Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_16
Hala Khankhour, O. Abdoun, J. Abouchabaka
{"title":"A New Design of an Ant Colony Optimization (ACO) Algorithm for Optimization of Ad Hoc Network","authors":"Hala Khankhour, O. Abdoun, J. Abouchabaka","doi":"10.1007/978-981-16-3637-0_16","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_16","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127877650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdelhak El Mouaffak, Abdelbaki El Belrhiti El Alaoui
Wireless sensor networks are a low-power communication technology that is increasingly used in our daily life to realize various monitoring tasks in almost all domains. Therefore, WSN are getting much interest from scientific researches. Simulations and Emulations are used for evaluating new protocols and architectures. Such tools focus on analyzing higher-layer protocols and suppose that the physical layer models, particularly the radio propagation models, do not interfere with the experimentation. Therefore, the adopted radio propagation model has a great impact on the simulation/emulation results. In this paper, we study the consideration of the deployment environment in some popular simulators and emulators.
{"title":"Considering the environment's characteristics in wireless networks simulations and emulations: case of popular Simulators and WSN","authors":"Abdelhak El Mouaffak, Abdelbaki El Belrhiti El Alaoui","doi":"10.1145/3386723.3387821","DOIUrl":"https://doi.org/10.1145/3386723.3387821","url":null,"abstract":"Wireless sensor networks are a low-power communication technology that is increasingly used in our daily life to realize various monitoring tasks in almost all domains. Therefore, WSN are getting much interest from scientific researches. Simulations and Emulations are used for evaluating new protocols and architectures. Such tools focus on analyzing higher-layer protocols and suppose that the physical layer models, particularly the radio propagation models, do not interfere with the experimentation. Therefore, the adopted radio propagation model has a great impact on the simulation/emulation results. In this paper, we study the consideration of the deployment environment in some popular simulators and emulators.","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125199943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_41
Youness Saadna, A. Boudhir, M. Ahmed
{"title":"An Analysis of ResNet50 Model and RMSprop Optimizer for Education Platform Using an Intelligent Chatbot System","authors":"Youness Saadna, A. Boudhir, M. Ahmed","doi":"10.1007/978-981-16-3637-0_41","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_41","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127045245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_9
Naouel Seghiri, M. Z. Baba-Ahmed, B. Benmammar, Nadhir Houari
{"title":"Optimization of a Multi-criteria Cognitive Radio User Through Autonomous Learning","authors":"Naouel Seghiri, M. Z. Baba-Ahmed, B. Benmammar, Nadhir Houari","doi":"10.1007/978-981-16-3637-0_9","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_9","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127827516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Skin Detection Based on Convolutional Neural Network","authors":"Yamina Bordjiba, Chemesse ennehar Bencheriet, Zahia Mabrek","doi":"10.1007/978-981-16-3637-0_6","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_6","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131840419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_56
Mohamed Eddoujaji, Hassan Samadi, Mohamed Bohorma
{"title":"Data Processing on Distributed Systems Storage Challenges","authors":"Mohamed Eddoujaji, Hassan Samadi, Mohamed Bohorma","doi":"10.1007/978-981-16-3637-0_56","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_56","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124896582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_17
Kaoutar Bella, A. Boulmakoul
{"title":"Real-Time Distributed Pipeline Architecture for Pedestrians' Trajectories","authors":"Kaoutar Bella, A. Boulmakoul","doi":"10.1007/978-981-16-3637-0_17","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_17","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123386933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_11
M. Boulouird, Jamal Amadid, Abdelhamid Riadi, M. Hassani
{"title":"Channel Estimation in Massive MIMO Systems for Spatially Correlated Channels with Pilot Contamination","authors":"M. Boulouird, Jamal Amadid, Abdelhamid Riadi, M. Hassani","doi":"10.1007/978-981-16-3637-0_11","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_11","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"102 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126250636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_1
Ayoub Jadouli, Chaker El Amrani
{"title":"Detection of Human Activities in Wildlands to Prevent the Occurrence of Wildfires Using Deep Learning and Remote Sensing","authors":"Ayoub Jadouli, Chaker El Amrani","doi":"10.1007/978-981-16-3637-0_1","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_1","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121853351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_44
Zineb Korachi, B. Bounabat
{"title":"Towards a Smart City Approach: A Comparative Study","authors":"Zineb Korachi, B. Bounabat","doi":"10.1007/978-981-16-3637-0_44","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_44","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121877180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}