Cognitive systems for education: architectures, innovations, and comparative analyses

H Bahassi, M Azmi, A Khiat - Procedia Computer Science, 2024 - Elsevier
In recent years, education has been closely linked to the continued development of
technology, especially smart systems based on the use of artificial intelligence with cognitive …

Toward a modern secure network based on next-generation firewalls: recommendations and best practices

O Lamdakkar, I Ameur, MM Eleyatt, F Carlier… - Procedia Computer …, 2024 - Elsevier
The security architecture of modern networks undergoes periodic changes, given (i) the
diversity of security solutions,(ii) the emergence of new attack vectors, and (iii) corporate …

Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems

MA Bouke, A Abdullah, K Cengiz, S Akleylek - PeerJ Computer Science, 2024 - peerj.com
This article presents an evaluation of BukaGini, a stability-aware Gini index feature selection
algorithm designed to enhance model performance in machine learning applications …

Towards an SDN-based Dynamic Resource Allocation in 5G Networks

HA Oulahyane, N Eddermoug, A Bakali, M Talea… - Procedia Computer …, 2024 - Elsevier
The rapid evolution of mobile technologies has ushered in a new era of connectivity,
particularly with the advent of the Fifth Generation (5G) technology, which promises low …

Toward an enhanced stock market forecasting with machine learning and deep learning models

R Najem, A Bahnasse, M Talea - Procedia Computer Science, 2024 - Elsevier
The use of both machine learning and deep learning in forecasting the stock market has
attracted the interest of finance, as it holds the promise of better and more efficient prediction …

A Lightweight Seamless Unimodal Biometric Authentication System

A Mansour, N Eddermoug, M Sadik, E Sabir… - Procedia Computer …, 2024 - Elsevier
Nowadays, authentication remains a crucial and primordial process in securing Information
Technology (IT) systems and infrastructures, while keeping users' data more secure and …

Survey of Intrusion Detection Techniques in Cloud Computing

SM Othman, AY Al-mutawkkil… - Sana'a University Journal …, 2024 - journals.su.edu.ye
With the continued development of cloud computing environments, security measures have
become more im-portant than ever. Intrusion detection systems (IDS) are considered one of …

An IoT-Based Prototype for Optimizing Agricultural Irrigation: A Case Study in the Biobío Region of Chile

JIS Rojas, JM Pantoja, M Matamala, IC Briceño… - Procedia Computer …, 2024 - Elsevier
This paper shows an agricultural irrigation alternative using a low-cost Internet of Things
(IoT) application. This technology allows the automation and optimization of processes by …

Principales medidas de seguridad para la protección de información y datos en la nube: una revisión sistemática

AJL Gil, POG Dionicio… - INGENIERÍA …, 2023 - revistas.upt.edu.pe
La revisión sistemática realizada se enfoca en identificar las principales medidas de
seguridad para proteger la información y los datos en entornos de computación en la nube …