Matrix F with PEG
4 SCMA Codebook Design
4.1 Mother Constellation - MC
4.2 Sub-constellation Generation with MED Maximization
4.3 SCMA Codebook Generation by Sub-constellation Mapping with MED Maximization
5 Design Example
6 Numerical Results and Analysis
7 Conclusion
References
Towards an Optimization Model for Outlier Detection in IoT-Enabled Smart Cities
1 Introduction
2 Related Work
2.1 IoT Paradigm: Definition, Layers and Enabling Technologies
2.2 Data Quality: Definition, Dimensions and Issues
2.3 Outlier Detection: Definition and Techniques
3 Towards a model for outlier detection in IoT-enabled smart cities
3.1 Data Quality for Geolocation Services
3.2 Recommended Method for OD
4 Conclusion
References
Performance Analysis of Static and Dynamic Clustering Protocols for Wireless Sensor Network
1 Introduction
2 Energy Consumption Model
3 Energy Consumed in Dynamic Clustering (set-Up Phase)
4 Energy Consumed in Static Clustering
5 Experiments and Results
5.1 Comparison of Network Lifetime
5.2 Comparison of the Energy Consumption.
5.3 Comparison of the Data Received by the Base Station
6 Conclusion
References
A Comprehensive Study of Integrating AI-Based Security Techniques on the Internet of Things
1 Introduction
2 Related Works
3 Overview of the Internet of Things (IoT) and Security Threats
3.1 IoT Overview
3.2 Challenges of the Emerging IoT Networks
3.3 Security Threats in IoT Networks
4 AI-Based Methods for IoT Security
5 Open Challenges and Future Research Opportunities
6 Conclusion
References
Semantic Segmentation Architecture for Text Detection with an Attention Module
1 Introduction
2 Related Works
3 The Proposed Method
3.1 Architecture
3.2 Attention Block
3.3 Loss
4 Experiments
5 Results
5.1 Quantitative Results
5.2 Qualitative Results
6 Conclusion
References
Car Damage Detection Based on Mask Scoring RCNN
1 Introduction
2 Related Work
3 Proposed Method
3.1 Mask Scoring RCNN
3.2 Transfer Learning
4 Results and Discussion
4.1 Dataset
4.2 Training Platform
4.3 Evaluation Metric
4.4 Results
4.5 Comparison with Mask RCNN
5 Conclusion
References
Blockchain and IoT for Real-Time Decision Support for the Optimization of Maritime Freight Transport Networks
1 Introduction
1.1 Big Data, Blockchain and Internet of Things as Solution for Logistics and Freight Transportation Problems
1.2 Overview of the Concept of Big Data
2 Big Data and IoT Technologies in Maritime Freight Transportation
2.1 Smart Containers
3 Adoption of Blockchain in Maritime Freight Transportation
3.1 What is Blockchain?
3.2 Problematic Solved by Blockchain Technology
4 What is Blockchainâs Value Proposition in Maritime Freight Transportation?
4.1 Smart Contracts
5 A Model for Using Blockchain Transaction Process
6 Maritime Freight Transportation
7 Conclusion
References
MQTT Protocol Analysis According to QoS Levels and SSL Implementation for IoT Systems
1 Introduction
2 Related Work
3 Background
3.1 MQTT
3.2 Quality of Service (QoS)
4 Experimental Study and Results
4.1 MQTT Analysis Without Security
4.2 MQTT Analysis with Security Implemented
5 Results and Discussion
6 Conclusion
References
New Analytical Method to Classify Areas According to Signal Quality and Coverage of GSM Network
1 Introduction
2 Related Work
2.1 Evaluation of the Signal Strength of the Mobile Network for GSM Networks in Gusau, in the State of Zamfara
2.2 Comparison Between the Differ Operator
3 Collection of Data via the Application
3.1 Figures and Tables Development of a Mobile Application
3.2 The Areas Concerned
4 The Algorithm Proposes
4.1 The Flood Filling Algorithm
4.2 Program Code
5 Proposed Solution
5.1 Presented Nodes via Signal Strength Level on Relevant Areas
5.2 Presents Problem Areas via the Flood Algorithm
5.3 Model Architecture
6 Analysis of the Following Signal the Environment of Each Zone
7 Conclusion
References
Neural Network Feature-Based System for Real-Time Road Condition Prediction
1 Introduction
2 Related Works
3 Proposed Solution
4 Conclusion
References
Author Index
đ SIMILAR VOLUMES
<span>This book describes the potential contributions of emerging technologies in different fields as well as the opportunities and challenges related to the integration of these technologies in the socio-economic sector. In this book, many latest technologies are addressed, particularly in the fiel
<span>This book describes the potential contributions of emerging technologies in different fields as well as the opportunities and challenges related to the integration of these technologies in the socio-economic sector. In this book, many latest technologies are addressed, particularly in the fiel
<span>This book describes the potential contributions of emerging technologies in different fields as well as the opportunities and challenges related to the integration of these technologies in the socio-economic sector. In this book, many latest technologies are addressed, particularly in the fiel
<p><p>This proceedings book presents extended versions of papers on advanced intelligent systems for networks and system selected from the second edition of the International Conference on Advanced Intelligent Systems for Sustainable Development (AI2SDâ2019), which was held on 8â11 July 2019 in Marr
<p><span>This book is a remarkable collection of chapters covering a wide domain of topics related to artificial intelligence and its applications to the real world. The conference attracted a total of 494 submissions from many academic pioneering researchers, scientists, industrial engineers, and s