Information Security Practice and Experience [[electronic resource] ] : 17th International Conference, ISPEC 2022, Taipei, Taiwan, November 23–25, 2022, Proceedings / / edited by Chunhua Su, Dimitris Gritzalis, Vincenzo Piuri |
Edizione | [1st ed. 2022.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
Descrizione fisica | 1 online resource (643 pages) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data protection
Computer networks Computer systems Application software Computers Security Services Computer Communication Networks Computer System Implementation Computer and Information Systems Applications Computing Milieux Data and Information Security |
ISBN | 3-031-21280-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Blockchain -- Security for Critical Infrastructure -- IoT Security -- Software Security -- Network -- Web Security -- Authentication -- Biometric Security -- Cryptography. |
Record Nr. | UNISA-996500062903316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Security Practice and Experience : 17th International Conference, ISPEC 2022, Taipei, Taiwan, November 23–25, 2022, Proceedings / / edited by Chunhua Su, Dimitris Gritzalis, Vincenzo Piuri |
Edizione | [1st ed. 2022.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
Descrizione fisica | 1 online resource (643 pages) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data protection
Computer networks Computer systems Application software Computers Security Services Computer Communication Networks Computer System Implementation Computer and Information Systems Applications Computing Milieux Data and Information Security |
ISBN | 3-031-21280-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Blockchain -- Security for Critical Infrastructure -- IoT Security -- Software Security -- Network -- Web Security -- Authentication -- Biometric Security -- Cryptography. |
Record Nr. | UNINA-9910631095103321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Innovations in Data Analytics [[electronic resource] ] : Selected Papers of ICIDA 2022 / / edited by Abhishek Bhattacharya, Soumi Dutta, Paramartha Dutta, Vincenzo Piuri |
Autore | Bhattacharya Abhishek |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (633 pages) |
Disciplina | 006.3 |
Altri autori (Persone) |
DuttaSoumi
DuttaParamartha PiuriVincenzo |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Computational intelligence
Quantitative research Image processing—Digital techniques Computer vision Data protection Telecommunication Computational Intelligence Data Analysis and Big Data Computer Imaging, Vision, Pattern Recognition and Graphics Data and Information Security Communications Engineering, Networks |
Soggetto non controllato |
Computer Security
Telecommunication Engineering Computers Technology & Engineering |
ISBN | 981-9905-50-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Foreword -- Preface -- Contents -- About the Editors -- Computational Intelligence -- Transience in COVID Patients with Comorbidity Issues-A Systematic Review and Meta-Analysis Based on Indian and Southeast Asian Context -- 1 Introduction -- 1.1 Risk of COVID Patients with Comorbidity Issues -- 2 COVID Patient Statistics with Comorbidity Issues -- 3 Research Methodology -- 3.1 Search Strategy -- 4 Related Literature Survey in This Area -- 5 Discussion -- 6 Conclusion and Future Scope -- References -- NFT HUB-The Decentralized Non-Fungible Token Market Place -- 1 Introduction -- 1.1 Non-Fungible Token -- 1.2 Blockchain -- 2 Literature Survey -- 3 Proposed System -- 3.1 Blockchain -- 3.2 Ethereum Blockchain -- 3.3 Properties of Blockchain -- 3.4 Generic Elements of the Blockchain -- 3.5 Secure Hash Algorithm -- 4 Results and Discussion -- 4.1 Deployment Confirmation -- 4.2 Metamask Wallet -- 4.3 Minting Page -- 4.4 Transaction Address -- 4.5 Dashboard -- 5 Conclusion -- 5.1 Future Scope of the Project -- References -- Hashgraph: A Decentralized Security Approach Based on Blockchain with NFT Transactions -- 1 Introduction -- 1.1 Optimized Blockchain Server -- 2 Literature Survey -- 2.1 Survey Report: On Token Service -- 2.2 Survey Report: On Main-Net Access -- 2.3 Survey Report: Remove Centralized Control: Hala Systems -- 3 Proposed System -- 3.1 Non-Fungible Transaction -- 3.2 Blockchain Methodology -- 3.3 Gossip Protocol -- 3.4 Hashgraph -- 3.5 Consensus Algorithm [In Gossip Protocol] -- 3.6 HCS Implementation -- 4 Performance Evaluation -- 4.1 Transaction Cost Denomination of Our Network -- 4.2 Transaction Cost of Network on Blockchain NFT -- 5 Result and Discussion -- 6 Conclusion -- References -- Med Card: An Innovative Way to Keep Your Medical Records Handy and Safe -- 1 Introduction -- 1.1 What is Blockchain?.
1.2 What is Machine Learning? -- 2 Literature Review -- 3 Technologies Used -- 3.1 Blockchain in Health Care -- 3.2 Machine Learning in Health Care -- 4 Proposed Idea -- 4.1 What is a Med Card? -- 4.2 Workflow -- 5 Conclusion and Future Scope -- References -- Delta Operator-Based Modelling and Control of High Power Induction Motor Using Novel Chaotic Gorilla Troop Optimizer -- 1 Introduction -- 2 Formulation of the Problem -- 3 New Chaotic Gorilla Troop Optimizer -- 4 Simulation Ouput and Their Analysis -- 5 Conclusions -- References -- An Enhanced Optimize Outlier Detection Using Different Machine Learning Classifier -- 1 Introduction -- 2 Outlier Detection -- 3 Literature Review -- 4 Proposed Methodology -- 5 Simulation Result -- 6 Conclusion -- References -- Prediction of Disease Diagnosis for Smart Healthcare Systems Using Machine Learning Algorithm -- 1 Introduction -- 2 Heart Disease -- 3 Diabetes Mellitus -- 4 Proposed Methodology -- 5 Simulation Results -- 6 Conclusion -- References -- Optimization Accuracy on an Intelligent Approach to Detect Fake News on Twitter Using LSTM Neural Network -- 1 Introduction -- 2 Road Map of Methodology -- 2.1 Data Collection and Filtration -- 2.2 Pre-processing -- 2.3 Feature Extraction -- 2.4 Feature Selection -- 2.5 Classification -- 3 Proposed Methodology -- 4 Simulation Results -- 5 Conclusion -- References -- Advance Computing -- Mining User Interest Using Bayesian-PMF and Markov Chain Monte Carlo for Personalised Recommendation Systems -- 1 Introduction -- 2 Related Work and Background -- 3 Experimental Methodology -- 3.1 Probabilistic Matrix Factorization (PMF) -- 3.2 Bayesian-PMF with MCMC -- 3.3 Sparsity Reduction -- 3.4 Performance Measure -- 4 Proposed Architecture -- 5 Experimental Outcomes and Investigation -- 5.1 Dataset Description -- 6 Conclusion and Future Work -- References. Big Data and Its Role in Cybersecurity -- 1 Introduction -- 2 Security Using Big Data -- 2.1 Use of Big Data Analytic (BDA) as Defense Tool -- 2.2 Cybersecurity and Machine Learning -- 3 Cybersecurity Approaches in Big Data -- 4 Research Trends and Challenges -- 4.1 Use of Big Data in Defense -- 4.2 Laws Regulating to Big Data -- 4.3 Distribution of Data for Storage -- 4.4 Security Technique Scalability in the Big Data -- 5 Conclusions -- References -- QR Code-Based Digital Payment System Using Visual Cryptography -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Implementation -- 4.1 Encryption -- 4.2 AES Algorithm -- 4.3 Decryption -- 5 Result -- 6 Conclusion -- References -- A Study of Different Approaches of Offloading for Mobile Cloud Computing -- 1 Introduction -- 2 Research Method -- 3 Offloading for Mobile Cloud Computing -- 4 Applications Suitable for Offloading in MCC -- 5 Different Offloading Approaches -- 6 Conclusion -- References -- Use of Machine Learning Models for Analyzing the Accuracy of Predicting the Cancerous Diseases -- 1 Introduction -- 2 Related Work -- 3 Machine Learning Models -- 3.1 Logistic Regression -- 3.2 Decision Tree -- 3.3 Random Forest Classifier -- 4 Experiment -- 4.1 Experiment Environment -- 4.2 Breast Cancer Dataset -- 5 Experimental Results -- 6 Conclusion -- References -- Predict Employee Promotion Using Supervised Classification Approaches -- 1 Introduction -- 2 Related Works -- 3 Implementation -- 3.1 Proposed Model -- 3.2 Data Collection -- 3.3 Data Analysis -- 3.4 Engineered Functions -- 3.5 Train-Test-Split -- 3.6 Model Building -- 4 Performance Evaluation -- 5 Conclusion -- References -- Smart Grid Analytics-Analyzing and Identifying Power Distribution Losses with the Help of Efficient Data Regression Algorithms -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Results. 5 Conclusion -- References -- Load Balancing on Cloud Using Genetic Algorithms -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 4 Results -- 5 Conclusions and Future Work -- References -- Network Security and Telecommunication -- Hybrid Feature Selection Approach to Classify IoT Network Traffic for Intrusion Detection System -- 1 Introduction -- 2 Literature Survey -- 3 Research Gaps -- 4 Proposed Work -- 4.1 Proposed Methodology -- 5 Experimental Results -- 5.1 Dataset Description -- 5.2 System Configuration -- 5.3 Model Parameters -- 5.4 Performance Parameters -- 6 Conclusion -- References -- A Deep Learning-Based Framework for Analyzing Stress Factors Among Working Women -- 1 Introduction -- 2 Literature Survey -- 3 Stress Factors (Stressors) -- 3.1 Deep Learning: Background -- 3.2 Deep Learning-Based Framework for Early Stress Detection -- 4 Results and Discussion -- 5 Conclusion -- References -- Automatic Question Generation -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Methodology -- 5 Conclusion and Future Scope -- References -- Automatic Construction of Named Entity Corpus for Adverse Drug Reaction Prediction -- 1 Introduction -- 2 Related Work -- 2.1 Biomedical Named Entity Recognition -- 2.2 Datasets for Biomedical Entity Recognition -- 3 Proposed Work -- 3.1 ADR Corpus Overview -- 3.2 Corpus Construction Steps -- 4 Results -- 4.1 Contributions -- 4.2 Statistics -- 5 Discussion -- References -- A Space Efficient Metadata Structure for Ranking Subset Sums -- 1 Introduction -- 1.1 Problem Formulation -- 1.2 Past Work -- 1.3 Our Contribution -- 2 Outline of Our Technique -- 3 Generation of Top-kk Subsets -- 3.1 The Metadata Structure upper GG -- 3.2 Construction of Metadata Structure upper GG -- 3.3 Query Answering with Heap -- 3.4 Modified Metadata Structure upper GG -- 3.5 The Final Structure of upper GG. 3.6 Generation of Top-kk Subsets by upper GG on Demand -- 3.7 Getting Rid of the Bit String -- 4 Experimental Results -- 4.1 Analysis of the Results -- 5 Conclusion -- References -- Brain Tumour Detection Using Machine Learning -- 1 Introduction -- 2 Literature Survey -- 3 Methodology and Materials -- 4 Results and Discussion -- 5 Conclusion and Future Scope -- References -- Implementation of a Smart Patient Health Tracking and Monitoring System Based on IoT and Wireless Technology -- 1 Overview -- 2 Block Diagram -- 3 Methodology and Results -- 3.1 Database Tracking and Maintenance -- 4 Conclusion and Future Scope -- References -- Diabetes Disease Prediction Using KNN -- 1 Introduction -- 2 Literature Survey -- 2.1 How is Data Science Revolutionizing the Healthcare Industry? -- 2.2 Role of Data Science in Health Care -- 2.3 Diabetes Detection Using Data Science -- 2.4 Flow of the Methodology Used for Diabetes Detection -- 3 Proposed System -- 4 Results -- 4.1 Experimental Results -- 4.2 Visualization of Obtained Results -- 5 Conclusion -- 6 Future Scope -- References -- Review: Application of Internet of Things (IoT) for Vehicle Simulation System -- 1 Introduction -- 2 Application -- 3 Basic Concepts of IoT -- 4 Simulation Concept -- 5 Simulation-Based Internet of Things -- 6 Application of Simulated IoT for System Used in Vehicle -- 7 Car Simulation Structure and Principle -- 8 Embedding Security Features in a Vehicle Using IoT -- 9 Conclusion and Future Scope -- References -- Data Science and Data Analytics -- Time Series Analysis and Forecast Accuracy Comparison of Models Using RMSE-Artificial Neural Networks -- 1 Introduction -- 2 Related Research -- 3 Neural Networks Models in Time Series -- 3.1 Feed-Forward Neural Network Model -- 3.2 Time-Lagged Neural Networks -- 3.3 Seasonal Artificial Neural Networks -- 3.4 Long Short-Term Memory (LSTM). 4 Time Series Analysis. |
Record Nr. | UNINA-9910728933703321 |
Bhattacharya Abhishek | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Intelligent and Interactive Computing [[electronic resource] ] : Proceedings of IIC 2018 / / edited by Vincenzo Piuri, Valentina Emilia Balas, Samarjeet Borah, Sharifah Sakinah Syed Ahmad |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XIV, 569 p. 228 illus., 155 illus. in color.) |
Disciplina | 006.3 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Computational intelligence
Artificial intelligence Quantum computers Computer simulation Computational Intelligence Artificial Intelligence Quantum Computing Simulation and Modeling |
ISBN | 981-13-6031-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Proposed Framework: Enhanced Automated Duplication Algorithm for Flash Application -- Publication Model for Academic Talent Based On Apriori Technique -- Software Module Clustering based on the Fuzzy Adaptive Teaching Learning based Optimization Algorithm -- Dynamic Solution Probability Acceptance within the Flower Pollination Algorithm for t-way Test Suite Generation -- A Study on Gamification for Higher Education Students' Engagement Towards Education 4.0 -- An Investigation of Learner Characteristics that Use Massive Open Online Courses (MOOC) in Learning Second Language -- Improved Ozone Pollution Prediction using Extreme Learning Machine with Tribas Regularization Activation Function -- Cultural Metadata Enhancement by Using Community-driven Approach to Create Digital Holistic Culture Conservation System -- Tracking Coastal Change over Kuala Terengganu using Landsat -- A Design of Automated Surgical Illumination System -- Image Spam Detection on Instagram using Convolutional Neural Network -- A Review of Botnet Detection Approaches Based on DNS Traffic Analysis -- Face Recognition using Texture Features and Multi-Layer Perceptron -- Classification of Landsat 8 Satellite Data Using Unsupervised Methods. |
Record Nr. | UNINA-9910483006303321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Learning Systems: From Theory to Practice / / edited by Vassil Sgurev, Vincenzo Piuri, Vladimir Jotsov |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XII, 301 p.) |
Disciplina | 006.31 |
Collana | Studies in Computational Intelligence |
Soggetto topico |
Computational intelligence
Artificial intelligence Computational Intelligence Artificial Intelligence |
ISBN | 3-319-75181-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | From von Neumann architecture and Atanasoff’s ABC to Neuro-morphic Computation and Kasabov’s NeuCube: Principles and Implementations -- Applications of Computational Intelligence in Industrial and Environmental Scenarios -- Real, Imaginary and Complex Sets -- Intercriteria analysis over patterns -- From Primary to Conventional Science -- Intelligent Two-Level Optimization and Model Predictive Control of Degrading Plants -- Collaborative Clustering: New Perspective to Rank Factor Granules -- Learning through Contstraint Applications -- Autonomous Flight Control and Precise Gestural Positioning of a Small Quadrotor -- Introduction to the Theory of Randomized Machine Learning -- Grid-Type Fuzzy Models for Performance Evaluation and Condition Monitoring of Photovoltaic Systems -- Intelligent Control of Uncertain Switched Nonlinear Plants: NFG Optimum Control Synthesis via Switched Fuzzy Time-delay Systems -- Multidimensional Intuitionistic Fuzzy Quantifiers and Level Operators -- Data Processing and Harmonization for Intelligent Transportation Systems. An Application Scenario on Highway Traffic Flows. |
Record Nr. | UNINA-9910299952103321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Machine learning in information and communication technology : proceedings of ICICT 2021, SMIT / / Hiren Kumar Deva Sarma, Vincenzo Piuri and Arun Kumar Pujari, editors |
Pubbl/distr/stampa | Singapore : , : Springer, , [2023] |
Descrizione fisica | 1 online resource (337 pages) |
Disciplina | 004.6 |
Collana | Lecture notes in networks and systems |
Soggetto topico |
Computer networks
Computer security Image processing - Digital techniques |
ISBN | 981-19-5090-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- Healthcare Informatics -- Earth Mover's Distance-Based Automated Disease Tagging of Indian ECGs -- 1 Introduction -- 2 Literature Review -- 2.1 Earth Mover's Distance -- 2.2 Various Distances -- 3 Statistics of ECG Training and Test Data Set -- 3.1 Data Set -- 3.2 EMD-Based Analysis of Training Data -- 3.3 ECG Tagging with EMD -- 3.4 Algorithmic Framework Setup -- 4 Conclusion -- References -- Cardial Disease Prediction in Multi-variant Systems Using MT-MrSBC Model -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 4 System Architecture -- 5 Experimental Approach -- 6 Future Works -- 7 Conclusion -- References -- SVM-based Pre- and Post-treatment Cancer Segmentation from Lung and Abdominal CT Images via Neighborhood-Influenced Features -- 1 Introduction -- 2 Proposed Work -- 2.1 Feature Extraction -- 2.2 Model Building and Validation -- 3 Experiments and Results -- 3.1 Description of Image Dataset -- 3.2 Results -- 4 Performance Analysis -- 5 Conclusion -- References -- Blood Cancer Detection with Microscopic Images Using Machine Learning -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Simulation Results -- 5 Conclusion -- References -- A Survey on Machine Learning-Based Approaches for Leukaemia Detection -- 1 Introduction -- 1.1 Classification of Leukaemia -- 2 Literature Survey -- 3 Methodology -- 4 Result and Analysis -- 5 Conclusion -- References -- Periocular Region Recognition-A Brief Survey -- 1 Introduction -- 2 Biometric System of Periocular Region Recognition -- 3 Benchmark Dataset for Periocular Recognition -- 4 Detection and Segmentation of the Periocular Region -- 5 Feature Descriptors of Periocular -- 5.1 Global Features -- 5.2 Local Features -- 6 Conclusion and Future Scope for Research -- References.
A Bibliometric Analysis on the Relationship Between Emotional Intelligence, Self-Management and Health Information Seeking -- 1 Introduction -- 2 Discussion -- 3 Research Methodology -- 3.1 Study Characteristics -- 3.2 Co-citation Analysis -- 4 Conclusion -- References -- Preferences in the Detailing Process Among Young and Senior Physicians -- 1 Introduction -- 1.1 Contributions Made in the Paper -- 2 Literature Review -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Non-cognitive Differences on Social Media Branded Drugs Promotion: Study of Indian Patients and Physicians -- 1 Introduction -- 2 Literature Review -- 3 Methodology and Data -- 4 Result -- 5 Discussion -- 6 Conclusion -- References -- AUTCD-Net: An Automated Framework for Efficient Covid-19 Diagnosis on Computed Tomography Scans -- 1 Introduction -- 2 Materials and Methods -- 2.1 Dataset -- 2.2 Proposed Architecture -- 3 Experimentation -- 4 Conclusion -- References -- Computer-Aided Detection of Brain Midline Using CT Images -- 1 Introduction -- 2 Methodology -- 2.1 Slice Selection -- 2.2 Soft Tissues Segmentation -- 2.3 Control Point Estimation -- 3 Results and Comparison -- 4 Conclusion -- References -- Deep Neural Network-Based Classification of ASD and Neurotypical Subjects Using Functional Connectivity Features Derived from Resting-State fMRI Data -- 1 Introduction -- 2 Methodology -- 2.1 Dataset -- 3 Feature Extraction -- 3.1 Tools -- 3.2 Model -- 4 Result and Discussion -- 5 Conclusion -- References -- Application of Deep Learning in Healthcare -- 1 Introduction -- 2 Literature Survey -- 3 Complete Framework Details -- 4 Proposed Deep Learning Classification Model -- 4.1 Dataset Description -- 4.2 Steps Involved -- 5 Results -- 6 Conclusion and Future Scope -- References -- Recommendation Systems. A Popularity-Based Recommendation System Using Machine Learning -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 4 Result and Discussion -- 5 Conclusion -- References -- Machine Learning-Based Movies and Shows Recommendation System -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Communication Networks -- A Survey on Application of LSTM as a Deep Learning Approach in Traffic Classification for SDN -- 1 Introduction -- 2 Related Works -- 3 Deep Learning for Traffic Classification in SDN -- 4 Long Short-Term Memory: An Overview -- 5 LSTM Application -- 6 LSTM-Based Traffic Classification in SDN -- 7 A Summary of the Methods and Limitations -- 8 Future Works -- 9 Conclusion -- References -- Assistive Technology -- A Novel Low-cost Visual Aid System for the Completely Blind People -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Simulation Results -- 5 Conclusion -- References -- Social Networks -- Twitter Sentiment Analysis Using Machine Learning Techniques: A Case Study Based on Farmers Protest -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Results -- 5 Conclusion -- References -- Sentiment Analysis to Find Sentence Polarity on Tweet Data -- 1 Introduction -- 2 Literature Survey -- 3 Motivation -- 4 Methodology -- 5 Implementation -- 6 Results and Discussion -- 7 Conclusion and Future Scope -- References -- Impact of Emotional Support and Medical Adherence on Social Media Branded Drug Promotion -- 1 Introduction -- 2 Literature Review -- 3 Methodology and Data -- 4 Conclusion and Future Scope -- References -- Image and Video Processing -- A Survey on Video Description and Summarization Using Deep Learning-Based Methods -- 1 Introduction -- 2 Related Work -- 3 Existing Methodology & -- Implementation -- 4 Datasets. 5 Benchmark Results -- 6 Future Directions -- 7 Conclusion -- References -- Aerial Image Classification Using Convolution Neural Network -- 1 Introduction -- 2 CNN for Image Classification -- 2.1 Choice of GoogLeNet -- 2.2 Layers of GoogLeNet -- 2.3 Inception Modules of GoogLeNet -- 3 Transfer Learning -- 3.1 Layer Modification, Network Retraining and Testing -- 3.2 Overfitting and Its Challenges -- 4 The Experiment -- 4.1 Experimental Protocol for Data Acquisition -- 4.2 Dataset Processing -- 4.3 Network Model Preparation -- 4.4 Training -- 4.5 Testing -- 4.6 Result -- 5 Challenges in Image Classification of Aerial Images for Object Detection -- 6 Conclusion -- References -- Image Retrieval Using Neural Networks for Word Image Spotting-A Review -- 1 Introduction -- 2 CBIR Framework -- 3 Low-Level Features -- 3.1 Color Feature -- 3.2 Texture Feature -- 3.3 Shape Feature -- 4 Similarity Matching in CBIR -- 4.1 Euclidean Distance (ED) -- 4.2 Manhattan Distance (MD) -- 4.3 Chebyshev Distance (CD) -- 4.4 Mahalanobis Distance (MahD) -- 5 Machine Learning in CBIR -- 5.1 Supervised Learning Models -- 5.2 Unsupervised Learning Models -- 6 Neural Networks in CBIR -- 6.1 Types of Neural Network -- 6.2 Deep Learning -- 6.3 Neural Network and Deep Learning-Based Approaches for Word Image Spotting -- 7 Discussions and Future Trends -- 8 Conclusion -- References -- Cybersecurity -- Priority-Based Mitigation in Education Sector using Machine Learning -- 1 Introduction -- 2 Risk Mitigation -- 3 Proposed Work -- 4 Conclusion and Discussion -- References -- Miscellaneous Applications -- Prediction and Analysis of Air Quality Index Using Machine Learning Algorithms -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Area of Investigation and Datasets -- 3.2 Pattern Recognition Methods -- 4 Results and Discussion -- 5 Conclusion -- References. A Short Overview on Various Bio-Inspired Algorithms -- 1 Introduction -- 1.1 Artificial Bee Colony (ABC) Algorithm -- 1.2 Fish Swarm Algorithm (FSA) -- 1.3 Cat Swarm Optimization (CSO) -- 1.4 Whale Optimization Algorithm (WOA) -- 1.5 Artificial Algae Algorithm (AAA) -- 1.6 Elephant Search Algorithm (ESA) -- 1.7 Chicken Swarm Optimization Algorithm (CSOA) -- 1.8 Moth Flame Optimization (MFO) -- 1.9 Grey Wolf Optimization (GWO) -- 1.10 Firefly Optimization (FFO) -- 2 Conclusion -- References -- Gesture-Based Drawing Application: A Survey -- 1 Introduction -- 2 Literature Survey -- 3 Methodologies -- 4 Conclusion -- References -- Simulation and Modeling of Electrical Load Data Using Machine Learning -- 1 Introduction -- 2 Simulation and Modeling of the Data -- 2.1 Generalized Linear Model -- 2.2 Decision Tree Model -- 2.3 Random Forest Model -- 2.4 Gradient Boosted Trees Model -- 3 Result and Discussion -- 4 Conclusion -- References -- Analysis of Single Missing Gate Faults in Quantum Circuit -- 1 Introduction -- 2 Background -- 2.1 Quantum Computing (QC) -- 2.2 Quantum Gates and Circuit -- 2.3 Faults in Quantum Circuit -- 2.4 Related Works -- 3 Proposed Methodology -- 3.1 Probability Distribution -- 3.2 Detection of Fault -- 4 Experimental Analysis -- 5 Conclusion -- References -- Experimental Validation of Frequency Scaling Over Indian Hilly Region -- 1 Introduction -- 2 Collection of Data -- 3 Methodology -- 4 Result -- 5 Summary/Conclusion -- References -- School Uniform Identification Using Deep Learning Based Approach -- 1 Introduction -- 2 Related Work -- 3 School Uniform Identification Using Deep Learning Based Approach -- 3.1 System Architecture -- 3.2 Implementation -- 4 Conclusion -- References -- Author Index. |
Record Nr. | UNINA-9910624320303321 |
Singapore : , : Springer, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Multi-Strategy Learning Environment : Proceedings of ICMSLE 2024 |
Autore | Vimal Vrince |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2024 |
Descrizione fisica | 1 online resource (710 pages) |
Altri autori (Persone) |
PerikosIsidoros
MukherjeeAmrit PiuriVincenzo |
Collana | Algorithms for Intelligent Systems Series |
ISBN | 981-9714-88-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- About the Editors -- 1 AI Powered Chat Assistant for Trauma Detection from Text and Voice Conversations with a Direct Doctor Connection -- 1 Introduction -- 2 Related Works -- 2.1 Emotional Intelligence in Communication: Research Challenges, Literature and Recent Achievements -- 2.2 Chatbot Mobile Isolation App for Depression -- 2.3 Mental Health Chatbot that Uses NLP and AI to Deliver Behavioral Insights and Remote Healthcare -- 2.4 Mental Health Support Chatbot Using NLP -- 2.5 Dost-Chatbot as Mental Health Assistant -- 2.6 Application of Cognitive Behavioral Therapy in Psychiatry: A Review -- 2.7 Revivify: Depression Research and Management Using Automated Tweets and Chatbots -- 2.8 Proposed Chatbot: Thinking and Problem-Solving Experience -- 2.9 Psykh, the Chatbot Using the Rasa Open Source Framework, to be Your Therapist and Stress Reliever -- 2.10 Identify Depression in a Person Using Speech Signals by Extracting Energy and Situations -- 3 Methodology -- 3.1 Module Description -- 4 Implementation -- 4.1 Implementation of Machine Learning Models -- 4.2 NLP Model Development -- 5 Result and Discussion -- 6 Conclusion -- References -- 2 An Intelligent Car Locating System Based on Arduino for a Massive Parking Place -- 1 Introduction -- 2 Motivation -- 3 Problem Statement -- 4 Project Scope -- 5 Objectives -- 6 Related Study -- 7 Comparison with Other System -- 8 Background Tools and Technology -- 8.1 Software Tools -- 8.2 Arduino Simulator -- 8.3 Hardware Tools -- 9 PCB Design of Intelligent Car Locating System for a Massive Parking Place -- 10 Proposed Model of Smart Car Parking System -- 11 Work Flow Diagram of Smart Car Locating System -- 12 Final Circuit of Intelligent Car Locating System for a Massive Parking Place -- 13 Implementation.
13.1 Final Output of Intelligent Car Locating System for a Massive Parking Place -- 14 Result and Discussion -- 15 Testing and Evaluation -- 15.1 Performance Analysis of IoT-Based Intelligent Car Parking System for Large Parking Lot Using Arduino -- 16 Contribution -- 17 Conclusion -- 18 Future Recommendation -- References -- 3 Electricity Load Forecasting Using LSTM for Household Usage -- 1 Introduction -- 2 Literature Review -- 3 LSTM for Electricity Load Forecasting Methodology -- 3.1 Building Machine-Learning Model -- 3.2 Training ML Model -- 4 Results and Discussions -- 4.1 Electricity Load Prediction Over Different Periods -- 4.2 Error Analysis for Electricity Load Prediction -- 4.3 Comparison with Conventional Methods -- 5 Conclusion -- References -- 4 A Cybersecurity Classification Model for Detecting Cyberattacks -- 1 Introduction -- 2 Literature Survey -- 2.1 Training with Support Vector Machine (SVM) for Cyberattack Detection -- 2.2 Normalization for Removing Noise from Given Datasets -- 2.3 Autoencoders with Cybersecurity -- 3 Dataset Description -- 4 Experimental Results -- 5 Conclusion -- References -- 5 Implementation of Baumann Skin Type Indicator Using Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Brief Overview of the Fundamental Dichotomies of BSTI -- 4 Proposed Architecture -- 4.1 Machine Learning Model Architecture -- 4.2 Dataset -- 5 Experiments and Results -- 5.1 Results of the InceptionV3 Model -- 5.2 Comparison with Other Deep Learning Techniques -- 6 Conclusion and Future Work -- References -- 6 An On-demand Data Delivery and Secured Platform in Cloud Computing -- 1 Introduction -- 1.1 Methodology -- 2 Literature Survey -- 3 On-demand Data Delivery and Secured Platform (ODDSP) -- 3.1 Quality of Service (QoS) -- 4 Advanced Encryption Standard (AES) for Cloud Data -- 4.1 Performance Metrics. 4.2 Evaluation Results -- 5 Conclusion -- References -- 7 Real-Time Sign Language Interpreter Using MediaPipe, Dynamic Time Warping, and NLP -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Problem Domain -- 3.2 Problem Definition -- 3.3 Problem Statement -- 3.4 Dataset -- 4 Implementation -- 4.1 MediaPipe Detection/Holistic Model -- 4.2 Extract Landmarks -- 4.3 Draw Landmarks -- 4.4 Models -- 4.5 Dynamic Time Warping (DTW) -- 4.6 Sign Prediction -- 4.7 Phrase Generation -- 5 Result -- 6 Discussion -- 7 Conclusion -- References -- 8 A Support Vector Machine Classifier Approach for Predicting Preeclampsia and Gestational Hypertension -- 1 Introduction -- 2 Literature Review -- 3 Materials and Methods -- 3.1 Description of the Dataset -- 3.2 Data Preprocessing -- 3.3 Importance of Using SVM in ML Experiments -- 3.4 Training and Testing Data -- 3.5 Methodology -- 3.6 Selection of Algorithm -- 3.7 Evaluation of the Schemes' Performance -- 4 Results and Discussion -- 5 Conclusion -- References -- 9 Multilingual Communication: NMT-Based On-Call Speech Translation for Indian Languages -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Dataset -- 3.2 Algorithms -- 3.3 Architecture -- 3.4 Model Training -- 3.5 Evaluation -- 4 Result -- 5 Conclusion -- 6 Future Work -- References -- 10 Brain Tumor Segmentation and Classification Using Deep Learning -- 1 Introduction -- 2 Literature Survey -- 2.1 Problem Formulation -- 2.2 Research Gap -- 3 Data and Variables -- 3.1 About Dataset -- 3.2 Variables for Segmentation Model: -- 3.3 Variables for Classification Model: -- 4 Methodology and Model Specifications -- 4.1 Segmentation Model -- 4.2 Classification Model -- 5 Empirical Results -- 5.1 Segmentation Model -- 5.2 Classification Model -- 6 Conclusion -- 7 Future Scope -- References. 11 ACO-Optimized DRL Model for Energy-Efficient Resource Allocation in High-Performance Computing -- 1 Introduction -- 2 Literature Review -- 3 Problem Definition -- 4 Methods -- 4.1 Ant Colony Optimization -- 4.2 DRL for Resource Allocation in HPC -- 5 Proposed Model -- 5.1 ACO-Optimized DRL for Resource Allocation in HPC -- 6 Experimental Analysis -- 6.1 Response Time Analysis -- 6.2 Makespan Analysis -- 6.3 Energy Consumption Analysis -- 7 Conclusion and Future Work -- References -- 12 Business Decision-Making Using Hybrid LSTM for Enhanced Operational Efficiency -- 1 Introduction -- 2 Literature Review -- 3 Problem Definition -- 4 Data Collection -- 4.1 Data Preprocessing -- 5 Hybrid Optimized LSTM Model for Sales Prediction -- 5.1 Loss Function -- 6 Experimental Analysis -- 6.1 Model Training -- 6.2 Forecast Analysis -- 6.3 Performance Analysis -- 7 Conclusion and Future Work -- References -- 13 Unveiling New Horizons in Machine Learning, NLP-Driven Framework for Student Learning Behavior -- 1 Introduction -- 2 Literature Review -- 3 Modeling and Analysis of Student Learning Behavior -- 3.1 Role of Machine Learning in Analyzing the Student Behavior -- 4 Techniques for Modeling Student Learning Behavior -- 4.1 Employing Natural Language Processing -- 4.2 Employing Natural Language Processing -- 5 Conclusion and Scope for Future Work -- References -- 14 Mirror Text Classification from Image Using Machine Learning Techniques -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Input and Preprocessing -- 3.2 Clustering and Sub-clustering -- 3.3 Feature Extraction -- 3.4 Training -- 3.5 Mirror Text Identification -- 4 Results and Discussion -- 5 Conclusion -- References -- 15 Using Deep Learning to Identify Types of Lung Diseases from X-Ray Images -- 1 Introduction -- 2 Objective -- 3 Literature Survey -- 4 Proposed System -- 5 Conclusion. References -- 16 A Light-Weight Data Storage and Delivery Platform in Cloud Computing -- 1 Introduction -- 1.1 Methodology -- 2 Literature Survey -- 3 Lempel-Ziv-Markov (LZMA) Compression -- 3.1 RSA-KEM (Key Encapsulation Mechanism) -- 3.2 Symmetric-Key Decryption -- 3.3 Dataset Description -- 3.4 Performance Metrics -- 4 Experimental Results -- 5 Conclusion -- References -- 17 Big Data Analytics Security Issues and Solutions in Healthcare -- 1 Introduction -- 2 The Need for Medical Care Analytics for Big Data -- 3 Different Big Data Analytics Phases -- 3.1 Extracting, Data Cleaning, and Data Collection -- 3.2 Integration and Aggregation of Data -- 3.3 Data Model -- 3.4 Data Delivery, Interpretation, and Feedback -- 4 Role-Based Application Security Principles -- 5 Big Data Lifecycle -- 6 Technologies in Use -- 7 Big Data Security Challenge and Solution -- 8 Conclusion -- References -- 18 Framework for Early-Stage Diabetes Mellitus Risk Prediction Using Hybrid Supervised Learning -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Framework -- 4 Experimental Setup -- 4.1 Evaluation Metrics -- 5 Results and Discussion -- 5.1 Prediction Performance of ML Techniques -- 5.2 Optimization of Prediction Accuracy -- 6 Conclusion -- References -- 19 Brain Tumor Classification in MRI Images: A CNN and U-Net Approach -- 1 Introduction -- 2 Proposed Method -- 2.1 Data Collection -- 2.2 Image Preprocessing -- 2.3 Image Segmentation -- 2.4 Feature Extraction -- 2.5 Convolutional Neural Network (CNN) -- 2.6 U-Net Architecture -- 2.7 Callback Functions -- 3 Result and Discussion -- 3.1 Evaluation Metrics -- 3.2 Experimental Analysis and Result -- 3.3 Prediction of Tumor -- 4 Conclusion -- References -- 20 Cross-Modal Text-to-Video Retrieval Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 System Architecture -- 4 Methodology. 5 Model Implementation and Output. |
Record Nr. | UNINA-9910864194303321 |
Vimal Vrince | ||
Singapore : , : Springer Singapore Pte. Limited, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Network and System Security [[electronic resource] ] : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings / / edited by Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XIV, 540 p. 128 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data protection
Cryptography Data encryption (Computer science) Computer networks Electronic data processing—Management Computers and civilization Data and Information Security Cryptology Computer Communication Networks IT Operations Computers and Society |
ISBN | 3-319-46298-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited paper -- While Mobile Encounters with Clouds -- Authentication Mechanism -- Multi-Device Anonymous Authentication -- A Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism -- Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications -- Cloud Computing Security -- Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing -- An Energy-Efficient Task Scheduling Heuristic Algorithm without Virtual Machine Migration in Real-time Cloud Environments -- An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from the OSN in Mobile Cloud Platforms -- Data Mining for Security Application -- Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content Security -- Realtime DDoS detection in SIP Ecosystems: Machine Learning tools of the trade -- Digital Signature -- Two-in-One Oblivious Signatures Secure in the Random Oracle Model -- A New Transitive Signature Scheme -- Privacy-preserving Technologies -- Privacy-Preserving Profile Matching Protocol Considering Conditions -- Privacy Preserving Credit Systems -- Evading System-Calls Based Intrusion Detection Systems -- Network Security and Forensic -- HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks -- A Network Timestamp Verification Mechanism for Forensic Analysis -- Searchable Encryption -- An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords -- Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards -- A System of Shareable Keyword Search on Encrypted Data -- Security Policy and Access Control -- An Attribute Based Protection Model for JSON Documents -- The GURA-G Administrative Model for User and Group Attribute Assignment.