top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Intelligent Computing for Sustainable Development : First International Conference, ICICSD 2023, Hyderabad, India, August 25-26, 2023, Revised Selected Papers, Part I
Intelligent Computing for Sustainable Development : First International Conference, ICICSD 2023, Hyderabad, India, August 25-26, 2023, Revised Selected Papers, Part I
Autore Satheeskumaran S
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer, , 2024
Descrizione fisica 1 online resource (428 pages)
Altri autori (Persone) ZhangYudong
BalasValentina Emilia
HongTzung-pei
PelusiDanilo
Collana Communications in Computer and Information Science Series
ISBN 3-031-61287-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents - Part I -- Contents - Part II -- Transfer Learning Based Bi-GRU for Intrusion Detection System in Cloud Computing -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 Pre-processing -- 3.2 Feature Extraction -- 3.3 Optimization Based Classification -- 4 Results and Discussion -- 4.1 Dataset Details -- 4.2 Performance Measures -- 5 Conclusion -- References -- Text to High Quality Image Generation Using Diffusion Model and Visual Transformer -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Algorithm -- 5 Results and Discussions -- 6 Experimentation -- 7 Comparison with Existing Models -- 8 Conclusion -- References -- Bequeathing the Blockchain Wallet in Public Blockchain Securing Wallet Sensitive Data -- 1 Introduction -- 1.1 Motivation of Research -- 1.2 Contribution -- 2 Preliminary -- 2.1 Blockchain -- 2.2 Encryption Algorithms Used -- 3 Proposed Method for Public Blockchain -- 4 Security Analysis -- 4.1 Comparison with Proposed Framework -- 4.2 Analysis on System Security -- 5 Conclusion -- References -- Few Shot Domain Adaptation Using Transformer and GNN-Based Fine Tuning -- 1 Introduction -- 2 Literature Review -- 3 Methodology/Experimental -- 3.1 Dataset -- 3.2 Preprocessing -- 3.3 Model -- 4 Algorithm -- 5 Results and Discussion -- 6 Conclusion -- References -- Prediction of Diabetic Retinopathy Using Deep Learning -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Data Collection -- 3.2 Image Pre-processing -- 3.3 Data Visualization -- 3.4 Training the Data -- 3.5 Evaluating The Data -- 4 Results and Discussion -- 5 Conclusion -- References -- Maritime Vessel Segmentation in Satellite Imagery Using UNET Architecture and Multiloss Optimization -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Preprocessing.
3.3 Model Architecture -- 3.4 Algorithm -- 3.5 Model Training -- 4 Result Analysis -- 5 Conclusion -- References -- A Blockchain-Based Ad-Hoc Network to Provide Live Updates to Navigation Systems -- 1 Introduction -- 2 Literature Survey -- 3 Relevant Use Cases -- 3.1 Sports Car with Low Ground Clearance -- 3.2 ATM Status -- 4 Blockchain-Based Ad-Hoc Network -- 4.1 Hardware -- 4.2 Framework -- 4.3 Workflow -- 5 Implementation and Results -- 6 Conclusion -- 7 Future Work -- References -- Recognition of Facial Expressions Using Geometric Appearance Features -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 MUG Dataset -- 3.2 Data Pre-processing -- 3.3 Feature Extraction -- 3.4 Classification -- 4 Experimental Results -- 5 Conclusion -- References -- Facial Emotion Recognition Using Deep Learning -- 1 Introduction -- 2 Background of the Work -- 3 Background -- 4 Methodology -- 4.1 Software Narrative -- 4.2 Open CV -- 4.3 NumPy -- 5 Problem Delineation -- 5.1 Flow Diagram of the Proposed Work -- 5.2 Algorithmic Steps -- 5.3 Dataset -- 5.4 Face Registraton -- 6 Results -- 7 Conclusion -- References -- Graph Based Semantically Extractive Tool for Text Summarization Using Similarity Score -- 1 Introduction -- 1.1 Abstractive Text Summarization -- 1.2 Extractive Text Summarization -- 1.3 Problem statement -- 2 Related Works -- 3 Proposed Methodology -- 4 Implementation -- 5  Results -- 6 Conclusion and Future Works -- References -- Cloud Based Attendance Management System Using Face Recognition with Haar Cascade Classifier and CNN -- 1 Introduction -- 1.1 The major face recognition algorithms discussed as: -- 2 Literature Study -- 3  Existing Solution -- 4 Methodology -- 4.1  CNN Architecture -- 4.2 Haar Cascades -- 5  Results and Discussion -- 6 Conclusion -- References.
An Efficient Early Detection of Lung Cancer and Pneumonia with Streamlit -- 1 Introduction -- 2 Related Works -- 3 Methodologies of the Proposed Work -- 3.1 Methodology for Lung Cancer Detection -- 3.2 Methodology for Pneumonia -- 3.3 System Design -- 4 Results -- 4.1 Results and Discussion on Lung Cancer -- 4.2 Results and Discussion on Pneumonia -- 4.3 Results and Discussion on Streamlit Web Application -- 5 Conclusion -- References -- An Improved Filter Based Feature Selection Model for Kidney Disease Prediction -- 1 Introduction -- 2 Literature Review -- 2.1 Research Gap -- 3 Methods -- 3.1 Working Principle -- 3.2 Significant Feature Selection -- 3.3 Statement of the Problem -- 3.4 Proposed Approach -- 4 Result -- 4.1 Dataset Description -- 4.2 Discussion -- 4.3 Significant Feature Selection -- 5 Conclusion -- References -- A Novel Approach to Address Concept Drift Detection with the Accuracy Enhanced Ensemble (AEE) in Data Stream Mining -- 1 Introduction -- 2 Literature Review -- 2.1 Ensemble Drift Detection Methods -- 2.2 Problem Statement -- 3 Proposed Methodology -- 3.1 Proposed Method Steps -- 4 Possible Outcomes -- 5 Conclusion -- References -- Intelligent Computing Techniques for Sustainable Cybersecurity: Enhancing Threat Detection and Response -- 1 Introduction -- 1.1 Types of Cyber Security -- 1.2 Study's Contribution -- 2 Literature Review -- 3 Methodology -- 3.1 Data Description -- 3.2 Data Pre-processing -- 3.3 Feature Selection -- 3.4 Indices of Performance -- 4 Results and Discussion -- 5 Conclusion -- References -- Parkinson's Disease Progression: Comparative Analysis of ML Models and Embedded Algorithm -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data Pre-processing -- 3.2 Dataset Split -- 3.3 Selection of ML Models -- 3.4 Hyperparameter Tuning -- 3.5 Model Evaluation -- 4 Results -- 5 Discussion -- 6 Conclusion.
References -- System Evaluation of Team and Winner Prediction in One Day International Matches with Scenario Based Questionnaire -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Collection and Understanding -- 3.2 Feature Selection and Optimization -- 3.3 Hybrid CS-PSO -- 3.4 Learning Algorithms/Model Selection -- 3.5 Training and Testing -- 3.6 Parameter Tuning and Model Evaluation -- 4 Result Analysis -- 4.1 Result for Winner Prediction (Model 1, 2, and 3) -- 4.2 Result: Player Selection for Team Formation -- 5 System Evaluation -- 5.1 Manual Evaluation of Winner Prediction System -- 5.2 Manual Evaluation of Team Prediction System -- 6 Conclusion and Future Work -- References -- Data-Driven Precision: Machine Learning's Impact on Thyroid Disease Diagnosis and Prediction -- 1 Introduction -- 2 Implementation -- 2.1 Exploring Its Role and Diagnostic Techniques -- 2.2 Unveiling the Power of Classification and Regression -- 2.3 Unraveling Multinomial Logistic Regression: Considerations, Applications, and Interpretation -- 2.4 Simultaneous Approach -- 2.5 Support Vector Machine (SVM) Variants and Extensions -- 2.6 Gradient Boosting -- 3 Conclusion and Future Work -- References -- Modeling and Design of an Autonomous Amphibious Vehicle with Obstacle Avoidance for Surveillance Applications -- 1 Introduction -- 2 Related Work -- 3 Proposed Solution -- 4 Results and Discussion -- 5 Conclusion and Future Scope -- References -- Prediction of Cardio Vascular Diseases Using Calibrated Machine Learning Model -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Gaussian Naïve Bayes (GNB) -- 3.2 Calibration -- 3.3 Sigmoid Calibration -- 3.4 Isotonic Calibration -- 3.5 Brier Score -- 4 Dataset -- 5 Experimental Results -- 5.1 Preprocessing -- 5.2 Input and Output Selection -- 5.3 Model Fitting -- 6 Conclusion -- References.
Alzheimer's Disease Detection Using Resnet -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Proposed Model -- 3.2 Model Details -- 4 Result and Discussion -- 5 Conclusion -- References -- Dysarthria Speech Disorder Assessment Using Genetic Algorithm (GA)-Based Layered Recurrent Neural Network -- 1 Introduction -- 1.1 Motivation -- 2 Related Work -- 3 Methodology -- 3.1 Clustered Cuckoo Search Optimized Feature Subset Selection -- 3.2 Speech Signal Energy-Based Lung Capacity Estimation -- 3.3 GA-Based Layered Recurrent Neural Networks -- 4 Results and Discussions -- 4.1 Performance Measure of Accuracy -- 4.2 Performance Measure of Precision -- 4.3 Performance Measure of RMSE -- 5 Conclusion -- References -- Plant Disease Diagnosis with Novel Segmentation and Multiple Feature Selection Based on Machine Learning -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Crop Image Acquiring and Pre-processing Techniques -- 3.2 Segmentation Color and Shape Elements -- 3.3 Feature Extraction Color and Shape Elements -- 4 Results and Discussion -- 5 Conclusions and Future Work -- References -- An Integrated Method to Monitor Indoor Air Quality Using IoT for Enhanced Health of COPD Patients -- 1 Introduction -- 2 Indoor Air Quality and Improved Living Environment -- 3 Related Works -- 4 Proposed Methodology - Materials and Methods -- 4.1 Thingsboard -- 4.2 Flutter Framework -- 5 Results and Discussions -- 6 Conclusion -- References -- Design and Development of Computational Methodologies for Agricultural Informatics -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 A Novel Data Mining Technique for Accurate Prediction of Leaf Diseases with Soil Characteristics -- 3.2 The Prediction of Leaf Disease and Soil Properties Using Multi-channel Convolutional Neural Network.
3.3 Multi-channel Multi-modal Concatenation-Based Deep Learning Model for Leaf Infection and Soil Property Prediction.
Record Nr. UNINA-9910864194203321
Satheeskumaran S  
Cham : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Intelligent cyber physical systems and internet of things : ICoICI 2022 / / Jude Hemanth, Danilo Pelusi, Joy Iong-Zong Chen, editors
Intelligent cyber physical systems and internet of things : ICoICI 2022 / / Jude Hemanth, Danilo Pelusi, Joy Iong-Zong Chen, editors
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2023]
Descrizione fisica 1 online resource (896 pages)
Disciplina 629.8
Collana Engineering cyber-physical systems and critical infrastructures
Soggetto topico Cooperating objects (Computer systems)
Internet of things
ISBN 3-031-18497-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Term Frequency Tokenization for Fake News Detection -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Aquaculture Monitoring System Using Internet of Things -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Extraction -- 3.2 Data Telemetry and Visualization -- 3.3 Parameter Prediction -- 3.4 Chatbot -- 3.5 Water Quality Maintenance -- 4 Design and Implementation -- 4.1 Hardware Details -- 4.2 Software Details -- 4.3 Overview of Implementation -- 4.4 Implementation of pH Prediction -- 5 Results and Discussion -- 5.1 Sensor Data Visualization in IBM Watson Internet of Things Platform -- 5.2 Parameter Prediction -- 5.3 Chatbot -- 5.4 Android App -- 6 Conclusion and Future Scope -- References -- A Comprehensive Study and Implementation of Memory Malware Analysis with Its Application for the Case Study of CRIDEX -- 1 Introduction -- 2 Background Work -- 3 Related Work -- 4 Memory Malware Analysis Approach -- 5 Available Tools -- 6 CRIDEX Case Study -- 7 Conclusion -- References -- IoT Based Anti Poaching of Trees and Protection of Forest -- 1 Introduction -- 2 Related Works -- 3 Proposed Work -- 4 Results -- 5 Conclusion and Future Works -- 5.1 Conclusion -- 5.2 Future Works -- References -- Artificial Intelligence Based Efficient Activity Recognition with Real Time Implementation for ATM Security -- 1 Introduction -- 2 Literature Review -- 3 Proposed Model -- 4 Results and Dıscussıon -- 5 Conclusion -- References -- Terror Attack Classification with the Application of Orange Data Mining Tool and Neo4j Sandbox -- 1 Introduction -- 1.1 Dataset -- 1.2 Graph and Neo4j -- 2 Literature Survey -- 3 Methodology -- 3.1 Graph Creation -- 3.2 Graph Embedding Calculation -- 4 Model Building -- 4.1 Counting Null Values.
4.2 Removal of Redundant Data -- 4.3 Dimension Reduction -- 4.4 Data Scaling -- 5 Results and Analysis -- 6 Conclusion -- References -- Multipurpose IoT Based Camera Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Hardware Integration -- 3.2 Training the Model -- 3.3 Detect and Predict Mask -- 3.4 Eye on Mask -- 3.5 Eye Open or Closed -- 3.6 Eye and Eye Ball Contours -- 3.7 Head Pose of Person -- 3.8 Function Calling and Display of Output -- 4 Result Analysis -- 5 Conclusion -- References -- Dr. Watson AI Based Healthcare Technology Project -- 1 Introduction -- 2 Methodology -- 3 Implementation -- 4 Results -- 4.1 Home Page -- 4.2 Dashboard Page -- 4.3 Medicine Prescriber -- 4.4 Diabetic Analyzer -- 4.5 Covid Predictor -- 4.6 Watson Assistant Chatbot -- 5 Conclusion -- References -- Empirical and Statistical Comparison of RSA and El-Gamal in Terms of Time Complexity -- 1 Introduction -- 2 Literature Review -- 3 Run Time Comparison of RSA and EL Gamal Protocols Used in MANET -- 4 Fundamental Theorem of Finite Difference -- 5 Result and Analysis -- 6 Conclusions and Future Work -- References -- IoT Communication to Capture and Store Data to Thingspeak Cloud Using NodeMCU and Ultrasonic Sensor -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Results and Discussion -- 5 Conclusion and Future Scope -- References -- A Comprehensive Study on Cloud Computing: Architecture, Load Balancing, Task Scheduling and Meta-Heuristic Optimization -- 1 Introduction -- 2 Cloud Computing: Architecture -- 2.1 Overview -- 2.2 Features of Cloud Computing -- 2.3 Architecture -- 2.4 Data Center in Cloud Network -- 2.5 Virtual Machines in Cloud Computing -- 2.6 Motivation of Study -- 3 Load Balancing in Cloud Computing -- 3.1 Classification of LB Techniques -- 3.2 Load Balancing Metrics -- 4 Task Scheduling in Cloud Environment.
4.1 Types of Task Scheduling -- 4.2 Framework of TS in CC Environment -- 5 Meta-Heuristic Optimization Techniques -- 6 Literature Survey -- 6.1 Research Gaps and Issues -- 7 Conclusion -- References -- Balancing Exploration and Exploitation in Nature Inspired Computing Algorithm -- 1 Introduction -- 2 Existing Work -- 2.1 Particle Swarm Optimization -- 3 Proposed Work -- 3.1 Improved Multiple Particle Swarm Optimization (IMPSO) -- 4 Results and Discusssion -- 5 Conclusion -- References -- Blockchain Based Secure, Efficient, and Scalable Platform for the Organ Donation Process of Healthcare Industry -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Blockchain -- 3.2 Ethereum -- 3.3 Smart Contracts -- 4 The Proposed Organ Donation Platform Using Blockchain Technology -- 5 Results and Analysis -- 6 Conclusions and Future Works -- References -- Image Enhancement in Frequency Domain Fingerprint Detection and Matching Approach -- 1 Introduction -- 2 Frequency Domain Approach in Enhancement -- 3 Adopted Methodology -- 4 Design and Implementation -- 5 Simulation Results and Discussion -- 6 Conclusion -- References -- Developing Machine Learning Based Mobile App for Agriculture Application -- 1 Introduction -- 2 Relevance -- 3 Related Work -- 4 Proposed Work -- 5 Block Diagram -- 6 Architecture Description -- 7 Live Field Status -- 8 Crop Detection and Market Prediction -- 8.1 Data Gathering -- 8.2 Data Pre-processing -- 9 Crop Detection -- 9.1 Image Acquisition -- 9.2 Image Pre-processing -- 9.3 Feature Extraction -- 9.4 SVM Classification -- 9.5 Segmentation -- 10 Implementation and Result Analysis -- 10.1 Home Screen Along with Application Menu -- 10.2 Confusion Matrix -- 10.3 ML Model Comparison -- 10.4 Notification and Information -- 11 Conclusion -- References -- Attack Detection in IoT Using Machine Learning-A Survey -- 1 Introduction.
2 IoT Architectures Attacks and Attacks Detection -- 3 Challenges -- 4 Conclusion -- References -- An Extensive Study on Logic Emerging IoT Adiabatic Techniques for Low-Power Circuit -- 1 Introduction -- 2 Background on Adiabatic Circuits -- 3 Recent Developments -- 3.1 Adiabatic Circuits for RF-Powered IoT Applications -- 3.2 Adiabatic Logic Enhanced Hardware Security -- 4 Avoid Common Mistakes to Adiabatic Logic Design -- 4.1 Don't Use Diodes -- 4.2 Rules of Don't Disobey Transistor -- 4.3 Use Reversible Logic -- 4.4 Don't Over-Constrain the Design -- 5 Conclusion -- References -- A Critical Review of Agri-Food Supply Management with Traceability and Transparency Using Blockchain Technology -- 1 Introduction -- 1.1 Motivation and Contribution of Research Work -- 2 Related Work -- 2.1 Traceability -- 2.2 Efficiency -- 2.3 Privacy -- 2.4 Cost -- 2.5 Inventory Management -- 3 Blockchain Implementation Challenges -- 4 Conclusion -- References -- Face-Anti-spoofing Based on Liveness Detection -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Dataset Gathering -- 3.2 Data Pre-processing -- 3.3 Model Parameter -- 4 Simulation Result -- 4.1 Performance Matrix -- 4.2 Confusion Matrix -- 5 Conclusion -- References -- PDR Analysis and Network Optimization of Routing Protocols for Edge Networks -- 1 Introduction -- 1.1 Dynamic Source Routing (DSR) -- 1.2 Ad-hoc On-demand Distance Vector (AODV) -- 2 Related Work -- 3 Proposed Work -- 4 Result Analysis -- 5 Conclusion -- References -- Privacy Threat Reduction Using Modified Multi-line Code Generation Algorithm (MMLCGA) for Cancelable Biometric Technique (CBT) -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 System Modules -- 3.2 System Architecture -- 4 Implementation Details -- 4.1 Binarization -- 4.2 Contextual Filtering -- 4.3 Thinning -- 4.4 Minutiae Extraction.
4.5 Line Code Algorithm -- 5 Results and Discussion -- 6 Conclusion -- References -- Systematic Literature Review-IoT-Based Supply Chain Management in Industry 4.0 -- 1 Introduction -- 2 IoT Based Supply Chain Management in Industry 4.0 -- 3 Principles and Methods -- 3.1 Review Principles -- 3.2 Systematic Literature Review Method -- 4 Review of Research Trends -- 5 Content Analysis -- 6 Industry 4.0 and IoT in Supply Chain Research (Future Work) -- 7 Conclusion -- References -- A Review on Urban Flood Management Techniques for the Smart City and Future Research -- 1 Introduction -- 2 Related Work -- 3 Analysis and Discussion -- 4 Conclusion -- References -- Application of Distributed Constraint Optimization Technique for Privacy Preservation in Cyber-Physical Systems -- 1 Introduction -- 2 Related Work -- 3 Proposed Mechanism -- 4 Experimental Results -- 5 Future Work -- 6 Conclusion -- References -- Grip Assisting Glove for Charcot-Marie-Tooth Patients -- 1 Introduction -- 2 Literature Survey -- 2.1 Smart Muscle Strength Assessment Glove for Rehabilitation Purposes [7] -- 2.2 Calibration and Evaluation of a Force Measurement Glove for Field-Based Monitoring of Manual Wheelchair Users [8] -- 2.3 A Fabricated Force Glove that Measures Hand Forces During Activities of Daily Living [9] -- 2.4 Wearable System with Embedded Force Sensors for Neurological Rehabilitation Trainings [10] -- 2.5 Tactile Sensorized Glove for Force and Motion Sensing [11] -- 2.6 Smart Glove to Measure a Grip Force of the Workers [12] -- 2.7 Force-Sensing Glove System for Measurement of Hand Forces During Motorbike Riding [13] -- 2.8 Smart Tactile Gloves for Haptic Interaction, Communication and Rehabilitation [14] -- 3 Working/Methodology -- 3.1 Sensing and Analog Signal Condition Block -- 3.2 Continuous Force Monitoring Block -- 3.3 Haptic Feedback Block.
4 Design of the Glove.
Record Nr. UNINA-9910647787103321
Cham, Switzerland : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Intelligent data communication technologies and internet of things : proceedings of ICICI 2021 / / D. Jude Hemanth, Danilo Pelusi, Chandrasekar Vuppalapati, editors
Intelligent data communication technologies and internet of things : proceedings of ICICI 2021 / / D. Jude Hemanth, Danilo Pelusi, Chandrasekar Vuppalapati, editors
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore Pte Ltd., , [2022]
Descrizione fisica 1 online resource (1042 pages)
Disciplina 006.3
Collana Lecture notes on data engineering and communications technologies
Soggetto topico Artificial intelligence
Internet of things
Soggetto non controllato Science
ISBN 981-16-7609-7
981-16-7610-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910743350903321
Singapore : , : Springer Nature Singapore Pte Ltd., , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Intelligent edge and 5G technologies for pervasive computing and communications / / guest editors: S. Satheeskumaran, Zhang Yu-Dong and Danilo Pelusi
Intelligent edge and 5G technologies for pervasive computing and communications / / guest editors: S. Satheeskumaran, Zhang Yu-Dong and Danilo Pelusi
Pubbl/distr/stampa [Place of publication not identified] : , : Emerald Publishing Limited, , 2021
Descrizione fisica 1 online resource (181 pages)
Disciplina 621.3845
Collana International Journal of Pervasive Computing and Communications
Soggetto topico Mobile communication systems
Mobile communication systems - Technological innovations
ISBN 1-80382-304-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910795677103321
[Place of publication not identified] : , : Emerald Publishing Limited, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Intelligent edge and 5G technologies for pervasive computing and communications / / guest editors: S. Satheeskumaran, Zhang Yu-Dong and Danilo Pelusi
Intelligent edge and 5G technologies for pervasive computing and communications / / guest editors: S. Satheeskumaran, Zhang Yu-Dong and Danilo Pelusi
Pubbl/distr/stampa [Place of publication not identified] : , : Emerald Publishing Limited, , 2021
Descrizione fisica 1 online resource (181 pages)
Disciplina 621.3845
Collana International Journal of Pervasive Computing and Communications
Soggetto topico Mobile communication systems
Mobile communication systems - Technological innovations
ISBN 1-80382-304-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910811118103321
[Place of publication not identified] : , : Emerald Publishing Limited, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui