top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information Security Practice and Experience [[electronic resource] ] : 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24–25, 2023, Proceedings / / edited by Weizhi Meng, Zheng Yan, Vincenzo Piuri
Information Security Practice and Experience [[electronic resource] ] : 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24–25, 2023, Proceedings / / edited by Weizhi Meng, Zheng Yan, Vincenzo Piuri
Autore Meng Weizhi
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (628 pages)
Disciplina 005.8
Altri autori (Persone) YanZheng
PiuriVincenzo
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Computer networks
Computer systems
Application software
Computers
Security Services
Computer Communication Networks
Computer System Implementation
Computer and Information Systems Applications
Computing Milieux
Data and Information Security
ISBN 981-9970-32-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Secure and Efficient Federated Learning by Combining Homomorphic Encryption and Gradient Pruning in Speech Emotion Recognition -- FedLS: An Anti-poisoning Attack Mechanism for Federated Network Intrusion Detection Systems using Autoencoder-based Latent Space Representations -- Mitigating Sybil Attacks in Federated Learning -- Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics -- Obfuscation padding schemes that minimize Renyi min-entropy for Privacy -- Cross-border Data Security from the Perspective of Risk Assessment -- IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-Designated Verifier Signatures -- CVAR-FL IoV Intrusion Detection Framework -- Transparent Security Method for Automating IoT Security Assessments -- DIDO: Data Provenance from Restricted TLS 1.3 Websites -- QR-SACP: Quantitative Risk-based Situational Awareness Calculation and Projection through Threat Information Sharing -- Dynamic Trust Boundary Identification for the Secure Communications of the Entities via 6G -- RTR-Shield: Early Detection of Ransomware using Registry and Trap Files -- MalXCap: A Method for Malware Capability Extraction -- Multimodal Software bug Severity Prediction Based on Sentiment Probability -- Recovering Multi-Prime RSA Keys with Erasures and Errors -- Performance Impact Analysis of Homomorphic Encryption: A Case Study Using Linear Regression as an Example -- Chosen Ciphertext Security for Blind Identity-based Encryption with Certified Identities -- A New Gadget Decomposition Algorithm with Less Noise Growth in HE schemes -- Malicious Player Card-based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations -- Cryptanalysis of Human Identification Protocol with Human-Computable Passwords -- A Source Hiding Protocol for Cooperative Intelligent Transportation Systems (C-ITS) -- A Revocable Outsourced Data Accessing Control Scheme with Black-Box Traceability -- LocKey: Location-based Key Extraction from the WiFi Environment in the User’s Vicinity -- BAHS: a Blockchain-Aided Hash-based Signature Scheme -- Lever: Making Intensive Validation Practical on Blockchain -- Tikuna: An Ethereum Blockchain Network Security Monitoring System -- Isogeny-based Multi-Signature Scheme -- Security Analysis of WAGE against Division Property based Cube Attack -- When MPC in the Head meets VC -- Quantum Key Distribution as a Service and Its Injection into TLS -- XFedGraph-Hunter: An Interpretable Federated Learning Framework for Hunting Advanced Persistent Threat in Provenance Graph -- XSS attack detection by attention mechanism based on script tags in URLs -- Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning -- SIOCEN: Secure Integrity Verification of Outsourced Data in Cloud Storage using Blockchain.
Record Nr. UNISA-996565871203316
Meng Weizhi  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security Practice and Experience : 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24–25, 2023, Proceedings / / edited by Weizhi Meng, Zheng Yan, Vincenzo Piuri
Information Security Practice and Experience : 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24–25, 2023, Proceedings / / edited by Weizhi Meng, Zheng Yan, Vincenzo Piuri
Autore Meng Weizhi
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (628 pages)
Disciplina 005.8
Altri autori (Persone) YanZheng
PiuriVincenzo
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Computer networks
Computer systems
Application software
Computers
Security Services
Computer Communication Networks
Computer System Implementation
Computer and Information Systems Applications
Computing Milieux
Data and Information Security
ISBN 981-9970-32-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Secure and Efficient Federated Learning by Combining Homomorphic Encryption and Gradient Pruning in Speech Emotion Recognition -- FedLS: An Anti-poisoning Attack Mechanism for Federated Network Intrusion Detection Systems using Autoencoder-based Latent Space Representations -- Mitigating Sybil Attacks in Federated Learning -- Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics -- Obfuscation padding schemes that minimize Renyi min-entropy for Privacy -- Cross-border Data Security from the Perspective of Risk Assessment -- IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-Designated Verifier Signatures -- CVAR-FL IoV Intrusion Detection Framework -- Transparent Security Method for Automating IoT Security Assessments -- DIDO: Data Provenance from Restricted TLS 1.3 Websites -- QR-SACP: Quantitative Risk-based Situational Awareness Calculation and Projection through Threat Information Sharing -- Dynamic Trust Boundary Identification for the Secure Communications of the Entities via 6G -- RTR-Shield: Early Detection of Ransomware using Registry and Trap Files -- MalXCap: A Method for Malware Capability Extraction -- Multimodal Software bug Severity Prediction Based on Sentiment Probability -- Recovering Multi-Prime RSA Keys with Erasures and Errors -- Performance Impact Analysis of Homomorphic Encryption: A Case Study Using Linear Regression as an Example -- Chosen Ciphertext Security for Blind Identity-based Encryption with Certified Identities -- A New Gadget Decomposition Algorithm with Less Noise Growth in HE schemes -- Malicious Player Card-based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations -- Cryptanalysis of Human Identification Protocol with Human-Computable Passwords -- A Source Hiding Protocol for Cooperative Intelligent Transportation Systems (C-ITS) -- A Revocable Outsourced Data Accessing Control Scheme with Black-Box Traceability -- LocKey: Location-based Key Extraction from the WiFi Environment in the User’s Vicinity -- BAHS: a Blockchain-Aided Hash-based Signature Scheme -- Lever: Making Intensive Validation Practical on Blockchain -- Tikuna: An Ethereum Blockchain Network Security Monitoring System -- Isogeny-based Multi-Signature Scheme -- Security Analysis of WAGE against Division Property based Cube Attack -- When MPC in the Head meets VC -- Quantum Key Distribution as a Service and Its Injection into TLS -- XFedGraph-Hunter: An Interpretable Federated Learning Framework for Hunting Advanced Persistent Threat in Provenance Graph -- XSS attack detection by attention mechanism based on script tags in URLs -- Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning -- SIOCEN: Secure Integrity Verification of Outsourced Data in Cloud Storage using Blockchain.
Record Nr. UNINA-9910760264603321
Meng Weizhi  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security Practice and Experience [[electronic resource] ] : 17th International Conference, ISPEC 2022, Taipei, Taiwan, November 23–25, 2022, Proceedings / / edited by Chunhua Su, Dimitris Gritzalis, Vincenzo Piuri
Information Security Practice and Experience [[electronic resource] ] : 17th International Conference, ISPEC 2022, Taipei, Taiwan, November 23–25, 2022, Proceedings / / edited by Chunhua Su, Dimitris Gritzalis, Vincenzo Piuri
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (643 pages)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Computer networks
Computer systems
Application software
Computers
Security Services
Computer Communication Networks
Computer System Implementation
Computer and Information Systems Applications
Computing Milieux
Data and Information Security
ISBN 3-031-21280-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Blockchain -- Security for Critical Infrastructure -- IoT Security -- Software Security -- Network -- Web Security -- Authentication -- Biometric Security -- Cryptography.
Record Nr. UNISA-996500062903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security Practice and Experience : 17th International Conference, ISPEC 2022, Taipei, Taiwan, November 23–25, 2022, Proceedings / / edited by Chunhua Su, Dimitris Gritzalis, Vincenzo Piuri
Information Security Practice and Experience : 17th International Conference, ISPEC 2022, Taipei, Taiwan, November 23–25, 2022, Proceedings / / edited by Chunhua Su, Dimitris Gritzalis, Vincenzo Piuri
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (643 pages)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Computer networks
Computer systems
Application software
Computers
Security Services
Computer Communication Networks
Computer System Implementation
Computer and Information Systems Applications
Computing Milieux
Data and Information Security
ISBN 3-031-21280-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Blockchain -- Security for Critical Infrastructure -- IoT Security -- Software Security -- Network -- Web Security -- Authentication -- Biometric Security -- Cryptography.
