Model and Data Engineering
12th International Conference, MEDI 2023, Sousse, Tunisia, November 2–4, 2023, Proceedings
Book and Conference Proceedings
12th International Conference, MEDI 2023, Sousse, Tunisia, November 2–4, 2023, Proceedings
Book and Conference Proceedings
MEDI 2023 Short and Workshop Papers, Sousse, Tunisia, November 2–4, 2023, Proceedings
Chapter and Conference Paper
Recent machine learning approaches have been effective in Artificial Intelligence (AI) applications. They produce robust results with a high level of accuracy. However, most of these techniques do not provide ...
Chapter and Conference Paper
Digital biofeedback systems (DBS) which use inertial measurement units (IMUs) can support patients during home rehabilitation. Models which accurately segment IMU data for rehabilitation exercises are required...
Chapter and Conference Paper
In order to make efficient decisions in agriculture, it is imperative to analyse the weather data collected from various sources. These data are generated by automated weather stations. Unfortunately, weather ...
Chapter and Conference Paper
Nowadays, a huge amount of knowledge has been amassed in digital agriculture. This knowledge and know-how information are collected from various sources, hence the question is how to organise this knowledge s...
Chapter and Conference Paper
The thesis of this research is that through the mining of Electronic Medical Records containing mixed types of data, and extracting patterns from the processed data, patients can be successfully categorised t...
Chapter and Conference Paper
In precision agriculture (PA), soil sampling and testing operation is prior to planting any new crop. It is an expensive operation since there are many soil characteristics to take into account. This paper giv...
Chapter and Conference Paper
The problem of automatic identification of physical activities performed by human subjects is referred to as Human Activity Recognition (HAR). There exist several techniques to measure motion characteristics d...
Article
Ultra-peers networks are emergent architectures in large-scale distributed computing environments. Controlling the workload is essential since the system scales up rapidly and accommodates a dynamic change in ...
Chapter and Conference Paper
Bandwidth optimization and its efficient utilization is more challenging in operating data centers. Our model can assist for proper usage of resource utilization and accommodate large scale of bursty data. In ...
Chapter and Conference Paper
During this era of the Internet of Things, millions of devices such as automobiles, smoke detectors, watches, glasses and webcams are being connected to the Internet. The number of devices with the ability of ...
Chapter and Conference Paper
In this paper, we propose a framework of knowledge for an agriculture ontology which can be used for the purpose of smart agriculture systems. This ontology not only includes basic concepts in the agricultural...
Article
Online social networks, such as Facebook, Twitter, and Weibo have played an important role in people’s common life. Most existing social network platforms, however, face the challenges of dealing with undesira...
Chapter and Conference Paper
The collection and handling of court admissible evidence is a fundamental component of any digital forensic investigation. While the procedures for handling digital evidence take much of their influence from t...
Chapter and Conference Paper
Exactly where an individual has been is important when attempting to forensically reconstruct an incident. With the advent of portable navigation systems and mobile phones, information about where a person has...
Chapter and Conference Paper
Today we collect large amounts of data and we receive more than we can handle, the accumulated data are often raw and far from being of good quality they contain Missing Values and noise.
Chapter and Conference Paper
Botnets have become the tool of choice to conduct a number of online attacks, e.g., distributed denial of service (DDoS), malware distribution, email spamming, phishing, advertisement click fraud, brute-force ...
Chapter and Conference Paper
The forensic processes and procedures for performing a bit-for-bit copy of computer memory and media are well established and documented. However, most commercially-available tools for smartphone data acquisit...
Chapter and Conference Paper
As cloud adoption grows, the importance of preparing for forensic investigations in cloud environments also grows. A recent survey of digital forensic professionals identified that missing terms and conditions...