1.

Record Nr.

UNISALENTO991002452879707536

Autore

Congresso nazionale del freddo <7. ; 1958 ; Padova>

Titolo

Atti del 7. Congresso nazionale del freddo : Padova, 1-2-3 giugno 1958 : Temi : prerefrigerazione, trasporti in regime di freddo ... / Congresso nazionale del freddo

Pubbl/distr/stampa

Padova : Fiera di Padova, 1959

Descrizione fisica

1 v. : ill. ; 24 cm

Disciplina

664.8

Soggetti

Merci refrigerate - Congressi - Padova

Lingua di pubblicazione

Italiano

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

In testa al front.: Ente autonomo Fiera internazionale di Padova

2.

Record Nr.

UNISALENTO991004269436907536

Autore

Alleau, René

Titolo

Guida ai giochi / a cura di René Alleau ; traduzione di Donatella Cerutti

Pubbl/distr/stampa

Milano : Longanesi, 1976

Descrizione fisica

220 p. : ill. ; 18 cm

Collana

I libri pocket ; 564

Altri autori (Persone)

Cerutti, Donatella

Disciplina

793

Soggetti

Giochi

Lingua di pubblicazione

Italiano

Formato

Materiale a stampa

Livello bibliografico

Monografia



3.

Record Nr.

UNINA9910770279403321

Autore

Perakovic Dragan

Titolo

Future Access Enablers for Ubiquitous and Intelligent Infrastructures : 7th EAI International Conference, FABULOUS 2023, Bratislava, Slovakia, October 24-26, 2023, Proceedings

Pubbl/distr/stampa

Cham : , : Springer, , 2024

©2024

ISBN

3-031-50051-2

Edizione

[1st ed.]

Descrizione fisica

1 online resource (217 pages)

Collana

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Series ; ; v.542

Altri autori (Persone)

KnapcikovaLucia

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Intro -- Preface -- Organization -- Contents -- Future Access Networks -- Systematic Analysis of Quantum Key Distribution Network Simulations Tools and Platforms -- 1 Introduction -- 2 Previous Research -- 3 The Role of QKD Network in Secure Communication -- 3.1 Distinguishing Characteristics of QKD and Classics Key Distribution -- 3.2 QKD Network Parameters and Architecture -- 4 Overview of QKD Network Simulation Platforms -- 4.1 Discrete-Event Simulation Platforms -- 4.2 Non Discrete-Event Simulation Platforms -- 5 Analysis of QKD Network Simulators Characteristics -- 6 Conclusion -- References -- A Blockchain Patient-Centric Records Framework for Older Adult Healthcare -- 1 Introduction -- 1.1 Older Adults and Co-morbidities -- 1.2 EHR Gaps -- 1.3 A Case for Patient-Centric Healthcare -- 2 Review of Literature -- 2.1 Blockchain Applications in Healthcare -- 2.2 Blockchain Frameworks and Platforms -- 2.3 Analysis and Machine Learning in Healthcare -- 2.4 Proxy Re-encryption -- 2.5 Blockchain Application Evaluation Strategies -- 3 Proposed System -- 3.1 The Framework -- 3.2 The Agents -- 3.3 The Workflow -- 3.4 Other Building Blocks -- 3.5 Security Analysis and Data Accuracy -- 4 Prototype -- 4.1 The Agent Panel and Features -- 4.2 Data Transfer -- 4.3 Algorithms -- 4.4 Queries -- 5 Conclusion -- References -- Analysis of Serious Challenges Faced by the Aviation



Industry -- 1 Introduction -- 2 Challenge of Big Data Management -- 3 Challenge of B737 MAX Aircraft Grounding -- 4 Conclusion -- References -- Internet of Vehicle Moving Objects Detection System for the Rural Road Networks -- 1 Introduction -- 2 Related Work -- 2.1 Design of Rural Road Infrastructure -- 3 Internet of Vehicles and Communications in the Traffic Environment -- 4 Potential Dangers and Protection of Living Moving Objects on Rural Roads.

