Proceedings of Fifth International Conference on Computing, Communications, and Cyber-Security : IC4S'05 Volume 1 |
Autore | Tanwar Sudeep |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (965 pages) |
Altri autori (Persone) |
SinghPradeep Kumar
GanzhaMaria EpiphaniouGregory |
Collana | Lecture Notes in Networks and Systems Series |
ISBN | 981-9725-50-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- Communication and Network Technologies -- Compatibility Checking to Adopt MANET in LoRaWAN for Long-Range Connectivity -- 1 Introduction -- 2 Technical Details of LoRa and LoRaWAN -- 3 Technical Details of Wireless Ad Hoc Network/s -- 4 Technical Details of Routing Protocols -- 5 Integration of LoRaWAN and Wireless Ad Hoc Networks -- 6 Conclusion and Future Scope -- References -- A Novel FR4-Based Slot Antenna with Circular Metasurface for Aerospace CubeSats -- 1 Introduction -- 2 Antenna Design and Structure -- 3 Results and Discussion -- 4 Conclusions -- References -- Compact and High-Gain RFID Reader Antennas for Future Internet of Things Applications -- 1 Introduction -- 2 Antenna Structure -- 3 Result Synthesis -- 4 Conclusions -- References -- Enabling Modern IoT Solutions with RFID Devices via an Integrated Feeding Network-Fed Ultra-Wide HPBW Patch Antenna Array -- 1 Introduction -- 2 Antenna Architecture and Description -- 3 Results and Discussion -- 4 Conclusions and Perspectives -- References -- A Compact and Extremely Stiffness CPW-Fed Metal-Only Patch Antenna Array for Unlimited Lifetime 2U CubeSat Mission Capabilities -- 1 Introduction -- 2 Geometrical Analysis -- 3 Results and Discussion -- 4 Conclusions and Future Works -- References -- Jeans-Based UWB UHF Textile Patch Antenna for IoT Applications -- 1 Introduction -- 2 Overview on Textile Antennas -- 3 Antenna Configuration -- 4 Results and Discussion -- 5 Conclusions and Upcoming Projects -- References -- Design and Fabrication of PCB-Based Proximity Sensors for Application in Automatic Railway Crossing System -- 1 Introduction -- 2 Proposed System Working -- 2.1 PCB Fabrication of Proximity Sensors PCB Fabrication of Proximity Sensors -- 2.2 Traffic Light Control System -- 2.3 Alert System -- 2.4 Gate Closing Mechanism.
3 Conclusion -- References -- FeaTrim-ViT: Vision Transformer Trimming with One Shot Neural Architecture Search in Continuous Optimisation Space and Efficient Feature Selection -- 1 Introduction -- 2 Related Work -- 2.1 Overview of Compression Techniques -- 2.2 Literature Review -- 3 Background -- 3.1 Vision Transformers -- 3.2 Neural Architecture Search -- 3.3 Nature-Inspired Algorithms -- 4 Methodology -- 4.1 Overview -- 4.2 Search Space -- 4.3 Single-Shot Architecture Search -- 4.4 Nature-Inspired Optimisation Algorithm -- 5 Experiments -- 5.1 Training Process -- 5.2 Multidimensional Search -- 5.3 Feature Selection -- 5.4 Dataset -- 6 Results and Analysis -- 6.1 Model Training -- 6.2 Evaluation Metrics -- 6.3 Attention Maps Interpretability -- 6.4 Discussion -- 7 Conclusion -- References -- Detecting Depressive Symptoms on Social Media: A Comprehensive Review of Methodologies and Strategies for Suicide Prevention -- 1 Introduction -- 2 Literature Review -- 2.1 Data Acquisition -- 2.2 Techniques Used -- 3 Critical Evaluation -- 4 Discussion -- 5 Conclusion and Future Scope -- References -- Enhancing Video Content Accessibility Through YouTube Transcript Summarization -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Usage of BART and Its Benefits -- 3.2 Video Summarization Through Captions -- 3.3 Video Summarization Through Audio -- 3.4 Video Clipping for Customized Summary Extraction -- 3.5 Evaluation of Summaries Using ROGUE Scores -- 4 Result and Discussion -- 5 Conclusion -- References -- Advanced Computing Technologies -- Enhanced Rear-End Collision Detection and Localization Scheme Using LSTM, DRNN, and DNN in Fog-Based Internet of Vehicles -- 1 Introduction -- 2 Related Work -- 3 Rear-End Collision Detection Scheme -- 4 Experimental Setup, Performance Metrics, and Evaluation -- 5 Results and Discussion of Result -- 6 Conclusion. References -- Security Threats and Data Protection Methods Used in Cloud Computing: A Review -- 1 Introduction -- 2 Cloud Computing -- 2.1 Cloud Deployment Models -- 3 Security Issues in Cloud -- 3.1 Identity and Access Management -- 3.2 Data Storage -- 3.3 Network -- 4 Cloud Security Threats -- 5 Research Methodology -- 5.1 Research Strategy -- 5.2 Inclusion and Exclusion Criteria -- 5.3 Research Questions -- 6 Result and Discussion -- 6.1 Ensuring Data Protection While It's Being Processed (RQ1) -- 6.2 Ensuring Data Protection While Searching and Filtering Through the Data (RQ2) -- 6.3 Ensuring Data Privacy Between Multiple Users (RQ3) -- 7 Conclusion -- References -- Load Balancing Algorithms for Cloud Computing Performance: A Review -- 1 Introduction -- 2 Load Balancing -- 3 Types of Load Balancing -- 3.1 Static Load Balancing Algorithms -- 3.2 Dynamic Load Balancing Algorithms -- 3.3 Comparison of Static and Dynamic Load Balancing Algorithms -- 3.4 Existing Load Balancing Techniques in Cloud Computing -- 4 Parameters -- 4.1 Parameter Impact -- 5 Research Methodology -- 5.1 Research Strategy -- 5.2 Inclusion and Exclusion Criteria -- 5.3 Research Questions -- 6 Result and Discussion -- 6.1 Load Balancing is Helpful in Optimizing the Overall Performance in Cloud Environment (RQ1) -- 6.2 Best Performing Load Balancing Algorithm (RQ2) -- 7 Conclusion -- References -- Seamless Mobility: Innovating the Digital Service Landscape in Telecom Industry -- 1 Introduction -- 2 Literature Review -- 3 Digital Payments -- 3.1 Mobile Banking (M-Banking) -- 3.2 UPI-Based Apps -- 3.3 Payments Bank -- 3.4 Mobile Blockchain -- 4 Governance -- 4.1 Mobile Governance -- 4.2 Biometric Technology -- 5 Conclusion -- References -- Data Analytics and Intelligent Learning -- Pandemic Pulse: Unveiling Insights with the Global Health Tracker Through AI and ML -- 1 Introduction. 2 Literature Review -- 3 Detailed Study -- 4 Proposed Work -- 5 Simulation Study -- 6 Discussion and Conclusion -- References -- CNN-Based Model for Real-Time Identification of Face Masks -- 1 Introduction -- 1.1 Face Recognition -- 1.2 Feature Extraction -- 2 Literature Survey -- 3 Proposed Approach -- 4 Performance Evaluation -- 4.1 Results -- 5 Conclusion -- References -- A Systematic Review of Deepfake Detection Using Learning Techniques and Vision Transformer -- 1 Introduction -- 1.1 Motivation -- 1.2 Organization of the Paper -- 1.3 Scope and Contributions of the Paper -- 2 Modalities of Deepfakes -- 2.1 Image Deepfake -- 2.2 Video Deepfake -- 2.3 Audio Deepfake -- 3 Deepfake Generation -- 3.1 Deepfake Tools -- 4 Deepfake Detection -- 4.1 Deep Learning/Machine Learning -- 4.2 Vision Transformer -- 5 Research Challenges -- 6 Evaluation of Proposed Study -- 7 Limitation of the Study -- 8 Conclusion and Future Scope -- References -- Probabilistic Forecasting Prediction Model for Anticipating Days with Elevated Air Pollution -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Dataset Description -- 4 Implementation of Models -- 4.1 Naïve-Prediction-Model Development -- 4.2 Ensemble Tree Prediction Model Development -- 5 Evaluation of Models -- 6 Result and Discussions -- 7 Conclusion and Future Scope -- References -- Optimizing Graph Colorings: Unleashing the Power of Heuristic Algorithms for Enhanced Problem-Solving -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Results -- 4.1 Using 10 Nodes -- 4.2 Using 25 Nodes -- 4.3 Using Nodes 50 -- 4.4 Using Nodes 75 -- 4.5 Using Nodes 100 -- 5 Conclusion -- References -- A Load Balancing Approach Using Binary Search -- 1 Introduction -- 1.1 Underutilization of Cloud Resources -- 2 Related Work -- 3 Proposed Methodology -- 4 Conclusion and Future Scope -- References. Enhanced Detection of Alzheimer's and Mild Cognitive Impairment: Leveraging Advanced Preprocessing and Convolutional Neural Networks -- 1 Introduction -- 2 Literature Review -- 3 Material and Methods -- 3.1 Dataset -- 3.2 Preprocessing -- 3.3 CNN Architectures -- 3.4 Performance Metrics -- 4 Results and Discussion -- 5 Conclusion -- References -- Classification of Dry Beans into Genetic Varieties Using Deep Learning-Based Convolutional Neural Networks (CNNs) -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Capturing Sample Image -- 3.2 Formation of a Well-Balanced Dataset -- 3.3 Data Preprocessing -- 3.4 Applying Deep Learning Algorithms -- 4 Results and Discussion -- 5 Conclusion -- References -- Navigating the Realm of Generative Models: GANs, Diffusion, Limitations, and Future Prospects-A Review -- 1 Introduction -- 2 Background -- 2.1 Generative Adversarial Networks (GANs) -- 2.2 Diffusion Models -- 3 Text-to-Image Synthesis -- 4 Comparison Between Generative Models -- 4.1 Generative Models in Different Scenarios -- 5 Research Methodology -- 5.1 Research Strategy -- 5.2 Sources -- 5.3 Search Process -- 5.4 Segregation of Literature -- 6 Research Questions -- 7 Results and Discussion -- 7.1 Application and Comparison of Generative Models (RQ1) -- 7.2 Challenges in Generative Models (RQ 2) -- 7.3 Future Research Directions and Emerging Trends in Generative Models -- 8 Conclusion -- References -- Enhancing Software Reliability Through Hybrid Metaheuristic Optimization -- 1 Introduction -- 1.1 Why NACO -- 2 Background and Related Work -- 2.1 Background -- 2.2 Related Work -- 3 Software Metrics -- 4 Methodology -- 4.1 Problem Formulation -- 4.2 Objective Function -- 4.3 Framework -- 5 Result and Discussion -- 5.1 Implementation Details -- 5.2 Results -- 6 Conclusion and Future Scope -- References. Anomaly Detection for Automated Cyber-attacks: Hybrid SVM ML-Based Approach. |
Record Nr. | UNINA-9910878046603321 |
Tanwar Sudeep | ||
Singapore : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of Fourth International Conference on Computing, Communications, and Cyber-Security : IC4S 2022 / / edited by Sudeep Tanwar, Slawomir T. Wierzchon, Pradeep Kumar Singh, Maria Ganzha, Gregory Epiphaniou |
Autore | Tanwar Sudeep |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (920 pages) |
Disciplina | 004.6 |
Altri autori (Persone) |
WierzchonSlawomir T
SinghPradeep Kumar GanzhaMaria EpiphaniouGregory |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Telecommunication
Signal processing Computer networks—Security measures Artificial intelligence Communications Engineering, Networks Signal, Speech and Image Processing Mobile and Network Security Artificial Intelligence |
ISBN | 981-9914-79-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- Communication and Network Technologies -- Design and Implementation of an IoT-Based Indoor Hydroponics Farm with Automated Climate and Light Control -- 1 Introduction -- 2 Literature Review -- 3 System Design Methodology -- 3.1 System Architecture -- 3.2 IoT System Decision Flow -- 3.3 User Interface Mobile Application -- 4 Results -- 5 Conclusion -- References -- Drone Ecosystem: Architecture for Configuring and Securing UAVs -- 1 Introduction -- 2 UAV Ecosystem Infrastructure -- 3 Communication Architecture-Stage One -- 3.1 UAV or Drones -- 3.2 Light-Weight Cryptographic Function -- 3.3 Ad Hoc Network -- 4 Communication Architecture-Stage Two -- 4.1 5G Cellular Network -- 4.2 5G Cellular Tower -- 4.3 Network Slicing -- 5 Communication Architecture-Stage Three -- 5.1 Ground Station -- 5.2 Sub-ground Station -- 5.3 HTTP-3/QUIC Messaging Protocol -- 5.4 Zero-Round Trip Time (Zero/0-RTT) -- 5.5 Cloud, Cloud-Based Storage, and WAi -- 6 Security: Types of Attacks -- 6.1 Cyberattack Vectors -- 6.2 Physical Threat to Drones -- 7 Conclusion and Future Scope -- References -- An Improved Neural Network-Based Routing Algorithm for Mobile Ad Hoc Networks -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Path Finding Mechanism -- 3.2 Management of Event -- 3.3 Evaluation of the QoS Parameters -- 4 Results and Discussion -- 5 Conclusion -- References -- Energy Harvesting in Fifth-Generation Wireless Network: Upcoming Challenges and Future Directions -- 1 Introduction -- 2 Background and Motivation -- 3 Trends in Energy Harvesting -- 4 Challenges -- 5 Future Directions -- 6 Conclusion -- References -- Develop a Quantum Based Time Scheduling Algorithm for Digital Microfluidic Biochips -- 1 Introduction -- 2 Problem Description -- 2.1 Motivation -- 2.2 Problem Formulation.
3 Proposed Algorithm -- 4 Experimental Result -- 5 Conclusion -- References -- Revolution in Agriculture with the Aid of Internet of Things -- 1 Introduction -- 2 Review of Literature -- 3 Benefits of IoT in Agriculture -- 4 Role of IoT in Agriculture -- 5 Proposed Systems -- 6 Conclusion -- References -- Supercontinuum Generation in Dispersion-Tailored Tetrachloroethylene Filled Photonic Crystal Fibers -- 1 Introduction -- 2 Theoretical Model of Tetrachloroethylene PCF -- 3 Dispersion Properties of the Proposed Fiber -- 4 SCG in Optimized Structures -- 5 Conclusion -- References -- Early Detection of Covid-19 Using Wearable Sensors' Data Enabled by Semantic Web Technologies -- 1 Introduction -- 1.1 Motivation -- 1.2 Objective -- 1.3 Contribution -- 2 Literature Survey -- 2.1 IoT and Covid-19 -- 2.2 SWT and SWoT -- 2.3 Related Works-Early Detection of Covid-19 -- 3 Methodology -- 4 Evaluation -- 4.1 Method and Metrics -- 4.2 Results -- 4.3 Discussion -- 5 Conclusion and Future Scope -- References -- Cell Outage Detection in 5G Self-organizing Networks Based on FDA-HMM -- 1 Introduction -- 2 FDA Feature Extraction Method -- 3 Hidden Markov Models -- 4 HMM Training and Detection -- 4.1 Training Stage -- 4.2 Detection Stage -- 5 Simulation Results -- 5.1 FDA-HMM Performance at Different pp and upper LL -- 5.2 FDA-HMM Performance Comparison with Other Detectors -- 6 Conclusion -- References -- IoT-Based Scalable Framework for Pollution Aware Route Recommendation -- 1 Introduction -- 2 Background -- 3 Air Quality Standards -- 4 Proposed Architecture -- 4.1 Air Pollution Tracking -- 4.2 Traffic Re-routing -- 5 Process Methodology -- 6 Experimental Setup -- 6.1 Ingest -- 6.2 Collect -- 6.3 Process -- 6.4 Store -- 6.5 Visualize -- 6.6 Route Recommendation -- 6.7 User Interface -- 6.8 Result Analysis -- 7 Interface -- 8 Conclusion and Future Directions. References -- Drone: A Systematic Review of UAV Technologies -- 1 Introduction -- 1.1 About the Drone and Its History -- 2 Contextual and Associated Work -- 2.1 Literature Review -- 2.2 Challenges in the Field of UAVs -- 2.3 Applications of Drones -- 2.4 Advantages and Disadvantages of Drones -- 2.5 Simulator Tools -- 3 Future Work and Conclusions -- References -- Reconfigurable Intelligent Surface-Enabled Energy-Efficient Cooperative Spectrum Sensing -- 1 Introduction -- 2 System Model -- 3 Energy Efficiency of RIS-Based CSS -- 4 Results and Discussion -- 5 Conclusion and Future Scope -- References -- Resource Sharing in Back Haul Satellite-Based NOMA Network -- 1 Introduction -- 2 System Model -- 2.1 Selection a User for a BS -- 2.2 Access to Satellite -- 3 Results and Simulation -- 4 Conclusion -- References -- Advanced Computing Technologies -- A Review on Various Deepfakes' Detection Methods -- 1 Introduction -- 2 Deepfakes' Generation -- 3 Generative Adversarial Networks (GANs) -- 4 Types of Deepfakes -- 5 Literature Survey -- 6 Conclusion -- References -- Proposed Framework for Implementation of Biometrics in Banking KYC -- 1 Introduction -- 2 Literature Review -- 3 Biometric Security -- 3.1 Biometric Implementation in Banking -- 4 Retinal Biometric Recognition -- 4.1 What Is Retinal Biometric Recognition -- 4.2 Working of Retinal Biometric Recognition -- 4.3 Application of Iris Recognition -- 5 Threats and Attacks on Banking -- 6 Proposed Methodology -- 6.1 Components of the Adaptive Framework -- 6.2 Adaptive Operational Framework -- 7 Strengths of Proposed Methodology -- 7.1 Design Objectives of KYC Framework -- 8 Conclusion and Future Scope -- References -- Paddy Pro: A MobileNetV3-Based App to Identify Paddy Leaf Diseases -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 System Architecture -- 4 Classification Models. 4.1 Convolutional Neural Networks (CNN) -- 4.2 MobileNetV3 -- 4.3 Transfer Learning -- 4.4 Mobile App Development -- 5 Experimental Results -- 5.1 Performance Analysis -- 6 Conclusion -- References -- Cryptanalysis of RSEAP2 Authentication Protocol Based on RFID for Vehicular Cloud Computing -- 1 Introduction -- 1.1 RFID Communication System Security Standards for IoT -- 2 Literature Review -- 2.1 Definition of the Problem -- 2.2 The Purpose and Signicance of Our Work -- 3 Definitions and Mathematical Preliminaries -- 3.1 Background of ECC -- 4 RSEAP2-Protocol -- 5 Security Analysis of RSEAP2 -- 5.1 Inappropriate Extraction of Keys -- 5.2 Inefficient Mutual Authentication Attack -- 5.3 Inefficient Session Key Establishment Attack -- 5.4 Attack on Denial of Service -- 5.5 Availability Issues -- 6 Performance Analysis -- 7 Concluding Remarks -- References -- A Survey on Code-Mixed Sentiment Analysis Based on Hinglish Dataset -- 1 Introduction -- 2 Related Research -- 3 Datasets -- 4 Challenges and Issues -- 5 Conclusion -- References -- An Alternative to PHP for the Development of Web Applications: Java Server Pages Engine -- 1 Introduction -- 2 Concept Statement -- 2.1 JSP: The Basis and High-Speed Setting -- 2.2 Shell for Java Server Pages -- 3 The Perspectives of Using Java Server Pages -- 4 Conclusions -- References -- Novel Load Balancing Technique for Microservice-Based Fog Healthcare Environment -- 1 Introduction -- 1.1 Motivation and Novelty -- 1.2 Load Balancing in Fog Computing -- 2 Load Balancing Technique for Microservice-Based Fog Healthcare Environment -- 2.1 Workflow -- 2.2 Details of Microservice in Proposed Healthcare System -- 2.3 Success_factor-Based Load Balancing Algorithm -- 3 Result and Discussion -- 3.1 Throughput -- 3.2 Execution Time -- 4 Conclusion -- References. Self-improved COOT Algorithm for Resource Allocation in Cloud Data Centers -- 1 Introduction -- 2 Literature Review -- 2.1 Related Works -- 3 Resource Allocation Method in Cloud: An Overview of Proposed Concept -- 3.1 Suggested Resource Allocation Method -- 3.2 Cloud Setup -- 4 Improved K-means-Based Workload Clustering: SUCO-Based Optimal Centroid Identification -- 4.1 Improved K-means Clustering-Based Workload Clustering -- 4.2 Defined Threefold Objectives -- 4.3 Suggested SUCO Model for Resource Allocation and Optimal Centroid Selection -- 5 Results and Discussion -- 5.1 Simulation Procedure -- 5.2 Analysis on Energy Consumption -- 5.3 Analysis on Execution Time -- 5.4 Analysis on Resource Utilization -- 5.5 Convergence Analysis -- 5.6 Performance Analysis -- 5.7 Analysis on Computing Time -- 6 Conclusion -- References -- XGBoost-Based Prediction and Evaluation Model for Enchanting Subscribers in Industrial Sector -- 1 Introduction -- 1.1 Customer Interaction -- 1.2 Customer Engagement Marketing -- 1.3 Implementing a Customer Engagement Marketing Strategy -- 1.4 Customer Interaction Strategies -- 2 Literature Review -- 3 Proposed System Model -- 3.1 Work Flow Classification -- 4 Simulation Results -- 5 Conclusion and Future Work -- References -- CleanO-Renewable Energy-Based Robotic Floor Cleaner -- 1 Introduction -- 2 Product Design -- 2.1 Product Comparison -- 2.2 Empathize and Ideate Phase -- 3 Proposed System Model -- 3.1 Block Diagram -- 3.2 Architectural Diagram of IoT-Based Floor Cleaner -- 3.3 Navigation System -- 4 Proposed Product Prototype -- 5 Challenges and Research Opportunities -- 5.1 Networking -- 5.2 Machine Learning -- 5.3 Blockchain -- 5.4 Artificial Intelligence -- 5.5 Renewable and Reusable Energych23b27 -- 5.6 Future Resources -- 6 Conclusion -- References. Impact of "COVID-19 Pandemic" on Children Online Education: A Review and Bibliometric Analysis. |
Record Nr. | UNINA-9910734872903321 |
Tanwar Sudeep | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of the 2016 Federated Conference on Computer Science and Information Systems : September 11-14, 2016. Gda'ns, Poland / / Maria Ganzha, Leszek Maciaszek, Marcin Paprzycki, editors ; sponsored by Institute of Electrical and Electronics Engineers |
Pubbl/distr/stampa | Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2016 |
Descrizione fisica | 1 online resource (164 pages) |
Disciplina | 029.7 |
Soggetto topico |
Information storage and retrieval systems
Computer science |
Soggetto genere / forma | Electronic books. |
ISBN | 83-60810-90-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910332530803321 |
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of the 2016 Federated Conference on Computer Science and Information Systems : September 11-14, 2016. Gda'ns, Poland / / Maria Ganzha, Leszek Maciaszek, Marcin Paprzycki, editors ; sponsored by Institute of Electrical and Electronics Engineers |
Pubbl/distr/stampa | Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2016 |
Descrizione fisica | 1 online resource (164 pages) |
Disciplina | 029.7 |
Soggetto topico |
Information storage and retrieval systems
Computer science |
ISBN | 83-60810-90-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996580865603316 |
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|