top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Ad-hoc, Mobile, and Wireless Networks [[electronic resource] ] : 16th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2017, Messina, Italy, September 20-22, 2017, Proceedings / / edited by Antonio Puliafito, Dario Bruneo, Salvatore Distefano, Francesco Longo
Ad-hoc, Mobile, and Wireless Networks [[electronic resource] ] : 16th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2017, Messina, Italy, September 20-22, 2017, Proceedings / / edited by Antonio Puliafito, Dario Bruneo, Salvatore Distefano, Francesco Longo
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIV, 396 p. 163 illus.)
Disciplina 004.685
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer communication systems
Computers
Special purpose computers
Computer security
Data structures (Computer science)
Electrical engineering
Computer Communication Networks
Information Systems and Communication Service
Special Purpose and Application-Based Systems
Systems and Data Security
Data Structures and Information Theory
Communications Engineering, Networks
ISBN 3-319-67910-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Internet of Things -- SustainaBLE: a Power-Aware Algorithm for Greener Industrial IoT Networks -- The 3D redeployment of nodes in Wireless Sensor Networks with real testbed prototyping -- Semantic Resource Management of Federated IoT Testbeds -- Targeted Content Delivery to IoT Devices Using Bloom Filters -- Security -- Trust Based Monitoring Approach for Mobile Ad Hoc Networks -- An Implementation and Evaluation of the Security Features of RPL -- A ticket-based Authentication Scheme for VANETs preserving Privacy -- A Trust based Communication Scheme for Safety Messages Exchange in VANETs -- Smart City -- Mobility as the main enabler of opportunistic data dissemination in urban scenarios -- Analysis and classification of the vehicular traffic distribution in an urban area -- User-space network tunneling under a mobile platform: a case study for Android environments -- Mobile Crowd Sensing as an Enabler for People as a Service Mobile Computing -- Ad-hoc networks -- SVM- MUSIC Algorithm for Spectrum Sensing in Cognitive Radio Ad-Hoc Networks -- Optimization of a modular ad hoc land wireless system via distributed joint Source-Network Coding for correlated sensors -- AdhocInfra Toggle: Opportunistic Auto-configuration of Wireless Interface for Maintaining Data Sessions in WiFi Networks -- Simulation of AdHoc Networks Including Clustering and Mobility -- Implementations and validations -- Highlighting Some Shortcomings of the CoCoA+ Congestion Control Algorithm -- Experimental Evaluation of Non-Coherent MIMO Grassmannian Signaling Schemes.-WEVA: A Complete Solution for Industrial Internet of Things -- Validating Contact Times Extracted from Mobility Traces -- Wireless sensor networks. -Optimising Wireless Sensor Network Link Quality through Power Control with non-Convex Utilities using Game Theory -- Routing protocol enhancement for mobility support in wireless sensor networks -- Correlation-Free MultiPath Routing for Multimedia traffic in Wireless Sensor Networks -- Impact of Simulation Environment in Performance Evaluation of Protocols for WSNs. -Data management -- A Real-Time Query Processing System for WSN -- Centralized and distributed architectures: Approximation of the response time in a video surveillance system of road traffic by logarithm, power and linear functions -- Secure Storage as a Service in Multi-Cloud Environment -- Policy Management and Enforcement Using OWL and SWRL for the Internet of Things -- Wireless systems -- BSSACH: A Big Slot Scheduling Algorithms with Channel Hopping for Dynamic Wireless Sensor Networks -- A hybrid ant-genetic algorithm to solve a real deployment problem: a case study with experimental validation -- Interference Analysis of Nonlinear and Asynchronous OFDM in Multiuser Cognitive Radio Networks.
Record Nr. UNISA-996465550603316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Ad-hoc, Mobile, and Wireless Networks : 16th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2017, Messina, Italy, September 20-22, 2017, Proceedings / / edited by Antonio Puliafito, Dario Bruneo, Salvatore Distefano, Francesco Longo
Ad-hoc, Mobile, and Wireless Networks : 16th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2017, Messina, Italy, September 20-22, 2017, Proceedings / / edited by Antonio Puliafito, Dario Bruneo, Salvatore Distefano, Francesco Longo
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIV, 396 p. 163 illus.)
Disciplina 004.685
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer communication systems
Computers
Special purpose computers
Computer security
Data structures (Computer science)
Electrical engineering
Computer Communication Networks
Information Systems and Communication Service
Special Purpose and Application-Based Systems
Systems and Data Security
Data Structures and Information Theory
Communications Engineering, Networks
ISBN 3-319-67910-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Internet of Things -- SustainaBLE: a Power-Aware Algorithm for Greener Industrial IoT Networks -- The 3D redeployment of nodes in Wireless Sensor Networks with real testbed prototyping -- Semantic Resource Management of Federated IoT Testbeds -- Targeted Content Delivery to IoT Devices Using Bloom Filters -- Security -- Trust Based Monitoring Approach for Mobile Ad Hoc Networks -- An Implementation and Evaluation of the Security Features of RPL -- A ticket-based Authentication Scheme for VANETs preserving Privacy -- A Trust based Communication Scheme for Safety Messages Exchange in VANETs -- Smart City -- Mobility as the main enabler of opportunistic data dissemination in urban scenarios -- Analysis and classification of the vehicular traffic distribution in an urban area -- User-space network tunneling under a mobile platform: a case study for Android environments -- Mobile Crowd Sensing as an Enabler for People as a Service Mobile Computing -- Ad-hoc networks -- SVM- MUSIC Algorithm for Spectrum Sensing in Cognitive Radio Ad-Hoc Networks -- Optimization of a modular ad hoc land wireless system via distributed joint Source-Network Coding for correlated sensors -- AdhocInfra Toggle: Opportunistic Auto-configuration of Wireless Interface for Maintaining Data Sessions in WiFi Networks -- Simulation of AdHoc Networks Including Clustering and Mobility -- Implementations and validations -- Highlighting Some Shortcomings of the CoCoA+ Congestion Control Algorithm -- Experimental Evaluation of Non-Coherent MIMO Grassmannian Signaling Schemes.-WEVA: A Complete Solution for Industrial Internet of Things -- Validating Contact Times Extracted from Mobility Traces -- Wireless sensor networks. -Optimising Wireless Sensor Network Link Quality through Power Control with non-Convex Utilities using Game Theory -- Routing protocol enhancement for mobility support in wireless sensor networks -- Correlation-Free MultiPath Routing for Multimedia traffic in Wireless Sensor Networks -- Impact of Simulation Environment in Performance Evaluation of Protocols for WSNs. -Data management -- A Real-Time Query Processing System for WSN -- Centralized and distributed architectures: Approximation of the response time in a video surveillance system of road traffic by logarithm, power and linear functions -- Secure Storage as a Service in Multi-Cloud Environment -- Policy Management and Enforcement Using OWL and SWRL for the Internet of Things -- Wireless systems -- BSSACH: A Big Slot Scheduling Algorithms with Channel Hopping for Dynamic Wireless Sensor Networks -- A hybrid ant-genetic algorithm to solve a real deployment problem: a case study with experimental validation -- Interference Analysis of Nonlinear and Asynchronous OFDM in Multiuser Cognitive Radio Networks.
Record Nr. UNINA-9910484342203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Computational Intelligence and Informatics : Proceedings of ICACII 2023 / / edited by Raghavendra Rao Chillarige, Salvatore Distefano, Sandeep Singh Rawat
Advances in Computational Intelligence and Informatics : Proceedings of ICACII 2023 / / edited by Raghavendra Rao Chillarige, Salvatore Distefano, Sandeep Singh Rawat
Autore Chillarige Raghavendra Rao
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (430 pages)
Disciplina 006.3
Altri autori (Persone) DistefanoSalvatore
RawatSandeep Singh
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Machine learning
Big data
Telecommunication
Computational Intelligence
Machine Learning
Big Data
Communications Engineering, Networks
ISBN 981-9747-27-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- ICACII2023 Committee -- Foreword -- Preface -- Contents -- Editors and Contributors -- Optimizing Complex Challenges: Harnessing the Power of Genetic Algorithms and the Nelder-Mead Simplex Algorithm for Effective Problem Solving -- 1 Introduction -- 2 Overview of GA and NMA -- 2.1 Genetic Algorithm -- 2.2 Nelder-Mead Algorithm -- 3 Hybrid Genetic Algorithm with Nelder-Mead Simplex Algorithm (HGANM) -- 4 Benchmark Functions -- 4.1 Experimental Configuration -- 4.2 Result and Analysis -- 5 Real-Life Problems -- 5.1 Experimental Setup -- 5.2 Analysis and Outcome -- 6 Conclusion -- References -- State-of-the-Art Techniques and Evaluation Criteria for Mobile Application Offloading in Heterogeneous Networks: A Comprehensive Survey of Computation, Data, and Energy Offloading Approaches -- 1 Introduction -- 2 Background -- 2.1 Offloading Techniques -- 2.2 Literature Survey -- 2.3 Current Gaps in Research and Opportunities for Future Work -- 3 Conclusion -- References -- IDSSA: An Intrusion Detection System with Self-adaptive Capabilities for Strengthening the IoT Network Security -- 1 Introduction -- 1.1 Objectives of the Research -- 2 Related Works -- 3 Proposed System -- 3.1 NSL-KDD Dataset -- 3.2 Preprocessing -- 3.3 DNS and EAT -- 4 Results and Discussions -- 5 Conclusion and Future Scope -- References -- Privacy and Security Aspects of Indian Population While Using Online Social Network: An Analysis -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results and Analysis -- 5 Conclusion -- References -- Digital HR Strategy in the Modern Business Environment of Ukraine in Conditions of Uncertainty -- 1 Introduction -- 2 Literature Review -- 3 Methodological Approach -- 4 Conducting the Research and the Results -- 5 Conclusion and Discussion -- References.
A Model for Quality Management in Industrial Products Based on Machine Learning and Image Processing Techniques -- 1 Introduction -- 2 Related Work -- 3 Our Work -- 3.1 Proposed Algorithm -- 3.2 Working Process -- 4 Conclusion -- References -- An Extensive Study on Financial Fraud Detection Using Artificial Intelligence-Based Models -- 1 Introduction -- 1.1 Overview to Big Data -- 1.2 Digital Banking -- 2 Data -- 2.1 Data Collection -- 2.2 Data Organization -- 2.3 Data Modality -- 3 Types of Financial Fraud -- 4 Financial Crime Compliance Risk -- 4.1 Identity Theft -- 4.2 Financial Declaration Fraud and Insurance Fraud -- 4.3 Anti-Money Laundering -- 4.4 Trafficking and Sanctions -- 5 Financial Fraud Finding Challenges and Future Instructions -- 5.1 Futures of Digital Banking -- 6 Conclusion -- References -- Exploring the State of the Art in Mobile Agent Computing: A Comparative Study of Adaptive Fault Tolerance, Security, Transaction, and Multicore Support -- 1 Introduction -- 2 Recent Techniques of Mobile Agent Computing -- 2.1 Lightweight Agent Platforms -- 2.2 Agent Migration Strategies -- 2.3 Context-Awareness -- 2.4 Security and Trust Management -- 2.5 Fault Tolerance and Resilience -- 2.6 Energy Efficiency -- 2.7 Machine Learning Integration -- 3 Comparative Table for Adaptive Fault Tolerant in the State of Art of Mobile Agent Computing: Security, Fault Tolerance, Transaction, and Multicore Support -- 4 Development of Mobile Agent Computing -- 4.1 Early Research -- 4.2 Platform Development -- 4.3 Agent Migration Strategies -- 4.4 Security and Trust Management -- 4.5 Application Development -- 4.6 Standardization Efforts -- 4.7 Performance Optimization -- 4.8 Context-Awareness and Intelligence -- 4.9 Mobile Agent Middleware -- 5 Conclusion -- References.
Leveraging Bidirectional Encoder Representations from Transformers (BERT) for Enhanced Sentiment Analysis -- 1 Introduction -- 2 Problem Statement -- 2.1 Exploring BERT-Driven Models Across Various Domains -- 3 BERT Architecture -- 4 Applications of BERT Techniques -- 5 Significance of BERT for Sentiment Analysis -- 6 Methodology for BERT in Sentiment Analysis -- 7 Conclusion -- References -- Securing the Future of Connected Cars: Investigating Vulnerabilities and Preventing Cyberattacks -- 1 Introduction -- 2 Literature Review -- 3 Types of Attacks -- 3.1 Malware Attacks -- 3.2 Wireless Attacks -- 4 Methods of Detecting and Preventing Attacks -- 5 Future Directions in Connected Car Security -- 6 Conclusion -- References -- Smart Surveillance Using OpenCV -- 1 Introduction -- 1.1 Objective -- 2 Related Work -- 2.1 A Hybrid Algorithm for Tracking and Counting Many Persons in Smart Surveillance -- 2.2 Performance Evaluation of the Intelligent Traffic Surveillance System's Object Detection Algorithm -- 2.3 Crowd Counting and Detection of Normal/Abnormal Events Using Multi-Person Tracking in a Smart Surveillance System -- 2.4 Raspberry Pi-Based IoT-Based Smart Surveillance and Security System -- 2.5 Intelligent Video Security Surveillance with Mobile Remote Control -- 3 Proposed Method -- 3.1 Structural Similarity Index Metric (SSIM) -- 3.2 Detecting Faces in the Frames -- 3.3 Look for Background Noise -- 3.4 Local Binary Pattern Histogram (LBPH) -- 4 Experimental Results -- 4.1 Feature 1-Monitor -- 4.2 Feature 2-Action Detection -- 4.3 Feature 3-Rectangle -- 4.4 Feature 4-Record -- 4.5 Feature 5-Identify -- 4.6 Feature 6-In and Out -- 5 Conclusion -- References -- Hyperspectral Band Selection Considering Spectral and Spatial Information -- 1 Introduction -- 2 Problem Statement -- 3 Scope and Objectives -- 4 Literature Survey -- 5 Proposed System.
5.1 System Specifications -- 5.2 Block Diagram -- 5.3 Methodology -- 6 Experimental Setup and Results -- 6.1 Results -- 7 Summary and Future Scope -- References -- Water Pumping Requirement Prediction in Irrigation System Using Internet of Things-Assisted Machine Intelligence-Based Approach -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 4 Results -- 5 Conclusion -- References -- Hybrid Method for Discovering DDOS Attack -- 1 Introduction -- 2 Objectives -- 3 Scope -- 4 Methodology -- 5 System Architecture -- 5.1 Algorithms -- 5.2 Data Set -- 5.3 Data Preprocessing -- 5.4 Results -- 6 Conclusions -- References -- A Novel Chaotic Map-Based Noise-Resistant Image Encryption Scheme for Medical Images -- 1 Introduction -- 2 Proposed Method -- 2.1 Encryption -- 3 Simulation Results -- 3.1 Encryption Efficiency Analysis -- 4 Conclusion -- References -- Survey of Attacks, Detection Techniques, and Evaluation Metrics in Wireless Sensor Networks -- 1 Introduction -- 1.1 Overview of Wireless Sensor Networks -- 2 Key Characteristics and Challenges -- 3 The Importance of Security in WSN -- 4 Different Protocols Used in WSN -- 5 Literature Review of Layerwise Attacks in WSN -- 6 Detection and Evaluation Metrics -- 7 Conclusion -- References -- Big Data's Ethical Frontier: Addressing Concerns in Data Acquisition and Analysis -- 1 Introduction -- 2 Ethical Challenges in Big Data -- 3 Cambridge Analytica Scandal -- 4 Aadhaar Data Leak -- 4.1 Ethical Concerns in Data Analysis and Regulatory Framework -- 5 Conclusion -- References -- Evaluating Security Risks and Protecting Conversational AI: An in-Depth Vulnerability Assessment and Security Testing of the ChatGPT Android Application -- 1 Introduction -- 2 Methodology -- 3 Results -- 4 Conclusion -- References -- Neural Networks and GPU-Based Weed Detection Under Varying Light Illumination -- 1 Introduction.
2 Proposed System -- 2.1 Dataset and Process Flow -- 2.2 Feature Extraction -- 2.3 Feature Selection -- 2.4 Methodology Used -- 2.5 Faster RCNN Algorithm -- 2.6 CNN Implementation Algorithm -- 3 Conclusion -- References -- Intelligent ECG-Based COVID-19 Diagnose Device Using CNN Deep Learning Approaches -- 1 Introduction -- 2 Literature Review -- 3 Techniques -- 3.1 Document Search -- 3.2 Search Methods -- 3.3 Restrictions -- 3.4 Presence in the Review Publication -- 4 Deep Convolution Transfer Learning via Neural Networks -- 4.1 Methodology -- 4.2 Different Abnormalities in ECG Images -- 5 Implementation -- 6 Conclusion -- References -- Analyzing Twitter Data Using Apache Hive-A Big Data Technology Exploration -- 1 Introduction -- 2 Big Data and Twitter Data Analysis -- 3 Experimental Setup -- 4 Conclusion -- References -- Detection of Phishing Websites Using Link Guard Algorithm -- 1 Introduction -- 2 Literature Survey -- 3 Problem Statement -- 4 Objectives -- 5 Existing Work -- 6 Proposed Work -- 6.1 Program Code -- 7 Methodology -- 8 Result -- 9 Conclusion -- References -- Forecasting Financial Commodities Using an Evolutionary Optimized Higher-Order Artificial Neural Network -- 1 Introduction -- 2 Method and Materials -- 2.1 Firefly Algorithm -- 2.2 Nelder-Mead Simplex Algorithm -- 2.3 Improved FFA -- 2.4 Pi-Sigma Neural Network -- 2.5 IFFA-PSNN Forecasting Model Training -- 3 Experimental Setup and Datasets -- 4 Results and Discussion -- 5 Conclusions -- References -- Plant Leaf Disease Classification Using GAN -- 1 Introduction -- 2 Problem Statement -- 3 Scope and Objectives -- 4 Literature Survey -- 4.1 Generative Adversarial Networks -- 4.2 VGG16 -- 4.3 Data Augmentation -- 4.4 Deep Learning -- 4.5 Data Preprocessing -- 5 Proposed System -- 5.1 System Specifications -- 5.2 Methodology -- 6 Functional Modules -- 7 Pseudocode.
8 Experimental Setup and Results.
Record Nr. UNINA-9910882898403321
Chillarige Raghavendra Rao  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Computational Intelligence and Informatics : Proceedings of ICACII 2019 / / edited by Raghavendra Rao Chillarige, Salvatore Distefano, Sandeep Singh Rawat
Advances in Computational Intelligence and Informatics : Proceedings of ICACII 2019 / / edited by Raghavendra Rao Chillarige, Salvatore Distefano, Sandeep Singh Rawat
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (414 pages)
Disciplina 006.3
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Machine learning
Bioinformatics
Big data
Electrical engineering
Computational Intelligence
Machine Learning
Computational Biology/Bioinformatics
Big Data
Communications Engineering, Networks
ISBN 981-15-3338-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Extraction of Tumor Chunk Using Image Segmentation – Thresholding and HSV Color Space -- Predictive & Interactive IOT Diagnosis System with AI and ML Tools: Review -- Multi Agent Data Mining using Asymmetric AES Algorithm in Cloud Computing -- A Novel Architecture for a Two-Pass Opinion Mining Classifier -- QoS based Routing Algorithm for Software Defined Network using Ant Colony optimization -- An Integrated AdaBoost Algorithm for Down Syndrome Disease Recognition -- A Comprehensive Healthcare Model for a Smart Left Ventricle Assisting Device -- Moving Hand Segmentation from H.264 Compressed Sign Language Videos -- CNN-Based Real-time Indian Sign Language Recognition System -- Sarcasm Detection using Multiple Occurrences of Emojis and Hashtagged Words -- Multiclass Multiple Object Tracking -- Dimensionality Reduction in Hyperspectral Images using Auto-encoders -- Improved Registration of Infrared Images using EOH Descriptor -- Fine Grained Analysis of Bridging Social Capital with Triadic Analysis in a Co-Author Network -- Accumulation of Methodologies for Intensifying the Lifetime of the Wireless Sensor Networks -- A Multifactor Biometric Based User Authentication Protocol for IOT Networks -- Leveraging Topic Models with Novel Word Embeddings for Effective Document Clustering -- Survey on Access Control Mechanisms in Cloud Environments -- Sales Analysis and Performance of Super Store using Qlik Geo Analytics -- Assessment of Crop Rotation Using Multi Polarized Sentinel-1 Temporal SAR Data Over Parts of Kumaun Region of Uttarakhand -- Spatiotemporal and Delay Dynamics on a Prey Predator Fishery Model -- An Efficient Intrusion Detection System with Convolutional Neural Network -- Supervised Machine Learning Approach for Identification of Malicious URLs -- A Unified Framework for Stress Forecasting Using Machine Learning Algorithms -- Investigation and Analysis of Crop Maintenance Using IoT & KNN Techniques -- Enhancement of Anisotropic Diffusion Filtered Cardiac MR Images using Contrast based Fuzzy Approach -- Social Media Ecosystem: Review on Social Media Profile’s Security and Introduce a New Approach -- An Investigation on Managing Patient Flow at Hospital Emergency Care Unit using Tree-Based Data Mining Techniques -- A Path Based Model for Link Prediction in Location Based Social Networks -- Predicting the Cost of Pre-owned Cars using Linear Regression Mechanisms in Machine Learning -- Bio-Inspired High Utility Item Framework based Particle Swarm Optimization Tree Algorithms for Mining High Utility Itemset -- On Atom-Bond Connectivity Invariant of Graphs -- Theoretical Design and Experimental Study for Urban Data Management using Energy-Saved IoT Big Data -- An Effective Approach for Security Attacks Based on Machine Learning Algorithms -- Class Based Associative Classification using Super Subset to Predict the By-Diseases in Thyroid Disorders -- Recommendation of Diet using Hybrid Collaborative Filtering Learning Methods -- Classification of Natural Images Using Machine Learning Classifiers on Graph Based Approaches -- Convolutional Neural Network Based Diagnosis of Alzheimer’s Disease using Time Frequency features -- Humanly Evolving Robotics with Angular Sensor Control (HERASC) -- Post-occupancy Evaluation of Building Facilities in a University Community using an Electronic Platform -- Internet of Things: Demystifying Smart Cities & Communities -- Comparative Analysis of Optimizations of Antecedents and Consequents of Fuzzy Inference System Rules Lists using Genetic Algorithm Operations -- Uses and Impact of Social Media on Work Performance of Low Literate People -- A Comparative Analysis on Rumor Microblogs Detection from Social Network Sites -- Smart Sprint Methodology for Financial Management System Development -- A Novel Infrared Image Segmentation Method for Identifying the Faults in the Systems.
Record Nr. UNINA-9910484607303321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Quantitative assessments of distributed systems : methodologies and techniques / / edited by Dario Bruneo and Salvatore Distefano ; cover design by Russell Richardson
Quantitative assessments of distributed systems : methodologies and techniques / / edited by Dario Bruneo and Salvatore Distefano ; cover design by Russell Richardson
Pubbl/distr/stampa Salem, Massachusetts ; ; Hoboken, New Jersey : , : Scrivener Publishing : , : Wiley, , 2015
Descrizione fisica 1 online resource (398 p.)
Disciplina 004.029
Collana Performability Engineering Series
Soggetto topico Computer systems - Evaluation - Mathematics
System analysis - Mathematics
Electronic data processing - Distributed processing - Mathematical models
Quantitative research
ISBN 1-119-13113-8
1-119-13115-4
1-119-13114-6
Classificazione TEC008000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Contents; Preface; PART I VERIFICATION; 1 Modeling and Verification of Distributed Systems Using Markov Decision Processes; 1.1 Introduction; 1.2 Markov Decision Processes; 1.3 Markov Decision Well-Formed Net formalism; 1.4 Case study: Peer-to-Peer Botnets; 1.5 Conclusion; Appendices: Well-formed Net Formalism; A.0.1 Syntax of Basic Predicates; A.0.2 Markings and Enabling; References; 2 Quantitative Analysis of Distributed Systems in Stoklaim: A Tutorial; 2.1 Introduction; 2.2 StoKlaim: Stochastic Klaim; 2.2.1 Klaim in a Nutshell; 2.2.2 Syntactic Categories
2.2.3 StoKlaim Syntax2.2.4 StoKlaim at Work; 2.3 StoKlaim Operational Semantics; 2.3.1 Rate Transition Systems; 2.3.2 StoKlaim: RTS-based Semantics; 2.4 MoSL: Mobile Stochastic Logic; 2.5 jSAM: Java Stochastic Model-Checker; 2.6 Leader Election in StoKlaim; 2.6.1 As far as it can; 2.6.2 Asynchronous Leader Election; 2.7 Concluding Remarks; References; 3 Stochastic Path Properties of Distributed Systems: the CSLTA Approach; 3.1 Introduction; 3.2 The Reference Formalisms for System Definition; 3.3 The Formalism for Path Property Definition: CSLTA; 3.4 CSLTA at work: a Fault-Tolerant Node
3.5 Literature Comparison3.6 Summary and Final Remarks; References; PART II EVALUATION; 4 Failure Propagation in Load-Sharing Complex Systems; 4.1 Introduction; 4.2 Building Blocks; 4.2.1 Coarse-grained Modeling; 4.2.2 Abstract Mechanisms Impacting the Failure Occurrence; 4.2.3 Parametric Distributions Revisited; 4.2.4 Exponential Distribution; 4.2.5 Weibull Distribution; 4.2.6 Lognormal Distribution; 4.2.7 Other Distributions; 4.3 Sand Box for Distributed Failures; 4.3.1 Failure Modes; 4.3.2 LOS and Stress Rupture; 4.4 Summary; References
5 Approximating Distributions and Transient Probabilities by Matrix Exponential Distributions and Functions5.1 Introduction; 5.2 Phase Type and Matrix Exponential Distributions; 5.3 Bernstein Polynomials and Expolynomials; 5.4 Application of BEs to Distribution Fitting; 5.5 Application of BEs to Transient Probabilities; 5.6 Conclusions; References; 6 Worst-Case Analysis of Tandem Queueing Systems Using Network Calculus; 6.1 Introduction; 6.2 Basic Network Calculus Modeling: Per-fl ow Scheduling; 6.2.1 Service Curve; 6.2.2 Arrival Curve; 6.2.3 Delay and Backlog Bounds; 6.2.4 Numerical Examples
6.3 Advanced Network Calculus Modeling: Aggregate Multiplexing6.3.1 Aggregate-multiplexing Schemes; 6.4 Tandem Systems Traversed by Several Flows; 6.4.1 Model; 6.4.2 Loss of the Tightness; 6.4.3 Separated-flow Analysis; 6.5 Mathematical Programming Approach; 6.5.1 Blind Multiplexing; 6.5.2 FIFO Multiplexing; 6.6 Related Work; 6.7 Numerical Results; 6.8 Conclusions; References; 7 Cloud Evaluation: Benchmarking and Monitoring; 7.1 Introduction; 7.2 Benchmarking; 7.2.1 Benchamrking State of Art; 7.2.2 Benchmarking Big Data Services; 7.3 Benchmarking with mOSAIC; 7.4 Monitoring
7.4.1 Monitoring Problem Scenarios
Record Nr. UNINA-9910131281903321
Salem, Massachusetts ; ; Hoboken, New Jersey : , : Scrivener Publishing : , : Wiley, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Quantitative assessments of distributed systems : methodologies and techniques / / edited by Dario Bruneo and Salvatore Distefano ; cover design by Russell Richardson
Quantitative assessments of distributed systems : methodologies and techniques / / edited by Dario Bruneo and Salvatore Distefano ; cover design by Russell Richardson
Pubbl/distr/stampa Salem, Massachusetts ; ; Hoboken, New Jersey : , : Scrivener Publishing : , : Wiley, , 2015
Descrizione fisica 1 online resource (398 p.)
Disciplina 004.029
Collana Performability Engineering Series
Soggetto topico Computer systems - Evaluation - Mathematics
System analysis - Mathematics
Electronic data processing - Distributed processing - Mathematical models
Quantitative research
ISBN 1-119-13113-8
1-119-13115-4
1-119-13114-6
Classificazione TEC008000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Contents; Preface; PART I VERIFICATION; 1 Modeling and Verification of Distributed Systems Using Markov Decision Processes; 1.1 Introduction; 1.2 Markov Decision Processes; 1.3 Markov Decision Well-Formed Net formalism; 1.4 Case study: Peer-to-Peer Botnets; 1.5 Conclusion; Appendices: Well-formed Net Formalism; A.0.1 Syntax of Basic Predicates; A.0.2 Markings and Enabling; References; 2 Quantitative Analysis of Distributed Systems in Stoklaim: A Tutorial; 2.1 Introduction; 2.2 StoKlaim: Stochastic Klaim; 2.2.1 Klaim in a Nutshell; 2.2.2 Syntactic Categories
2.2.3 StoKlaim Syntax2.2.4 StoKlaim at Work; 2.3 StoKlaim Operational Semantics; 2.3.1 Rate Transition Systems; 2.3.2 StoKlaim: RTS-based Semantics; 2.4 MoSL: Mobile Stochastic Logic; 2.5 jSAM: Java Stochastic Model-Checker; 2.6 Leader Election in StoKlaim; 2.6.1 As far as it can; 2.6.2 Asynchronous Leader Election; 2.7 Concluding Remarks; References; 3 Stochastic Path Properties of Distributed Systems: the CSLTA Approach; 3.1 Introduction; 3.2 The Reference Formalisms for System Definition; 3.3 The Formalism for Path Property Definition: CSLTA; 3.4 CSLTA at work: a Fault-Tolerant Node
3.5 Literature Comparison3.6 Summary and Final Remarks; References; PART II EVALUATION; 4 Failure Propagation in Load-Sharing Complex Systems; 4.1 Introduction; 4.2 Building Blocks; 4.2.1 Coarse-grained Modeling; 4.2.2 Abstract Mechanisms Impacting the Failure Occurrence; 4.2.3 Parametric Distributions Revisited; 4.2.4 Exponential Distribution; 4.2.5 Weibull Distribution; 4.2.6 Lognormal Distribution; 4.2.7 Other Distributions; 4.3 Sand Box for Distributed Failures; 4.3.1 Failure Modes; 4.3.2 LOS and Stress Rupture; 4.4 Summary; References
5 Approximating Distributions and Transient Probabilities by Matrix Exponential Distributions and Functions5.1 Introduction; 5.2 Phase Type and Matrix Exponential Distributions; 5.3 Bernstein Polynomials and Expolynomials; 5.4 Application of BEs to Distribution Fitting; 5.5 Application of BEs to Transient Probabilities; 5.6 Conclusions; References; 6 Worst-Case Analysis of Tandem Queueing Systems Using Network Calculus; 6.1 Introduction; 6.2 Basic Network Calculus Modeling: Per-fl ow Scheduling; 6.2.1 Service Curve; 6.2.2 Arrival Curve; 6.2.3 Delay and Backlog Bounds; 6.2.4 Numerical Examples
6.3 Advanced Network Calculus Modeling: Aggregate Multiplexing6.3.1 Aggregate-multiplexing Schemes; 6.4 Tandem Systems Traversed by Several Flows; 6.4.1 Model; 6.4.2 Loss of the Tightness; 6.4.3 Separated-flow Analysis; 6.5 Mathematical Programming Approach; 6.5.1 Blind Multiplexing; 6.5.2 FIFO Multiplexing; 6.6 Related Work; 6.7 Numerical Results; 6.8 Conclusions; References; 7 Cloud Evaluation: Benchmarking and Monitoring; 7.1 Introduction; 7.2 Benchmarking; 7.2.1 Benchamrking State of Art; 7.2.2 Benchmarking Big Data Services; 7.3 Benchmarking with mOSAIC; 7.4 Monitoring
7.4.1 Monitoring Problem Scenarios
Record Nr. UNINA-9910809546503321
Salem, Massachusetts ; ; Hoboken, New Jersey : , : Scrivener Publishing : , : Wiley, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui