1.

Record Nr.

UNINA990008487830403321

Autore

Perlingieri, Pietro

Titolo

Il diritto civile nella legalità costituzionale : secondo il sistema italo-comunitario delle fonti / Pietro Perlingieri

Pubbl/distr/stampa

Napoli : Edizioni Scientifiche Italiane, 2006

ISBN

88-495-1353-4

Edizione

[3. ed.]

Descrizione fisica

XVI, 1083 p. ; 24 cm

Locazione

DEC

DDCP

Collocazione

DPR 7-277

19-L-348

19-L-349

Lingua di pubblicazione

Italiano

Formato

Materiale a stampa

Livello bibliografico

Monografia



2.

Record Nr.

UNISA996210008103316

Autore

Puchner Walter <1947-, >

Titolo

Studien zur Volkskunde Südosteuropas und des mediterranen Raums / / Walter Puchner

Pubbl/distr/stampa

Böhlau, 2009

Wien : , : Böhlau Verlag, , 2009

©2009

ISBN

9783205783695

Descrizione fisica

1 online resource (738 pages) : digital, PDF file(s)

Disciplina

390.09496

Soggetti

Folklore - Balkan Peninsula

Ethnology - Balkan Peninsula

Folklore - Mediterranean Region

Ethnology - Mediterranean Region

Folklore - Greece

Ethnology - Greece

Gender & Ethnic Studies

Social Sciences

Ethnic & Race Studies

Balkan Peninsula Civilization

Mediterranean Region Civilization

Greece Civilization

Lingua di pubblicazione

Tedesco

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Collection of texts partly published previously.

Nota di bibliografia

Includes bibliographical references and index.

Sommario/riassunto

This volume includes 24 studies on comparative culture analysis in the Southeastern-European and Mediterrean area, as practizised in the "Ethnologia europaea" of Leopold Kretzenbacher, giving an idea of the plurality of possible topics and issues of folk culture in history and presence of this oldest part of Europe, which has not yet been really explored by interested readers. In t erms of subjects and methods these studies are partly located beyond the traditional thematical set of



folklore studies: theoretical and terminological problems are discussed, cultural history since the late antiquity is involved, theological issues come together with research facts on customs and rites, masques and disguisings, issues of gender studies and sociology af ages are brought together with methodological critics on comparativism of the Victorian school of ethnography, the competitions of tournament are analyzed in historical and functional context as symbols of power and superiority of Venice in the Eastern Mediterrean, folk plays are examined as prefigurating structures of elaborated forms of folk theatre as well as the influences of Byzantine ecclesiastic painting and iconography on orthodox folk culture; other chapters focus on ethnosteretyps, on forms and functions of blood brotherhood (adoptio in fratrem) since late antiquity, the ways of reception of popular reading material throughout the Balkan peninsula since the 16th century are presented. Other studies are dedicated to the formation of religious traditions in West and East, between Catholicism and Orthodoxy, to fairy tales between orality and literacy, but also topics like the public display of personal feelings, forms of gestures, figures of demonology, narratives of oral autobiography, etymological and semantic questions are examined and research projects on oral folk literature are presented. One chapter is also dedicated to the ideological use of folklore studies in the nineteenth century. Chapters 15-24 focus more sepcifically on Greece without lacking wider comparative views. The Introduction and the Conclusion, the selected bibliography at the end of the volume and the indices integrate these chapters in a unique perspective. The specific indices allow also a selective use of the volume.

Der vorliegende Band stellt 24 Studien zur balkan-mediterranen Kulturkomparatistik im Zeichen einer Vergleichenden Volkskunde zusammen, wie sie vom Altmeister der "Ethnologia europaea", Leopold Kretzenbacher, betrieben wurde, und vermittelt einen lebhaften Eindruck über die mögliche Reichweite von Themen und Fragekomplexen, die sich in Geschichte und Gegen wart der Volkskultur des ältesten europäischen Kulturraums Europas stellen, den es für eine interessierte Leserschaft vielfach noch zu entdecken gilt. Unter methodischen Gesichtspunkten reicht die Vielfalt der Studien über den traditionellen thematischen Kanon der Vergleichenden Volkskunde hinaus: neben theoretischen und terminologischen Fragen wird in die Kulturgeschichte bis zur Spätantike ausgeholt, theologische Fragestellungen kommen neben Masken- und Brauchforschung zu stehen, alterssoziologische und gender-zentrierte Problematiken treffen auf die Methodenkritik der Viktorianischen Schule der Ethnographie, Sportgeschichte und ihre symbolisch-machtpolitische Funktionen kommen zur Sprache, das Volksschauspiel als genetische Struktur eine möglichen Theaterentwicklung ist thematisiert, die byzantinische Ikonographie wird in Einzelbeispielen auf ihre Auswirkung auf die balkanische Volkskultur analysiert, Untersuchungen zu Ethnostereotypen finden sich neben Formen und Funktio nen der Wahlbruderschaft in ihrer langen Geschichte, die Rezeptionachsen popularer Lesestoffe werden großräumig nachgezeichnet; dazu treten Studien zur mittelalterlichen Legendenbildung in West und Ost, religiöse Verserzählungen zwischen Orthodoxie und Katholizismus, Märchentypen zwischen Mündlichkeit und Schriftlichkeit, Fragen der öffentlichen Inszenierung persönlicher Gefühle, Dämonologie und Schimpfgebärden, Formen der oralen Autobiographie, etymologische und semantische Fragen, die Vorstellung einzelner Großforschungsprojekte wie auch die ideologische Funktion der Beschäftigung mit der Volkskultur im 19. Jahrhundert. Die Mehrzahl dieser Studien ist komparativ angelegt, die Kapitel 15-24 beziehen sich



spezifischer auf die griechische Tradition bzw. Griechenland, ohne daß aber die vergleichenden Perspektiven gänzlich fehlen würden. Ein Einleitungskapitel, das Schlußwort, die den Gesamtband betreffende Auswahlbibliographie und die umfassenden Register integrieren die Einzelkapitel in eine übergreifende einheitliche Perspektive, die Indices erlauben dahingegen auch einen handbuchartigen Gebrauch.

3.

Record Nr.

UNICASUSM1493655

Autore

Rabenstein, Albert L.

Titolo

Elementary differential equations with linear algebra / Albert L. Rabenstein

Pubbl/distr/stampa

New York, : Academic Press, Inc., 1982

Descrizione fisica

x, 578 p.

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia



4.

Record Nr.

UNINA9910644266803321

Titolo

Advancements in Smart Computing and Information Security : First International Conference, ASCIS 2022, Rajkot, India, November 24–26, 2022, Revised Selected Papers, Part II / / edited by Sridaran Rajagopal, Parvez Faruki, Kalpesh Popat

Pubbl/distr/stampa

Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2022

ISBN

9783031230950

3031230957

Edizione

[1st ed. 2022.]

Descrizione fisica

1 online resource (315 pages)

Collana

Communications in Computer and Information Science, , 1865-0937 ; ; 1760

Disciplina

330

006.3

Soggetti

Artificial intelligence

Computer networks

Computer systems

Coding theory

Information theory

Application software

Data protection

Artificial Intelligence

Computer Communication Networks

Computer System Implementation

Coding and Information Theory

Computer and Information Systems Applications

Data and Information Security

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Intro -- Preface -- Organization -- Abstracts of Keynotes -- Post-pandemic Applications of AI and Machine Learning -- Smart and Soft Computing Methods for Prioritizing Software Requirements in Large-Scale Software Projects -- Your Readiness for Industry 4.0 -- Securing NexGen Automotives - Threats and Trends -- Cyber Attacks



Classification and Attack Handling Methods Using Machine Learning Methods -- The Internet of Things (IoT) Ecosystem Revolution in the World of Global Sports -- Orchestration of Containers: Role of Artificial Intelligence -- Enterprise Cybersecurity Strategies in the Cloud -- Contents - Part II -- Contents - Part I -- Cyber Security -- A Comprehensive Study on Cyber Legislation in G20 Countries -- 1 Introduction -- 2 Literature Review -- 2.1 Argentina -- 2.2 Australia -- 2.3 Brazil -- 2.4 Canada -- 2.5 China -- 2.6 France -- 2.7 Germany -- 2.8 India -- 2.9 Indonesia -- 2.10 Italy -- 2.11 Japan -- 2.12 South Korea -- 2.13 Mexico -- 2.14 Russia -- 2.15 Saudi Arabia -- 2.16 South Africa -- 2.17 Turkey -- 2.18 United Kingdom -- 2.19 United State of America -- 2.20 European Union -- 3 Conclusions -- References -- Image Encryption Algorithm Based on Timeout, Pixel Transposition and Modified Fisher-Yates Shuffling -- 1 Introduction -- 2 Proposed Work -- 2.1 Key Generation -- 2.2 Encryption Process -- 2.3 Decryption Process -- 3 Library and Packages -- 4 Performance Analysis and Results -- 4.1 NPCR &amp -- UACI Test -- 4.2 Mean Square Error (MSE) -- 4.3 Root Mean Square Error (RMSE) -- 4.4 Peak Signal to Noise Ratio (PSNR) -- 4.5 Key Space Analysis -- 4.6 Key Sensitivity Test -- 4.7 Encryption Time -- 4.8 Correlation Analysis -- 4.9 Mono-bit Test -- 4.10 Entropy Analysis -- 4.11 Average Difference (AD) and Maximum Difference (MD) -- 4.12 Structural Content (SC) -- 5 Conclusion -- References.

EXAM: Explainable Models for Analyzing Malicious Android Applications -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Data Set Preparation -- 3.2 Feature Extraction -- 3.3 Pre-processing the Feature Set and FVT Creation -- 3.4 Model Preparation and Classification -- 3.5 Obfuscation of Samples -- 3.6 Interpretation of Results Using SHAP -- 4 Experiments and Results -- 4.1 Evaluation Measures -- 4.2 Research Questions -- 4.3 Comparison with State-of-the-Art Approaches -- 5 Conclusion -- References -- Data Encryption Approach Using Hybrid Cryptography and Steganography with Combination of Block Ciphers -- 1 Introduction -- 1.1 Research Contribution -- 1.2 Paper Organisation -- 2 Related Work in the Domain -- 3 Proposed Methodology -- 4 Results and Discussions -- 5 Conclusion -- References -- Mitigation and Prevention Methods for Distributed Denial-of-Service Attacks on Network Servers -- 1 Introduction -- 2 Proposed Survey -- 2.1 Motivation for DDoS Attacks -- 2.2 Attack Strategies and Phases -- 2.3 Attack Methods -- 3 Prevention Methods -- 3.1 Prevention Using Filters -- 3.2 Secure Overlay -- 3.3 Honeypots -- 3.4 Load Balancing -- 3.5 Additional Security Patches -- 4 DDoS Mitigation Methods -- 4.1 Detection of DDoS Attacks -- 5 Conclusion -- References -- A Machine Learning Framework for Automatic Detection of Malware -- 1 Introduction -- 2 Literature Review -- 3 Proposed Framework -- 4 Experimental Results -- 5 Conclusion and Future Work -- References -- DNNdroid: Android Malware Detection Framework Based on Federated Learning and Edge Computing -- 1 Introduction -- 2 Related Work -- 3 Datasets -- 4 Machine Learning Technique -- 5 Proposed Framework Architecture -- 6 Evaluation of Proposed Framework -- 7 Comparison of Proposed Framework -- 7.1 Comparison on the Basis of Framework Available in the Literature.

7.2 Comparison of the Proposed Framework with Different Anti-virus Scanners -- 8 Experimental Findings -- 9 Conclusion -- References -- An Improved Symmetric Key Encryption Method Using Randomized Matrix Generation -- 1 Introduction -- 2 Types of Encryption Technique -- 2.1 AES -- 2.2 DES -- 2.3 Blowfish -- 3 Proposed Technique -- 3.1 Random Key Generation Algorithm -- 3.2 Text



Message Encryption Algorithm -- 3.3 Text Message Decryption Algorithm -- 4 Matrix Operations -- 4.1 Matrix Determinant -- 4.2 Matrix Multiplication -- 4.3 Matrix Transpose Operation -- 5 Performance Analysis -- 5.1 Implementation of System -- 5.2 Text Encryption Algorithms Performance Analysis -- 5.3 Analysis of Complexity for Random Key Generation -- 5.4 Analysis of Execution Time -- 5.5 Analysis of Throughput -- 6 Conclusion -- References -- Performance Analyses of Black Hole Attack in AODV Routing Protocol in Vanet Using NS3 -- 1 Introduction -- 1.1 AODV Routing Protocol -- 1.2 Black Hole Attack -- 1.3 Literature Survey -- 1.4 Simulation Set-Up -- 1.5 Result Analyses -- 1.6 Conclusion -- References -- Comparative Analysis of Several Approaches of Encoding Audio Files -- 1 Introduction -- 2 Overview of Cryptography -- 3 Aims of Cryptography -- 3.1 The Many Forms that Cryptography Can Take -- 4 Cryptographic Algorithms at a Glance -- 4.1 DES -- 4.2 3DES -- 4.3 AES -- 4.4 Blowfish -- 4.5 RC4 -- 4.6 Twofish -- 4.7 ThreeFish -- 5 Background and Related Works -- 5.1 Related Research and Development on Audio Encryption -- 6 Recent Works on Audio Encryption -- 7 Limitations -- 8 Conclusion -- References -- A Secure Mechanism for Safeguarding Cloud Infrastructure -- 1 Introduction -- 2 Literature Review -- 3 Types of Security in Cloud Computing -- 3.1 Information Security -- 3.2 Identity Security -- 3.3 Network Security -- 3.4 Software Security -- 3.5 Infrastructure Security.

4 Security Concerns in Cloud -- 4.1 Virtualization -- 4.2 Public-Cloud Storage -- 4.3 Multitenancy -- 4.4 Identity and Access Management (IAM) -- 5 Security of Data in Cloud-Computing -- 6 Major Security Challenges -- 6.1 Internal Attacks -- 6.2 Partial/Incomplete Data Deletion -- 6.3 Interception of Data -- 6.4 Failure of Isolation -- 7 Using Encryption for Data Protection -- 7.1 Block-Cipher -- 7.2 Stream Ciphers -- 7.3 Hash Functions -- 8 Case Study on Cloud Based Cyber Security Model for Identification of Safe and Malicious Request -- 9 Conclusion -- References -- Phishing URLs Detection Using Machine Learning -- 1 Introduction -- 2 Related Work -- 2.1 Literature Review -- 2.2 URLs Descriptions -- 3 Research Methodology -- 4 Result and Analysis -- 4.1 Result -- 4.2 Analysis -- 5 Conclusion -- References -- Android Malware Detection with Classification Based on Hybrid Analysis and N-gram Feature Extraction -- 1 Introduction -- 1.1 Average Cost of a Data Breach -- 1.2 Growth Rate of Malware Infections -- 1.3 India and Asia Statistics on Malware Attacks -- 1.4 Trends in the Number of Attacks -- 1.5 Users Attacked by Malware -- 2 Research Objective/Problem Statement -- 3 Challenges in Malware Detection -- 4 Theoretical Framework -- 5 Hypothesis Declaration -- 6 Methodology -- 7 Approach -- 8 Outline of the Work Proposed -- 8.1 Process for the Proposed Scheme of Work -- 9 Conclusion -- 10 Further Research -- References -- Industry -- Image Processing and Deep Neural Networks for Face Mask Detection -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 3.1 Machine Learning Approach -- 3.2 Supervised Learning -- 3.3 Unsupervised Learning -- 3.4 Viola Jones algorithm -- 4 Mathematical Formulation -- 5 Results and Discussion -- 6 Conclusion -- References -- An Analysis of Lightweight Cryptographic Algorithms for IoT-Applications.

1 Introduction -- 2 Introduction of IoT -- 3 Software and Hardware Performance Metrics -- 4 Research Directions and Open Research Challenges -- 5 Conclusion -- Appendix 1 -- Hardware and Software Performances of LWC Algorithm -- References -- Permissioned Blockchain-Based Solution to Document Processing in the Real Estate Industry -- 1 Introduction -- 1.1 Blockchain Technology -- 1.2 Indian Real Estate Sector -- 1.3 Impact of Blockchain Technology on the Indian



Real Estate Sector -- 2 Related Research Work and Limitations -- 2.1 Summarization of Recent Research Work -- 2.2 Research Gap -- 3 Proposed Research Work -- 3.1 Designed Framework and Components -- 3.2 Core Transaction Process Flow -- 3.3 Proposed Algorithms -- 3.4 Deployment -- 4 Conclusion and Future Scope -- References -- Automatic Evaluation of Free Text Answers: A Review -- 1 Introduction -- 2 Related Work -- 3 A Systematic Review -- 4 Discussion -- 5 Conclusions and Future Work -- References -- Blockchain Federated Learning Framework for Privacy-Preservation -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 4 Performance Evaluation -- 4.1 Datasets -- 4.2 Simulation Setup -- 4.3 Evaluation Metrics -- 4.4 Results and Discussion -- 5 Conclusion -- References -- Path Planning and Static Obstacle Avoidance for Unmanned Aerial Systems -- 1 Introduction -- 2 Methodology -- 2.1 A* Search -- 2.2 Rapidly-Exploring Random Tree -- 2.3 Ant Colony Optimization -- 2.4 Imitation Learning -- 3 Results and Discussion -- 4 Conclusion and Future Work -- References -- Comparative Study of Various Algorithms for Vehicle Detection and Counting in Traffic -- 1 Introduction -- 2 Literature Review -- 2.1 YOLO Real-Time Object Tracking -- 3 Methodology -- 3.1 YOLOv3 Architecture -- 3.2 YOLOv4 Architecture -- 3.3 YOLOv5 Architecture -- 3.4 YOLOv6 Architecture -- 3.5 YOLOv7 Architecture.

4 Results and Discussion.

Sommario/riassunto

This two-volume constitutes the refereed proceedings of the First International Conference on Advancements in Smart Computing and Information Security, ASCIS 2022, held in Rajkot, India, in November 2022. The 37 full papers and 19 short papers presented were thoroughly reviewed and selected from the 206 submissions. The papers are organized in topical sections on artificial intelligence; smart computing; cyber security; industry.