5 Internet of Vehicle Moving Objects Detection System Designed for the Rural Road Networks -- 6 Conclusions -- References -- Sustainable Communications and Computing Infrastructures -- Photogrammetry in a Virtual Environment -- 1 Introduction -- 1.1 Photogrammetry and Its Current State -- 2 Methodology -- 2.1 Data Collection -- 2.2 The Process of Creating a Virtual Room -- 3 Results -- 4 Conclusion -- References -- Enhancing Circular Economy Using Expert Systems -- 1 Introduction -- 1.1 The Circular Economy of Selected Materials in the Motorsport -- 2 Definition of Expert Systems -- 3 Results and Discussion -- 3.1 Utilization of Acquired Data Using Expert Systems -- 4 Conclusion -- References -- Digital Twin Ecosystem Built with PLM Software for Smart Factory -- 1 Introduction -- 1.1 Literature Review -- 2 Methodology -- 2.1 Case Study -- 3 Results -- 4 Conclusion -- References -- Empirical Evaluations of Machine Learning Effectiveness in Detecting Web Application Attacks -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 XSS: Cross-Site Scripting -- 3.2 SQL Injection Attack -- 4 System Methodology -- 4.1 Design Choice -- 4.2 System Work Flow -- 5 Experimental Results -- 6 Conclusion -- References -- Parameters of Sustainability in the Context of Decarbonization and Circular Construction Sector -- 1 Introduction -- 2 Literature Review -- 2.1 Sustainability and Its Aspects -- 2.2 Sustainability of Buildings -- 2.3 Decarbonization and Its Impact on Industry -- 2.4 Circular Construction -- 3 Research Methodology and Data -- 3.1 Research Aim -- 3.2 Data Collection and Research Sample -- 3.3 Research Step and Methodology -- 4 Results and Discussion -- 4.1 Green Taxes, Energy Taxes -- 4.2 Waste and Recycling -- 5 Conclusion -- References -- Smart Environment Applications/Scenarios -- Online Monitoring and Control FDM Devices: Study.

1 Introduction -- 2 Fused Deposition Modeling Method -- 2.1 OctoPrint and Software -- 3 Research and Discussion -- 4 Conclusion -- References -- Possibilities of Applying Augmented Reality Elements in the Concept of Lean Management -- 1 Introduction -- 2 Methods and Tools -- 2.1 Lean Management -- 2.2 Augmented Reality -- 3 Possibilities of Applying Augmented Reality for Selected Methods of Lean Management -- 3.1 Shop Floor -- 3.2 Value Stream Mapping -- 3.3 Single Minute Exchange to Dies -- 4 Conclusion -- References -- Detection of Energy Consumption Cyber Attacks on Smart Devices -- 1 Introduction -- 1.1 Motivation and Contribution -- 1.2 Organization of the Paper -- 2 Related Work and Background -- 3 Proposed Algorithm -- 3.1 Packet Measurements -- 3.2 Energy Measurements -- 3.3 Calculation of Normal and Abnormal Behaviors -- 4 Experimentation and Discussion -- 4.1 The Testbed Scenario -- 4.2 Experimental Results -- 5 Conclusion and Future Work -- References -- An Efficient Strategy for Deploying Deception Technology -- 1 Introduction -- 2 Background -- 2.1 Problem Statement -- 2.2 Deception -- 2.3 Honeynet -- 2.4 Honeypot -- 3 Methodology -- 3.1 Testing Lab Components -- 3.2 Phases -- 3.3 Steps -- 3.4 Proposed Framework -- 3.5 Consider Data Ex-Filtration Detection Using Deception -- 3.6 Network Scanning -- 4 Lab Testing Use Cases -- 4.1 Scenario 1: Scanning the Network Using Nmap (two Types of Network



Scan: Normal Nmap Scan and Silent Scan) -- 4.2 Scenario 2: Password Spray Was Not Identified by Snort IDS but Got Detected by Dejavu Open-Source Deception Platform -- 5 Conclusion -- References -- The Use of Data in BIM Technology and Effects on Profitability of Construction Projects in Slovakia, Slovenia and Croatia -- 1 Introduction and Problem Statement -- 2 Data in BIM Technology and Profitability Indicators -- 3 Methodology.

3.1 Research Aim and Research Problem -- 3.2 Data Collection and Data Processing -- 3.3 Research Sample -- 3.4 Research Limitations -- 4 Results and Discussion -- 5 Conclusion -- References -- Author Index.