top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II
Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II
Autore Sun Xingming
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2021
Descrizione fisica 1 online resource (766 pages)
Disciplina 006.3
Altri autori (Persone) ZhangXiaorui
XiaZhihua
BertinoElisa
Collana Lecture Notes in Computer Science
Soggetto topico Artificial intelligence
Intel·ligència artificial
Computació en núvol
Seguretat informàtica
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-030-78612-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910491029903321
Sun Xingming  
Cham : , : Springer International Publishing AG, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Artificial intelligence for cyber security : methods, issues and possible horizons or opportunities / / editors, Sanjay Misra, Amit Kumar Tyagi
Artificial intelligence for cyber security : methods, issues and possible horizons or opportunities / / editors, Sanjay Misra, Amit Kumar Tyagi
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (467 pages) : illustrations (black and white, and colour)
Disciplina 005.8
Collana Studies in computational intelligence
Soggetto topico Computer security
Intel·ligència artificial
Seguretat informàtica
Soggetto genere / forma Llibres electrònics
ISBN 3-030-72236-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910484984303321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Blockchain technology : applications and challenges / / Sandeep Kumar Panda [and three others] editors
Blockchain technology : applications and challenges / / Sandeep Kumar Panda [and three others] editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (xiii, 300)
Disciplina 005.74
Collana Intelligent Systems Reference Library
Soggetto topico Blockchains (Databases)
Database security
Cadena de blocs (Bases de dades)
Seguretat informàtica
Soggetto genere / forma Llibres electrònics
ISBN 3-030-69395-3
Classificazione 32.24.08
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910484611103321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Blockchain technology and innovations in business processes / / Srikanta Patnaik [and three others], editors
Blockchain technology and innovations in business processes / / Srikanta Patnaik [and three others], editors
Pubbl/distr/stampa Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (xiv, 237 pages) : illustrations
Disciplina 005.74
Collana Smart innovation, systems, and technologies
Soggetto topico Blockchains (Databases)
Business - Data processing
Business - Data processing - Security measures
Cadena de blocs (Bases de dades)
Negocis
Seguretat informàtica
Gestió de bases de dades
Soggetto genere / forma Llibres electrònics
ISBN 981-336-470-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Editorial -- Contents -- About the Editors -- 1 Introduction to Blockchain Evolution, Architecture and Application with Use Cases -- 1.1 Layman's Introduction to Blockchain -- 1.2 The Blockchain Technology -- 1.3 Types of Blockchain -- 1.4 Evolution of Blockchain -- 1.4.1 Blockchain 1.0: Programmable Money and Cryptocurrencies -- 1.4.2 Blockchain 2.0: Smart Contracts -- 1.4.3 Blockchain 3.0: Decentralised Web -- 1.5 Ledger System for Blockchain -- 1.5.1 Centralized Ledger Systems -- 1.5.2 Distributed Ledger Systems -- 1.6 Layers of Blockchain -- 1.6.1 Hardware or Infrastructure Layer -- 1.6.2 Data Layer -- 1.6.3 Network Layer -- 1.6.4 Consensus Layer -- 1.6.5 Application Layer -- 1.7 Use Cases and Applications of Blockchain -- 1.8 Development Tools for Blockchain -- 1.9 Summary -- References -- 2 Blockchain: A Technology in Search of Legitimacy -- 2.1 Introduction -- 2.2 Theoretical Background -- 2.3 Research Design and Methodology -- 2.4 Results -- 2.5 Discussion and Conclusion -- References -- 3 Using Blockchain in Intermittently Connected Network Environments -- 3.1 Introduction -- 3.2 Overview of Delay Tolerant Networks -- 3.2.1 Features -- 3.2.2 Architecture -- 3.2.3 Routing -- 3.2.4 Applications -- 3.3 Rudimentary Elements of Blockchain -- 3.3.1 Blocks -- 3.3.2 Transaction -- 3.3.3 Mining -- 3.3.4 Ethereum and Smart Contracts -- 3.4 Integration of Blockchain Technology with DTNs -- 3.4.1 System Components -- 3.4.2 Generation and Transmission of Shelter Needs -- 3.4.3 Need Validation and Creation of Local Blockchain -- 3.4.4 Block Conversion Through API -- 3.4.5 Mining Blocks and Deploying to Global Blockchain -- 3.5 Open Research Areas -- 3.6 Conclusion -- References -- 4 Slaying the Crypto Dragons: Towards a CryptoSure Trust Model for Crypto-economics -- 4.1 Introduction: Blockchain and the Right to Be Forgotten.
4.2 The New 'Crypto-economy'-A Fraudsters' Playground? -- 4.3 Blockchain: Sceptical ICT Professionalism and Legal Due Diligence -- 4.4 The Need for Trusted Third Parties and for Probative Electronic Evidence -- 4.5 Towards a CryptoSure Trust Model for Crypto-economics -- 4.6 Conclusions: Blockchain Versus Trust-The Expert Issues in Disputes Over Crypto Assets -- 5 Decentralized Governance for Smart Contract Platform Enabling Mobile Lite Wallets Using a Proof-of-Stake Consensus Algorithm -- 5.1 Introduction -- 5.2 Preliminaries for Qtum Decentralized Blockchain Governance -- 5.3 Qtum Basic Requirement Sets for Decentralized Governance -- 5.3.1 UTXO Versus Account Model -- 5.3.2 Consensus Management -- 5.3.3 Mutualized Proof-of-Stake -- 5.3.4 AAL and EVM Integration -- 5.4 Scalability Extension of the Virtual Machine Through Decentralized Governance -- 5.4.1 Qtum Transaction Processing Using Virtual Machine -- 5.4.2 Decentralised Governance Protocol -- 5.5 Qtum Account Abstraction Layer -- 5.6 Discussion of the Technical Governance Realization -- 5.6.1 Hard fork Update -- 5.6.2 Qtum X86 Virtual Machine -- 5.7 Conclusions -- References -- 6 Blockchain Technology: Security and Privacy Issues -- 6.1 Introduction -- 6.2 Distributed Ledger Technology -- 6.2.1 Blockchain Benefits -- 6.2.2 How Blockchain Works -- 6.2.3 Consensus Algorithms -- 6.3 Blockchain Pros and Cons -- 6.4 Applications of Blockchain -- 6.4.1 Blockchain 1.0 -- 6.4.2 Blockchain 2.0 -- 6.5 Blockchain Security Issues -- 6.5.1 Cryptojacking Attacks -- 6.5.2 51% Attack -- 6.5.3 Smart Contract Attacks -- 6.6 Discussion -- 6.6.1 Voting and Blockchain -- 6.6.2 Energy and Blockchain -- 6.6.3 Web 3.0 and Blockchain -- 6.7 Conclusions -- References -- 7 Personal Data Protection in Blockchain with Zero-Knowledge Proof -- 7.1 Introduction -- 7.2 Related Works -- 7.3 Background About Blockchain.
7.4 Personal Data Protection and Blockchain -- 7.5 Zero-Knowledge Proof on Blockchain -- 7.5.1 Zerocoin Protocol -- 7.5.2 Zerocash Protocol -- 7.5.3 Zcash and Zk-SNARK -- 7.6 Conclusion -- References -- 8 Design and Verification of Privacy Patterns for Business Process Models -- 8.1 Introduction -- 8.2 A Privacy-Aware System Using Blockchain -- 8.2.1 Scenario: A Cloud-Based Order System -- 8.3 GDPR Verification -- 8.3.1 Design Time Verification -- 8.3.2 Runtime Verification -- 8.4 Experimental Results -- 8.4.1 Evaluation of Design Time Verification -- 8.4.2 Evaluation of Runtime Verification -- 8.5 Conclusion -- References -- 9 Blockchain Technology in Energy Field: Opportunities and Challenges -- 9.1 Introduction -- 9.2 Blockchain Solutions for Energy Internet -- 9.3 Application Scenarios of Blockchain Technology in the Energy Industry -- 9.4 Challenges -- 9.5 Conclusions -- References -- 10 BlockChainTechnology for Energy Transition -- 10.1 Introduction -- 10.2 What Is the "Energy Transition"? -- 10.2.1 Business Models in the Energy Sector -- 10.2.2 New Business Models for Energy Transition -- 10.3 BlockChain and Smart Contracts in the Energy Sector -- 10.3.1 Types of Applications of BlockChain and Smart Contracts in the Energy Sector -- 10.3.2 New Business Models Enabled by BlockChain in the Energy Market -- 10.3.3 Risks and Issues Related to BlockChain and Smart Contracts -- 10.4 The Framework -- 10.4.1 The Business Model Canvas -- 10.4.2 The Use Case Selection -- 10.4.3 Impact Analysis of the Two Selected Use Cases -- 10.4.4 The Business Models for the Use Cases -- 10.4.5 Microgrid Business Model (Elaborated After the Workshop) -- 10.4.6 Discussion of the Results -- 10.5 Current Trends and Future Scenarios -- 10.5.1 P2P Distributed Energy Trading for Residential Microgrids.
10.5.2 Bridging Industrial and Residential Microgrids Through Electric Vehicles -- 10.6 Conclusions -- References -- 11 The Feasibility and Significance of Employing Blockchain-Based Identity Solutions in Health Care -- 11.1 Introduction -- 11.2 A Brief History of Identities in the Digital Age -- 11.2.1 Fully Centralized Identity Management -- 11.2.2 Federated Identity Management -- 11.2.3 User-Centric Identity Management -- 11.3 The Main Ideas Behind Decentralized Identity Management -- 11.3.1 Decentralized Identifier Based on Blockchain -- 11.3.2 Zero-Knowledge Proof -- 11.3.3 Decentralized Blockchains and the Internet -- 11.4 The Technical Architecture of Decentralized Identity Management -- 11.4.1 Architecture Overview -- 11.4.2 Blockchain-Based DID Service -- 11.4.3 Standardization of DIDs -- 11.4.4 Examples of DID Frameworks -- 11.5 The Potential of Applying Blockchain-Based DID Solutions in Health Care -- 11.5.1 Addressing the Patient Mismatching Problem -- 11.5.2 Facilitating Patient Recruitment in Clinical Research Using DID -- 11.5.3 The Safer Use of Medical Devices -- 11.5.4 Limitations Facing Current Blockchain-Based DID Solutions -- 11.6 Conclusion -- References -- 12 Toward eHealth with Blockchain: Success Factors for Crowdfunding with ICOs -- 12.1 Introduction -- 12.2 Theoretical Background -- 12.2.1 eHealth -- 12.2.2 Initial Coin Offerings (ICOs) and Blockchain -- 12.2.3 Signaling Theory -- 12.3 Research Method -- 12.3.1 Related Work -- 12.4 Research Hypotheses -- 12.4.1 Data and Variables -- 12.5 Results and Discussion -- 12.5.1 Descriptive Statistics of the ICO Data -- 12.5.2 Multivariate Analysis of the Factors Influencing the Success -- 12.6 Discussion -- 12.7 Conclusion -- References -- 13 Blockchain Track and Trace System (BTTS) for Pharmaceutical Supply Chain -- 13.1 Introduction -- 13.2 Related Works.
13.3 Overview of Bitcoin, Blockchain Platforms and Smart Contracts -- 13.4 The Proposal Model -- 13.4.1 Structure of Blockchain Track and Trace System (BTTS) -- 13.4.2 The Proposed Smart Contracts -- 13.5 Conclusion and Future Works -- References.
Record Nr. UNINA-9910484502403321
Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer security and the Internet [[electronic resource] ] : tools and Jewels / / by Paul C. van Oorschot
Computer security and the Internet [[electronic resource] ] : tools and Jewels / / by Paul C. van Oorschot
Autore Van Oorschot Paul C
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (381 pages)
Disciplina 005.8
Collana Information Security and Cryptography
Soggetto topico Seguretat informàtica
Ordinadors - Disseny i funcionament
Computer security
System safety
Computer organization
Electrical engineering
Application software
Systems and Data Security
Security Science and Technology
Computer Systems Organization and Communication Networks
Communications Engineering, Networks
Information Systems Applications (incl. Internet)
ISBN 3-030-33649-2
9783030336493
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Basic Concepts and Principles -- Cryptographic Building Blocks -- User Authentication: Passwords, Biometrics and Alternatives -- Authentication Protocols and Key Establishment -- Operating System Security and Access Control -- Software Security: Exploits and Privilege Escalation -- Malicious Software -- Public-Key Certificate Management and Use Cases -- Web and Browser Security -- Firewalls and Tunnels -- Intrusion Detection and Network-Based Attacks -- Epilogue -- Index.
Record Nr. UNISA-996465472503316
Van Oorschot Paul C  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer security and the Internet : tools and Jewels / / by Paul C. van Oorschot
Computer security and the Internet : tools and Jewels / / by Paul C. van Oorschot
Autore Van Oorschot Paul C
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (381 pages)
Disciplina 005.8
Collana Information Security and Cryptography
Soggetto topico Seguretat informàtica
Ordinadors - Disseny i funcionament
Computer security
System safety
Computer organization
Electrical engineering
Application software
Systems and Data Security
Security Science and Technology
Computer Systems Organization and Communication Networks
Communications Engineering, Networks
Information Systems Applications (incl. Internet)
ISBN 3-030-33649-2
9783030336493
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Basic Concepts and Principles -- Cryptographic Building Blocks -- User Authentication: Passwords, Biometrics and Alternatives -- Authentication Protocols and Key Establishment -- Operating System Security and Access Control -- Software Security: Exploits and Privilege Escalation -- Malicious Software -- Public-Key Certificate Management and Use Cases -- Web and Browser Security -- Firewalls and Tunnels -- Intrusion Detection and Network-Based Attacks -- Epilogue -- Index.
Record Nr. UNINA-9910409671203321
Van Oorschot Paul C  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Congress on intelligent systems . Volume 1 : proceedings of CIS 2020 / / Harish Sharma [and four others] editors
Congress on intelligent systems . Volume 1 : proceedings of CIS 2020 / / Harish Sharma [and four others] editors
Pubbl/distr/stampa Gateway East, Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (789 pages)
Disciplina 006.3
Collana Advances in Intelligent Systems and Computing
Soggetto topico Artificial intelligence
Intel·ligència artificial
Internet de les coses
Seguretat informàtica
Computació en núvol
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 981-336-981-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- About the Editors -- Modelling Subjective Happiness with a Survey Poisson Model and XGBoost Using an Economic Security Approach -- 1 Introduction -- 2 Data and Descriptive Statistics -- 3 Methodology -- 3.1 Survey Poisson Model -- 3.2 XGBoost -- 3.3 Missing Data -- 4 Results -- 4.1 Results of the Sensitivity Analysis of Missing Data -- 4.2 Predicted Subjective Happiness -- 4.3 Regression Analysis -- 5 Conclusions -- References -- Monitoring Web-Based Evaluation of Online Reputation in Barcelona -- 1 Introduction -- 2 Methodology Description -- 2.1 Principal Component Analysis -- 2.2 Robust Compositional Regression Model -- 3 Data Description -- 4 Discussion of Results -- 5 Conclusions and Managerial Implications -- Appendix 1: Abbreviation and Corresponding Meaning of Fig. 1 -- Appendix 2: Abbreviation and Corresponding Meaning of Fig. 2 -- References -- Information Technology for the Synthesis of Optimal Spatial Configurations with Visualization of the Decision-Making Process -- 1 Introduction -- 2 Basic Concepts and Definitions -- 3 Configuration Space of Geometric Objects Based on Geometric Information -- 4 Information Technology Model for the Synthesis of Spatial Configurations -- 5 The Software Package Description -- 6 An Example of Implementing the Results -- 7 Conclusion -- References -- Hybrid Approach to Combinatorial and Logic Graph Problems -- 1 Introduction -- 2 The Problem Description -- 3 The Hybrid Approach -- 4 Hybrid Three-Level Algorithm -- 5 Objective Function -- 6 Experiments -- 7 Conclusion -- References -- Energy-Efficient Algorithms Used in Datacenters: A Survey -- 1 Introduction -- 2 Techniques Used in Datacenters to Maintain Energy Efficiency -- 3 Energy Efficiency Metrics Used in Datacenters -- 4 Different Types of Algorithms Used in Datacenters -- 5 Related Work -- 6 Conclusion.
References -- Software Log Anomaly Detection Method Using HTM Algorithm -- 1 Introduction -- 2 Background -- 3 Proposed Method -- 3.1 Log Parser -- 3.2 Method Overview -- 4 Evaluation -- 4.1 Experiment Setting -- 4.2 Input Format -- 4.3 Results -- 5 Conclusion -- References -- Logical Inference in Predicate Calculus with the Definition of Previous Statements -- 1 Introduction -- 2 Definition of the Problem -- 2.1 Meaningful Definition of the Problem -- 2.2 Formal Definition of the Problem -- 3 Basic Processing Procedures -- 3.1 Partial "Disjuncts Division" -- 3.2 Complete "Disjunct Division" -- 4 Procedure of Inference -- 5 Method of Inference -- 6 Conclusion -- References -- Congestion Management Considering Demand Response Programs Using Multi-objective Grasshopper Optimization Algorithm -- 1 Introduction -- 2 Materials and Methods -- 2.1 Demand Response Programs Cost -- 3 Multi-objective Grasshopper Optimization Algorithm -- 4 Results and Discussions -- 5 Conclusion -- Appendix: Parameters of MOGOA -- References -- A Hardware Accelerator Implementation of Multilayer Perceptron -- 1 Introduction -- 2 Literature Review -- 3 FFNN Computation Algorithm -- 4 Hardware Architecture -- 4.1 Neural Processing Element -- 4.2 Activation Function Block (AFB) -- 4.3 Network Control Sequences -- 4.4 Number of Clock Cycles of Execution -- 5 Results and Discussion -- 5.1 Hardware Blocks -- 5.2 Hardware Architecture of 3times3times2 MLP -- 5.3 Resource Utilization and Performance Evaluation -- 6 Application -- 7 Conclusion -- References -- Building a Classifier of Behavior Patterns for Semantic Search Based on Cuckoo Search Meta-heuristics -- 1 Introduction -- 2 Formulation of the Problem -- 3 Method for Building the Classifier of Behavior Pattern -- 4 Bio-inspired Algorithm Based on Cuckoo Search -- 5 Experimental Research -- 6 Conclusion -- References.
TETRA Enhancement Based on Adaptive Modulation -- 1 Introduction -- 2 The Proposed TETRA Modules Layers -- 3 The Proposed TETRA System Structure -- 4 Proposal Frame of Adaptive TETRA System -- 5 Simulation and Results -- 6 Conclusion -- References -- Dynamic Stability Enhancement of Grid Connected Wind System Using Grey Wolf Optimization Technique -- 1 Introduction -- 2 Grid Connected Wind Turbine System -- 3 Modeling of SMEs System -- 3.1 Modeling of VSC -- 3.2 Modeling of Chopper -- 4 Grey Wolf Optimization (GWO) Technique -- 5 Control Strategy of Wind System Using GWO -- 6 Simulation Results -- 7 Conclusion -- References -- A Comparative Analysis on Wide-Area Power System Control with Mitigation the Effects of an Imperfect Medium -- 1 Introduction -- 2 Modelling of the Test Power System -- 2.1 Kundur's Two-Area Four-Machine Test System -- 2.2 Selection of Control Location and Wide-Area Remote Signal -- 3 Control Techniques -- 3.1 Conventional PSS (CPSS) -- 3.2 Multi-band-based PSS (MB-PSS4B) -- 3.3 Linear Quadratic Gaussian (LQG) Controller -- 4 Noise in System -- 5 Results and Discussions -- 6 Conclusions -- References -- Adware Attack Detection on IoT Devices Using Deep Logistic Regression SVM (DL-SVM-IoT) -- 1 Introduction -- 2 Related Work -- 3 Theoretical Background -- 3.1 Delineation of IoT Adware Attacks Classification and Identification Using (DL-SVM-IoT) -- 4 Experimental Results and Comparison -- 5 Conclusion and Future Work -- References -- Intrusion Detection System for Securing Computer Networks Using Machine Learning: A Literature Review -- 1 Introduction -- 1.1 Machine Learning for IDS -- 1.2 Types of IDS -- 2 Review Questions -- 3 Papers in Review -- 4 Discussions -- 5 Conclusion -- References -- An Exploration of Entropy Techniques for Envisioning Announcement Period of Open Source Software -- 1 Introduction.
1.1 Information Measures -- 2 Predicting Bugs and Estimating Release Time of Software -- 3 Conclusion -- References -- Occurrence Prediction of Pests and Diseases in Rice of Weather Factors Using Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Data Collection -- 3.2 Data Preprocessing -- 3.3 Modeling of Data for Testing and Training Purpose -- 3.4 Machine Learning -- 4 Results -- 5 Conclusion -- 6 Future Scope -- References -- A Literature Review on Generative Adversarial Networks with Its Applications in Healthcare -- 1 Introduction -- 2 What are Generative Adversarial Networks or GANs -- 2.1 Generative Model -- 2.2 Discriminative Model -- 3 Applications of GANs or Generative Adversarial Networks in Healthcare -- 3.1 Electronic Health Record -- 3.2 Retinal Image Synthesis -- 3.3 Skin Lesion Analysis -- 3.4 Medical Image Segmentation -- 4 Discussion -- 4.1 Advantages -- 4.2 Disadvantages -- 4.3 Future Scope -- 5 Conclusion -- References -- A Federated Search System for Online Property Listings Based on SIFT Algorithm -- 1 Introduction -- 2 Online Federated Search System -- 2.1 Source Crawling -- 2.2 Collection Creation -- 2.3 User Interface -- 3 Implementing the Property Federated Search System -- 4 Evaluation and Discussions -- 5 Conclusions -- References -- Digital Brain Building a Key to Improve Cognitive Functions by an EEG-Controlled Videogames as Interactive Learning Platform -- 1 Introduction -- 1.1 User State Monitoring -- 1.2 Neurogaming Using NeuroSky -- 1.3 EEG Acquisition -- 1.4 Neuroergonomics Application -- 2 Methodology -- 2.1 Mathematical Model -- 2.2 Neurogame and Educational Concept -- 2.3 Brain Runner -- 2.4 Hybrid BCI -- 2.5 Interactive Session -- 3 Results -- 4 Conclusion -- References -- Intelligent Car Cabin Safety System Through IoT Application -- 1 Introduction -- 2 IoT (Internet of Things).
3 System Description and Principal -- 4 Methodology -- 5 Results and Discussions -- 6 Conclusions -- References -- Utilization of Delmia Software for Saving Cycle Time in Robotics Spot Welding -- 1 Introduction -- 2 Problem Statement -- 3 Evolutionary Approach -- 4 Simulation Experiments -- 5 Conclusion -- References -- Data Protection Techniques Over Multi-cloud Environment-A Review -- 1 Introduction -- 2 Literature Survey -- 3 Comparative Analysis or Research Scope -- 4 Visibility of Comparative Study -- 4.1 Description of Different Cloud Framework Used -- 4.2 Issued Addressed -- 4.3 Benefits -- 5 Identified Gaps in Literature Survey -- 6 Mathematical Model -- 7 Proposed Methodology or Related Work -- 8 Conclusion -- References -- Hierarchical Ontology Based on Word Sense Disambiguation of English to Hindi Language -- 1 Introduction -- 2 Proposed Methodology -- 3 Preprocessing of English/Hindi Questions File and Dictionary -- 3.1 Preprocessing -- 3.2 Dictionary Preprocessing -- 4 Ontology Development Module -- 4.1 Collection of Senses -- 4.2 Calculation of Weight TF -- 4.3 Hierarchical Ontology -- 5 Proposed Hierarchical Ontology Algorithm -- 5.1 Proposed Algorithm -- 6 Experiment and Results -- 7 Conclusion -- References -- Review Paper: Error Detection and Correction Onboard Nanosatellites -- 1 Introduction -- 2 Methodology -- 2.1 Space Radiation -- 2.2 Glitches and Upsets -- 2.3 Geomagnetism -- 2.4 EDAC Schemes -- 2.5 Implementing EDAC Systems -- 3 Discussion -- 4 Conclusion -- References -- Kerala Floods: Twitter Analysis Using Deep Learning Techniques -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Cleaning -- 3.3 Data Labeling -- 3.4 Data Division and Separation -- 4 Implementation and Results -- 5 Conclusion -- References -- An Improved DVFS Circuit & -- Error Correction Technique -- 1 Introduction.
2 Charge Pump Circuit.
Record Nr. UNINA-9910483511903321
Gateway East, Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Congress on intelligent systems : proceedings of CIS 2020 / / editors, Harish Sharma [and four others]
Congress on intelligent systems : proceedings of CIS 2020 / / editors, Harish Sharma [and four others]
Pubbl/distr/stampa Gateway East, Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (785 pages)
Disciplina 006.3
Collana Advances in Intelligent Systems and Computing
Soggetto topico Artificial intelligence
Computational intelligence
Automatic control
Intel·ligència artificial
Internet de les coses
Seguretat informàtica
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 981-336-984-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910484352603321
Gateway East, Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber security intelligence and analytics : 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA2021) / / Zheng Xu [and three others], editors
Cyber security intelligence and analytics : 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA2021) / / Zheng Xu [and three others], editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (952 pages)
Disciplina 005.8
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computer security
Computer networks - Security measures
Seguretat informàtica
Seguretat de les xarxes d'ordinadors
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-030-70042-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910483270103321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber security intelligence and analytics : 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA2021) . Volume 2 / / editors, Zheng Xu [et al.]
Cyber security intelligence and analytics : 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA2021) . Volume 2 / / editors, Zheng Xu [et al.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (1,016 pages)
Disciplina 005.8
Collana Advances in intelligent systems and computing
Soggetto topico Computer security
Seguretat informàtica
Seguretat de les xarxes d'ordinadors
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-030-69999-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910484088103321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui