Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II |
Autore | Sun Xingming |
Pubbl/distr/stampa | Cham : , : Springer International Publishing AG, , 2021 |
Descrizione fisica | 1 online resource (766 pages) |
Disciplina | 006.3 |
Altri autori (Persone) |
ZhangXiaorui
XiaZhihua BertinoElisa |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Artificial intelligence
Intel·ligència artificial Computació en núvol Seguretat informàtica |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN | 3-030-78612-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910491029903321 |
Sun Xingming | ||
Cham : , : Springer International Publishing AG, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Artificial intelligence for cyber security : methods, issues and possible horizons or opportunities / / editors, Sanjay Misra, Amit Kumar Tyagi |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (467 pages) : illustrations (black and white, and colour) |
Disciplina | 005.8 |
Collana | Studies in computational intelligence |
Soggetto topico |
Computer security
Intel·ligència artificial Seguretat informàtica |
Soggetto genere / forma | Llibres electrònics |
ISBN | 3-030-72236-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910484984303321 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Blockchain technology : applications and challenges / / Sandeep Kumar Panda [and three others] editors |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (xiii, 300) |
Disciplina | 005.74 |
Collana | Intelligent Systems Reference Library |
Soggetto topico |
Blockchains (Databases)
Database security Cadena de blocs (Bases de dades) Seguretat informàtica |
Soggetto genere / forma | Llibres electrònics |
ISBN | 3-030-69395-3 |
Classificazione | 32.24.08 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910484611103321 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Blockchain technology and innovations in business processes / / Srikanta Patnaik [and three others], editors |
Pubbl/distr/stampa | Singapore : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (xiv, 237 pages) : illustrations |
Disciplina | 005.74 |
Collana | Smart innovation, systems, and technologies |
Soggetto topico |
Blockchains (Databases)
Business - Data processing Business - Data processing - Security measures Cadena de blocs (Bases de dades) Negocis Seguretat informàtica Gestió de bases de dades |
Soggetto genere / forma | Llibres electrònics |
ISBN | 981-336-470-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Editorial -- Contents -- About the Editors -- 1 Introduction to Blockchain Evolution, Architecture and Application with Use Cases -- 1.1 Layman's Introduction to Blockchain -- 1.2 The Blockchain Technology -- 1.3 Types of Blockchain -- 1.4 Evolution of Blockchain -- 1.4.1 Blockchain 1.0: Programmable Money and Cryptocurrencies -- 1.4.2 Blockchain 2.0: Smart Contracts -- 1.4.3 Blockchain 3.0: Decentralised Web -- 1.5 Ledger System for Blockchain -- 1.5.1 Centralized Ledger Systems -- 1.5.2 Distributed Ledger Systems -- 1.6 Layers of Blockchain -- 1.6.1 Hardware or Infrastructure Layer -- 1.6.2 Data Layer -- 1.6.3 Network Layer -- 1.6.4 Consensus Layer -- 1.6.5 Application Layer -- 1.7 Use Cases and Applications of Blockchain -- 1.8 Development Tools for Blockchain -- 1.9 Summary -- References -- 2 Blockchain: A Technology in Search of Legitimacy -- 2.1 Introduction -- 2.2 Theoretical Background -- 2.3 Research Design and Methodology -- 2.4 Results -- 2.5 Discussion and Conclusion -- References -- 3 Using Blockchain in Intermittently Connected Network Environments -- 3.1 Introduction -- 3.2 Overview of Delay Tolerant Networks -- 3.2.1 Features -- 3.2.2 Architecture -- 3.2.3 Routing -- 3.2.4 Applications -- 3.3 Rudimentary Elements of Blockchain -- 3.3.1 Blocks -- 3.3.2 Transaction -- 3.3.3 Mining -- 3.3.4 Ethereum and Smart Contracts -- 3.4 Integration of Blockchain Technology with DTNs -- 3.4.1 System Components -- 3.4.2 Generation and Transmission of Shelter Needs -- 3.4.3 Need Validation and Creation of Local Blockchain -- 3.4.4 Block Conversion Through API -- 3.4.5 Mining Blocks and Deploying to Global Blockchain -- 3.5 Open Research Areas -- 3.6 Conclusion -- References -- 4 Slaying the Crypto Dragons: Towards a CryptoSure Trust Model for Crypto-economics -- 4.1 Introduction: Blockchain and the Right to Be Forgotten.
4.2 The New 'Crypto-economy'-A Fraudsters' Playground? -- 4.3 Blockchain: Sceptical ICT Professionalism and Legal Due Diligence -- 4.4 The Need for Trusted Third Parties and for Probative Electronic Evidence -- 4.5 Towards a CryptoSure Trust Model for Crypto-economics -- 4.6 Conclusions: Blockchain Versus Trust-The Expert Issues in Disputes Over Crypto Assets -- 5 Decentralized Governance for Smart Contract Platform Enabling Mobile Lite Wallets Using a Proof-of-Stake Consensus Algorithm -- 5.1 Introduction -- 5.2 Preliminaries for Qtum Decentralized Blockchain Governance -- 5.3 Qtum Basic Requirement Sets for Decentralized Governance -- 5.3.1 UTXO Versus Account Model -- 5.3.2 Consensus Management -- 5.3.3 Mutualized Proof-of-Stake -- 5.3.4 AAL and EVM Integration -- 5.4 Scalability Extension of the Virtual Machine Through Decentralized Governance -- 5.4.1 Qtum Transaction Processing Using Virtual Machine -- 5.4.2 Decentralised Governance Protocol -- 5.5 Qtum Account Abstraction Layer -- 5.6 Discussion of the Technical Governance Realization -- 5.6.1 Hard fork Update -- 5.6.2 Qtum X86 Virtual Machine -- 5.7 Conclusions -- References -- 6 Blockchain Technology: Security and Privacy Issues -- 6.1 Introduction -- 6.2 Distributed Ledger Technology -- 6.2.1 Blockchain Benefits -- 6.2.2 How Blockchain Works -- 6.2.3 Consensus Algorithms -- 6.3 Blockchain Pros and Cons -- 6.4 Applications of Blockchain -- 6.4.1 Blockchain 1.0 -- 6.4.2 Blockchain 2.0 -- 6.5 Blockchain Security Issues -- 6.5.1 Cryptojacking Attacks -- 6.5.2 51% Attack -- 6.5.3 Smart Contract Attacks -- 6.6 Discussion -- 6.6.1 Voting and Blockchain -- 6.6.2 Energy and Blockchain -- 6.6.3 Web 3.0 and Blockchain -- 6.7 Conclusions -- References -- 7 Personal Data Protection in Blockchain with Zero-Knowledge Proof -- 7.1 Introduction -- 7.2 Related Works -- 7.3 Background About Blockchain. 7.4 Personal Data Protection and Blockchain -- 7.5 Zero-Knowledge Proof on Blockchain -- 7.5.1 Zerocoin Protocol -- 7.5.2 Zerocash Protocol -- 7.5.3 Zcash and Zk-SNARK -- 7.6 Conclusion -- References -- 8 Design and Verification of Privacy Patterns for Business Process Models -- 8.1 Introduction -- 8.2 A Privacy-Aware System Using Blockchain -- 8.2.1 Scenario: A Cloud-Based Order System -- 8.3 GDPR Verification -- 8.3.1 Design Time Verification -- 8.3.2 Runtime Verification -- 8.4 Experimental Results -- 8.4.1 Evaluation of Design Time Verification -- 8.4.2 Evaluation of Runtime Verification -- 8.5 Conclusion -- References -- 9 Blockchain Technology in Energy Field: Opportunities and Challenges -- 9.1 Introduction -- 9.2 Blockchain Solutions for Energy Internet -- 9.3 Application Scenarios of Blockchain Technology in the Energy Industry -- 9.4 Challenges -- 9.5 Conclusions -- References -- 10 BlockChainTechnology for Energy Transition -- 10.1 Introduction -- 10.2 What Is the "Energy Transition"? -- 10.2.1 Business Models in the Energy Sector -- 10.2.2 New Business Models for Energy Transition -- 10.3 BlockChain and Smart Contracts in the Energy Sector -- 10.3.1 Types of Applications of BlockChain and Smart Contracts in the Energy Sector -- 10.3.2 New Business Models Enabled by BlockChain in the Energy Market -- 10.3.3 Risks and Issues Related to BlockChain and Smart Contracts -- 10.4 The Framework -- 10.4.1 The Business Model Canvas -- 10.4.2 The Use Case Selection -- 10.4.3 Impact Analysis of the Two Selected Use Cases -- 10.4.4 The Business Models for the Use Cases -- 10.4.5 Microgrid Business Model (Elaborated After the Workshop) -- 10.4.6 Discussion of the Results -- 10.5 Current Trends and Future Scenarios -- 10.5.1 P2P Distributed Energy Trading for Residential Microgrids. 