توضیحاتی در مورد کتاب Innovations in Smart Cities Applications Volume 7: The Proceedings of the 8th International Conference on Smart City Applications, Volume 1 (Lecture Notes in Networks and Systems, 906)
نام کتاب : Innovations in Smart Cities Applications Volume 7: The Proceedings of the 8th International Conference on Smart City Applications, Volume 1 (Lecture Notes in Networks and Systems, 906)
عنوان ترجمه شده به فارسی : نوآوری ها در برنامه های کاربردی شهرهای هوشمند جلد 7: مجموعه مقالات هشتمین کنفرانس بین المللی برنامه های کاربردی شهر هوشمند، جلد 1 (یادداشت های سخنرانی در شبکه ها و سیستم ها، 906)
سری :
نویسندگان : Mohamed Ben Ahmed (editor), Anouar Abdelhakim Boudhir (editor), Rani El Meouche (editor), İsmail Rakıp Karaș (editor)
ناشر : Springer
سال نشر : 2024
تعداد صفحات : 637
ISBN (شابک) : 3031538234 , 9783031538230
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 52 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Preface
Committees
Keynotes Speakers
Smart City: Why, What, Experience Feedback and the Future/Challenges
Imagining a Digital Competency Management Ecosystem Approach to Transforming the Productivity of People in the Built Environment
Challenges of Cybersecurity in Smart Cities
Advancing Urban Modelling with Emerging Geospatial Datasets and AI Technologies
Integrating System Dynamics in Digital Urban Twin
Background of Smart Navigation
Contents
Smart Cities
Connections Between Smart City and Flood Management Against Extreme Weather Events
1 Introduction
2 Smart Data Resources for Flood Management
3 Flood Maps: Basis for Smart Systems Planning
4 Conclusion
References
Unleashing the Potential of Graph Database in Smart Asset Management: Enhancing Predictive Maintenance in Industry 4.0
1 Introduction
1.1 Predictive Maintenance and Industry 4.0
1.2 Predictive Maintenance for Immovable and Movable Assets
1.3 Data Challenges in Predictive Maintenance
2 Graph Database as Agile Solution: Implementing Graph Database for Predictive Maintenance
2.1 Storing Asset Information Using Graph Database for Predictive Maintenance
2.2 Graph Database in Managing Built Environment Infrastructure
2.3 Integrating Graph Database with Predictive Maintenance Workflows
3 Discussion and Future Directions
4 Conclusion
References
Deep Learning or Traditional Methods for Sentiment Analysis: A Review
1 Introduction
2 Literature Review
3 Machine Learning Tools
3.1 Naïve Bayes (NB)
3.2 Multinomial Naïve Bayes
3.3 Support Vector Machine (SVM)
3.4 Maximum Entropy (MaxEnt)
3.5 Stochastic Gradient Descet (SGD)
3.6 Multilayer Perceptron (MLP)
3.7 Random Forest
4 Deep Learning Tools
4.1 CNN’s
4.2 Recurrent Neural Networks (RNN)
4.3 LSTM
4.4 Word Embedding
4.5 DBN\'s
5 Discussion and Possible Directions
6 Conclusion and Future Works
References
Knowledge Infrastructure Data Wizard (KIDW): A Cooperative Approach for Data Management and Knowledge Dissemination
1 Introduction
2 Data Management Challenges in Multi-Activity Projects
3 Methodology
4 Main Developed Components of the Data Wizard
4.1 The Interactive Knowledge Tree (IKT)
4.2 The Typical Experimentations
4.3 The Activity in the Project
4.4 The Relations and Dependency Graph
4.5 The Knowledge Transfer Form (KTF)
4.6 The Storybook
5 Put into Operation and Feedbacks
6 Conclusion and Future Works
References
YOLOv5 Model-Based Real-Time Recyclable Waste Detection and Classification System
1 Introduction
1.1 Project Scope
2 Related Works
3 System Design
3.1 Dataset
3.2 Data Labelling Using the Make Sense Online Tool
3.3 YOLOv5 Algorithms
4 Result and Discussion
4.1 Mean Average Precision Metric
4.2 Accuracy Testing
5 System Limitation
6 Recommendation
7 Conclusion
References
Reviewing the Effect of Indoor Living Walls on Air Quality, Energy Consumption in Different Climates
1 Introduction
2 Methodology
3 Findings and Discussion
3.1 Climate Change, Pandemic (Covid-19) and Energy Consumption
3.2 Indoor Air Quality
3.3 Living Walls
3.4 Indoor Living Walls
3.5 Living Walls in Various Climates
4 Conclusion
References
Acoustic Emission and Machine Learning for Smart Monitoring of Cable Damages in Bridges
1 Introduction
2 Experimental Setup
3 Results and Discussion
3.1 Parametric Analysis
3.2 Unsupervised and Supervised Machine Learning Analyses
4 Conclusion
References
Seismic Waves Shielding Using Spherical Matryoshka-Like Metamaterials
1 Introduction
2 Model and Methods
3 Results and Discussion
4 Conclusion
References
Investigating the Spatial Suitability of the Location of Urban Services Using Space Syntax Theory
1 Background
2 Methods
2.1 Study Area
2.2 Methodology
3 Results and Discussion
3.1 Spatial Mapping
3.2 Performance Index
3.3 Results Explanation
4 Conclusion
References
The Impact of Influencer Marketing Versus Paid Ads on Social Media: Moroccan Perspective
1 Introduction
2 Literature Review
3 Methodology
3.1 Background to the Study
3.2 Data Collection
3.3 Population of the Study
4 Results
4.1 Participants
4.2 Social Media Platform
4.3 Influencer Marketing
4.4 Paid ADS
5 Discussion
6 Conclusion and Future Research
References
Electronic Voting: Review and Challenges
1 Introduction
2 Electronic Voting Requirements
3 Literature Review
4 Existing Voting Systems in Different Countries
4.1 Electronic Voting in Estonia
4.2 Electronic Voting in Brazil
4.3 Electronic Voting in India
4.4 Electronic Voting in Namibia
4.5 Electronic Voting in the USA
5 Discussion
6 Conclusion
References
Smart Mobility Systems
Recommended LEED-Compliant Cars, SUVs, Vans, Pickup Trucks, Station Wagons, and Two Seaters for Smart Cities Based on the Environmental Damage Index (EDX) and Green Score
1 Nomenclature (Alphabetical Order, Numbers Come First)
2 Introduction
2.1 Overview
2.2 Study Objective
2.3 Criteria for Selecting Vehicle Models
3 ACEEE’s EDX and ACEEE’s Green Score
4 Results
4.1 Extreme Cases Per Broad Vehicle Class
4.2 Lists of Top Vehicle Models Per Broad Vehicle Class
5 Conclusions
References
Tracking and Tracing Containers Model Enabled Blockchain Basing on IOT Layers
1 Introduction
2 Background
2.1 Containerization and Containers Tracking
2.2 Blockchain and Its Use in Tracking
3 Containers Tracking in Portal Supply Chain
4 Technologies Used in the Tracking and Tracing Operation
4.1 Internet of Things IOT
4.2 Blockchain Technology
5 Results
6 Conclusion and Discussion
References
A Grid-Based and a Context-Oriented Trajectory Modeling for Mobility Prediction in Smart Cities
1 Introduction
2 Related Works
3 Trajectory Modeling For Mobility Prediction
3.1 Trajectory Description Technique: Technique of the Grid
3.2 Trajectory Modeling
3.3 Comparative Study
4 Application of the Model in Road Traffic Field
4.1 Model Evaluation
5 Conclusion and Future Works
References
Real-Time Mapping of Mobility Restrictions in Palestine Using Crowdsourced Data
1 Introduction
2 Methods
2.1 Data Sources and Collection
2.2 Data Processing
2.3 Service Publishing
3 Application
4 Conclusion
References
Comparative Analysis of ITS-G5 and C-V2X for Autonomous Vehicles with an Improved Algorithm of C-V2X
1 Introduction
2 CV2X
2.1 Concept of C-V2X
2.2 C-V2X Services
2.3 C-V2X Architecture
3 C-ITS
3.1 Concept of C-ITS
3.2 ITS-5G Services
3.3 ITS-G5 Architecture
4 Comparison ITS-G5 VS CV2X
4.1 Coexistence Between c-v2x and ITS-G5
4.2 C-V2X vs. ITS-G5
5 Improvement of C-V2X Algorithm
6 Conclusion
References
Evaluation of Resilience Based on Resources and Adaptation Level in Critical Transport Infrastructures
1 Introduction
2 CTIs Data-Driven Investment
2.1 Dynamic Economic Resilience
2.2 Adaptation and Sustainable Criteria
3 Data-Driven Methodology
3.1 Resilience and Sustainability Quantification
3.2 Adaptation Level Assessment
4 Case-Study
5 Results
5.1 LCC Analysis
5.2 Adaptation Level
6 Conclusions
References
Optimizing Station Selection and Routing Efficiency Using the Pickup and Delivery Problem Method with A-Star and Genetic Algorithm
1 Introduction
2 Literature Review
3 The Mathematical Modeling
3.1 Sets
3.2 Parameters
3.3 Decision Variables
3.4 Cost Function
4 Our Approach
4.1 PDP Method
4.2 Genetic Algorithm
4.3 A-Star Algorithm
5 Results
6 Conclusion
References
.26em plus .1em minus .1emSpatio-Temporal Clustering for Optimal Real-Time Parking Availability Estimation
1 Introduction
2 Related Works
3 Methodology
4 Implementation and Results
5 Conclusion
References
Real-Time Parking Availability Classification on a Large-Area Scale
1 Introduction
2 Related Work
3 Methodology
3.1 Pre-processing and Clustering
3.2 Classifiers
4 Result
4.1 Dataset
4.2 Metrics
4.3 Discussion
5 Conclusion
References
A Review of a Research in Autonomous Vehicles with Embedded Systems
1 Introduction
2 Material Method
3 Probabilistic Hough Line Transform
4 Exerimental Analysis
4.1 JetRacer AI KIT
4.2 Implementation Details and Experimental Setup
5 Discussion and Conclusion
References
A Comparative Analysis of MANET Routing Protocols Using NS2 and NS3 Simulators
1 Introduction
2 Related Works
3 Methods and Technics
4 Results and Discussions
5 Conclusion and Future Work
References
Sustainable Cities
Enhancing Sustainability: Leveraging Sensor Technology in Smart Bins for Real-Time Data Analysis
1 Introduction
2 Literature Review
3 Methodology
3.1 Selection and Integration of Physical Parameters
3.2 Selection and Integration of Appropriate Sensors
4 Results and Discussion
5 Conclusion and Perspectives
References
The Accuracy Analysis and Usability of Low Cost RTK Portable Kit on Surveying Aims
1 Introduction
2 Material and Method
2.1 ArduSimple RTK Calibrated Surveyor Kit
2.2 Study Area and Data Collection
3 Results
4 Conclusions
References
Sustainability Assessment of Public Schools in the Palestinian Territory
1 Introduction
2 Methodology
2.1 Implementation of the Pressure-State-Response (PSR) Model for the Framework
2.2 SWARA Method
2.3 Data Collection
3 Results and Discussion
3.1 Presentation of Results
3.2 Discusion of the Sustainability Categories Ranking
3.3 Discusion of of the Sustainability Indicators’ Weights
4 Application on Palestinian Schools
5 Conclusion
References
Empowering Sustainability Advancement in Urban Public Spaces Through Low-Cost Technology and Citizen Engagement
1 Introduction
2 Background
3 Methodology
4 Results
4.1 Distribution and Accessibility
4.2 The Users
4.3 Physical Features
4.4 The Safety Perception
5 Conclusion and Future Work
References
Energy and Exergy Analysis of a Domestic Hot Water Production System with a Heat Pump and Thermal Storage
1 Introduction
2 Presentation of the Methodology
2.1 Description of the Experimental Bench, Metrology and Procedure
2.2 Description of the Numerical Model
3 Energy and Exergy Analysis of the System
3.1 Energy Balance
3.2 Exergy Balance
4 Results and Interpretations
4.1 Energy Analysis
4.2 Exergy Analysis
4.3 Energy and Exergy Distribution Diagram
5 Conclusion et Perspectives
References
Post-Disaster Assessment of Buildings in Complex Geopolitical Context: Application to Beirut Port
1 Introduction
2 Methodology
2.1 Estimation of the Priority Index
2.2 Data Collection
3 Results and Discussion
3.1 Weights of the Indicators According to Experts
3.2 Data Analysis
4 Conclusion
Appendix 1
SWARA Method
Weights of the Indicators
References
Smart Waste Management System Based on IoT
1 Introduction
2 Related Work
2.1 Discussion
3 Smart Waste Management System Based on IoT
3.1 Geolocation System
3.2 Smart Dustbin System
3.3 The Functionality of the System
4 Implementation of the Proposed Solution
4.1 Administration Web Dashboard
4.2 Truck\'s Driver Mobile Application
4.3 Smart Bin Prototype
5 Results
6 Conclusion
References
A Review on Artificial Intelligence and Behavioral Macroeconomics
1 Introduction
2 Artificial Intelligence over Time
3 AI in Macroeconomics
4 From Classical to Behavioral Macroeconomics
5 AI Techniques in Behavioral Macroeconomics Axes
6 Conclusion
References
Using Machine Learning and TF-IDF for Sentiment Analysis in Moroccan Dialect an Analytical Methodology and Comparative Study
1 Introduction
2 Sentiment Analysis in Moroccan Dialect
3 Proposed Approach
3.1 Dataset
3.2 Preprocessing Techniques
3.3 Feature Extraction
4 Classification Algorithms
4.1 Logistic Regression
4.2 Support Vector Machine
4.3 Decision Tree
5 Performance Parameters
5.1 Accuracy
5.2 Precision
5.3 Recall
5.4 F-1score
6 Results and Comparison Analysis
6.1 Results of the Work
6.2 Comparison Analysis
7 Conclusion
References
Smart Healthcare Systems
Study of Correlation Between Intestinal Parasitism and the Nutritional Status of Children at the Moulay Abdellah Hospital of Sale (MOROCCO)
1 Introduction
2 Patients, Materials and Methods
2.1 Type, Location, Duration of Study
2.2 Inclusion Criteria
2.3 Exclusion Criteria
2.4 Estimating the Prevalences of Intestinal Parasitism and Forms of Malnutrition
2.5 Statistical Analysis
2.6 Ethical Aspects
3 Résultats
3.1 Prévalence Parasitaire
3.2 Prevalence of Malnutrition
3.3 Variation of Malnutrition According to Intestinal Parasitism
4 Discussion
5 Conclusion
References
An IoT-Based Smart Home for Elderly Suffering from Dementia
1 Introduction
2 Related Work
3 The Proposed Solution
4 Results and Discussion
5 Conclusion
References
MFOOD-70: Moroccan Food Dataset for Food Image Recognition Towards Glycemic Index Estimation
1 Introduction
2 Related Works
2.1 Food Image Recognition
2.2 Food Image Datasets
3 Proposed Approach
3.1 MFOOD-72 Dataset
3.2 Food Image Recognition Method
3.3 Glycemic Index and Glycemic Load Calculation
4 Experiment and Results
5 Conclusion and Future Works
References
Toward an IoB-Based Architecture for Bipolar Disorder Management
1 Introduction
2 Related Works
3 Overview of Bipolar Disease
3.1 Symptoms of Bipolar Disorder
3.2 Important Factors in Bipolar Disease
3.3 Nursing Care for Bipolar Patients
4 Proposed Bipolar Disorder Management Approach
4.1 Proposed Architecture
4.2 The Outputs and Recommendations of the Proposed System
5 Conclusion
References
Nyon-Data, a Fall Detection Dataset from a Hinged Board Apparatus
1 Introduction
1.1 Objectives and Structure of the Paper
2 Experimental Setup
2.1 Datalogging Electronic System
2.2 Hinged Board
3 Dataset Description
3.1 Dataset Format Description
4 Results and Discussion
4.1 Fall Detection Algorithm
4.2 ROC Computation
4.3 Discussion
5 Conclusions
References
A Novel Approach for Detecting Fetal Electrocardiogram (FECG) Signals: Integration of Convolutional Neural Network (CNN) with Advanced Mathematical Techniques
1 Introduction
2 Methodology
2.1 Adopted Algorithm
2.2 Description of CNN Model
3 Results and Discussion
3.1 Recorded Data
3.2 Recovered Sources
3.3 Discussion
4 Conclusion
References
A New Machine-Learning Approach to Prognosticate Poisoned Patients by Combining Nature of Poison, Circumstances of Intoxication and Therapeutic Care Indices
1 Introduction
2 General Prognostic: General Approach
3 General Prognostic: General Approach
3.1 Database Description
3.2 Machine Learning Algorithms
4 Results
5 Conclusion
References
Efficient Throughput Allocation for Emergency Data Transmission in IoMT-Based Smart Hospitals
1 Introduction
2 IoMT and Smart Hospitals
3 Related Works
4 Proposed Approach
5 Conclusion
References
HealthPathFinder: Navigating the Healthcare Knowledge Graph with Neural Attention for Personalized Health Recommendations
1 Introduction
2 Related Work
2.1 Embedding-Based Methods
2.2 Path-Based Methods
2.3 Propagation Methods
3 HealthPathFinder: Utilizing Attention Networks in a Knowledge Graph for Healthcare
3.1 Background
3.2 Paths Extraction
3.3 Modeling with HealthPathFinder
3.4 Loss Function
3.5 Explainability and Cold Start Problem
4 Experiment
4.1 Datasets
4.2 Baselines
4.3 Evaluation Metrics
4.4 Results
5 Conclusion
References
A Secure and Privacy-Preserving Paradism Based on Blockchain and Federated Learning for CIoMT in Smart Healthcare Systems
1 Introduction
2 Related Works
3 Background
3.1 Federated Learning
3.2 Blockchain Technology
4 Proposed Blockchain and FL-Based Scheme for CIoMT
4.1 Architecture Overview
4.2 System Interactions
5 Advantages and Open Issues
6 Conclusion and Future Work
References
A Comparative Study Based on Deep Learning and Machine Learning Methods for COVID-19 Detection Using Audio Signal
1 Introduction
2 Related Works
3 Methods and Database
4 Experimental Result
4.1 COVID-19 Detection Using ML Techniques
4.2 COVID-19 Detection Using DL Techniques
5 Discussion and Conclusion
References
Vaccine Tweets Analysis Using Naive Bayes Classifier and TF-IDF Techniques
1 Introduction
2 Related Works
3 Dataset
4 Method
4.1 Data Preprocessing
4.2 Sentiment Analysis
4.3 Keyword Extraction
4.4 Feature Extraction
4.5 Model Building and Evaluation
5 Results and Discussion
6 Conclusion
References
Smart Energy Systems and Smart Motors
Life Cycle Assessment of a Smart Building: Energy Optimization Integration
1 Introduction
1.1 Life Cycle Analysis
1.2 Smart Buildings
1.3 Energy Optimization and Contemporary Technologies
2 Case Study: The ESEO Building in Dijon, France
2.1 An Introduction to the Building
2.2 Scope of Simulation Procedures
2.3 Pleiades Energy Optimization and LCA Simulation
3 Conclusion
4 Perspective
References
Beamforming Antenna Array with Circular Polarization for an RF Energy Recovery System an UAV
1 Introduction
2 Design Considerations
2.1 Butler Matrix
2.2 Antenna Element
2.3 Smart Antenna System
3 Conclusions
References
Enhancing Convergence Speed in Control of Synchronous Motors Using Model Predictive Control–MPC with Reference Model
1 Introduction
2 Research Methodology
2.1 Model
2.2 The Model Predictive Control (MPC)
2.3 Incorporation of the Model Predictive Control (MPC)
3 Results and Discussion
3.1 PMSM Nominal Values
3.2 Simulation Results and Discussion
4 Conclusion
References
PV Panel Emulator Based on Arduino and LabVIEW
1 Introduction
2 Emulator
2.1 Hardware Component
2.2 Software Component
3 Experimental Results
4 Conclusions
References
Analysis of Power Consumption After Switching to 5G
1 Introduction
2 Related Works
3 Material and Method
3.1 Radio Station: Antenna Line
3.2 5G Deployment (Methodology)
3.3 Method
3.4 Energy Consumption of 5G Equipment
3.5 Energy Balance Calculation
4 Results and Discussion
4.1 BBU
4.2 Wireless Modules
4.3 Antennas
4.4 Total Energy
5 Conclusion
References
Smart Security Systems
Secure and Efficient Color Image Cryptography Using Two Secret Keys
1 Introduction
2 The Proposed Method
3 Implementation and Results Discussion
4 Conclusion
References
A Comparative Analysis of Deep Learning Approaches for Enhancing Security in Web Applications
1 Introduction
1.1 Cyber Attacks
1.2 Web Attacks
2 Literature Review
2.1 Web Attack Detection
2.2 Vulnerability Detection
3 Comparison of Existing Web Attack Detection Models
4 Comparison of Existing Code Vulnerability Detection Models
5 Conclusion
References
AI-Driven Cyber Risk Management Framework
1 Introduction
2 Literature Review
2.1 ISO27005
2.2 EBIOS RM
2.3 NIST Risk Management Framework (RMF)
2.4 Related Work on AI-Driven Cyber Risk Management Models
3 Proposed AI-Driven Cyber Risk Management Framework
3.1 Preparation Phase
3.2 Assessment Phase
3.3 Decision Phase
3.4 Deployment Phase
3.5 Monitoring Phase
4 AI-Driven Cyber Risk Management Implementation
5 Performance Evaluation
5.1 Confusion Matrix
5.2 Performance Metrics
6 Results
7 Comparison with Other Studies
8 Conclusion
9 Future Work
References
Intrusion Detection Using Time-Series Imaging and Transfer Learning in Smart Grid Environments
1 Introduction
1.1 Background
1.2 Contribution
2 Related Works
2.1 Deep Learning
2.2 Transfer Learning
3 Proposed Method
3.1 Time-Series Imaging for ID
3.2 Dataset Description
3.3 Transfer Learning
4 Experimental Results
4.1 Causal Analysis
5 Conclusion
References
Building a Resilient Smart City Ecosystem: A Comprehensive Security and Cybersecurity Management Model
1 Introduction
2 Smart City and Cybersecurity
2.1 Importance of Cybersecurity
2.2 Cybersecurity Existing Models
3 Research Methodology
4 Instruments and Supporting Factors for Cybersecurity Implementation
5 Governance, Risk and Compliance Based Cybersecurity Model
5.1 Legal Basis of Cybersecurity Management.
5.2 Security Management
5.3 Cybersecurity Stakeholders
6 Conclusion
References
Mobile Applications Security: A Survey About Security Level and Awareness of Moroccan Users
1 Introduction
2 The Security Level of Mobile Applications
3 Weaknesses in Mobile Applications
3.1 How Does Deep Link Work?
3.2 Risks Associated with Their Use
4 Cyber-Attacks on Smartphones
4.1 Attacks on Smartphones
4.2 Mobile Spyware
4.3 Mobile Phishing
5 Mobile Financial Malware
6 Methods
7 Results and Discussions
8 Conclusion
References
Author Index