Record Nr. UNINA-9910631095103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Innovations in Data Analytics : Selected Papers of ICIDA 2022 / / edited by Abhishek Bhattacharya, Soumi Dutta, Paramartha Dutta, Vincenzo Piuri
Innovations in Data Analytics : Selected Papers of ICIDA 2022 / / edited by Abhishek Bhattacharya, Soumi Dutta, Paramartha Dutta, Vincenzo Piuri
Autore Bhattacharya Abhishek
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (633 pages)
Disciplina 006.3
Altri autori (Persone) DuttaSoumi
DuttaParamartha
PiuriVincenzo
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computational intelligence
Quantitative research
Image processing—Digital techniques
Computer vision
Data protection
Telecommunication
Computational Intelligence
Data Analysis and Big Data
Computer Imaging, Vision, Pattern Recognition and Graphics
Data and Information Security
Communications Engineering, Networks
Soggetto non controllato Computer Security
Telecommunication
Engineering
Computers
Technology & Engineering
ISBN 981-9905-50-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Foreword -- Preface -- Contents -- About the Editors -- Computational Intelligence -- Transience in COVID Patients with Comorbidity Issues-A Systematic Review and Meta-Analysis Based on Indian and Southeast Asian Context -- 1 Introduction -- 1.1 Risk of COVID Patients with Comorbidity Issues -- 2 COVID Patient Statistics with Comorbidity Issues -- 3 Research Methodology -- 3.1 Search Strategy -- 4 Related Literature Survey in This Area -- 5 Discussion -- 6 Conclusion and Future Scope -- References -- NFT HUB-The Decentralized Non-Fungible Token Market Place -- 1 Introduction -- 1.1 Non-Fungible Token -- 1.2 Blockchain -- 2 Literature Survey -- 3 Proposed System -- 3.1 Blockchain -- 3.2 Ethereum Blockchain -- 3.3 Properties of Blockchain -- 3.4 Generic Elements of the Blockchain -- 3.5 Secure Hash Algorithm -- 4 Results and Discussion -- 4.1 Deployment Confirmation -- 4.2 Metamask Wallet -- 4.3 Minting Page -- 4.4 Transaction Address -- 4.5 Dashboard -- 5 Conclusion -- 5.1 Future Scope of the Project -- References -- Hashgraph: A Decentralized Security Approach Based on Blockchain with NFT Transactions -- 1 Introduction -- 1.1 Optimized Blockchain Server -- 2 Literature Survey -- 2.1 Survey Report: On Token Service -- 2.2 Survey Report: On Main-Net Access -- 2.3 Survey Report: Remove Centralized Control: Hala Systems -- 3 Proposed System -- 3.1 Non-Fungible Transaction -- 3.2 Blockchain Methodology -- 3.3 Gossip Protocol -- 3.4 Hashgraph -- 3.5 Consensus Algorithm [In Gossip Protocol] -- 3.6 HCS Implementation -- 4 Performance Evaluation -- 4.1 Transaction Cost Denomination of Our Network -- 4.2 Transaction Cost of Network on Blockchain NFT -- 5 Result and Discussion -- 6 Conclusion -- References -- Med Card: An Innovative Way to Keep Your Medical Records Handy and Safe -- 1 Introduction -- 1.1 What is Blockchain?.
1.2 What is Machine Learning? -- 2 Literature Review -- 3 Technologies Used -- 3.1 Blockchain in Health Care -- 3.2 Machine Learning in Health Care -- 4 Proposed Idea -- 4.1 What is a Med Card? -- 4.2 Workflow -- 5 Conclusion and Future Scope -- References -- Delta Operator-Based Modelling and Control of High Power Induction Motor Using Novel Chaotic Gorilla Troop Optimizer -- 1 Introduction -- 2 Formulation of the Problem -- 3 New Chaotic Gorilla Troop Optimizer -- 4 Simulation Ouput and Their Analysis -- 5 Conclusions -- References -- An Enhanced Optimize Outlier Detection Using Different Machine Learning Classifier -- 1 Introduction -- 2 Outlier Detection -- 3 Literature Review -- 4 Proposed Methodology -- 5 Simulation Result -- 6 Conclusion -- References -- Prediction of Disease Diagnosis for Smart Healthcare Systems Using Machine Learning Algorithm -- 1 Introduction -- 2 Heart Disease -- 3 Diabetes Mellitus -- 4 Proposed Methodology -- 5 Simulation Results -- 6 Conclusion -- References -- Optimization Accuracy on an Intelligent Approach to Detect Fake News on Twitter Using LSTM Neural Network -- 1 Introduction -- 2 Road Map of Methodology -- 2.1 Data Collection and Filtration -- 2.2 Pre-processing -- 2.3 Feature Extraction -- 2.4 Feature Selection -- 2.5 Classification -- 3 Proposed Methodology -- 4 Simulation Results -- 5 Conclusion -- References -- Advance Computing -- Mining User Interest Using Bayesian-PMF and Markov Chain Monte Carlo for Personalised Recommendation Systems -- 1 Introduction -- 2 Related Work and Background -- 3 Experimental Methodology -- 3.1 Probabilistic Matrix Factorization (PMF) -- 3.2 Bayesian-PMF with MCMC -- 3.3 Sparsity Reduction -- 3.4 Performance Measure -- 4 Proposed Architecture -- 5 Experimental Outcomes and Investigation -- 5.1 Dataset Description -- 6 Conclusion and Future Work -- References.
Big Data and Its Role in Cybersecurity -- 1 Introduction -- 2 Security Using Big Data -- 2.1 Use of Big Data Analytic (BDA) as Defense Tool -- 2.2 Cybersecurity and Machine Learning -- 3 Cybersecurity Approaches in Big Data -- 4 Research Trends and Challenges -- 4.1 Use of Big Data in Defense -- 4.2 Laws Regulating to Big Data -- 4.3 Distribution of Data for Storage -- 4.4 Security Technique Scalability in the Big Data -- 5 Conclusions -- References -- QR Code-Based Digital Payment System Using Visual Cryptography -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Implementation -- 4.1 Encryption -- 4.2 AES Algorithm -- 4.3 Decryption -- 5 Result -- 6 Conclusion -- References -- A Study of Different Approaches of Offloading for Mobile Cloud Computing -- 1 Introduction -- 2 Research Method -- 3 Offloading for Mobile Cloud Computing -- 4 Applications Suitable for Offloading in MCC -- 5 Different Offloading Approaches -- 6 Conclusion -- References -- Use of Machine Learning Models for Analyzing the Accuracy of Predicting the Cancerous Diseases -- 1 Introduction -- 2 Related Work -- 3 Machine Learning Models -- 3.1 Logistic Regression -- 3.2 Decision Tree -- 3.3 Random Forest Classifier -- 4 Experiment -- 4.1 Experiment Environment -- 4.2 Breast Cancer Dataset -- 5 Experimental Results -- 6 Conclusion -- References -- Predict Employee Promotion Using Supervised Classification Approaches -- 1 Introduction -- 2 Related Works -- 3 Implementation -- 3.1 Proposed Model -- 3.2 Data Collection -- 3.3 Data Analysis -- 3.4 Engineered Functions -- 3.5 Train-Test-Split -- 3.6 Model Building -- 4 Performance Evaluation -- 5 Conclusion -- References -- Smart Grid Analytics-Analyzing and Identifying Power Distribution Losses with the Help of Efficient Data Regression Algorithms -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Results.
5 Conclusion -- References -- Load Balancing on Cloud Using Genetic Algorithms -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 4 Results -- 5 Conclusions and Future Work -- References -- Network Security and Telecommunication -- Hybrid Feature Selection Approach to Classify IoT Network Traffic for Intrusion Detection System -- 1 Introduction -- 2 Literature Survey -- 3 Research Gaps -- 4 Proposed Work -- 4.1 Proposed Methodology -- 5 Experimental Results -- 5.1 Dataset Description -- 5.2 System Configuration -- 5.3 Model Parameters -- 5.4 Performance Parameters -- 6 Conclusion -- References -- A Deep Learning-Based Framework for Analyzing Stress Factors Among Working Women -- 1 Introduction -- 2 Literature Survey -- 3 Stress Factors (Stressors) -- 3.1 Deep Learning: Background -- 3.2 Deep Learning-Based Framework for Early Stress Detection -- 4 Results and Discussion -- 5 Conclusion -- References -- Automatic Question Generation -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Methodology -- 5 Conclusion and Future Scope -- References -- Automatic Construction of Named Entity Corpus for Adverse Drug Reaction Prediction -- 1 Introduction -- 2 Related Work -- 2.1 Biomedical Named Entity Recognition -- 2.2 Datasets for Biomedical Entity Recognition -- 3 Proposed Work -- 3.1 ADR Corpus Overview -- 3.2 Corpus Construction Steps -- 4 Results -- 4.1 Contributions -- 4.2 Statistics -- 5 Discussion -- References -- A Space Efficient Metadata Structure for Ranking Subset Sums -- 1 Introduction -- 1.1 Problem Formulation -- 1.2 Past Work -- 1.3 Our Contribution -- 2 Outline of Our Technique -- 3 Generation of Top-kk Subsets -- 3.1 The Metadata Structure upper GG -- 3.2 Construction of Metadata Structure upper GG -- 3.3 Query Answering with Heap -- 3.4 Modified Metadata Structure upper GG -- 3.5 The Final Structure of upper GG.
3.6 Generation of Top-kk Subsets by upper GG on Demand -- 3.7 Getting Rid of the Bit String -- 4 Experimental Results -- 4.1 Analysis of the Results -- 5 Conclusion -- References -- Brain Tumour Detection Using Machine Learning -- 1 Introduction -- 2 Literature Survey -- 3 Methodology and Materials -- 4 Results and Discussion -- 5 Conclusion and Future Scope -- References -- Implementation of a Smart Patient Health Tracking and Monitoring System Based on IoT and Wireless Technology -- 1 Overview -- 2 Block Diagram -- 3 Methodology and Results -- 3.1 Database Tracking and Maintenance -- 4 Conclusion and Future Scope -- References -- Diabetes Disease Prediction Using KNN -- 1 Introduction -- 2 Literature Survey -- 2.1 How is Data Science Revolutionizing the Healthcare Industry? -- 2.2 Role of Data Science in Health Care -- 2.3 Diabetes Detection Using Data Science -- 2.4 Flow of the Methodology Used for Diabetes Detection -- 3 Proposed System -- 4 Results -- 4.1 Experimental Results -- 4.2 Visualization of Obtained Results -- 5 Conclusion -- 6 Future Scope -- References -- Review: Application of Internet of Things (IoT) for Vehicle Simulation System -- 1 Introduction -- 2 Application -- 3 Basic Concepts of IoT -- 4 Simulation Concept -- 5 Simulation-Based Internet of Things -- 6 Application of Simulated IoT for System Used in Vehicle -- 7 Car Simulation Structure and Principle -- 8 Embedding Security Features in a Vehicle Using IoT -- 9 Conclusion and Future Scope -- References -- Data Science and Data Analytics -- Time Series Analysis and Forecast Accuracy Comparison of Models Using RMSE-Artificial Neural Networks -- 1 Introduction -- 2 Related Research -- 3 Neural Networks Models in Time Series -- 3.1 Feed-Forward Neural Network Model -- 3.2 Time-Lagged Neural Networks -- 3.3 Seasonal Artificial Neural Networks -- 3.4 Long Short-Term Memory (LSTM).
4 Time Series Analysis.
Record Nr. UNINA-9910728933703321
Bhattacharya Abhishek  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Intelligent and Interactive Computing : Proceedings of IIC 2018 / / edited by Vincenzo Piuri, Valentina Emilia Balas, Samarjeet Borah, Sharifah Sakinah Syed Ahmad
Intelligent and Interactive Computing : Proceedings of IIC 2018 / / edited by Vincenzo Piuri, Valentina Emilia Balas, Samarjeet Borah, Sharifah Sakinah Syed Ahmad
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIV, 569 p. 228 illus., 155 illus. in color.)
Disciplina 006.3
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Artificial intelligence
Quantum computers
Computer simulation
Computational Intelligence
Artificial Intelligence
Quantum Computing
Simulation and Modeling
ISBN 981-13-6031-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Proposed Framework: Enhanced Automated Duplication Algorithm for Flash Application -- Publication Model for Academic Talent Based On Apriori Technique -- Software Module Clustering based on the Fuzzy Adaptive Teaching Learning based Optimization Algorithm -- Dynamic Solution Probability Acceptance within the Flower Pollination Algorithm for t-way Test Suite Generation -- A Study on Gamification for Higher Education Students' Engagement Towards Education 4.0 -- An Investigation of Learner Characteristics that Use Massive Open Online Courses (MOOC) in Learning Second Language -- Improved Ozone Pollution Prediction using Extreme Learning Machine with Tribas Regularization Activation Function -- Cultural Metadata Enhancement by Using Community-driven Approach to Create Digital Holistic Culture Conservation System -- Tracking Coastal Change over Kuala Terengganu using Landsat -- A Design of Automated Surgical Illumination System -- Image Spam Detection on Instagram using Convolutional Neural Network -- A Review of Botnet Detection Approaches Based on DNS Traffic Analysis -- Face Recognition using Texture Features and Multi-Layer Perceptron -- Classification of Landsat 8 Satellite Data Using Unsupervised Methods.
Record Nr. UNINA-9910483006303321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Learning Systems: From Theory to Practice / / edited by Vassil Sgurev, Vincenzo Piuri, Vladimir Jotsov
Learning Systems: From Theory to Practice / / edited by Vassil Sgurev, Vincenzo Piuri, Vladimir Jotsov
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XII, 301 p.)
Disciplina 006.31
Collana Studies in Computational Intelligence
Soggetto topico Computational intelligence
Artificial intelligence
Computational Intelligence
Artificial Intelligence
ISBN 3-319-75181-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto From von Neumann architecture and Atanasoff’s ABC to Neuro-morphic Computation and Kasabov’s NeuCube: Principles and Implementations -- Applications of Computational Intelligence in Industrial and Environmental Scenarios -- Real, Imaginary and Complex Sets -- Intercriteria analysis over patterns -- From Primary to Conventional Science -- Intelligent Two-Level Optimization and Model Predictive Control of Degrading Plants -- Collaborative Clustering: New Perspective to Rank Factor Granules -- Learning through Contstraint Applications -- Autonomous Flight Control and Precise Gestural Positioning of a Small Quadrotor -- Introduction to the Theory of Randomized Machine Learning -- Grid-Type Fuzzy Models for Performance Evaluation and Condition Monitoring of Photovoltaic Systems -- Intelligent Control of Uncertain Switched Nonlinear Plants: NFG Optimum Control Synthesis via Switched Fuzzy Time-delay Systems -- Multidimensional Intuitionistic Fuzzy Quantifiers and Level Operators -- Data Processing and Harmonization for Intelligent Transportation Systems. An Application Scenario on Highway Traffic Flows.
Record Nr. UNINA-9910299952103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Machine Learning in Information and Communication Technology : Proceedings of ICICT 2021, SMIT / / edited by Hiren Kumar Deva Sarma, Vincenzo Piuri, Arun Kumar Pujari
Machine Learning in Information and Communication Technology : Proceedings of ICICT 2021, SMIT / / edited by Hiren Kumar Deva Sarma, Vincenzo Piuri, Arun Kumar Pujari
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (337 pages)
Disciplina 004.6
Collana Lecture Notes in Networks and Systems
Soggetto topico Telecommunication
Signal processing
Artificial intelligence
Artificial intelligence—Data processing
Communications Engineering, Networks
Signal, Speech and Image Processing
Artificial Intelligence
Data Science
ISBN 981-19-5090-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part 1: Healthcare Informatics -- Chapter 1. Earth Mover’s Distance Based Automated Disease Tagging of Indian ECGs -- Chapter 2. Cardial Disease Prediction in Multi-variant Systems: A Short Survey -- Chapter 3. SVM-based pre-and post-treatment cancer segmentation from lung and abdominal CT images via neighbourhood-influenced features -- Chapter 4. Blood Cancer Detection with Microscopic Images using Machine Learning.-Chapter 5. A Survey on Leukemia Detection: A Machine Learning Approach -- Chapter 6. Periocular Region Recognition - A Brief Survey -- Chapter 7. A Bibliometric Analysis on the relationship between Emotional Intelligence, Self-Management and Health Information Seeking -- Chapter 8. Preferences in the Detailing Process Among Young and Senior Physicians -- Chapter 9. Perceptual Difference Patient & Physician on Negative Aspects of Social Media -- Chapter 10. AUTCD-Net: An Automated Framework for Efficient Covid-19 Diagnosis on Computed Tomography Scans -- Chapter 11. Computer aided detection of brain midline using CT images -- Chapter 12. Deep neural network based classification of ASD and neuro-typical subjects using functional connectivity features derived from resting state fMRI data -- Chapter 13. Application of Deep Learning in Healthcare -- Part 2: Recommendation Systems -- Chapter 14. A Popularity-based Recommendation System using Machine Learning -- Chapter 15. Machine Learning based Movies and Shows Recommendation System. etc.
Record Nr. UNINA-9910624320303321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Multi-Strategy Learning Environment : Proceedings of ICMSLE 2024
Multi-Strategy Learning Environment : Proceedings of ICMSLE 2024
Autore Vimal Vrince
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2024
Descrizione fisica 1 online resource (710 pages)
Altri autori (Persone) PerikosIsidoros
MukherjeeAmrit
PiuriVincenzo
Collana Algorithms for Intelligent Systems Series
ISBN 981-9714-88-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- About the Editors -- 1 AI Powered Chat Assistant for Trauma Detection from Text and Voice Conversations with a Direct Doctor Connection -- 1 Introduction -- 2 Related Works -- 2.1 Emotional Intelligence in Communication: Research Challenges, Literature and Recent Achievements -- 2.2 Chatbot Mobile Isolation App for Depression -- 2.3 Mental Health Chatbot that Uses NLP and AI to Deliver Behavioral Insights and Remote Healthcare -- 2.4 Mental Health Support Chatbot Using NLP -- 2.5 Dost-Chatbot as Mental Health Assistant -- 2.6 Application of Cognitive Behavioral Therapy in Psychiatry: A Review -- 2.7 Revivify: Depression Research and Management Using Automated Tweets and Chatbots -- 2.8 Proposed Chatbot: Thinking and Problem-Solving Experience -- 2.9 Psykh, the Chatbot Using the Rasa Open Source Framework, to be Your Therapist and Stress Reliever -- 2.10 Identify Depression in a Person Using Speech Signals by Extracting Energy and Situations -- 3 Methodology -- 3.1 Module Description -- 4 Implementation -- 4.1 Implementation of Machine Learning Models -- 4.2 NLP Model Development -- 5 Result and Discussion -- 6 Conclusion -- References -- 2 An Intelligent Car Locating System Based on Arduino for a Massive Parking Place -- 1 Introduction -- 2 Motivation -- 3 Problem Statement -- 4 Project Scope -- 5 Objectives -- 6 Related Study -- 7 Comparison with Other System -- 8 Background Tools and Technology -- 8.1 Software Tools -- 8.2 Arduino Simulator -- 8.3 Hardware Tools -- 9 PCB Design of Intelligent Car Locating System for a Massive Parking Place -- 10 Proposed Model of Smart Car Parking System -- 11 Work Flow Diagram of Smart Car Locating System -- 12 Final Circuit of Intelligent Car Locating System for a Massive Parking Place -- 13 Implementation.
13.1 Final Output of Intelligent Car Locating System for a Massive Parking Place -- 14 Result and Discussion -- 15 Testing and Evaluation -- 15.1 Performance Analysis of IoT-Based Intelligent Car Parking System for Large Parking Lot Using Arduino -- 16 Contribution -- 17 Conclusion -- 18 Future Recommendation -- References -- 3 Electricity Load Forecasting Using LSTM for Household Usage -- 1 Introduction -- 2 Literature Review -- 3 LSTM for Electricity Load Forecasting Methodology -- 3.1 Building Machine-Learning Model -- 3.2 Training ML Model -- 4 Results and Discussions -- 4.1 Electricity Load Prediction Over Different Periods -- 4.2 Error Analysis for Electricity Load Prediction -- 4.3 Comparison with Conventional Methods -- 5 Conclusion -- References -- 4 A Cybersecurity Classification Model for Detecting Cyberattacks -- 1 Introduction -- 2 Literature Survey -- 2.1 Training with Support Vector Machine (SVM) for Cyberattack Detection -- 2.2 Normalization for Removing Noise from Given Datasets -- 2.3 Autoencoders with Cybersecurity -- 3 Dataset Description -- 4 Experimental Results -- 5 Conclusion -- References -- 5 Implementation of Baumann Skin Type Indicator Using Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Brief Overview of the Fundamental Dichotomies of BSTI -- 4 Proposed Architecture -- 4.1 Machine Learning Model Architecture -- 4.2 Dataset -- 5 Experiments and Results -- 5.1 Results of the InceptionV3 Model -- 5.2 Comparison with Other Deep Learning Techniques -- 6 Conclusion and Future Work -- References -- 6 An On-demand Data Delivery and Secured Platform in Cloud Computing -- 1 Introduction -- 1.1 Methodology -- 2 Literature Survey -- 3 On-demand Data Delivery and Secured Platform (ODDSP) -- 3.1 Quality of Service (QoS) -- 4 Advanced Encryption Standard (AES) for Cloud Data -- 4.1 Performance Metrics.
4.2 Evaluation Results -- 5 Conclusion -- References -- 7 Real-Time Sign Language Interpreter Using MediaPipe, Dynamic Time Warping, and NLP -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Problem Domain -- 3.2 Problem Definition -- 3.3 Problem Statement -- 3.4 Dataset -- 4 Implementation -- 4.1 MediaPipe Detection/Holistic Model -- 4.2 Extract Landmarks -- 4.3 Draw Landmarks -- 4.4 Models -- 4.5 Dynamic Time Warping (DTW) -- 4.6 Sign Prediction -- 4.7 Phrase Generation -- 5 Result -- 6 Discussion -- 7 Conclusion -- References -- 8 A Support Vector Machine Classifier Approach for Predicting Preeclampsia and Gestational Hypertension -- 1 Introduction -- 2 Literature Review -- 3 Materials and Methods -- 3.1 Description of the Dataset -- 3.2 Data Preprocessing -- 3.3 Importance of Using SVM in ML Experiments -- 3.4 Training and Testing Data -- 3.5 Methodology -- 3.6 Selection of Algorithm -- 3.7 Evaluation of the Schemes' Performance -- 4 Results and Discussion -- 5 Conclusion -- References -- 9 Multilingual Communication: NMT-Based On-Call Speech Translation for Indian Languages -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Dataset -- 3.2 Algorithms -- 3.3 Architecture -- 3.4 Model Training -- 3.5 Evaluation -- 4 Result -- 5 Conclusion -- 6 Future Work -- References -- 10 Brain Tumor Segmentation and Classification Using Deep Learning -- 1 Introduction -- 2 Literature Survey -- 2.1 Problem Formulation -- 2.2 Research Gap -- 3 Data and Variables -- 3.1 About Dataset -- 3.2 Variables for Segmentation Model: -- 3.3 Variables for Classification Model: -- 4 Methodology and Model Specifications -- 4.1 Segmentation Model -- 4.2 Classification Model -- 5 Empirical Results -- 5.1 Segmentation Model -- 5.2 Classification Model -- 6 Conclusion -- 7 Future Scope -- References.
11 ACO-Optimized DRL Model for Energy-Efficient Resource Allocation in High-Performance Computing -- 1 Introduction -- 2 Literature Review -- 3 Problem Definition -- 4 Methods -- 4.1 Ant Colony Optimization -- 4.2 DRL for Resource Allocation in HPC -- 5 Proposed Model -- 5.1 ACO-Optimized DRL for Resource Allocation in HPC -- 6 Experimental Analysis -- 6.1 Response Time Analysis -- 6.2 Makespan Analysis -- 6.3 Energy Consumption Analysis -- 7 Conclusion and Future Work -- References -- 12 Business Decision-Making Using Hybrid LSTM for Enhanced Operational Efficiency -- 1 Introduction -- 2 Literature Review -- 3 Problem Definition -- 4 Data Collection -- 4.1 Data Preprocessing -- 5 Hybrid Optimized LSTM Model for Sales Prediction -- 5.1 Loss Function -- 6 Experimental Analysis -- 6.1 Model Training -- 6.2 Forecast Analysis -- 6.3 Performance Analysis -- 7 Conclusion and Future Work -- References -- 13 Unveiling New Horizons in Machine Learning, NLP-Driven Framework for Student Learning Behavior -- 1 Introduction -- 2 Literature Review -- 3 Modeling and Analysis of Student Learning Behavior -- 3.1 Role of Machine Learning in Analyzing the Student Behavior -- 4 Techniques for Modeling Student Learning Behavior -- 4.1 Employing Natural Language Processing -- 4.2 Employing Natural Language Processing -- 5 Conclusion and Scope for Future Work -- References -- 14 Mirror Text Classification from Image Using Machine Learning Techniques -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Input and Preprocessing -- 3.2 Clustering and Sub-clustering -- 3.3 Feature Extraction -- 3.4 Training -- 3.5 Mirror Text Identification -- 4 Results and Discussion -- 5 Conclusion -- References -- 15 Using Deep Learning to Identify Types of Lung Diseases from X-Ray Images -- 1 Introduction -- 2 Objective -- 3 Literature Survey -- 4 Proposed System -- 5 Conclusion.
References -- 16 A Light-Weight Data Storage and Delivery Platform in Cloud Computing -- 1 Introduction -- 1.1 Methodology -- 2 Literature Survey -- 3 Lempel-Ziv-Markov (LZMA) Compression -- 3.1 RSA-KEM (Key Encapsulation Mechanism) -- 3.2 Symmetric-Key Decryption -- 3.3 Dataset Description -- 3.4 Performance Metrics -- 4 Experimental Results -- 5 Conclusion -- References -- 17 Big Data Analytics Security Issues and Solutions in Healthcare -- 1 Introduction -- 2 The Need for Medical Care Analytics for Big Data -- 3 Different Big Data Analytics Phases -- 3.1 Extracting, Data Cleaning, and Data Collection -- 3.2 Integration and Aggregation of Data -- 3.3 Data Model -- 3.4 Data Delivery, Interpretation, and Feedback -- 4 Role-Based Application Security Principles -- 5 Big Data Lifecycle -- 6 Technologies in Use -- 7 Big Data Security Challenge and Solution -- 8 Conclusion -- References -- 18 Framework for Early-Stage Diabetes Mellitus Risk Prediction Using Hybrid Supervised Learning -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Framework -- 4 Experimental Setup -- 4.1 Evaluation Metrics -- 5 Results and Discussion -- 5.1 Prediction Performance of ML Techniques -- 5.2 Optimization of Prediction Accuracy -- 6 Conclusion -- References -- 19 Brain Tumor Classification in MRI Images: A CNN and U-Net Approach -- 1 Introduction -- 2 Proposed Method -- 2.1 Data Collection -- 2.2 Image Preprocessing -- 2.3 Image Segmentation -- 2.4 Feature Extraction -- 2.5 Convolutional Neural Network (CNN) -- 2.6 U-Net Architecture -- 2.7 Callback Functions -- 3 Result and Discussion -- 3.1 Evaluation Metrics -- 3.2 Experimental Analysis and Result -- 3.3 Prediction of Tumor -- 4 Conclusion -- References -- 20 Cross-Modal Text-to-Video Retrieval Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 System Architecture -- 4 Methodology.
5 Model Implementation and Output.
Record Nr. UNINA-9910864194303321
Vimal Vrince  
Singapore : , : Springer Singapore Pte. Limited, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Network and System Security [[electronic resource] ] : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings / / edited by Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung
Network and System Security [[electronic resource] ] : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings / / edited by Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XIV, 540 p. 128 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Computer networks
Electronic data processing—Management
Computers and civilization
Data and Information Security
Cryptology
Computer Communication Networks
IT Operations
Computers and Society
ISBN 3-319-46298-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited paper -- While Mobile Encounters with Clouds -- Authentication Mechanism -- Multi-Device Anonymous Authentication -- A Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism -- Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications -- Cloud Computing Security -- Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing -- An Energy-Efficient Task Scheduling Heuristic Algorithm without Virtual Machine Migration in Real-time Cloud Environments -- An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from the OSN in Mobile Cloud Platforms -- Data Mining for Security Application -- Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content Security -- Realtime DDoS detection in SIP Ecosystems: Machine Learning tools of the trade -- Digital Signature -- Two-in-One Oblivious Signatures Secure in the Random Oracle Model -- A New Transitive Signature Scheme -- Privacy-preserving Technologies -- Privacy-Preserving Profile Matching Protocol Considering Conditions -- Privacy Preserving Credit Systems -- Evading System-Calls Based Intrusion Detection Systems -- Network Security and Forensic -- HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks -- A Network Timestamp Verification Mechanism for Forensic Analysis -- Searchable Encryption -- An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords -- Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards -- A System of Shareable Keyword Search on Encrypted Data -- Security Policy and Access Control -- An Attribute Based Protection Model for JSON Documents -- The GURA-G Administrative Model for User and Group Attribute Assignment.-On the relationship between finite domain ABAM and PreUCONA -- Security Protocols -- MD-VCMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication -- Expressive Rating Scheme by Signatures with Predications on Ratees -- Symmetric Key Cryptography -- A New Adaptable Construction of Modulo Addition with Scalable Security for Stream Ciphers -- Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR -- System Security -- DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access Pattern -- PMFA: Toward Passive Message Fingerprint Attacks on Challenge-based Collaborative Intrusion Detection Networks -- Iris Cancellable Template Generation based on Indexing-First-One Hashing -- Web Security -- Detecting Malicious URLs Using Lexical Analysis -- Gatekeeping Behavior Analysis for Information Credibility Assessmenton Weibo -- Data Mining for Security Application (Short Paper) -- Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining -- Provable Seucirty (Short Paper) -- Improved Security Proofs for Modular Exponentiation Bits -- Security Protocol (Short Paper) -- Secure Outsourced Bilinear Pairings Computation for Mobile Devices -- The Design and Implementation of Multi-Dimensional Bloom Filter Storage Matrix.
Record Nr. UNISA-996466241303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui