top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Proceedings of Fifth International Conference on Computing, Communications, and Cyber-Security : IC4S'05 Volume 1
Proceedings of Fifth International Conference on Computing, Communications, and Cyber-Security : IC4S'05 Volume 1
Autore Tanwar Sudeep
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (965 pages)
Altri autori (Persone) SinghPradeep Kumar
GanzhaMaria
EpiphaniouGregory
Collana Lecture Notes in Networks and Systems Series
ISBN 981-9725-50-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- Communication and Network Technologies -- Compatibility Checking to Adopt MANET in LoRaWAN for Long-Range Connectivity -- 1 Introduction -- 2 Technical Details of LoRa and LoRaWAN -- 3 Technical Details of Wireless Ad Hoc Network/s -- 4 Technical Details of Routing Protocols -- 5 Integration of LoRaWAN and Wireless Ad Hoc Networks -- 6 Conclusion and Future Scope -- References -- A Novel FR4-Based Slot Antenna with Circular Metasurface for Aerospace CubeSats -- 1 Introduction -- 2 Antenna Design and Structure -- 3 Results and Discussion -- 4 Conclusions -- References -- Compact and High-Gain RFID Reader Antennas for Future Internet of Things Applications -- 1 Introduction -- 2 Antenna Structure -- 3 Result Synthesis -- 4 Conclusions -- References -- Enabling Modern IoT Solutions with RFID Devices via an Integrated Feeding Network-Fed Ultra-Wide HPBW Patch Antenna Array -- 1 Introduction -- 2 Antenna Architecture and Description -- 3 Results and Discussion -- 4 Conclusions and Perspectives -- References -- A Compact and Extremely Stiffness CPW-Fed Metal-Only Patch Antenna Array for Unlimited Lifetime 2U CubeSat Mission Capabilities -- 1 Introduction -- 2 Geometrical Analysis -- 3 Results and Discussion -- 4 Conclusions and Future Works -- References -- Jeans-Based UWB UHF Textile Patch Antenna for IoT Applications -- 1 Introduction -- 2 Overview on Textile Antennas -- 3 Antenna Configuration -- 4 Results and Discussion -- 5 Conclusions and Upcoming Projects -- References -- Design and Fabrication of PCB-Based Proximity Sensors for Application in Automatic Railway Crossing System -- 1 Introduction -- 2 Proposed System Working -- 2.1 PCB Fabrication of Proximity Sensors PCB Fabrication of Proximity Sensors -- 2.2 Traffic Light Control System -- 2.3 Alert System -- 2.4 Gate Closing Mechanism.
3 Conclusion -- References -- FeaTrim-ViT: Vision Transformer Trimming with One Shot Neural Architecture Search in Continuous Optimisation Space and Efficient Feature Selection -- 1 Introduction -- 2 Related Work -- 2.1 Overview of Compression Techniques -- 2.2 Literature Review -- 3 Background -- 3.1 Vision Transformers -- 3.2 Neural Architecture Search -- 3.3 Nature-Inspired Algorithms -- 4 Methodology -- 4.1 Overview -- 4.2 Search Space -- 4.3 Single-Shot Architecture Search -- 4.4 Nature-Inspired Optimisation Algorithm -- 5 Experiments -- 5.1 Training Process -- 5.2 Multidimensional Search -- 5.3 Feature Selection -- 5.4 Dataset -- 6 Results and Analysis -- 6.1 Model Training -- 6.2 Evaluation Metrics -- 6.3 Attention Maps Interpretability -- 6.4 Discussion -- 7 Conclusion -- References -- Detecting Depressive Symptoms on Social Media: A Comprehensive Review of Methodologies and Strategies for Suicide Prevention -- 1 Introduction -- 2 Literature Review -- 2.1 Data Acquisition -- 2.2 Techniques Used -- 3 Critical Evaluation -- 4 Discussion -- 5 Conclusion and Future Scope -- References -- Enhancing Video Content Accessibility Through YouTube Transcript Summarization -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Usage of BART and Its Benefits -- 3.2 Video Summarization Through Captions -- 3.3 Video Summarization Through Audio -- 3.4 Video Clipping for Customized Summary Extraction -- 3.5 Evaluation of Summaries Using ROGUE Scores -- 4 Result and Discussion -- 5 Conclusion -- References -- Advanced Computing Technologies -- Enhanced Rear-End Collision Detection and Localization Scheme Using LSTM, DRNN, and DNN in Fog-Based Internet of Vehicles -- 1 Introduction -- 2 Related Work -- 3 Rear-End Collision Detection Scheme -- 4 Experimental Setup, Performance Metrics, and Evaluation -- 5 Results and Discussion of Result -- 6 Conclusion.
References -- Security Threats and Data Protection Methods Used in Cloud Computing: A Review -- 1 Introduction -- 2 Cloud Computing -- 2.1 Cloud Deployment Models -- 3 Security Issues in Cloud -- 3.1 Identity and Access Management -- 3.2 Data Storage -- 3.3 Network -- 4 Cloud Security Threats -- 5 Research Methodology -- 5.1 Research Strategy -- 5.2 Inclusion and Exclusion Criteria -- 5.3 Research Questions -- 6 Result and Discussion -- 6.1 Ensuring Data Protection While It's Being Processed (RQ1) -- 6.2 Ensuring Data Protection While Searching and Filtering Through the Data (RQ2) -- 6.3 Ensuring Data Privacy Between Multiple Users (RQ3) -- 7 Conclusion -- References -- Load Balancing Algorithms for Cloud Computing Performance: A Review -- 1 Introduction -- 2 Load Balancing -- 3 Types of Load Balancing -- 3.1 Static Load Balancing Algorithms -- 3.2 Dynamic Load Balancing Algorithms -- 3.3 Comparison of Static and Dynamic Load Balancing Algorithms -- 3.4 Existing Load Balancing Techniques in Cloud Computing -- 4 Parameters -- 4.1 Parameter Impact -- 5 Research Methodology -- 5.1 Research Strategy -- 5.2 Inclusion and Exclusion Criteria -- 5.3 Research Questions -- 6 Result and Discussion -- 6.1 Load Balancing is Helpful in Optimizing the Overall Performance in Cloud Environment (RQ1) -- 6.2 Best Performing Load Balancing Algorithm (RQ2) -- 7 Conclusion -- References -- Seamless Mobility: Innovating the Digital Service Landscape in Telecom Industry -- 1 Introduction -- 2 Literature Review -- 3 Digital Payments -- 3.1 Mobile Banking (M-Banking) -- 3.2 UPI-Based Apps -- 3.3 Payments Bank -- 3.4 Mobile Blockchain -- 4 Governance -- 4.1 Mobile Governance -- 4.2 Biometric Technology -- 5 Conclusion -- References -- Data Analytics and Intelligent Learning -- Pandemic Pulse: Unveiling Insights with the Global Health Tracker Through AI and ML -- 1 Introduction.
2 Literature Review -- 3 Detailed Study -- 4 Proposed Work -- 5 Simulation Study -- 6 Discussion and Conclusion -- References -- CNN-Based Model for Real-Time Identification of Face Masks -- 1 Introduction -- 1.1 Face Recognition -- 1.2 Feature Extraction -- 2 Literature Survey -- 3 Proposed Approach -- 4 Performance Evaluation -- 4.1 Results -- 5 Conclusion -- References -- A Systematic Review of Deepfake Detection Using Learning Techniques and Vision Transformer -- 1 Introduction -- 1.1 Motivation -- 1.2 Organization of the Paper -- 1.3 Scope and Contributions of the Paper -- 2 Modalities of Deepfakes -- 2.1 Image Deepfake -- 2.2 Video Deepfake -- 2.3 Audio Deepfake -- 3 Deepfake Generation -- 3.1 Deepfake Tools -- 4 Deepfake Detection -- 4.1 Deep Learning/Machine Learning -- 4.2 Vision Transformer -- 5 Research Challenges -- 6 Evaluation of Proposed Study -- 7 Limitation of the Study -- 8 Conclusion and Future Scope -- References -- Probabilistic Forecasting Prediction Model for Anticipating Days with Elevated Air Pollution -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Dataset Description -- 4 Implementation of Models -- 4.1 Naïve-Prediction-Model Development -- 4.2 Ensemble Tree Prediction Model Development -- 5 Evaluation of Models -- 6 Result and Discussions -- 7 Conclusion and Future Scope -- References -- Optimizing Graph Colorings: Unleashing the Power of Heuristic Algorithms for Enhanced Problem-Solving -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Results -- 4.1 Using 10 Nodes -- 4.2 Using 25 Nodes -- 4.3 Using Nodes 50 -- 4.4 Using Nodes 75 -- 4.5 Using Nodes 100 -- 5 Conclusion -- References -- A Load Balancing Approach Using Binary Search -- 1 Introduction -- 1.1 Underutilization of Cloud Resources -- 2 Related Work -- 3 Proposed Methodology -- 4 Conclusion and Future Scope -- References.
Enhanced Detection of Alzheimer's and Mild Cognitive Impairment: Leveraging Advanced Preprocessing and Convolutional Neural Networks -- 1 Introduction -- 2 Literature Review -- 3 Material and Methods -- 3.1 Dataset -- 3.2 Preprocessing -- 3.3 CNN Architectures -- 3.4 Performance Metrics -- 4 Results and Discussion -- 5 Conclusion -- References -- Classification of Dry Beans into Genetic Varieties Using Deep Learning-Based Convolutional Neural Networks (CNNs) -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Capturing Sample Image -- 3.2 Formation of a Well-Balanced Dataset -- 3.3 Data Preprocessing -- 3.4 Applying Deep Learning Algorithms -- 4 Results and Discussion -- 5 Conclusion -- References -- Navigating the Realm of Generative Models: GANs, Diffusion, Limitations, and Future Prospects-A Review -- 1 Introduction -- 2 Background -- 2.1 Generative Adversarial Networks (GANs) -- 2.2 Diffusion Models -- 3 Text-to-Image Synthesis -- 4 Comparison Between Generative Models -- 4.1 Generative Models in Different Scenarios -- 5 Research Methodology -- 5.1 Research Strategy -- 5.2 Sources -- 5.3 Search Process -- 5.4 Segregation of Literature -- 6 Research Questions -- 7 Results and Discussion -- 7.1 Application and Comparison of Generative Models (RQ1) -- 7.2 Challenges in Generative Models (RQ 2) -- 7.3 Future Research Directions and Emerging Trends in Generative Models -- 8 Conclusion -- References -- Enhancing Software Reliability Through Hybrid Metaheuristic Optimization -- 1 Introduction -- 1.1 Why NACO -- 2 Background and Related Work -- 2.1 Background -- 2.2 Related Work -- 3 Software Metrics -- 4 Methodology -- 4.1 Problem Formulation -- 4.2 Objective Function -- 4.3 Framework -- 5 Result and Discussion -- 5.1 Implementation Details -- 5.2 Results -- 6 Conclusion and Future Scope -- References.
Anomaly Detection for Automated Cyber-attacks: Hybrid SVM ML-Based Approach.
Record Nr. UNINA-9910878046603321
Tanwar Sudeep  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of Fourth International Conference on Computing, Communications, and Cyber-Security : IC4S 2022 / / edited by Sudeep Tanwar, Slawomir T. Wierzchon, Pradeep Kumar Singh, Maria Ganzha, Gregory Epiphaniou
Proceedings of Fourth International Conference on Computing, Communications, and Cyber-Security : IC4S 2022 / / edited by Sudeep Tanwar, Slawomir T. Wierzchon, Pradeep Kumar Singh, Maria Ganzha, Gregory Epiphaniou
Autore Tanwar Sudeep
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (920 pages)
Disciplina 004.6
Altri autori (Persone) WierzchonSlawomir T
SinghPradeep Kumar
GanzhaMaria
EpiphaniouGregory
Collana Lecture Notes in Networks and Systems
Soggetto topico Telecommunication
Signal processing
Computer networks—Security measures
Artificial intelligence
Communications Engineering, Networks
Signal, Speech and Image Processing
Mobile and Network Security
Artificial Intelligence
ISBN 981-9914-79-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- Communication and Network Technologies -- Design and Implementation of an IoT-Based Indoor Hydroponics Farm with Automated Climate and Light Control -- 1 Introduction -- 2 Literature Review -- 3 System Design Methodology -- 3.1 System Architecture -- 3.2 IoT System Decision Flow -- 3.3 User Interface Mobile Application -- 4 Results -- 5 Conclusion -- References -- Drone Ecosystem: Architecture for Configuring and Securing UAVs -- 1 Introduction -- 2 UAV Ecosystem Infrastructure -- 3 Communication Architecture-Stage One -- 3.1 UAV or Drones -- 3.2 Light-Weight Cryptographic Function -- 3.3 Ad Hoc Network -- 4 Communication Architecture-Stage Two -- 4.1 5G Cellular Network -- 4.2 5G Cellular Tower -- 4.3 Network Slicing -- 5 Communication Architecture-Stage Three -- 5.1 Ground Station -- 5.2 Sub-ground Station -- 5.3 HTTP-3/QUIC Messaging Protocol -- 5.4 Zero-Round Trip Time (Zero/0-RTT) -- 5.5 Cloud, Cloud-Based Storage, and WAi -- 6 Security: Types of Attacks -- 6.1 Cyberattack Vectors -- 6.2 Physical Threat to Drones -- 7 Conclusion and Future Scope -- References -- An Improved Neural Network-Based Routing Algorithm for Mobile Ad Hoc Networks -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Path Finding Mechanism -- 3.2 Management of Event -- 3.3 Evaluation of the QoS Parameters -- 4 Results and Discussion -- 5 Conclusion -- References -- Energy Harvesting in Fifth-Generation Wireless Network: Upcoming Challenges and Future Directions -- 1 Introduction -- 2 Background and Motivation -- 3 Trends in Energy Harvesting -- 4 Challenges -- 5 Future Directions -- 6 Conclusion -- References -- Develop a Quantum Based Time Scheduling Algorithm for Digital Microfluidic Biochips -- 1 Introduction -- 2 Problem Description -- 2.1 Motivation -- 2.2 Problem Formulation.
3 Proposed Algorithm -- 4 Experimental Result -- 5 Conclusion -- References -- Revolution in Agriculture with the Aid of Internet of Things -- 1 Introduction -- 2 Review of Literature -- 3 Benefits of IoT in Agriculture -- 4 Role of IoT in Agriculture -- 5 Proposed Systems -- 6 Conclusion -- References -- Supercontinuum Generation in Dispersion-Tailored Tetrachloroethylene Filled Photonic Crystal Fibers -- 1 Introduction -- 2 Theoretical Model of Tetrachloroethylene PCF -- 3 Dispersion Properties of the Proposed Fiber -- 4 SCG in Optimized Structures -- 5 Conclusion -- References -- Early Detection of Covid-19 Using Wearable Sensors' Data Enabled by Semantic Web Technologies -- 1 Introduction -- 1.1 Motivation -- 1.2 Objective -- 1.3 Contribution -- 2 Literature Survey -- 2.1 IoT and Covid-19 -- 2.2 SWT and SWoT -- 2.3 Related Works-Early Detection of Covid-19 -- 3 Methodology -- 4 Evaluation -- 4.1 Method and Metrics -- 4.2 Results -- 4.3 Discussion -- 5 Conclusion and Future Scope -- References -- Cell Outage Detection in 5G Self-organizing Networks Based on FDA-HMM -- 1 Introduction -- 2 FDA Feature Extraction Method -- 3 Hidden Markov Models -- 4 HMM Training and Detection -- 4.1 Training Stage -- 4.2 Detection Stage -- 5 Simulation Results -- 5.1 FDA-HMM Performance at Different pp and upper LL -- 5.2 FDA-HMM Performance Comparison with Other Detectors -- 6 Conclusion -- References -- IoT-Based Scalable Framework for Pollution Aware Route Recommendation -- 1 Introduction -- 2 Background -- 3 Air Quality Standards -- 4 Proposed Architecture -- 4.1 Air Pollution Tracking -- 4.2 Traffic Re-routing -- 5 Process Methodology -- 6 Experimental Setup -- 6.1 Ingest -- 6.2 Collect -- 6.3 Process -- 6.4 Store -- 6.5 Visualize -- 6.6 Route Recommendation -- 6.7 User Interface -- 6.8 Result Analysis -- 7 Interface -- 8 Conclusion and Future Directions.
References -- Drone: A Systematic Review of UAV Technologies -- 1 Introduction -- 1.1 About the Drone and Its History -- 2 Contextual and Associated Work -- 2.1 Literature Review -- 2.2 Challenges in the Field of UAVs -- 2.3 Applications of Drones -- 2.4 Advantages and Disadvantages of Drones -- 2.5 Simulator Tools -- 3 Future Work and Conclusions -- References -- Reconfigurable Intelligent Surface-Enabled Energy-Efficient Cooperative Spectrum Sensing -- 1 Introduction -- 2 System Model -- 3 Energy Efficiency of RIS-Based CSS -- 4 Results and Discussion -- 5 Conclusion and Future Scope -- References -- Resource Sharing in Back Haul Satellite-Based NOMA Network -- 1 Introduction -- 2 System Model -- 2.1 Selection a User for a BS -- 2.2 Access to Satellite -- 3 Results and Simulation -- 4 Conclusion -- References -- Advanced Computing Technologies -- A Review on Various Deepfakes' Detection Methods -- 1 Introduction -- 2 Deepfakes' Generation -- 3 Generative Adversarial Networks (GANs) -- 4 Types of Deepfakes -- 5 Literature Survey -- 6 Conclusion -- References -- Proposed Framework for Implementation of Biometrics in Banking KYC -- 1 Introduction -- 2 Literature Review -- 3 Biometric Security -- 3.1 Biometric Implementation in Banking -- 4 Retinal Biometric Recognition -- 4.1 What Is Retinal Biometric Recognition -- 4.2 Working of Retinal Biometric Recognition -- 4.3 Application of Iris Recognition -- 5 Threats and Attacks on Banking -- 6 Proposed Methodology -- 6.1 Components of the Adaptive Framework -- 6.2 Adaptive Operational Framework -- 7 Strengths of Proposed Methodology -- 7.1 Design Objectives of KYC Framework -- 8 Conclusion and Future Scope -- References -- Paddy Pro: A MobileNetV3-Based App to Identify Paddy Leaf Diseases -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 System Architecture -- 4 Classification Models.
4.1 Convolutional Neural Networks (CNN) -- 4.2 MobileNetV3 -- 4.3 Transfer Learning -- 4.4 Mobile App Development -- 5 Experimental Results -- 5.1 Performance Analysis -- 6 Conclusion -- References -- Cryptanalysis of RSEAP2 Authentication Protocol Based on RFID for Vehicular Cloud Computing -- 1 Introduction -- 1.1 RFID Communication System Security Standards for IoT -- 2 Literature Review -- 2.1 Definition of the Problem -- 2.2 The Purpose and Signicance of Our Work -- 3 Definitions and Mathematical Preliminaries -- 3.1 Background of ECC -- 4 RSEAP2-Protocol -- 5 Security Analysis of RSEAP2 -- 5.1 Inappropriate Extraction of Keys -- 5.2 Inefficient Mutual Authentication Attack -- 5.3 Inefficient Session Key Establishment Attack -- 5.4 Attack on Denial of Service -- 5.5 Availability Issues -- 6 Performance Analysis -- 7 Concluding Remarks -- References -- A Survey on Code-Mixed Sentiment Analysis Based on Hinglish Dataset -- 1 Introduction -- 2 Related Research -- 3 Datasets -- 4 Challenges and Issues -- 5 Conclusion -- References -- An Alternative to PHP for the Development of Web Applications: Java Server Pages Engine -- 1 Introduction -- 2 Concept Statement -- 2.1 JSP: The Basis and High-Speed Setting -- 2.2 Shell for Java Server Pages -- 3 The Perspectives of Using Java Server Pages -- 4 Conclusions -- References -- Novel Load Balancing Technique for Microservice-Based Fog Healthcare Environment -- 1 Introduction -- 1.1 Motivation and Novelty -- 1.2 Load Balancing in Fog Computing -- 2 Load Balancing Technique for Microservice-Based Fog Healthcare Environment -- 2.1 Workflow -- 2.2 Details of Microservice in Proposed Healthcare System -- 2.3 Success_factor-Based Load Balancing Algorithm -- 3 Result and Discussion -- 3.1 Throughput -- 3.2 Execution Time -- 4 Conclusion -- References.
Self-improved COOT Algorithm for Resource Allocation in Cloud Data Centers -- 1 Introduction -- 2 Literature Review -- 2.1 Related Works -- 3 Resource Allocation Method in Cloud: An Overview of Proposed Concept -- 3.1 Suggested Resource Allocation Method -- 3.2 Cloud Setup -- 4 Improved K-means-Based Workload Clustering: SUCO-Based Optimal Centroid Identification -- 4.1 Improved K-means Clustering-Based Workload Clustering -- 4.2 Defined Threefold Objectives -- 4.3 Suggested SUCO Model for Resource Allocation and Optimal Centroid Selection -- 5 Results and Discussion -- 5.1 Simulation Procedure -- 5.2 Analysis on Energy Consumption -- 5.3 Analysis on Execution Time -- 5.4 Analysis on Resource Utilization -- 5.5 Convergence Analysis -- 5.6 Performance Analysis -- 5.7 Analysis on Computing Time -- 6 Conclusion -- References -- XGBoost-Based Prediction and Evaluation Model for Enchanting Subscribers in Industrial Sector -- 1 Introduction -- 1.1 Customer Interaction -- 1.2 Customer Engagement Marketing -- 1.3 Implementing a Customer Engagement Marketing Strategy -- 1.4 Customer Interaction Strategies -- 2 Literature Review -- 3 Proposed System Model -- 3.1 Work Flow Classification -- 4 Simulation Results -- 5 Conclusion and Future Work -- References -- CleanO-Renewable Energy-Based Robotic Floor Cleaner -- 1 Introduction -- 2 Product Design -- 2.1 Product Comparison -- 2.2 Empathize and Ideate Phase -- 3 Proposed System Model -- 3.1 Block Diagram -- 3.2 Architectural Diagram of IoT-Based Floor Cleaner -- 3.3 Navigation System -- 4 Proposed Product Prototype -- 5 Challenges and Research Opportunities -- 5.1 Networking -- 5.2 Machine Learning -- 5.3 Blockchain -- 5.4 Artificial Intelligence -- 5.5 Renewable and Reusable Energych23b27 -- 5.6 Future Resources -- 6 Conclusion -- References.
Impact of "COVID-19 Pandemic" on Children Online Education: A Review and Bibliometric Analysis.
Record Nr. UNINA-9910734872903321
Tanwar Sudeep  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the 2016 Federated Conference on Computer Science and Information Systems : September 11-14, 2016. Gda'ns, Poland / / Maria Ganzha, Leszek Maciaszek, Marcin Paprzycki, editors ; sponsored by Institute of Electrical and Electronics Engineers
Proceedings of the 2016 Federated Conference on Computer Science and Information Systems : September 11-14, 2016. Gda'ns, Poland / / Maria Ganzha, Leszek Maciaszek, Marcin Paprzycki, editors ; sponsored by Institute of Electrical and Electronics Engineers
Pubbl/distr/stampa Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2016
Descrizione fisica 1 online resource (164 pages)
Disciplina 029.7
Soggetto topico Information storage and retrieval systems
Computer science
Soggetto genere / forma Electronic books.
ISBN 83-60810-90-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910332530803321
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the 2016 Federated Conference on Computer Science and Information Systems : September 11-14, 2016. Gda'ns, Poland / / Maria Ganzha, Leszek Maciaszek, Marcin Paprzycki, editors ; sponsored by Institute of Electrical and Electronics Engineers
Proceedings of the 2016 Federated Conference on Computer Science and Information Systems : September 11-14, 2016. Gda'ns, Poland / / Maria Ganzha, Leszek Maciaszek, Marcin Paprzycki, editors ; sponsored by Institute of Electrical and Electronics Engineers
Pubbl/distr/stampa Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2016
Descrizione fisica 1 online resource (164 pages)
Disciplina 029.7
Soggetto topico Information storage and retrieval systems
Computer science
ISBN 83-60810-90-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996580865603316
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui