Description |
1 online resource (607 p.) |
Series |
Lecture Notes in Networks and Systems ; 625 |
|
Lecture notes in networks and systems ; v. 625.
|
Contents |
Intro -- Preface -- Contents -- Computational Intelligence & Big Data -- Construction of a Training Device in Pedagogical Engineering from the "My Scenari" Model -- 1 Theoretical and Conceptual Framework -- 1.1 Theoretical Frame -- 2 Results -- 3 Conclusion -- References -- Machine Learning-Based Intrusion Detection System: Review and Taxonomy -- 1 Introduction -- 2 General Concept of IDS -- 2.1 Intrusion Detection System (IDS) -- 2.2 Classification of Intrusion Detection System -- 3 Benchmark Datasets, Features Reduction, and Evaluation Metrics -- 3.1 Intrusion Detection Datasets |
|
3.2 Feature Selection -- 3.3 Evaluation Metrics -- 4 The ML-Based NIDS -- 4.1 Supervised Learning Methods -- 5 Discussion and Conclusion -- References -- Retrospective Study and Evaluation of School Failure (Junior High School) in Scientific Subjects -- 1 Introduction -- 2 Context -- 3 The School Body in the Province of Ouezzane in Morocco -- 4 Theoretical Framework -- 4.1 School Failure -- 5 Methods -- 5.1 Traget Audience -- 5.2 Origin of the Data -- 5.3 Statistical Analysis -- 6 Results and Interpretation: Exploratory Approach "Comparative Analysis" |
|
6.1 Learning Environment (Rural/urban) and Success Rate -- 6.2 The Effect of Learning Certain Science Subjects on Success Rates -- 6.3 Life and Earth Sciences -- 6.4 Physics Sciences -- 6.5 Mathematics -- 7 Recommendations and Proposals -- 8 Conclusion -- References -- The Use of "Mathematical Modeling" in Physics: Case of Representations and Teaching-Learning Practices -- 1 Introduction -- 2 Theoretical Framework -- 3 Research Methodology -- 4 Results and Discussions -- 4.1 Questionnaire 1 Addressed to Teachers -- 4.2 Questionnaire 2 (Addressed to Learners) -- 5 Conclusion -- References |
|
Towards Face-to-Face Smart Classroom that Adheres to Covid'19 Restrictions -- 1 Introduction -- 2 Related Works -- 3 The Proposed System -- 3.1 Dataset Description -- 3.2 Face Mask Detection Approach -- 3.3 Euclidean Distance -- 4 Experimental Results -- 4.1 Results of the Proposed Dataset -- 4.2 Results of Face Mask Detection Dataset -- 4.3 Comparison with Other Models -- 5 Conclusion -- References -- Supervised Machine Learning for Breast Cancer Risk Factors Analysis and Survival Prediction -- 1 Introduction -- 2 Artificial Intelligence in Epidemiology -- 3 Related Works -- 4 Methods |
|
4.1 K-Fold Cross Validation Strategy -- 4.2 Logistic Regression Classification -- 4.3 Support Vector Machines (SVM) Classification -- 4.4 Decision Tree Classification -- 4.5 Random Forest Classification -- 4.6 Extremely Randomized Trees Classification -- 4.7 K-Nearest Neighbor Classification -- 4.8 Adaptive Boosting Classification -- 5 Results -- 5.1 Data Description -- 5.2 Performance of the Proposed Methods -- 6 Conclusion and Recommendation -- References -- Applying Process Mining in Recommender System: A Comparative Study -- 1 Introduction -- 2 Background and Foundation |
Summary |
This book is a collection of papers that were presented at the 6th International Conference on Big Data Cloud and Internet of Things, BDIoT 2022. The conference took place on October 25-27, 2022, Tangier, Morocco. The book consisted of 49 chapters, which correspond to the four major areas that are covered during the conference, namely Big Data & Cloud Computing, Cybersecurity, Machine Learning, Deep Learning, E-Learning, Internet of Things, Information System and Natural Language Processing. Every year BDIoT attracted researchers from all over the world, and this year was not an exception the authors received 98 submissions from 7 countries. More importantly, there were participants from many countries, which indicates that the conference is truly gaining more and more international recognition as it brought together a vast number of specialists who represented the aforementioned fields and share information about their newest projects. Since the authors strived to make the conference presentations and proceedings of the highest quality possible, the authors only accepted papers that presented the results of various investigations directed to the discovery of new scientic knowledge in the area of Big Data, IoT and their applications. All the papers were reviewed and selected by the Program Committee, which comprised 96 reviewers from over 58 academic institutions. As usual, each submission was reviewed following a double process by at least two reviewers. When necessary, some of the papers were reviewed by three or four reviewers. Authors deepest thanks and appreciation go to all the reviewers for devoting their precious time to produce truly through reviews and feedback to the authors |
Notes |
2.1 Recommender System |
|
Includes author index |
|
Online resource; title from PDF title page (SpringerLink, viewed April 7, 2023) |
Subject |
Big data -- Congresses
|
|
Internet of things -- Congresses
|
|
Machine learning -- Congresses
|
|
Big data
|
|
Internet of things
|
|
Machine learning
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Lazaar, Mohamed
|
|
En-Naimi, El Mokhtar
|
|
Zouhair, Abdelhamid
|
|
Al Achhab, Mohammed
|
|
Mahboub, Oussama
|
ISBN |
9783031283871 |
|
3031283872 |
|