Advanced Computational Intelligence Techniques for Virtual Reality in Healthcare / / edited by Deepak Gupta, Aboul Ella Hassanien, Ashish Khanna |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (241 pages) |
Disciplina | 006.3 |
Collana | Studies in Computational Intelligence |
Soggetto topico |
Computational intelligence
Artificial intelligence Virtual reality in medicine |
ISBN | 3-030-35252-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | World of Virtual Reality (VR) in Healthcare -- Towards a VIREAL Platform: Virtual Reality in Cognitive and Behavioural Training for Autistic Individuals -- Assisting Students To Understand Mathematical Graphs Using Virtual Reality Application -- Short Time Frequency Analysis of Theta Activity for the Diagnosis of Bruxism on EEG Sleep Record -- Hand Gesture Recognition for Human Computer Interaction and its Applications in Virtual Reality -- Fluid Dynamics in Healthcare Industries: Computational Intelligence Prospective -- A Novel Approach Towards using Big Data and IoT for Improving the Efficiency of m-Health Systems -- Using Artificial Intelligence to Bring Accurate Real-Time Simulation To Virtual Reality -- Application Of Chicken Swarm Optimization In Detection of Cancer and Virtual Reality -- Computational Fluid Dynamics Simulations with Applications in Virtual Reality Aided Health Care Diagnostics -- Data Analysis and Classification of Cardiovascular Disease and Risk Factors Associated With it in India. |
Record Nr. | UNINA-9910483983103321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced machine intelligence and signal processing / / Deepak Gupta [and three others], editors |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore Pte Ltd., , [2022] |
Descrizione fisica | 1 online resource (859 pages) |
Disciplina | 006.31 |
Collana | Lecture notes in electrical engineering |
Soggetto topico |
Machine learning
Signal processing |
ISBN | 981-19-0840-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910580150803321 |
Singapore : , : Springer Nature Singapore Pte Ltd., , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in IoT and Security with Computational Intelligence : Proceedings of ICAISA 2023, Volume 2 |
Autore | Mishra Anurag |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2023 |
Descrizione fisica | 1 online resource (418 pages) |
Altri autori (Persone) |
GuptaDeepak
ChettyGirija |
Collana | Lecture Notes in Networks and Systems Series |
ISBN | 981-9950-88-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- Comparative Study of Metaheuristic Algorithms for Scheduling in Cloud Computing Based on QoS Parameters -- 1 Introduction -- 1.1 Contributions -- 2 Review Literature -- 3 Scheduling Approaches -- 3.1 Heuristic Approaches -- 3.2 Metaheuristic Approaches -- 4 Problem Description and QoS Parameters -- 5 Comparative Analysis of PSO, GA, and ACO -- 6 Conclusion and Future Work -- References -- Impact of Spatial Distribution of Repeated Samples on the Geometry of Hyperplanes -- 1 Introduction -- 2 Review of SVM Classifiers -- 2.1 Support Vector Machine (SVM) -- 3 Experimental Setup, Results, and Analysis -- 3.1 Dataset Used -- 3.2 Algorithm -- 3.3 Case 1 and Case 3: Repeating the Left-Side Support Vectors Belonging to the Positive and Negative Classes -- 3.4 Case 2 and Case 4: Repeating the Right-Side Support Vectors Belonging to the Positive and Negative Classes -- 4 Conclusion and Future Directions -- References -- IoT-Based Smart Farming for Sustainable Agriculture -- 1 Introduction -- 2 Methodology -- 2.1 IoT in Indian Agriculture and Its Applications -- 2.2 Agridat Package in RStudio -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- ELM-Based Liver Disease Prediction Model -- 1 Introduction -- 2 Extreme Learning Machine -- 3 Dataset -- 4 Proposed Methodology -- 5 Result and Discussion -- 5.1 Performance Analysis of ELM Using 80:20 Training-Testing Ratio -- 5.2 Performance Analysis of ELM Using 70:30 Training-Testing Ratio -- 5.3 Comparison with Other Published Works Done in the Same Domain -- 6 Conclusion -- References -- Intercompatibility of IoT Devices Using Matter: Next-Generation IoT Connectivity Protocol -- 1 Introduction -- 1.1 Current Alternatives -- 2 Need for Matter -- 2.1 Smart Home Ecosystems -- 2.2 Consumer and Manufacturer Standpoint -- 2.3 Security.
3 What is Matter -- 3.1 Architecture -- 3.2 Security -- 4 Thread for Matter -- 5 Outcome -- 5.1 Moving Forward -- References -- Role of Node Centrality for Information Dissemination in Delhi Metro Network -- 1 Introduction -- 1.1 Our Contributions -- 2 Characteristics of the Network -- 2.1 Structural Properties -- 2.2 Centrality Metrics -- 3 Methodology -- 3.1 Construction of Delhi Metro Network -- 3.2 Information Diffusion Model -- 4 Results -- 4.1 Identifying Prominent Metro Stations -- 4.2 Role of the Central Most Station on Information Dissemination -- 4.3 Identifying Efficient Centrality Measure by Regression Analysis -- 4.4 Connectivity Analysis -- 5 Conclusion -- References -- Biometric Iris Recognition System's Software and Hardware Implementation Using LabVIEW Tool -- 1 Introduction -- 2 Methodology -- 3 Drawbacks of the Research Works Done by Earlier Researchers -- 4 Image Analysis and the Image Recognition Algorithmic Steps -- 5 Recognition of Iris Procedures Utilizing Sing DIP Summaries -- 6 Overview of the LabVIEW Concepts -- 7 Proposed Contributions -- 8 Conclusions -- References -- A Unique Method of Detection of Edges and Circles of Multiple Objects in Imaging Scenarios Using Line Descriptor Concepts -- 1 Introduction -- 2 Block-Diagrams/Flow-Charts -- 3 Chain Coding Process -- 4 Approaches -- 5 Introductory Remarks -- 6 Line Descriptors -- 7 Program/Algorithm Developed -- 8 Conclusion -- References -- Robotic Vision: Simultaneous Localization And Mapping (SLAM) and Object Recognition -- 1 Introduction -- 2 Literature Survey -- 3 LiDAR SLAM -- 4 YOLO_v4 -- 5 Hardware Used -- 6 Results -- 7 Conclusion -- References -- Optimum Value of Cyclic Prefix (CP) to Reduce Bit Error Rate (BER) in OFDM -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 4 Simulation Flowchart -- 5 Results and Conclusion. 5.1 BPSK (Binary Phase Shift Keying) -- 5.2 QPSK (Quadrature Phase Shift Keying) -- 5.3 16-QAM (16-Quadrature Amplitude Multiplexing) -- 5.4 32-QAM (32-Quadrature Amplitude Multiplexing) -- References -- Optimum Sizing of Solar/Wind/Battery Storage in Hybrid Energy System Using Improved Particle Swarm Optimization and Firefly Algorithm -- 1 Introduction -- 2 System Configuration, Mathematical Modeling of Components of Hybrid Renewable Energy System, Objective Function and Constraints -- 2.1 Mathematical Modeling of Components of Hybrid Energy System: [15, 17] -- 2.2 Objective Function and Constraints -- 3 Size Optimization Algorithms -- 3.1 Improved Particle Swarm Optimization (IPSO) [15, 17, 18] -- 3.2 Firefly Algorithm (FA): [11, 12, 16]: -- 3.3 Procedure for Implementing IPSO [18] and FA -- 3.4 Comparison of Optimization Methods IPSO and FA -- 4 Results and Discussions -- 5 Conclusions -- References -- Fuzzy Based MPPT Control of Multiport Boost Converter for Solar Based Electric Vehicle -- 1 Introduction -- 2 Proposed System -- 3 Solar PV -- 3.1 Solar PV Array -- 3.2 Fuzzy-Based MPPT Control -- 4 Non-isolated Multiport Boost Converter -- 4.1 Double Output Mode -- 5 Proposed Controller -- 6 Results -- 7 Conclusion -- References -- Image Classification Model Based on Machine Learning Using GAN and CNN Algorithm -- 1 Introduction -- 1.1 Face Detection -- 1.2 Developing Face Recognition Software -- 2 Literature Review -- 3 Experimental Investigation -- 3.1 Description of Modules -- 3.2 Response and Conversation -- 4 Result Analysis -- 5 Data Visualization Techniques -- 6 Conclusion -- References -- Role of Natural Language Processing for Text Mining of Education Policy in Rajasthan -- 1 Introduction -- 1.1 Interpretation with ML for NLP -- 1.2 About Education Policy 2020 -- 2 Methodology -- 2.1 Code and Executed Screenshots of Python for NLP. 3 Results -- 4 Conclusion -- References -- Multilingual and Cross Lingual Audio Emotion Analysis Using RNN -- 1 Introduction -- 2 Related Work -- 3 Methods and Materials -- 3.1 Database -- 3.2 Data Augmentation Technique -- 3.3 Feature Extraction -- 3.4 Convolution Neural Network -- 3.5 LSTM Model -- 4 Proposed Model Framework -- 5 Experimental Results and Discussion- -- 5.1 Some Potential Comparison Studies Based on Mono-lingual Database -- 5.2 Multilingual Database Analysis -- 5.3 Cross-Lingual Database Analysis -- 6 Conclusions -- References -- Multi-modality Brain Tumor Segmentation of MRI Images Using ResUnet with Attention Mechanism -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Preprocessing and Data Augmentation -- 3.2 ResUnet with Attention Mechanism -- 4 Results and Discussion -- 4.1 Dataset (BraTs 2020) -- 4.2 Experimental Setup -- 4.3 Performance Metrics -- 4.4 Results and Discussion -- 5 Conclusion and Future Scope -- References -- CPF Analysis for Identification of Voltage Collapse Point and Voltage Stability of an IEEE-5 Bus System Using STATCOM -- 1 Introduction -- 2 System Structure -- 3 Simulation Results and Discussion -- 4 Conclusion -- References -- Analysis of Various Blockchain-Based Solutions for Electronic Health Record System -- 1 Introduction -- 2 Blockchain Technology/Fundamentals -- 3 Blockchain Development Tools -- 4 Blockchain for EHR -- 5 Comparative Analysis of Existing Blockchain-Based Solutions -- 6 Conclusion -- References -- Coordinated Network of Sensors Over 5G for High-Resolution Protection of City Assets During Earthquakes -- 1 Introduction -- 1.1 Current Technology for Earthquake Early Warning -- 1.2 Proposed Dense Network of Sensors for Individual Asset Damage Assessment -- 2 Mini-Seismic Stations -- 3 Sensors Coordination -- 3.1 Asynchronous Sensor Coordination Algorithm. 3.2 Latency Measurements -- 4 Performance-Based Damage Assessment -- 5 Infrastructures Interdependencies Integration (I2SIM) -- 6 Conclusion -- References -- Detection of COVID-19 Using Medical Image Processing -- 1 Introduction -- 2 Contribution of Medical Image Processing in COVID-19 -- 3 Medical Image Processing with Deep Learning in COVID-19 -- 4 Conclusions -- References -- Text Encryption Using ECC and Chaotic Map -- 1 Introduction -- 2 Preliminaries -- 2.1 Mathematical Computation with Elliptic Curve Over a Finite Field -- 2.2 Chaotic System -- 3 Data Grouping -- 4 Proposed Methodology -- 4.1 Encryption Algorithm -- 4.2 Decryption Algorithm -- 5 Experimental Simulation -- 6 Experimental Analysis -- 6.1 Key Space -- 6.2 Key Sensitivity -- 6.3 Histogram Analysis -- 6.4 Ciphertext Only Attack -- 6.5 Known Plaintext Attack -- 6.6 Performance Comparison -- 7 Conclusion -- References -- Plant Leaf Disease Detection and Classification: A Survey -- 1 Introduction -- 1.1 Motivation -- 2 Related Work -- 2.1 Disease Detection and Classification -- 2.2 Comparative Analysis -- 3 Findings -- 4 Conclusion -- References -- Performance Evaluation of K-SVCR in Multi-class Scenario -- 1 Introduction -- 2 Literature Review -- 3 K-Support Vector Classification Regression -- 4 Experimental Design -- 5 Conclusion and Future Scope -- References -- An Ensemble Method for Categorizing Cardiovascular Disease -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Dataset -- 3.2 Data Preprocessing -- 3.3 Feature Engineering -- 4 Model Training and Disease Classification -- 5 Model Performance Evaluation -- 6 Discussion and Conclusion -- References -- Intrusion Detection System for Internet of Medical Things -- 1 Introduction -- 2 IoMT -- 2.1 Components of IoMT -- 2.2 3-Layer Architecture -- 2.3 Intrusion Detection in IoMT -- 3 Integrative Technologies in IoMT. 3.1 Blockchain Technology. |
Record Nr. | UNINA-9910746297503321 |
Mishra Anurag | ||
Singapore : , : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Artificial intelligence for data-driven medical diagnosis / / edited by Deepak Gupta [and three others] |
Pubbl/distr/stampa | Berlin ; ; Boston : , : De Gruyter, , [2021] |
Descrizione fisica | 1 online resource (328 pages) |
Disciplina | 006.3 |
Collana | Intelligent Biomedical Data Analysis |
Soggetto topico | Artificial intelligence |
ISBN | 3-11-066832-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Frontmatter -- Preface -- Acknowledgment -- Contents -- List of contributors -- 1 Performance of CNN for predicting cancerous lung nodules using LightGBM -- 2 Deep learning-based cellular image analysis for intelligent medical diagnosis -- 3 Deep learning approaches in metastatic breast cancer detection -- 4 Machine learning: an ultimate solution for diagnosis and treatment of cancer -- 5 Artificial intelligence in medicine (AIM): machine learning in cancer diagnosis, prognosis and therapy -- 6 Diagnosis disease from medical databases using neural networks: a review -- 7 A novel neutrosophic approach-based filtering and Gaussian mixture modeling clustering for CT/MR images -- 8 Decentralized solutions for data collection and privacy in healthcare -- 9 Navigation from conventional to intelligent healthcare: adoption of Internet of health things for noncommunicable disease screening, diagnosis, monitoring and treatment in community settings -- 10 Automated gastric cancer detection and classification using machine learning -- 11 Artificial intelligence applications for medical diagnosis and production with 3D printing technologies -- 12 Detection of breast cancer using deep neural networks with transfer learning on histopathological images -- 13 A machine vision technique-based tongue diagnosis system in Ayurveda -- 14 Vine copula and artificial neural network models to analyze breast cancer data -- Index |
Record Nr. | UNINA-9910554496703321 |
Berlin ; ; Boston : , : De Gruyter, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber crime and forensic computing : modern principles, practices, and algorithms. / / edited by Gulshan Shrivastava, Deepak Gupta, Kavita Sharma |
Pubbl/distr/stampa | Berlin ; ; Boston : , : Walter de Gruyter GmbH, , [2021] |
Descrizione fisica | 1 online resource (242 pages) |
Disciplina | 364.168 |
Collana | De Gruyter Frontiers in Computational Intelligence |
Soggetto topico | Computer crimes |
ISBN | 3-11-067747-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Intro -- Contents -- About the editors -- A survey of popular digital forensic tools -- An insight review on multimedia forensics technology -- An overview on advanced multimedia forensic techniques and future direction -- Computer forensics and Cyber Crimes: COVID-19 perspective -- Biometric forensic tools for criminal investigation -- Deep learning for optimization of e-evidence -- Electronic voting machine security issues and solution protocol by physical unclonable function -- Machine learning for mobile malware analysis -- Mobile platform security: issues and countermeasures -- Data leakage detection in Wi-Fi networks -- Index. |
Record Nr. | UNINA-9910554250903321 |
Berlin ; ; Boston : , : Walter de Gruyter GmbH, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Fog, edge, and pervasive computing in intelligent IoT driven applications / / editors, Deepak Gupta, Aditya Khamparia |
Pubbl/distr/stampa | Hoboken, NJ : , : John Wiley & Sons, Incorporated : , : The Institute of Electricals and Electronics Engineers Press, , [2021] |
Descrizione fisica | 1 PDF |
Disciplina | 004.678 |
Soggetto topico |
Cloud computing
