| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA990001260640203316 |
|
|
Autore |
VANDELLI, Luciano |
|
|
Titolo |
2. : I comuni e le provincie / Luciano Vandelli, Franco Mastragostino |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Bologna : Il Mulino, 1998 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[Nuova ed] |
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Enti locali - Legislazione |
|
|
|
|
|
|
Collocazione |
|
XXIV.3.F 113 (IG IV 1521) |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910627279303321 |
|
|
Titolo |
Advances on Broad-Band Wireless Computing, Communication and Applications : Proceedings of the 17th International Conference on Broad-Band Wireless Computing, Communication and Applications (BWCCA-2022) / / edited by Leonard Barolli |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
|
|
|
|
|
|
|
|
|
ISBN |
|
9783031200298 |
9783031200281 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed. 2023.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (419 pages) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Networks and Systems, , 2367-3389 ; ; 570 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Telecommunication |
Computational intelligence |
Communications Engineering, Networks |
Computational Intelligence |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Intro -- Welcome Message of BWCCA-2022 International Conference Organizers -- BWCCA-2022 Organizing Committee -- Honorary Chair -- General Co-chairs -- Program Committee Co-chairs -- International Advisory Committee -- Publicity Co-chairs -- Finance Chair -- Web Administrator Chairs -- Local Organizing Co-chairs -- Steering Committee Chair -- Track Areas -- Next Generation Wireless Networks -- Track Co-chairs -- PC Members -- Cloud and Service Computing -- Track Co-chairs -- PC Members -- Multimedia and Web Applications -- Track Co-chairs -- PC Members -- Security and Privacy -- Track Co-chairs -- PC Members -- Network Protocols and Performance Analysis -- Track Co-chairs -- PC Members -- Intelligent and Cognitive Computing -- Track Co-chairs -- PC Members -- Distributed and Parallel Computing -- Track Co-chairs -- PC Members -- IoT and Smart Environment -- Track Co-chairs -- PC Members -- Database, Data Mining, and Big Data -- Track Co-chairs -- PC Members -- Ubiquitous and Pervasive Computing -- Track Co-chairs -- PC Members -- BWCCA-2022 Reviewers -- BWCCA-2022 Keynote Talks -- |
|
|
|
|
|
|
|
|
|
Humanics Information Security: How to Go Above and Beyond? -- Multi-objective Methods for Wireless Sensor Network Optimization -- Contents -- A Comparison Study of UNDX and UNDX-m Methods for LDVM and RDVM Router Replacement Methods by WMN-PSODGA Hybrid Intelligent System Considering Stadium Distribution -- 1 Introduction -- 2 Intelligent Algorithms for Proposed Hybrid Simulation System -- 2.1 Particle Swarm Optimization -- 2.2 Distributed Genetic Algorithm -- 3 Proposed and Implemented WMN-PSODGA Hybrid Intelligent Simulation System -- 4 Simulation Results -- 5 Conclusions -- References -- Performance Comparison of Roulette Wheel and Random Selection Methods by WMN-PSODGA Simulation System Considering Stadium Distribution and LDIWM -- 1 Introduction. |
2 Intelligent Algorithms for Proposed Hybrid Simulation System -- 2.1 Particle Swarm Optimization -- 2.2 Distributed Genetic Algorithm -- 3 Proposed and Implemented WMN-PSODGA Hybrid Intelligent Simulation System -- 4 Simulation Results -- 5 Conclusions -- References -- A Fuzzy-Based System for Handover in 5G Wireless Networks Considering Different Network Slicing Constraints: Effects of Slice Reliability Parameter on Handover Decision -- 1 Introduction -- 2 Software-Defined Networks (SDNs) -- 3 5G Network Slicing -- 4 Proposed Fuzzy-Based System -- 5 Simulation Results -- 6 Conclusions and Future Work -- References -- A Simulated Annealing Based Simulation System for Optimization of Wild Deer Damage Prevention Devices -- 1 Introduction -- 2 Proposed System -- 2.1 OSM Extraction for DD Placement Candidate Locations -- 2.2 DD Placement Optimization -- 3 Simulation Results -- 4 Conclusions -- References -- Techno-Economic Analysis of Cloud Computing Supported by 5G: A Cloud vs on Premise Based Solutions Comparison -- 1 Introduction -- 2 Proposed Models -- 2.1 Cloud Based Solution -- 2.2 On Premise Based Solution -- 3 Pricing Model -- 3.1 Cloud Based Solution -- 3.2 On Premise Based Solution -- 4 Parameter Selection -- 4.1 Cost Comparison -- 4.2 On Premises Solution Cost Adjustments -- 4.3 Cloud Based Solution Cost Adjustments -- 4.4 Performance Evaluation -- 5 5G and Cloud Computing -- 6 Conclusions and Future Work -- References -- An Integrated Fog-VDTN Architecture for Data Dissemination -- 1 Introduction -- 2 Proposed Architecture -- 3 Simulation System and Scenarios -- 4 Simulation Results -- 5 Conclusions -- References -- Energy-Consumption Evaluation of the Tree-Based Fog Computing (TBFC) Model -- 1 Introduction -- 2 The TBFC Model -- 3 Power Consumption and Computation Models of the TBFC Model -- 4 Evaluation -- 5 Concluding Remarks. |
References -- Evaluation of the Information Flow Control in the Fog Computing Model -- 1 Introduction -- 2 System Model -- 2.1 CBAC (Capability-Based Access Control) Model -- 2.2 Information Flow Relations -- 2.3 FC (Fog Computing) Model -- 3 Information Flow Control -- 3.1 Protocols -- 3.2 FC-Based Protocols -- 4 Evaluation -- 5 Concluding Remarks -- References -- A Study of Network Attack Strategy Using AS Topology Map -- 1 Introduction -- 2 Preliminaries -- 2.1 Outline -- 2.2 Adjacency Matrix -- 2.3 Laplacian Matrix -- 3 Proposed Attack Strategy -- 3.1 Topology Map of AS -- 3.2 Attack Strategy -- 4 Example Execution -- 4.1 Preparation (Step-1 Step-3) -- 4.2 Simulation of Tactics and Result (Step-4) -- 4.3 Select of Attack Strategy (Step-5) -- 4.4 Consideration -- 5 Discussion -- 5.1 Feasibility of Proposed Attack Strategy -- 5.2 Effectiveness of Stopped Terminal AS -- 5.3 Appropriate Values of max(A) and R -- 6 Conclusion -- References -- Improving Classification Accuracy by Optimizing Activation Function for Convolutional Neural Network on Homomorphic Encryption -- 1 Introduction -- 2 Related Work -- 3 |
|
|
|
|
|
|
|
Proposed Method -- 3.1 Polynomial Approximation of the Mish Function -- 3.2 Accuracy Optimization -- 4 Evaluation -- 4.1 Evaluation Setup -- 4.2 Experimental Results for Classification Accuracy -- 4.3 Experimental Results for Different Networks -- 5 Disucussion -- 5.1 Effective Optimization Method for Activation Functions in CNN -- 5.2 Application of Optimization to Different Networks -- 5.3 Limitations -- 6 Conclusion -- References -- An Attention Mechanism for Visualizing Word Weights in Source Code of PowerShell Samples: Experimental Results and Analysis -- 1 Introduction -- 2 Related Work -- 3 Related Technique -- 3.1 Long Short-Term Memory -- 3.2 Attention Mechanism -- 4 Experimental Method -- 4.1 Outline -- 4.2 Preprocessing. |
4.3 Training Phase -- 4.4 Test Phase -- 5 Experimental Model and Evaluation Results -- 5.1 Experimental Model -- 5.2 Dataset -- 5.3 Environment -- 5.4 Evaluation Metrics -- 5.5 Experiment Contents -- 5.6 Result -- 6 Discussion -- 6.1 Important Words -- 6.2 Possibility of Evasion Attack -- 6.3 Research Ethics -- 6.4 Limitations -- 7 Conclusion -- References -- Improving Palmprint-Region Estimation for ID-Less Palmprint Recognition -- 1 Introduction -- 2 Related Work -- 2.1 Palmprint-Region Estimation Using Hand Shape -- 2.2 Palmprint-Region Estimation Using Interdigital Spaces -- 2.3 Palmprint-Region Estimation Using Skeletal Information -- 3 Proposed Methods -- 3.1 Improvement of Region Quality -- 3.2 Proposed Method 1 -- 3.3 Proposed Method 2 -- 3.4 Proposed Method 3 -- 4 Evaluation -- 4.1 Evaluation Dataset -- 4.2 Evaluation Method -- 4.3 Verification Process -- 4.4 Results -- 4.5 Discussions -- 5 Conclusion -- References -- Real Vehicle-Based Attack Dataset for Security Threat Analysis in a Vehicle -- 1 Introduction -- 2 Related Work -- 3 Method of Generate Attack CAN Dataset Based on Actual Vehicle -- 3.1 Method for Collection CAN Dataset in Vehicle -- 3.2 Vehicle Internal CAN Network Attack Tool -- 3.3 Collection of Attack CAN Data Packet Based on Actual Vehicle -- 4 Evaluation -- 4.1 Result of DoS Attack -- 4.2 Result of Fuzzing Attack -- 4.3 Result of Replay Attack -- 5 Conclusion and Future Work -- References -- Performance Analysis of HARQ in 2-step RACH Procedure Using Markov Chain Model -- 1 Introduction -- 2 2-step RACH Procedure -- 3 Hybrid Automatic Repeat and Request -- 4 Analytical Markov Chain Model -- 5 Simulation -- 6 Conclusion -- References -- A Comparison Study of FC-RDVM with LDVM Router Replacement Methods by WMN-PSOHC Simulation System Considering Weibull Distribution of Mesh Clients -- 1 Introduction. |
2 Intelligent Algorithms -- 2.1 Particle Swarm Optimization -- 2.2 Hill Climbing -- 3 WMN-PSOHC Hybrid Simulation System and FC-RDVM -- 4 Simulation Results -- 5 Conclusions -- References -- A Fuzzy-Based System for Estimation of Landslide Disasters Risk Considering Digital Elevation Model -- 1 Introduction -- 2 Proposed System -- 2.1 LDR Estimation -- 2.2 Danger Area Estimation Based on LDR -- 3 Evaluation Results -- 3.1 LDR Estimation Results -- 3.2 Evaluation Results for Danger Area Estimation Based on LDR -- 4 Conclusions -- References -- Human-Centered Protocols for Secure Data Management in Distributed Systems -- 1 Introduction -- 2 Human-Centered Protocols for Secure Data Management -- 3 Secure Data Management in Distributed Systems -- 4 Conclusions -- References -- Multi-Version Concurrency Control to Reduce the Electric Energy Consumption of Servers -- 1 Introduction -- 2 System Model -- 2.1 Object-Based Systems -- 2.2 Multi-Version Timestamp Ordering (MVTO) Algorithm -- 2.3 Data Access Model -- 2.4 Power Consumption Model of a Server -- 3 Improved EEMVTO (IEEMVTO) Algorithm -- 3.1 Meaningless Methods -- 3.2 IEEMVTO Algorithm -- 4 Evaluation -- 4.1 |
|
|
|
|
|
|
|
|
|
Environment -- 4.2 Total Processing Electric Energy Consumption -- 4.3 Average Execution Time of Each Transaction -- 5 Concluding Remarks -- References -- A Study on Increasing Simultaneous Transmissions After Extended RTS/CTS Handshake on Full-duplex Wireless LANs -- 1 Introduction -- 2 Full-duplex Wireless Transmission -- 2.1 Full-duplex Transmission Fassions -- 2.2 Challenges of Full-duplex Wireless Transmission -- 3 Method for Selecting Multiple Nodes for Synchronous Transmission -- 3.1 Transmission Procedure -- 3.2 Selection Algorithm of Candidate Transmitters -- 3.3 Method for Selecting Destination of Synchronous Transmission -- 4 Performance Evaluation. |
4.1 Characteristics of Throughput Performance. |
|
|
|
|
|
|
Sommario/riassunto |
|
This book aims to provide latest research findings, innovative research results, methods, and development techniques from both theoretical and practical perspectives related to the emerging areas of broadband and wireless computing. Information networks of today are going through a rapid evolution. Different kinds of networks with different characteristics are emerging, and they are integrating in heterogeneous networks. For these reasons, there are many interconnection problems which may occur at different levels of the hardware and software design of communicating entities and communication networks. These kinds of networks need to manage an increasing usage demand, provide support for a significant number of services, guarantee their QoS, and optimize the network resources. The success of all-IP networking and wireless technology has changed the ways of living the people around the world. The progress of electronic integration and wireless communications is going to pavethe way to offer people the access to the wireless networks on the fly, based on which all electronic devices will be able to exchange the information with each other in ubiquitous way whenever necessary. |
|
|
|
|
|
|
|
| |