Skip to main content

Page of 51
and
  1. No Access

    Chapter and Conference Paper

    A Survey of Routing Protocols for WSNs in Smart Farming Applications

    Wireless sensor networks (WSNs) are used in various applications ranging from military to home automation and smart farming. WSNs are deployed to sense the environment so that decision-management systems can ...

    Karim Fathallah, Mohamed Amine Abid in Distributed Computing for Emerging Smart N… (2022)

  2. No Access

    Chapter and Conference Paper

    Combining Artificial Intelligence and Edge Computing to Reshape Distance Education (Case Study: K-12 Learners)

    Nowadays, the use of distance learning is increasing, especially with the recent Covid-19 pandemic. To improve e-learning and maximise its effectiveness, artificial intelligence (AI) is used to analyse learnin...

    Chahrazed Labba, Rabie Ben Atitallah, Anne Boyer in Artificial Intelligence in Education (2022)

  3. No Access

    Chapter and Conference Paper

    Characterization of the State of Health of Electronic Devices for Fostering Safety and Circular Economy

    Inspired by the concept of the health of the human body, the state of health (SoH) determination of products has been gaining importance for preventive maintenance and product lifetime extension. In electronic...

    Christian Wandji, Andreas Riel in Systems, Software and Services Process Imp… (2022)

  4. No Access

    Chapter and Conference Paper

    ImageCLEF 2022: Multimedia Retrieval in Medical, Nature, Fusion, and Internet Applications

    ImageCLEF s part of the Conference and Labs of the Evaluation Forum (CLEF) since 2003. CLEF 2022 will take place in Bologna, Italy. ImageCLEF is an ongoing evaluation initiative which promotes the evaluation ...

    Alba G. Seco de Herrera, Bogdan Ionescu in Advances in Information Retrieval (2022)

  5. No Access

    Chapter and Conference Paper

    ICU Mortality Prediction Using Long Short-Term Memory Networks

    Extensive bedside monitoring in Intensive Care Units (ICUs) has resulted in complex temporal data regarding patient physiology, which presents an upscale context for clinical data analysis. In the other hand, ...

    Manel Mili, Asma Kerkeni, Asma Ben Abdallah in Intelligent Data Engineering and Automated… (2022)

  6. No Access

    Chapter and Conference Paper

    Morphological Analysis for Design Science Research: The Case of Human-Drone Collaboration in Emergencies

    Drones are becoming pervasive in private and professional settings. The engineering of human-drone collaboration poses unique challenges. Specifically, drones’ distinctive capabilities yield a vast design spac...

    Mateusz Dolata, Kiram Ben Aleya in The Transdisciplinary Reach of Design Science Research (2022)

  7. No Access

    Chapter and Conference Paper

    Kaspar Causally Explains

    The Kaspar robot has been used with great success to work as an education and social mediator with children with autism spectrum disorder. Enabling the robot to automatically generate causal explanations is ke...

    Hugo Araujo, Patrick Holthaus, Marina Sarda Gou, Gabriella Lakatos in Social Robotics (2022)

  8. No Access

    Chapter and Conference Paper

    The INTERSECT Open Federated Architecture for the Laboratory of the Future

    A federated instrument-to-edge-to-center architecture is needed to autonomously collect, transfer, store, process, curate, and archive scientific data and reduce human-in-the-loop needs with (a) common interfa...

    Christian Engelmann, Olga Kuchar, Swen Boehm in Accelerating Science and Engineering Disco… (2022)

  9. No Access

    Chapter and Conference Paper

    Modeling Long-Range Travelling Times with Big Railway Data

    Big Railway Data, such as train movement logs and timetables, have become increasingly available. By analyzing these data, insights about train movement and delay can be extracted, allowing train operators to ...

    Wenya Sun, Tobias Grubenmann, Reynold Cheng in Database Systems for Advanced Applications (2022)

  10. No Access

    Chapter and Conference Paper

    IiCE: A Proposed System Based on IoTaaS to Study Administrative Efficiency in Primary Schools

    Although many studies are conducted for ICT systems for educational organisations, there is a lack of understanding of ICT systems’ usage for school administration. Infrastructure IT support Communication Exp...

    Hamad Almaghrabi, Alice Li, Ben Soh in IoT as a Service (2022)

  11. No Access

    Chapter and Conference Paper

    Threat Modeling of Cyber-Physical Systems in Practice

    Traditional Cyber-physical Systems (CPSs) were not built with cybersecurity in mind. They operated on separate Operational Technology (OT) networks. As these systems now become more integrated with Informatio...

    Ameerah-Muhsinah Jamil, Lotfi Ben Othmane in Risks and Security of Internet and Systems (2022)

  12. No Access

    Chapter and Conference Paper

    A Comprehensive Study on the Energy Efficiency of IoT from Four Angles: Clustering and Routing in WSNs, Smart Grid, Fog Computing and MQTT & CoAP Application Protocols

    The Internet of things (IoT) technologies have been develo** since their inception. Consequently, the number of connected devices increases yearly. The development of IoT devices has to be set, taking into c...

    Ziyad Almudayni, Ben Soh, Alice Li in IoT as a Service (2022)

  13. No Access

    Chapter and Conference Paper

    How Byzantine is a Send Corruption?

    Consensus protocols enable n parties, each holding some input string, to agree on a common output even in the presence of corrupted parties. Recent work has pushed to understand the problem when a majority of par...

    Karim Eldefrawy, Julian Loss, Ben Terner in Applied Cryptography and Network Security (2022)

  14. No Access

    Chapter and Conference Paper

    Proof Labeling Schemes for Reachability-Related Problems in Directed Graphs

    We study proof labeling schemes in directed networks, and ask what assumptions are necessary to be able to certify reachability-related problems such as strong connectivity, or the existence of a node from whi...

    Yoav Ben Shimon, Orr Fischer, Rotem Oshman in Structural Information and Communication C… (2022)

  15. No Access

    Chapter and Conference Paper

    Verifiable Private Information Retrieval

    A computational PIR scheme allows a client to privately query a database hosted on a single server without downloading the entire database. We introduce the notion of verifiable PIR (vPIR) where the server can...

    Shany Ben-David, Yael Tauman Kalai, Omer Paneth in Theory of Cryptography (2022)

  16. No Access

    Chapter and Conference Paper

    Research on Demand Forecasting Method of Multi-user Group Based on Big Data

    In order to accurately meet the purchasing needs of consumers, this paper proposes a multi-user demand forecasting model based on big data that organically combines sentiment classification and user portraits....

    Miao Liu, Liangliang Ben in Human Interface and the Management of Info… (2022)

  17. No Access

    Chapter and Conference Paper

    A New Addition Law in Twisted Edwards Curves on Non Local Ring

    Let \(\mathbb {F}_{q}\) be a finite field of q elements with ...

    Moha Ben Taleb Elhamam, Abdelhakim Chillali in Cryptography, Codes and Cyber Security (2022)

  18. No Access

    Chapter and Conference Paper

    Extending SysML with Refinement and Decomposition Mechanisms to Generate Event-B Specifications

    SysML, dedicated to system design, provides graphical models. One of the strengths of these graphical models is that they can be validated by domain experts. However, the semantics of SysML is given in natural la...

    Racem Bougacha, Régine Laleau in Theoretical Aspects of Software Engineering (2022)

  19. No Access

    Chapter and Conference Paper

    The Effect of the Loss on Generalization: Empirical Study on Synthetic Lung Nodule Data

    Convolutional Neural Networks (CNNs) are widely used for image classification in a variety of fields, including medical imaging. While most studies deploy cross-entropy as the loss function in such tasks, a gr...

    Vasileios Baltatzis, Loïc Le Folgoc in Interpretability of Machine Intelligence i… (2021)

  20. No Access

    Chapter and Conference Paper

    Cast-as-Intended: A Formal Definition and Case Studies

    Verifiable voting systems allow voters to check whether their ballot is correctly recorded (individual verifiability) and allow anyone to check whether votes expressed in recorded ballots are correctly counted...

    Peter B. Rønne, Peter Y. A. Ryan, Ben Smyth in Financial Cryptography and Data Security. … (2021)

Page of 51