Distributed databases Internet of things Ubiquitous computing |
ISBN |
1-119-67010-1
1-119-67009-8 1-119-67008-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Fog, Edge and Pervasive Computing in Intelligent Internet of Things Driven Applications in Healthcare: Challenges, Limitations and Future Use / Afroj Alam, Sahar Qazi, Naiyar Iqbal, Khalid Raza -- Future Opportunistic Fog/Edge Computational Models and their Limitations / Sonia Singla, Naveen Kumar Bhati, S Aswath -- Automating Elicitation Technique Selection using Machine Learning / Hatim M Elhassan Ibrahim Dafallaa, Nazir Ahmad, Mohammed Burhanur Rehman, Iqrar Ahmad, Rizwan khan -- Machine Learning Frameworks and Algorithms for Fog and Edge Computing / Murali Mallikarjuna Rao Perumalla, Sanjay Kumar Singh, Aditya Khamparia, Anjali Goyal, Ashish Mishra -- Integrated Cloud Based Library Management in Intelligent IoT driven Applications / Md Robiul Alam Robel, Subrato Bharati, Prajoy Podder, M Rubaiyat Hossain Mondal -- A Systematic and Structured Review of Intelligent Systems for Diagnosis of Renal Cancer / Nikita, Harsh Sadawarti, Balwinder Kaur, Jimmy Singla -- Location Driven Edge Assisted Device and Solutions for Intelligent Transportation / Saravjeet Singh, Jaiteg Singh -- Design and Simulation of MEMS for Automobile Condition Monitoring Using COMSOL Multiphysics Simulator / Natasha Tiwari, Anil Kumar, Pallavi Asthana, Sumita Mishra, Bramah Hazela -- IoT Driven Healthcare Monitoring System / Md Robiul Alam Robel, Subrato Bharati, Prajoy Podder, M Rubaiyat Hossain Mondal -- Fog Computing as Future Perspective in Vehicular Ad hoc Networks / Harjit Singh, Vijay Laxmi, Arun Malik, Isha -- An Overview to Design an Efficient and Secure Fog-assisted Data Collection Method in the Internet of Things / Sofia, Arun Malik, Isha, Aditya Khamparia -- Role of Fog Computing Platform in Analytics of Internet of Things- Issues, Challenges and Opportunities / Mamoon Rashid, Umer Iqbal Wani -- A Medical Diagnosis of Urethral Stricture Using Intuitionistic Fuzzy Sets / Prabjot Kaur, Maria Jamal -- Security Attacks in Internet of Things / Rajit Nair, Preeti Sharma, Dileep Kumar Singh -- Fog Integrated Novel Architecture for Telehealth Services with Swift Medical Delivery / Inderpreet Kaur, Kamaljit Singh Saini, Jaiteg Singh Khaira -- Fruit Fly Optimization Algorithm for Intelligent IoT Applications / Satinder Singh Mohar, Sonia Goyal, Ranjit Kaur -- Optimization Techniques for Intelligent IoT Applications / Priyanka Pattnaik, Subhashree Mishra, Bhabani Shankar Prasad Mishra -- Optimization Techniques for Intelligent IoT Applications in Transport Processes / Muzafer Sara♯⁻evi♯⁷, Zoran Lon♯⁻arevi♯⁷, Adnan Hasanovi♯⁷ -- Role of Intelligent IOT Applications in Fog paradigm: Issues, Challenges and Future Opportunities / Priyanka Rajan Kumar, Sonia Goel -- Security and Privacy Issues in Fog/Edge/Pervasive Computing / Shweta Kaushik, Charu Gandhi -- Fog and Edge Driven Security & Privacy Issues in IoT Devices / Deepak Kumar Sharma, Aarti Goel, Pragun Mangla. |
Record Nr. | UNINA-9910554870703321 |
Hoboken, NJ : , : John Wiley & Sons, Incorporated : , : The Institute of Electricals and Electronics Engineers Press, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Fog, edge, and pervasive computing in intelligent IoT driven applications / / editors, Deepak Gupta, Aditya Khamparia |
Pubbl/distr/stampa | Hoboken, NJ : , : John Wiley & Sons, Incorporated : , : The Institute of Electricals and Electronics Engineers Press, , [2021] |
Descrizione fisica | 1 PDF |
Disciplina | 004.678 |
Soggetto topico |
Cloud computing
Distributed databases Internet of things Ubiquitous computing |
ISBN |
1-119-67010-1
1-119-67009-8 1-119-67008-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Fog, Edge and Pervasive Computing in Intelligent Internet of Things Driven Applications in Healthcare: Challenges, Limitations and Future Use / Afroj Alam, Sahar Qazi, Naiyar Iqbal, Khalid Raza -- Future Opportunistic Fog/Edge Computational Models and their Limitations / Sonia Singla, Naveen Kumar Bhati, S Aswath -- Automating Elicitation Technique Selection using Machine Learning / Hatim M Elhassan Ibrahim Dafallaa, Nazir Ahmad, Mohammed Burhanur Rehman, Iqrar Ahmad, Rizwan khan -- Machine Learning Frameworks and Algorithms for Fog and Edge Computing / Murali Mallikarjuna Rao Perumalla, Sanjay Kumar Singh, Aditya Khamparia, Anjali Goyal, Ashish Mishra -- Integrated Cloud Based Library Management in Intelligent IoT driven Applications / Md Robiul Alam Robel, Subrato Bharati, Prajoy Podder, M Rubaiyat Hossain Mondal -- A Systematic and Structured Review of Intelligent Systems for Diagnosis of Renal Cancer / Nikita, Harsh Sadawarti, Balwinder Kaur, Jimmy Singla -- Location Driven Edge Assisted Device and Solutions for Intelligent Transportation / Saravjeet Singh, Jaiteg Singh -- Design and Simulation of MEMS for Automobile Condition Monitoring Using COMSOL Multiphysics Simulator / Natasha Tiwari, Anil Kumar, Pallavi Asthana, Sumita Mishra, Bramah Hazela -- IoT Driven Healthcare Monitoring System / Md Robiul Alam Robel, Subrato Bharati, Prajoy Podder, M Rubaiyat Hossain Mondal -- Fog Computing as Future Perspective in Vehicular Ad hoc Networks / Harjit Singh, Vijay Laxmi, Arun Malik, Isha -- An Overview to Design an Efficient and Secure Fog-assisted Data Collection Method in the Internet of Things / Sofia, Arun Malik, Isha, Aditya Khamparia -- Role of Fog Computing Platform in Analytics of Internet of Things- Issues, Challenges and Opportunities / Mamoon Rashid, Umer Iqbal Wani -- A Medical Diagnosis of Urethral Stricture Using Intuitionistic Fuzzy Sets / Prabjot Kaur, Maria Jamal -- Security Attacks in Internet of Things / Rajit Nair, Preeti Sharma, Dileep Kumar Singh -- Fog Integrated Novel Architecture for Telehealth Services with Swift Medical Delivery / Inderpreet Kaur, Kamaljit Singh Saini, Jaiteg Singh Khaira -- Fruit Fly Optimization Algorithm for Intelligent IoT Applications / Satinder Singh Mohar, Sonia Goyal, Ranjit Kaur -- Optimization Techniques for Intelligent IoT Applications / Priyanka Pattnaik, Subhashree Mishra, Bhabani Shankar Prasad Mishra -- Optimization Techniques for Intelligent IoT Applications in Transport Processes / Muzafer Sara♯⁻evi♯⁷, Zoran Lon♯⁻arevi♯⁷, Adnan Hasanovi♯⁷ -- Role of Intelligent IOT Applications in Fog paradigm: Issues, Challenges and Future Opportunities / Priyanka Rajan Kumar, Sonia Goel -- Security and Privacy Issues in Fog/Edge/Pervasive Computing / Shweta Kaushik, Charu Gandhi -- Fog and Edge Driven Security & Privacy Issues in IoT Devices / Deepak Kumar Sharma, Aarti Goel, Pragun Mangla. |
Record Nr. | UNINA-9910830025303321 |
Hoboken, NJ : , : John Wiley & Sons, Incorporated : , : The Institute of Electricals and Electronics Engineers Press, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Handbook of Computer Networks and Cyber Security [[electronic resource] ] : Principles and Paradigms / / edited by Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (xx, 959 pages) : illustrations |
Disciplina | 004.6 |
Soggetto topico |
Data protection
Computer communication systems Computers Artificial intelligence Security Computer Communication Networks Information Systems and Communication Service Artificial Intelligence |
ISBN | 3-030-22277-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Security Frameworks in Mobile Cloud Computing -- 2. An investigation study of Privacy Preserving in Cloud -- 3. Towards new quantitative security risk analysis models for information systems: A Cloud Computing case study -- 4. A Novel AckIBE based Secure Cloud Data Management Framework -- 5. A Practicable Machine Learning Solution for Security-cognizant Data Placement on Cloud Platforms -- 6. Threats behind default configurations of network devices: local network attacks and their countermeasures -- 7. Security and Privacy issues in Wireless Sensor and Body Area Networks -- 8. Preventing Security and Privacy Attacks in WBANs -- 9. Security in Underwater Wireless Sensor Networks -- 10. Security Issues in Cognitive Radio Ad Hoc Networks -- 11. Security and privacy in social networks: Data and Structural Anonymity -- 12. SOI FinFET for Computer Networks and Cyber Security Systems -- 13. Software Defined Networking: An Innovative Approach to Computer Networks -- 14. Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions -- 15. Survey on DDoS Attacks Techniques and Solutions in Software Defined Network -- 16. Classification of Cooperative Distributed Denial of Service Defense (DDoS) Schemes -- 17. Epidemic Modelling for the Spread of Bots through DDoS Attack in E-Commerce Network -- 18. Physical unclonable functions (puf) based security in iot: key challenges and solutions -- 19. Fog Computing: Applications and Secure Data Aggregation -- 20. A Comprehensive review of Distributed Denial of service (DDoS) Attacks in Fog Computing Environment -- 21. Secure Machine Learning scenario from Big Data in Cloud Computing via Internet of Things network -- 22. Heterogeneous-Internet of Vehicles (IoV) Communication in 21st Century: A comprehensive study -- 23. A Systematic Review on Security and Privacy Issues in Mobile Devices and Systems -- 24. Investigation of Security Issues in Distributed Systems Monitoring -- 25. An analysis of Provable Security Frameworks for RFID Security -- 26. Computational Techniques for Real Time Credit Card Fraud Detection -- 27. Requirements, Protocols and Security Challenges in Wireless Sensor Networks - An Industrial Perspective -- 28. Privacy Preservation of Electronic Health Record: Current Status and Future Direction -- 29. QKD protocols security between theory and engineering implementation -- 30. Survey of Security and Privacy issues on Biometric system -- 31. A Novel Session key Generation and Secure Communication Establishment Protocol Using Fingerprint Biometrics -- 32. Trees, CryptoSignatures and Cyberspace Mobile Agent Interfaces -- 33. Permutation-Substitution Based Image Encryption Algorithms using Pseudo Random Number Generators -- 34. Recent Trends in Document Authentication using Text Steganography -- 35. Machine Learning Based Intrusion Detection Techniques -- 36. Feature Selection using a Machine Learning to Classify a Malware -- 37. DeepDGA-MINet: Cost-Sensitive Deep Learning based Framework for Handling Multiclass Imbalanced DGA Detection -- 38. ABFT: Analytics to uplift Big Social Events Using Forensic Tools -- 39. HackIt: A Real-Time Simulation Tool for Studying Real-World Cyber-Attacks in the Laboratory. |
Record Nr. | UNISA-996465441903316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Handbook of Computer Networks and Cyber Security : Principles and Paradigms / / edited by Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (xx, 959 pages) : illustrations |
Disciplina | 004.6 |
Soggetto topico |
Data protection
Computer communication systems Computers Artificial intelligence Security Computer Communication Networks Information Systems and Communication Service Artificial Intelligence |
ISBN | 3-030-22277-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Security Frameworks in Mobile Cloud Computing -- 2. An investigation study of Privacy Preserving in Cloud -- 3. Towards new quantitative security risk analysis models for information systems: A Cloud Computing case study -- 4. A Novel AckIBE based Secure Cloud Data Management Framework -- 5. A Practicable Machine Learning Solution for Security-cognizant Data Placement on Cloud Platforms -- 6. Threats behind default configurations of network devices: local network attacks and their countermeasures -- 7. Security and Privacy issues in Wireless Sensor and Body Area Networks -- 8. Preventing Security and Privacy Attacks in WBANs -- 9. Security in Underwater Wireless Sensor Networks -- 10. Security Issues in Cognitive Radio Ad Hoc Networks -- 11. Security and privacy in social networks: Data and Structural Anonymity -- 12. SOI FinFET for Computer Networks and Cyber Security Systems -- 13. Software Defined Networking: An Innovative Approach to Computer Networks -- 14. Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions -- 15. Survey on DDoS Attacks Techniques and Solutions in Software Defined Network -- 16. Classification of Cooperative Distributed Denial of Service Defense (DDoS) Schemes -- 17. Epidemic Modelling for the Spread of Bots through DDoS Attack in E-Commerce Network -- 18. Physical unclonable functions (puf) based security in iot: key challenges and solutions -- 19. Fog Computing: Applications and Secure Data Aggregation -- 20. A Comprehensive review of Distributed Denial of service (DDoS) Attacks in Fog Computing Environment -- 21. Secure Machine Learning scenario from Big Data in Cloud Computing via Internet of Things network -- 22. Heterogeneous-Internet of Vehicles (IoV) Communication in 21st Century: A comprehensive study -- 23. A Systematic Review on Security and Privacy Issues in Mobile Devices and Systems -- 24. Investigation of Security Issues in Distributed Systems Monitoring -- 25. An analysis of Provable Security Frameworks for RFID Security -- 26. Computational Techniques for Real Time Credit Card Fraud Detection -- 27. Requirements, Protocols and Security Challenges in Wireless Sensor Networks - An Industrial Perspective -- 28. Privacy Preservation of Electronic Health Record: Current Status and Future Direction -- 29. QKD protocols security between theory and engineering implementation -- 30. Survey of Security and Privacy issues on Biometric system -- 31. A Novel Session key Generation and Secure Communication Establishment Protocol Using Fingerprint Biometrics -- 32. Trees, CryptoSignatures and Cyberspace Mobile Agent Interfaces -- 33. Permutation-Substitution Based Image Encryption Algorithms using Pseudo Random Number Generators -- 34. Recent Trends in Document Authentication using Text Steganography -- 35. Machine Learning Based Intrusion Detection Techniques -- 36. Feature Selection using a Machine Learning to Classify a Malware -- 37. DeepDGA-MINet: Cost-Sensitive Deep Learning based Framework for Handling Multiclass Imbalanced DGA Detection -- 38. ABFT: Analytics to uplift Big Social Events Using Forensic Tools -- 39. HackIt: A Real-Time Simulation Tool for Studying Real-World Cyber-Attacks in the Laboratory. |
Record Nr. | UNINA-9910366655603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Handbook of Reconstructive Flaps / / by: Hanasono, Matthew M., Butler, Charles E. |
Autore | Adelman David M |
Pubbl/distr/stampa | New York, New York : , : Thieme, , [2021] |
Descrizione fisica | 1 online resource (382 pages) |
Disciplina | 617.95 |
Soggetto topico | Flaps (Surgery) |
ISBN |
1-63853-010-6
1-62623-860-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910794377303321 |
Adelman David M | ||
New York, New York : , : Thieme, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|