-On the relationship between finite domain ABAM and PreUCONA -- Security Protocols -- MD-VCMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication -- Expressive Rating Scheme by Signatures with Predications on Ratees -- Symmetric Key Cryptography -- A New Adaptable Construction of Modulo Addition with Scalable Security for Stream Ciphers -- Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR -- System Security -- DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access Pattern -- PMFA: Toward Passive Message Fingerprint Attacks on Challenge-based Collaborative Intrusion Detection Networks -- Iris Cancellable Template Generation based on Indexing-First-One Hashing -- Web Security -- Detecting Malicious URLs Using Lexical Analysis -- Gatekeeping Behavior Analysis for Information Credibility Assessmenton Weibo -- Data Mining for Security Application (Short Paper) -- Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining -- Provable Seucirty (Short Paper) -- Improved Security Proofs for Modular Exponentiation Bits -- Security Protocol (Short Paper) -- Secure Outsourced Bilinear Pairings Computation for Mobile Devices -- The Design and Implementation of Multi-Dimensional Bloom Filter Storage Matrix. |
Record Nr. | UNISA-996466241303316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Network and System Security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings / / edited by Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XIV, 540 p. 128 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data protection
Cryptography Data encryption (Computer science) Computer networks Electronic data processing—Management Computers and civilization Data and Information Security Cryptology Computer Communication Networks IT Operations Computers and Society |
ISBN | 3-319-46298-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited paper -- While Mobile Encounters with Clouds -- Authentication Mechanism -- Multi-Device Anonymous Authentication -- A Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism -- Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications -- Cloud Computing Security -- Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing -- An Energy-Efficient Task Scheduling Heuristic Algorithm without Virtual Machine Migration in Real-time Cloud Environments -- An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from the OSN in Mobile Cloud Platforms -- Data Mining for Security Application -- Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content Security -- Realtime DDoS detection in SIP Ecosystems: Machine Learning tools of the trade -- Digital Signature -- Two-in-One Oblivious Signatures Secure in the Random Oracle Model -- A New Transitive Signature Scheme -- Privacy-preserving Technologies -- Privacy-Preserving Profile Matching Protocol Considering Conditions -- Privacy Preserving Credit Systems -- Evading System-Calls Based Intrusion Detection Systems -- Network Security and Forensic -- HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks -- A Network Timestamp Verification Mechanism for Forensic Analysis -- Searchable Encryption -- An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords -- Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards -- A System of Shareable Keyword Search on Encrypted Data -- Security Policy and Access Control -- An Attribute Based Protection Model for JSON Documents -- The GURA-G Administrative Model for User and Group Attribute Assignment.-On the relationship between finite domain ABAM and PreUCONA -- Security Protocols -- MD-VCMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication -- Expressive Rating Scheme by Signatures with Predications on Ratees -- Symmetric Key Cryptography -- A New Adaptable Construction of Modulo Addition with Scalable Security for Stream Ciphers -- Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR -- System Security -- DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access Pattern -- PMFA: Toward Passive Message Fingerprint Attacks on Challenge-based Collaborative Intrusion Detection Networks -- Iris Cancellable Template Generation based on Indexing-First-One Hashing -- Web Security -- Detecting Malicious URLs Using Lexical Analysis -- Gatekeeping Behavior Analysis for Information Credibility Assessmenton Weibo -- Data Mining for Security Application (Short Paper) -- Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining -- Provable Seucirty (Short Paper) -- Improved Security Proofs for Modular Exponentiation Bits -- Security Protocol (Short Paper) -- Secure Outsourced Bilinear Pairings Computation for Mobile Devices -- The Design and Implementation of Multi-Dimensional Bloom Filter Storage Matrix. |
Record Nr. | UNINA-9910484501503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of research and applications in artificial intelligence : RAAI 2020 / / edited by Indrajit Pan, Anirban Mukherjee, Vincenzo Piuri |
Pubbl/distr/stampa | Gateway East, Singapore : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (350 pages) |
Disciplina | 006.3 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico | Computational intelligence |
ISBN | 981-16-1543-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910484752703321 |
Gateway East, Singapore : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|