001452888 000__ 05009cam\a2200601\i\4500 001452888 001__ 1452888 001452888 003__ OCoLC 001452888 005__ 20230314003323.0 001452888 006__ m\\\\\o\\d\\\\\\\\ 001452888 007__ cr\cn\nnnunnun 001452888 008__ 220903s2023\\\\sz\a\\\\o\\\\\101\0\eng\d 001452888 019__ $$a1344159821 001452888 020__ $$a9783031151910$$q(electronic bk.) 001452888 020__ $$a3031151917$$q(electronic bk.) 001452888 020__ $$z9783031151903 001452888 020__ $$z3031151909 001452888 0247_ $$a10.1007/978-3-031-15191-0$$2doi 001452888 035__ $$aSP(OCoLC)1343197202 001452888 040__ $$aYDX$$beng$$erda$$epn$$cYDX$$dGW5XE$$dEBLCP$$dOCLCF$$dOCLCQ 001452888 049__ $$aISEA 001452888 050_4 $$aTK5105.59 001452888 08204 $$a005.8$$223/eng/20220913 001452888 1112_ $$aInternational Conference on Networking, Information Systems and Security$$n(5th :$$d2022 :$$cOnline). 001452888 24510 $$aEmerging trends in intelligent systems & network security /$$cMohamed Ben Ahmed, Boudhir Anouar Abdelhakim, Bernadetta Kwintiana Ane, Didi Rosiyadi, editors. 001452888 264_1 $$aCham :$$bSpringer,$$c[2023] 001452888 264_4 $$c©2023 001452888 300__ $$a1 online resource (xxxiii, 523 pages) :$$billustrations (chiefly color). 001452888 336__ $$atext$$btxt$$2rdacontent 001452888 337__ $$acomputer$$bc$$2rdamedia 001452888 338__ $$aonline resource$$bcr$$2rdacarrier 001452888 4901_ $$aLecture notes on data engineering and communications technologies ;$$vvolume 147 001452888 500__ $$aInternational conference proceedings. 001452888 500__ $$aIncludes author index. 001452888 5050_ $$aA Bi-objective Evolutionary Algorithm to Improve the Service Quality for On-demand Mobility -- A Dynamic Circular Hough Transform Based Iris Segmentation -- A Game Theoretic Framework for Interpretable Student Performance Model -- A New Telecom Churn Prediction Model Based on Multi Layer Stacking Architecture -- A Novel Hybrid Classification Approach for Predict Performance Student in e-learning -- A Proposed Big Data Architecture using Data Lakes for Education Systems -- A SVM Approach for Assessing Traffic Congestion State by Similarity Measures -- A Tool for the Analysis, Characterization, and Evaluation of Serious Games in Teaching -- Analysis and Examination of the Bus Control Center(BCC) System: Burulas Example -- Analyze Symmetric and Asymmetric Encryption Techniques by Securing Facial Recognition System -- Aspect-Based Sentiment Analysis of Indonesian Language Hotel Reviews using Long Short-Term Memory with an Attention Mechanism -- Big Data and Machine Learning in Healthcare: Concepts, Technologies, and Opportunities -- Classification of Credit Applicants using SVM Variants Coupled with Filter-Based Feature Selection -- Classification of Hate Speech Language Detection on social media: Preliminary Study for Improvement -- CoAP and MQTT: Characteristics and Security. 001452888 506__ $$aAccess limited to authorized users. 001452888 520__ $$aThis book covers selected research works presented at the fifth International Conference on Networking, Information Systems and Security (NISS 2022), organized by the Research Center for Data and Information Sciences at the National Research and Innovation Agency (BRIN), Republic of Indonesia, and Moroccan Mediterranean Association of Sciences and Sustainable Development, Morocco, during March 3031, 2022, hosted in online mode in Bandung, Indonesia. Building on the successful history of the conference series in the recent four years, this book aims to present the paramount role of connecting researchers around the world to disseminate and share new ideas in intelligent information systems, cyber-security, and networking technologies. The 49 chapters presented in this book were carefully reviewed and selected from 115 submissions. They focus on delivering intelligent solutions through leveraging advanced information systems, networking, and security for competitive advantage and cost savings in modern industrial sectors as well as public, business, and education sectors. Authors are eminent academicians, scientists, researchers, and scholars in their respective fields from across the world. 001452888 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed September 13, 2022). 001452888 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 001452888 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001452888 655_7 $$aConference papers and proceedings.$$2lcgft 001452888 655_0 $$aElectronic books. 001452888 7001_ $$aBen Ahmed, Mohamed,$$eeditor. 001452888 7001_ $$aAbdelhakim, Boudhir Anouar,$$eeditor. 001452888 7001_ $$aAne, Bernadetta Kwintiana,$$eeditor. 001452888 7001_ $$aRosiyadi, Didi,$$eeditor. 001452888 77608 $$iPrint version:$$tEMERGING TRENDS IN INTELLIGENT SYSTEMS & NETWORK SECURITY.$$d[S.l.] : SPRINGER INTERNATIONAL PU, 2022$$z3031151909$$w(OCoLC)1336535240 001452888 830_0 $$aLecture notes on data engineering and communications technologies ;$$vv. 147. 001452888 852__ $$bebk 001452888 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-15191-0$$zOnline Access$$91397441.1 001452888 909CO $$ooai:library.usi.edu:1452888$$pGLOBAL_SET 001452888 980__ $$aBIB 001452888 980__ $$aEBOOK 001452888 982__ $$aEbook 001452888 983__ $$aOnline 001452888 994__ $$a92$$bISE