1.

Record Nr.

UNINA9910643874103321

Titolo

Planning future land uses / / editors, Gary Peterson, Marvin Beatty

Pubbl/distr/stampa

Madison, Wisconsin : , : American Society of Agronomy : , : Crop Science Society of America : , : Soil Science Society of America, , 1981

ISBN

0-89118-308-6

Descrizione fisica

1 online resource (71 pages)

Collana

ASA Special Publication ; ; Number 42

Disciplina

333.70973

Soggetti

Land use - United States - Planning

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

2.

Record Nr.

UNISA996279610503316

Titolo

ITHET 2018 : 2018 17th International Conference on Information Technology Based Higher Education and Training : April 26-28, 2018, Olhao, Portugal / / Institute of Electrical and Electronics Engineers

Pubbl/distr/stampa

Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2018

ISBN

1-5386-4623-4

Descrizione fisica

1 online resource (803 pages)

Disciplina

378.002854

Soggetti

Education, Higher - Data processing

Computer-assisted instruction

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia



3.

Record Nr.

UNISA996503562403316

Titolo

Computing, communication and learning : first international conference, CoCoLe 2022, Warangal, India, October 27-29, 2022, proceedings / / edited by Sanjaya Kumar Panda [and five others]

Pubbl/distr/stampa

Cham, Switzerland : , : Springer, , [2022]

©2022

ISBN

3-031-21750-0

Descrizione fisica

1 online resource (323 pages)

Collana

Communications in Computer and Information Science ; ; v.1729

Disciplina

929.605

Soggetti

Computer science

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Intro -- Preface -- Organization -- Contents -- Computing -- A Lightweight Block Cipher for Cloud-Based Healthcare Systems -- 1 Introduction -- 2 Related Work -- 3 Proposed System for Secure Healthcare System -- 4 Software Implementation -- 5 Results and Findings -- 5.1 Statistical Analysis -- 5.2 Accuracy -- 5.3 Key Analysis -- 6 Conclusion -- References -- Developing a Cloud Intrusion Detection System with Filter-Based Features Selection Techniques and SVM Classifier -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Pre-processing -- 3.2 Feature Selection -- 3.3 Classification Approach -- 4 Implementation and Result Analysis -- 4.1 Dataset -- 4.2 Evaluation Criteria -- 4.3 Result Analysis -- 5 Conclusion -- References -- A Study on Effect of Learning Rates Using Adam Optimizer in LSTM Deep Intelligent Model for Detection of DDoS Attack to Support Fog Based IoT Systems -- 1 Introduction -- 2 Related Work -- 3 Optimizers -- 3.1 Gradient Descent (GD) -- 3.2 Stochastic Gradient Descent (SGD) -- 3.3 SGD+Momentum -- 3.4 Adagrad -- 3.5 RMSProp -- 3.6 Addelta -- 3.7 Adam -- 4 DDoS Attack Model -- 5 Overview of Dataset -- 6 Results and Discussion -- 7 Conclusion -- References -- Comparative Study of Workflow Modeling Services Based on Activity Complexity -- 1 Introduction -- 2 Motivation -- 3 Related Work -- 4 Serverless Workflow Modeling Concepts -- 4.1 Serverless Computing -- 4.2 Function as a Service -- 4.3 Serverless Application as



Workflow Model -- 5 Feature Comparison of Serverless Workflow Services -- 6 Experiments and Results -- 6.1 Experimental Setup and Dataset Preparation -- 6.2 Evaluation Parameters -- 6.3 Results and Discussion -- 7 Conclusion -- References -- Granular Access Control of Smart Contract Using Hyperledger Framework -- 1 Introduction -- 2 Literature Review -- 2.1 Findings -- 2.2 Gap Analysis -- 2.3 Problem Definition.

3 Methodology -- 3.1 Proposed Solutions -- 3.2 Discussion and Analysis -- 4 Conclusion -- References -- Cyclomatic Complexity Analysis for Smart Contract Using Control Flow Graph -- 1 Introduction -- 2 Related Work -- 3 Problem Approach -- 3.1 Creation of CFG -- 3.2 Cyclomatic Complexity with the Help of Control Flow Graph -- 4 Experimental Studies -- 5 Conclusion and Future Work -- References -- An Improved GWO Algorithm for Data Clustering -- 1 Introduction -- 2 Literature Work -- 2.1 Partitional Clustering Algorithms -- 2.2 Grey Wolf Optimization -- 2.3 JAYA Algorithm -- 3 Methodology -- 3.1 Proposed Clustering Methods Using Meta-heuristic Approaches -- 4 Experimental Setup and Result Analysis -- 4.1 Dataset Description -- 4.2 Result Analysis Using Individual Dataset -- 4.3 Analysis Using Non-parametric Test -- 5 Conclusion -- References -- Anticipation of Heart Disease Using Improved Optimization Techniques -- 1 Introduction -- 1.1 Problem Statement -- 2 Literature Review -- 3 Research Question -- 4 Proposed Model -- 4.1 Data Collection -- 4.2 Manual Exploration -- 4.3 Data Preprocessing -- 4.4 Feature Selection -- 4.5 Optimization Algorithms -- 4.6 Performance Measure -- 5 Results and Discussion -- 6 Conclusion -- References -- Decentralized Energy Management in Smart Cities Using Blockchain Technology -- 1 Introduction -- 1.1 Bockchain Technology -- 1.2 Motivation -- 1.3 Scope -- 1.4 Objectives of the Paper -- 1.5 The Significance of Paper -- 2 Literature Survey -- 3 Proposed Scheme -- 3.1 Smart Meters and Cloud Server -- 3.2 Cloud Server and Blockchain -- 4 Implementation -- 4.1 Limitations of the Proposed System -- 5 Results and Comparisons -- 5.1 Traditional Bill Payment Process: -- 5.2 E-Bill Payment System ch9CASINO201955,ch9https:spsspsdoi.orgsps10.1002spser.7927 -- 5.3 System Security Analysis: -- 6 Conclusion and Future Works.

6.1 Conclusion -- 6.2 Future Scope -- References -- Design and FPGA Realization of an Energy Efficient Artificial Neural Modular Exponentiation Architecture -- 1 Introduction -- 2 Designs of Various Full Adders -- 2.1 RTL Full Adder -- 2.2 SLC Full Adder -- 2.3 RLG Full Adder -- 2.4 ANN Full Adder -- 3 Design of Modular Exponentiation (ME) Architecture -- 3.1 Introduction -- 3.2 Estimation of Average Switching Activity of ME Circuit Designs -- 4 Simulation and Performance Results -- 4.1 Simulation Results -- 4.2 Synthesis Results -- 4.3 Performance Metrics Evaluation -- References -- Comparative Analysis of Power Management System for Microbial Fuel Cell -- 1 Introduction -- 2 Electrical Equivalent Model of MFC -- 3 Analysis of PMS for MFC -- 4 Conclusion -- References -- Communication -- Localized Hop-Count Based Routing (LHR) Protocol for Underwater Acoustic Sensor Networks -- 1 Introduction -- 2 Related Work -- 3 Design of Localized Hop-Count Based Routing (LHR) Protocol -- 3.1 Phase-I: Initial Network Setup -- 3.2 Phase-II: Localized Hop-Count Updation and Next-Hop Selection -- 4 Implementation of LHR in UnetStack -- 4.1 UnetStack -- 4.2 User-Defined Agents in LHR -- 5 Results and Analysis -- 6 Conclusion -- References -- Underwater Acoustic Sensor Networks' Performance Evaluation Tool (UASN-PET) for UnetStack -- 1 Introduction -- 2 Introduction to UnetStack and Its Simulation Output -- 2.1 Output Files of a Simulation in UnetStack -- 3 Design of UASN-PET -- 3.1 Approach Taken -- 3.2 Architecture of



UnetStack Trace Analyzer -- 3.3 Layers Are Described Briefly Below -- 4 Implementation of UASN-PET -- 4.1 Tracing a Data Packet on Multi-hop Communication -- 5 Result and Analysis of UASN-PET -- 5.1 Result Analysis on Network Topology -- 5.2 Prerequisites for the Tool -- 6 Conclusions and Future Work -- References.

Zero Watermarking Scheme Based on Polar Harmonic Fourier Moments -- 1 Introduction -- 2 Literature Survey -- 2.1 Related Work -- 2.2 Existing Problem -- 3 Proposed Methodology -- 3.1 Embedding -- 3.2 Extraction Process -- 4 Experimental Results -- 4.1 Experimental Result on Reconstruction of PHFMS -- 5 Conclusion and Future Scope -- References -- Dual Image Watermarking Technique Using IWT-SVD and Diffie Hellman Key Exchange Algorithm -- 1 Introduction -- 2 Related Works -- 3 Contribution of Our Work -- 4 Fundamental Concepts -- 4.1 IWT -- 4.2 SVD -- 4.3 DHKE -- 5 Proposed Method -- 5.1 Embedding Algorithm -- 5.2 Extraction Algorithm -- 6 Simulation Result and Analysis -- 7 Conclusion -- References -- A Communication-Efficient Federated Learning: A Probabilistic Approach -- 1 Introduction -- 2 Related Work -- 3 Communication-Efficient FL -- 3.1 Basic Concepts of FL -- 3.2 Probability Based Gadget Selection Method -- 4 Simulation Results -- 5 Conclusion and Future Scope -- References -- Learning -- Pavement Distress Detection Using Deep Learning Based Methods: A Survey on Role, Challenges and Opportunities -- 1 Introduction -- 2 Basic Concepts and Terminologies -- 2.1 Deep Learning -- 2.2 Convolutional Neural Networks -- 2.3 Object Detection Algorithms -- 3 Literature Review -- 4 Challenges in This Domain and Contributions of Our Study -- 5 Conclusion and Future Scope -- References -- Performance Enhancement of Animal Species Classification Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Data Preparation -- 3.1 Dataset Used -- 3.2 Image Augmentation and Pre-processing -- 3.3 Artificial Neural Network (ANN) -- 3.4 Convolutional Neural Network (CNN) -- 3.5 Transfer Learning -- 3.6 Software and Hardware Used -- 4 Experimentation and Results -- 4.1 Experiments and Analysis -- 4.2 Results of Selected Model -- 5 Conclusion and Future Work.

References -- Intelligent Intrusion Detection System Using Deep Learning Technique -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Dataset Pre-processing -- 3.2 RNN-GRU (Recurrent Neural Network-Gated Recurrent Unit) -- 4 Experiments and Results -- 5 Conclusion -- References -- Rice Leaf Disease Detection and Classification Using a Deep Neural Network -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 4 Rice Disease Type and Dataset Description -- 4.1 Bacterial Blight -- 4.2 Blast -- 4.3 Brown Spot -- 4.4 Tungro -- 5 Implementation -- 5.1 Simulation Environment -- 5.2 Image Acquisition -- 5.3 Image Preprocessing and Augmentation -- 5.4 Deep Neural Network Model Training -- 6 Result Analysis -- 6.1 Simulation Environment -- 6.2 Error Analysis -- 7 Conclusion and Future Scope -- References -- Training Scheme for Stereo Audio Generation -- 1 Introduction -- 2 Literature Review -- 2.1 Audio Generative Model -- 2.2 Multi-channel Audio -- 3 Proposed Method -- 3.1 Training Scheme -- 3.2 Custom Dataset -- 4 Experiments -- 4.1 Representation for Stereo Audio -- 4.2 Evaluation Metrics -- 4.3 Experimental Results -- 5 Conclusion -- References -- A Machine Learning Approach for Classification of Lemon Leaf Diseases -- 1 Introduction -- 2 Related Works -- 3 Proposed Method for Classification of Lemon Leaf Disease -- 3.1 Image Pre-processing -- 3.2 Image Segmentation -- 3.3 Feature Extraction -- 3.4 Classification -- 4 Results and Analysis -- 5 Conclusion -- References -- Optimization of Random Forest Hyperparameter Using Improved PSO



for Handwritten Digits Classification -- 1 Introduction -- 2 Related Work -- 3 Hyperparameter Optimization -- 3.1 Random Forest -- 3.2 Improved Particle Swarm Optimization (PSO) -- 3.3 Proposed Model Using Improved PSO Optimizer -- 4 Result and Analysis -- 5 Conclusion -- References.

Risk Identification Using Quantum Machine Learning for Fleet Insurance Premium.

4.

Record Nr.

UNINA9910959792503321

Autore

Mavelli Luca

Titolo

Europe's encounter with Islam : the secular and the postsecular / / Luca Mavelli

Pubbl/distr/stampa

London ; ; New York, : Routledge, 2012

ISBN

1-136-44843-8

1-280-66556-4

9786613642493

1-136-44844-6

0-203-12512-6

Edizione

[First edition.]

Descrizione fisica

1 online resource (185 p.)

Collana

Interventions

Disciplina

303.48/2401767

Soggetti

Muslims - Europe

Islam and secularism - Europe

Postsecularism - Europe

Other (Philosophy)

Europe Ethnic relations

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Cover; Europe's Encounter with Islam; Copyright; Contents; Acknowledgements; Introduction; 1. Theorizing the Secular: Modernity and the Separation of Reason and Faith; Introduction; Contending Conceptions of the Secular: the Asad-casanova Debate; Religion Within the Boundaries of the Secular: Casanova's 'modern Public Religions' and Kant's 'rational Faith'; The Exclusionary Character of the Secular Notion of Faith: Asad's Critique of Kant's 'rational Religion'; The Constitution of



the Subject in the Secular Episteme: Foucault's Critique of Modern Subjectivity and the 'analytic of Finitude'

Conclusion2. from Autonomy to Isolation: a Genealogy of European Secularity; Introduction; Aquinas' Ladders of Individuation; Descartes' Withdrawal in the Cogito; Kant's Faith in the Transcendental Subject; Durkheim's Society of Individuals; Weber's Iron Cage of Secular Subjectivity; Conclusion; 3. the Withdrawal from the Muslim Other; Introduction; The Secular Political Theology of the Headscarf; The Appropriation of Secularism; The Redemption of the Muslim Other; The Paradigm of Immunization; Conclusion; 4. Islam and the European Search for Co-immunity; Introduction

Beyond the Paradigm of Immunization (i): Habermas' Intersubjective ProceduralismProcedural Europe; Political Church; Conclusion; 5. Imagining the Postsecular; Introduction; Beyond the Paradigm of Immunization (ii): Connolly's Postsecular Philosophy of Becoming; Habermas' Postsecular Turn; Beyond the Paradigm of Immunization (iii): Buber's Philosophy of Life as Encounter; Conclusion; Conclusion; A Personal Note; Notes; References; Index

Sommario/riassunto

In the last few years, the Muslim presence in Europe has been increasingly perceived as ‘problematic’. Events such as the French ban on headscarves in public schools, the publication of the so-called ‘Danish cartoons’, and the speech of Pope Benedict XVI at the University of Regensburg have hit the front pages of newspapers the world over, and prompted a number of scholarly debates on Muslims’ capacity to comply with the seemingly neutral and pluralistic rules of European secularity. Luca Mavelli argues that this perspective has prevented an in-depth reflection on the limits of Europe’s secular tradition and its role in Europe’s conflictual encounter with Islam. Through an original reading of Michel Foucault’s spiritual notion of knowledge and an engagement with key thinkers, from Thomas Aquinas to Jurgën Habermas, Mavelli articulates a contending genealogy of European secularity. While not denying the latter’s achievements in terms of pluralism and autonomy, he suggests that Europe’s secular tradition has also contributed to forms of isolation, which translate into Europe’s incapacity to perceive its encounter with Islam as an opportunity rather than a threat. Drawing on this theoretical perspective, Mavelli offers a contending account of some of the most important recent controversies surrounding Islam in Europe and investigates the ‘postsecular’ as a normative model to engage with the tensions at the heart of European secularity. Finally, he advances the possibility of a Europe willing to reconsider its established secular narratives which may identify in the encounter with Islam an opportunity to flourish and cultivate its democratic qualities and postnational commitments. This work will be of great interest to students and scholars of religion and international relations, social and political theory, and Islam in Europe.