10.5.2 Bridging Industrial and Residential Microgrids Through Electric Vehicles -- 10.6 Conclusions -- References -- 11 The Feasibility and Significance of Employing Blockchain-Based Identity Solutions in Health Care -- 11.1 Introduction -- 11.2 A Brief History of Identities in the Digital Age -- 11.2.1 Fully Centralized Identity Management -- 11.2.2 Federated Identity Management -- 11.2.3 User-Centric Identity Management -- 11.3 The Main Ideas Behind Decentralized Identity Management -- 11.3.1 Decentralized Identifier Based on Blockchain -- 11.3.2 Zero-Knowledge Proof -- 11.3.3 Decentralized Blockchains and the Internet -- 11.4 The Technical Architecture of Decentralized Identity Management -- 11.4.1 Architecture Overview -- 11.4.2 Blockchain-Based DID Service -- 11.4.3 Standardization of DIDs -- 11.4.4 Examples of DID Frameworks -- 11.5 The Potential of Applying Blockchain-Based DID Solutions in Health Care -- 11.5.1 Addressing the Patient Mismatching Problem -- 11.5.2 Facilitating Patient Recruitment in Clinical Research Using DID -- 11.5.3 The Safer Use of Medical Devices -- 11.5.4 Limitations Facing Current Blockchain-Based DID Solutions -- 11.6 Conclusion -- References -- 12 Toward eHealth with Blockchain: Success Factors for Crowdfunding with ICOs -- 12.1 Introduction -- 12.2 Theoretical Background -- 12.2.1 eHealth -- 12.2.2 Initial Coin Offerings (ICOs) and Blockchain -- 12.2.3 Signaling Theory -- 12.3 Research Method -- 12.3.1 Related Work -- 12.4 Research Hypotheses -- 12.4.1 Data and Variables -- 12.5 Results and Discussion -- 12.5.1 Descriptive Statistics of the ICO Data -- 12.5.2 Multivariate Analysis of the Factors Influencing the Success -- 12.6 Discussion -- 12.7 Conclusion -- References -- 13 Blockchain Track and Trace System (BTTS) for Pharmaceutical Supply Chain -- 13.1 Introduction -- 13.2 Related Works. 13.3 Overview of Bitcoin, Blockchain Platforms and Smart Contracts -- 13.4 The Proposal Model -- 13.4.1 Structure of Blockchain Track and Trace System (BTTS) -- 13.4.2 The Proposed Smart Contracts -- 13.5 Conclusion and Future Works -- References. |
Record Nr. | UNINA-9910484502403321 |
Singapore : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer security and the Internet [[electronic resource] ] : tools and Jewels / / by Paul C. van Oorschot |
Autore | Van Oorschot Paul C |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (381 pages) |
Disciplina | 005.8 |
Collana | Information Security and Cryptography |
Soggetto topico |
Seguretat informàtica
Ordinadors - Disseny i funcionament Computer security System safety Computer organization Electrical engineering Application software Systems and Data Security Security Science and Technology Computer Systems Organization and Communication Networks Communications Engineering, Networks Information Systems Applications (incl. Internet) |
ISBN |
3-030-33649-2
9783030336493 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Basic Concepts and Principles -- Cryptographic Building Blocks -- User Authentication: Passwords, Biometrics and Alternatives -- Authentication Protocols and Key Establishment -- Operating System Security and Access Control -- Software Security: Exploits and Privilege Escalation -- Malicious Software -- Public-Key Certificate Management and Use Cases -- Web and Browser Security -- Firewalls and Tunnels -- Intrusion Detection and Network-Based Attacks -- Epilogue -- Index. |
Record Nr. | UNISA-996465472503316 |
Van Oorschot Paul C | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computer security and the Internet : tools and Jewels / / by Paul C. van Oorschot |
Autore | Van Oorschot Paul C |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (381 pages) |
Disciplina | 005.8 |
Collana | Information Security and Cryptography |
Soggetto topico |
Seguretat informàtica
Ordinadors - Disseny i funcionament Computer security System safety Computer organization Electrical engineering Application software Systems and Data Security Security Science and Technology Computer Systems Organization and Communication Networks Communications Engineering, Networks Information Systems Applications (incl. Internet) |
ISBN |
3-030-33649-2
9783030336493 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Basic Concepts and Principles -- Cryptographic Building Blocks -- User Authentication: Passwords, Biometrics and Alternatives -- Authentication Protocols and Key Establishment -- Operating System Security and Access Control -- Software Security: Exploits and Privilege Escalation -- Malicious Software -- Public-Key Certificate Management and Use Cases -- Web and Browser Security -- Firewalls and Tunnels -- Intrusion Detection and Network-Based Attacks -- Epilogue -- Index. |
Record Nr. | UNINA-9910409671203321 |
Van Oorschot Paul C | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Congress on intelligent systems . Volume 1 : proceedings of CIS 2020 / / Harish Sharma [and four others] editors |
Pubbl/distr/stampa | Gateway East, Singapore : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (789 pages) |
Disciplina | 006.3 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Artificial intelligence
Intel·ligència artificial Internet de les coses Seguretat informàtica Computació en núvol |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN | 981-336-981-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- About the Editors -- Modelling Subjective Happiness with a Survey Poisson Model and XGBoost Using an Economic Security Approach -- 1 Introduction -- 2 Data and Descriptive Statistics -- 3 Methodology -- 3.1 Survey Poisson Model -- 3.2 XGBoost -- 3.3 Missing Data -- 4 Results -- 4.1 Results of the Sensitivity Analysis of Missing Data -- 4.2 Predicted Subjective Happiness -- 4.3 Regression Analysis -- 5 Conclusions -- References -- Monitoring Web-Based Evaluation of Online Reputation in Barcelona -- 1 Introduction -- 2 Methodology Description -- 2.1 Principal Component Analysis -- 2.2 Robust Compositional Regression Model -- 3 Data Description -- 4 Discussion of Results -- 5 Conclusions and Managerial Implications -- Appendix 1: Abbreviation and Corresponding Meaning of Fig. 1 -- Appendix 2: Abbreviation and Corresponding Meaning of Fig. 2 -- References -- Information Technology for the Synthesis of Optimal Spatial Configurations with Visualization of the Decision-Making Process -- 1 Introduction -- 2 Basic Concepts and Definitions -- 3 Configuration Space of Geometric Objects Based on Geometric Information -- 4 Information Technology Model for the Synthesis of Spatial Configurations -- 5 The Software Package Description -- 6 An Example of Implementing the Results -- 7 Conclusion -- References -- Hybrid Approach to Combinatorial and Logic Graph Problems -- 1 Introduction -- 2 The Problem Description -- 3 The Hybrid Approach -- 4 Hybrid Three-Level Algorithm -- 5 Objective Function -- 6 Experiments -- 7 Conclusion -- References -- Energy-Efficient Algorithms Used in Datacenters: A Survey -- 1 Introduction -- 2 Techniques Used in Datacenters to Maintain Energy Efficiency -- 3 Energy Efficiency Metrics Used in Datacenters -- 4 Different Types of Algorithms Used in Datacenters -- 5 Related Work -- 6 Conclusion.
References -- Software Log Anomaly Detection Method Using HTM Algorithm -- 1 Introduction -- 2 Background -- 3 Proposed Method -- 3.1 Log Parser -- 3.2 Method Overview -- 4 Evaluation -- 4.1 Experiment Setting -- 4.2 Input Format -- 4.3 Results -- 5 Conclusion -- References -- Logical Inference in Predicate Calculus with the Definition of Previous Statements -- 1 Introduction -- 2 Definition of the Problem -- 2.1 Meaningful Definition of the Problem -- 2.2 Formal Definition of the Problem -- 3 Basic Processing Procedures -- 3.1 Partial "Disjuncts Division" -- 3.2 Complete "Disjunct Division" -- 4 Procedure of Inference -- 5 Method of Inference -- 6 Conclusion -- References -- Congestion Management Considering Demand Response Programs Using Multi-objective Grasshopper Optimization Algorithm -- 1 Introduction -- 2 Materials and Methods -- 2.1 Demand Response Programs Cost -- 3 Multi-objective Grasshopper Optimization Algorithm -- 4 Results and Discussions -- 5 Conclusion -- Appendix: Parameters of MOGOA -- References -- A Hardware Accelerator Implementation of Multilayer Perceptron -- 1 Introduction -- 2 Literature Review -- 3 FFNN Computation Algorithm -- 4 Hardware Architecture -- 4.1 Neural Processing Element -- 4.2 Activation Function Block (AFB) -- 4.3 Network Control Sequences -- 4.4 Number of Clock Cycles of Execution -- 5 Results and Discussion -- 5.1 Hardware Blocks -- 5.2 Hardware Architecture of 3times3times2 MLP -- 5.3 Resource Utilization and Performance Evaluation -- 6 Application -- 7 Conclusion -- References -- Building a Classifier of Behavior Patterns for Semantic Search Based on Cuckoo Search Meta-heuristics -- 1 Introduction -- 2 Formulation of the Problem -- 3 Method for Building the Classifier of Behavior Pattern -- 4 Bio-inspired Algorithm Based on Cuckoo Search -- 5 Experimental Research -- 6 Conclusion -- References. TETRA Enhancement Based on Adaptive Modulation -- 1 Introduction -- 2 The Proposed TETRA Modules Layers -- 3 The Proposed TETRA System Structure -- 4 Proposal Frame of Adaptive TETRA System -- 5 Simulation and Results -- 6 Conclusion -- References -- Dynamic Stability Enhancement of Grid Connected Wind System Using Grey Wolf Optimization Technique -- 1 Introduction -- 2 Grid Connected Wind Turbine System -- 3 Modeling of SMEs System -- 3.1 Modeling of VSC -- 3.2 Modeling of Chopper -- 4 Grey Wolf Optimization (GWO) Technique -- 5 Control Strategy of Wind System Using GWO -- 6 Simulation Results -- 7 Conclusion -- References -- A Comparative Analysis on Wide-Area Power System Control with Mitigation the Effects of an Imperfect Medium -- 1 Introduction -- 2 Modelling of the Test Power System -- 2.1 Kundur's Two-Area Four-Machine Test System -- 2.2 Selection of Control Location and Wide-Area Remote Signal -- 3 Control Techniques -- 3.1 Conventional PSS (CPSS) -- 3.2 Multi-band-based PSS (MB-PSS4B) -- 3.3 Linear Quadratic Gaussian (LQG) Controller -- 4 Noise in System -- 5 Results and Discussions -- 6 Conclusions -- References -- Adware Attack Detection on IoT Devices Using Deep Logistic Regression SVM (DL-SVM-IoT) -- 1 Introduction -- 2 Related Work -- 3 Theoretical Background -- 3.1 Delineation of IoT Adware Attacks Classification and Identification Using (DL-SVM-IoT) -- 4 Experimental Results and Comparison -- 5 Conclusion and Future Work -- References -- Intrusion Detection System for Securing Computer Networks Using Machine Learning: A Literature Review -- 1 Introduction -- 1.1 Machine Learning for IDS -- 1.2 Types of IDS -- 2 Review Questions -- 3 Papers in Review -- 4 Discussions -- 5 Conclusion -- References -- An Exploration of Entropy Techniques for Envisioning Announcement Period of Open Source Software -- 1 Introduction. 1.1 Information Measures -- 2 Predicting Bugs and Estimating Release Time of Software -- 3 Conclusion -- References -- Occurrence Prediction of Pests and Diseases in Rice of Weather Factors Using Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Data Collection -- 3.2 Data Preprocessing -- 3.3 Modeling of Data for Testing and Training Purpose -- 3.4 Machine Learning -- 4 Results -- 5 Conclusion -- 6 Future Scope -- References -- A Literature Review on Generative Adversarial Networks with Its Applications in Healthcare -- 1 Introduction -- 2 What are Generative Adversarial Networks or GANs -- 2.1 Generative Model -- 2.2 Discriminative Model -- 3 Applications of GANs or Generative Adversarial Networks in Healthcare -- 3.1 Electronic Health Record -- 3.2 Retinal Image Synthesis -- 3.3 Skin Lesion Analysis -- 3.4 Medical Image Segmentation -- 4 Discussion -- 4.1 Advantages -- 4.2 Disadvantages -- 4.3 Future Scope -- 5 Conclusion -- References -- A Federated Search System for Online Property Listings Based on SIFT Algorithm -- 1 Introduction -- 2 Online Federated Search System -- 2.1 Source Crawling -- 2.2 Collection Creation -- 2.3 User Interface -- 3 Implementing the Property Federated Search System -- 4 Evaluation and Discussions -- 5 Conclusions -- References -- Digital Brain Building a Key to Improve Cognitive Functions by an EEG-Controlled Videogames as Interactive Learning Platform -- 1 Introduction -- 1.1 User State Monitoring -- 1.2 Neurogaming Using NeuroSky -- 1.3 EEG Acquisition -- 1.4 Neuroergonomics Application -- 2 Methodology -- 2.1 Mathematical Model -- 2.2 Neurogame and Educational Concept -- 2.3 Brain Runner -- 2.4 Hybrid BCI -- 2.5 Interactive Session -- 3 Results -- 4 Conclusion -- References -- Intelligent Car Cabin Safety System Through IoT Application -- 1 Introduction -- 2 IoT (Internet of Things). 3 System Description and Principal -- 4 Methodology -- 5 Results and Discussions -- 6 Conclusions -- References -- Utilization of Delmia Software for Saving Cycle Time in Robotics Spot Welding -- 1 Introduction -- 2 Problem Statement -- 3 Evolutionary Approach -- 4 Simulation Experiments -- 5 Conclusion -- References -- Data Protection Techniques Over Multi-cloud Environment-A Review -- 1 Introduction -- 2 Literature Survey -- 3 Comparative Analysis or Research Scope -- 4 Visibility of Comparative Study -- 4.1 Description of Different Cloud Framework Used -- 4.2 Issued Addressed -- 4.3 Benefits -- 5 Identified Gaps in Literature Survey -- 6 Mathematical Model -- 7 Proposed Methodology or Related Work -- 8 Conclusion -- References -- Hierarchical Ontology Based on Word Sense Disambiguation of English to Hindi Language -- 1 Introduction -- 2 Proposed Methodology -- 3 Preprocessing of English/Hindi Questions File and Dictionary -- 3.1 Preprocessing -- 3.2 Dictionary Preprocessing -- 4 Ontology Development Module -- 4.1 Collection of Senses -- 4.2 Calculation of Weight TF -- 4.3 Hierarchical Ontology -- 5 Proposed Hierarchical Ontology Algorithm -- 5.1 Proposed Algorithm -- 6 Experiment and Results -- 7 Conclusion -- References -- Review Paper: Error Detection and Correction Onboard Nanosatellites -- 1 Introduction -- 2 Methodology -- 2.1 Space Radiation -- 2.2 Glitches and Upsets -- 2.3 Geomagnetism -- 2.4 EDAC Schemes -- 2.5 Implementing EDAC Systems -- 3 Discussion -- 4 Conclusion -- References -- Kerala Floods: Twitter Analysis Using Deep Learning Techniques -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Cleaning -- 3.3 Data Labeling -- 3.4 Data Division and Separation -- 4 Implementation and Results -- 5 Conclusion -- References -- An Improved DVFS Circuit & -- Error Correction Technique -- 1 Introduction. 2 Charge Pump Circuit. |
Record Nr. | UNINA-9910483511903321 |
Gateway East, Singapore : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Congress on intelligent systems : proceedings of CIS 2020 / / editors, Harish Sharma [and four others] |
Pubbl/distr/stampa | Gateway East, Singapore : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (785 pages) |
Disciplina | 006.3 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Artificial intelligence
Computational intelligence Automatic control Intel·ligència artificial Internet de les coses Seguretat informàtica |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN | 981-336-984-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910484352603321 |
Gateway East, Singapore : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber security intelligence and analytics : 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA2021) / / Zheng Xu [and three others], editors |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (952 pages) |
Disciplina | 005.8 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Computer security
Computer networks - Security measures Seguretat informàtica Seguretat de les xarxes d'ordinadors |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN | 3-030-70042-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910483270103321 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber security intelligence and analytics : 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA2021) . Volume 2 / / editors, Zheng Xu [et al.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (1,016 pages) |
Disciplina | 005.8 |
Collana | Advances in intelligent systems and computing |
Soggetto topico |
Computer security
Seguretat informàtica Seguretat de les xarxes d'ordinadors |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN | 3-030-69999-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910484088103321 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|