top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advanced Computational Intelligence Techniques for Virtual Reality in Healthcare / / edited by Deepak Gupta, Aboul Ella Hassanien, Ashish Khanna
Advanced Computational Intelligence Techniques for Virtual Reality in Healthcare / / edited by Deepak Gupta, Aboul Ella Hassanien, Ashish Khanna
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (241 pages)
Disciplina 006.3
Collana Studies in Computational Intelligence
Soggetto topico Computational intelligence
Artificial intelligence
Virtual reality in medicine
ISBN 3-030-35252-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto World of Virtual Reality (VR) in Healthcare -- Towards a VIREAL Platform: Virtual Reality in Cognitive and Behavioural Training for Autistic Individuals -- Assisting Students To Understand Mathematical Graphs Using Virtual Reality Application -- Short Time Frequency Analysis of Theta Activity for the Diagnosis of Bruxism on EEG Sleep Record -- Hand Gesture Recognition for Human Computer Interaction and its Applications in Virtual Reality -- Fluid Dynamics in Healthcare Industries: Computational Intelligence Prospective -- A Novel Approach Towards using Big Data and IoT for Improving the Efficiency of m-Health Systems -- Using Artificial Intelligence to Bring Accurate Real-Time Simulation To Virtual Reality -- Application Of Chicken Swarm Optimization In Detection of Cancer and Virtual Reality -- Computational Fluid Dynamics Simulations with Applications in Virtual Reality Aided Health Care Diagnostics -- Data Analysis and Classification of Cardiovascular Disease and Risk Factors Associated With it in India.
Record Nr. UNINA-9910483983103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced machine intelligence and signal processing / / Deepak Gupta [and three others], editors
Advanced machine intelligence and signal processing / / Deepak Gupta [and three others], editors
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore Pte Ltd., , [2022]
Descrizione fisica 1 online resource (859 pages)
Disciplina 006.31
Collana Lecture notes in electrical engineering
Soggetto topico Machine learning
Signal processing
ISBN 981-19-0840-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910580150803321
Singapore : , : Springer Nature Singapore Pte Ltd., , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in IoT and Security with Computational Intelligence : Proceedings of ICAISA 2023, Volume 2
Advances in IoT and Security with Computational Intelligence : Proceedings of ICAISA 2023, Volume 2
Autore Mishra Anurag
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2023
Descrizione fisica 1 online resource (418 pages)
Altri autori (Persone) GuptaDeepak
ChettyGirija
Collana Lecture Notes in Networks and Systems Series
ISBN 981-9950-88-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- Comparative Study of Metaheuristic Algorithms for Scheduling in Cloud Computing Based on QoS Parameters -- 1 Introduction -- 1.1 Contributions -- 2 Review Literature -- 3 Scheduling Approaches -- 3.1 Heuristic Approaches -- 3.2 Metaheuristic Approaches -- 4 Problem Description and QoS Parameters -- 5 Comparative Analysis of PSO, GA, and ACO -- 6 Conclusion and Future Work -- References -- Impact of Spatial Distribution of Repeated Samples on the Geometry of Hyperplanes -- 1 Introduction -- 2 Review of SVM Classifiers -- 2.1 Support Vector Machine (SVM) -- 3 Experimental Setup, Results, and Analysis -- 3.1 Dataset Used -- 3.2 Algorithm -- 3.3 Case 1 and Case 3: Repeating the Left-Side Support Vectors Belonging to the Positive and Negative Classes -- 3.4 Case 2 and Case 4: Repeating the Right-Side Support Vectors Belonging to the Positive and Negative Classes -- 4 Conclusion and Future Directions -- References -- IoT-Based Smart Farming for Sustainable Agriculture -- 1 Introduction -- 2 Methodology -- 2.1 IoT in Indian Agriculture and Its Applications -- 2.2 Agridat Package in RStudio -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- ELM-Based Liver Disease Prediction Model -- 1 Introduction -- 2 Extreme Learning Machine -- 3 Dataset -- 4 Proposed Methodology -- 5 Result and Discussion -- 5.1 Performance Analysis of ELM Using 80:20 Training-Testing Ratio -- 5.2 Performance Analysis of ELM Using 70:30 Training-Testing Ratio -- 5.3 Comparison with Other Published Works Done in the Same Domain -- 6 Conclusion -- References -- Intercompatibility of IoT Devices Using Matter: Next-Generation IoT Connectivity Protocol -- 1 Introduction -- 1.1 Current Alternatives -- 2 Need for Matter -- 2.1 Smart Home Ecosystems -- 2.2 Consumer and Manufacturer Standpoint -- 2.3 Security.
3 What is Matter -- 3.1 Architecture -- 3.2 Security -- 4 Thread for Matter -- 5 Outcome -- 5.1 Moving Forward -- References -- Role of Node Centrality for Information Dissemination in Delhi Metro Network -- 1 Introduction -- 1.1 Our Contributions -- 2 Characteristics of the Network -- 2.1 Structural Properties -- 2.2 Centrality Metrics -- 3 Methodology -- 3.1 Construction of Delhi Metro Network -- 3.2 Information Diffusion Model -- 4 Results -- 4.1 Identifying Prominent Metro Stations -- 4.2 Role of the Central Most Station on Information Dissemination -- 4.3 Identifying Efficient Centrality Measure by Regression Analysis -- 4.4 Connectivity Analysis -- 5 Conclusion -- References -- Biometric Iris Recognition System's Software and Hardware Implementation Using LabVIEW Tool -- 1 Introduction -- 2 Methodology -- 3 Drawbacks of the Research Works Done by Earlier Researchers -- 4 Image Analysis and the Image Recognition Algorithmic Steps -- 5 Recognition of Iris Procedures Utilizing Sing DIP Summaries -- 6 Overview of the LabVIEW Concepts -- 7 Proposed Contributions -- 8 Conclusions -- References -- A Unique Method of Detection of Edges and Circles of Multiple Objects in Imaging Scenarios Using Line Descriptor Concepts -- 1 Introduction -- 2 Block-Diagrams/Flow-Charts -- 3 Chain Coding Process -- 4 Approaches -- 5 Introductory Remarks -- 6 Line Descriptors -- 7 Program/Algorithm Developed -- 8 Conclusion -- References -- Robotic Vision: Simultaneous Localization And Mapping (SLAM) and Object Recognition -- 1 Introduction -- 2 Literature Survey -- 3 LiDAR SLAM -- 4 YOLO_v4 -- 5 Hardware Used -- 6 Results -- 7 Conclusion -- References -- Optimum Value of Cyclic Prefix (CP) to Reduce Bit Error Rate (BER) in OFDM -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 4 Simulation Flowchart -- 5 Results and Conclusion.
5.1 BPSK (Binary Phase Shift Keying) -- 5.2 QPSK (Quadrature Phase Shift Keying) -- 5.3 16-QAM (16-Quadrature Amplitude Multiplexing) -- 5.4 32-QAM (32-Quadrature Amplitude Multiplexing) -- References -- Optimum Sizing of Solar/Wind/Battery Storage in Hybrid Energy System Using Improved Particle Swarm Optimization and Firefly Algorithm -- 1 Introduction -- 2 System Configuration, Mathematical Modeling of Components of Hybrid Renewable Energy System, Objective Function and Constraints -- 2.1 Mathematical Modeling of Components of Hybrid Energy System: [15, 17] -- 2.2 Objective Function and Constraints -- 3 Size Optimization Algorithms -- 3.1 Improved Particle Swarm Optimization (IPSO) [15, 17, 18] -- 3.2 Firefly Algorithm (FA): [11, 12, 16]: -- 3.3 Procedure for Implementing IPSO [18] and FA -- 3.4 Comparison of Optimization Methods IPSO and FA -- 4 Results and Discussions -- 5 Conclusions -- References -- Fuzzy Based MPPT Control of Multiport Boost Converter for Solar Based Electric Vehicle -- 1 Introduction -- 2 Proposed System -- 3 Solar PV -- 3.1 Solar PV Array -- 3.2 Fuzzy-Based MPPT Control -- 4 Non-isolated Multiport Boost Converter -- 4.1 Double Output Mode -- 5 Proposed Controller -- 6 Results -- 7 Conclusion -- References -- Image Classification Model Based on Machine Learning Using GAN and CNN Algorithm -- 1 Introduction -- 1.1 Face Detection -- 1.2 Developing Face Recognition Software -- 2 Literature Review -- 3 Experimental Investigation -- 3.1 Description of Modules -- 3.2 Response and Conversation -- 4 Result Analysis -- 5 Data Visualization Techniques -- 6 Conclusion -- References -- Role of Natural Language Processing for Text Mining of Education Policy in Rajasthan -- 1 Introduction -- 1.1 Interpretation with ML for NLP -- 1.2 About Education Policy 2020 -- 2 Methodology -- 2.1 Code and Executed Screenshots of Python for NLP.
3 Results -- 4 Conclusion -- References -- Multilingual and Cross Lingual Audio Emotion Analysis Using RNN -- 1 Introduction -- 2 Related Work -- 3 Methods and Materials -- 3.1 Database -- 3.2 Data Augmentation Technique -- 3.3 Feature Extraction -- 3.4 Convolution Neural Network -- 3.5 LSTM Model -- 4 Proposed Model Framework -- 5 Experimental Results and Discussion- -- 5.1 Some Potential Comparison Studies Based on Mono-lingual Database -- 5.2 Multilingual Database Analysis -- 5.3 Cross-Lingual Database Analysis -- 6 Conclusions -- References -- Multi-modality Brain Tumor Segmentation of MRI Images Using ResUnet with Attention Mechanism -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Preprocessing and Data Augmentation -- 3.2 ResUnet with Attention Mechanism -- 4 Results and Discussion -- 4.1 Dataset (BraTs 2020) -- 4.2 Experimental Setup -- 4.3 Performance Metrics -- 4.4 Results and Discussion -- 5 Conclusion and Future Scope -- References -- CPF Analysis for Identification of Voltage Collapse Point and Voltage Stability of an IEEE-5 Bus System Using STATCOM -- 1 Introduction -- 2 System Structure -- 3 Simulation Results and Discussion -- 4 Conclusion -- References -- Analysis of Various Blockchain-Based Solutions for Electronic Health Record System -- 1 Introduction -- 2 Blockchain Technology/Fundamentals -- 3 Blockchain Development Tools -- 4 Blockchain for EHR -- 5 Comparative Analysis of Existing Blockchain-Based Solutions -- 6 Conclusion -- References -- Coordinated Network of Sensors Over 5G for High-Resolution Protection of City Assets During Earthquakes -- 1 Introduction -- 1.1 Current Technology for Earthquake Early Warning -- 1.2 Proposed Dense Network of Sensors for Individual Asset Damage Assessment -- 2 Mini-Seismic Stations -- 3 Sensors Coordination -- 3.1 Asynchronous Sensor Coordination Algorithm.
3.2 Latency Measurements -- 4 Performance-Based Damage Assessment -- 5 Infrastructures Interdependencies Integration (I2SIM) -- 6 Conclusion -- References -- Detection of COVID-19 Using Medical Image Processing -- 1 Introduction -- 2 Contribution of Medical Image Processing in COVID-19 -- 3 Medical Image Processing with Deep Learning in COVID-19 -- 4 Conclusions -- References -- Text Encryption Using ECC and Chaotic Map -- 1 Introduction -- 2 Preliminaries -- 2.1 Mathematical Computation with Elliptic Curve Over a Finite Field -- 2.2 Chaotic System -- 3 Data Grouping -- 4 Proposed Methodology -- 4.1 Encryption Algorithm -- 4.2 Decryption Algorithm -- 5 Experimental Simulation -- 6 Experimental Analysis -- 6.1 Key Space -- 6.2 Key Sensitivity -- 6.3 Histogram Analysis -- 6.4 Ciphertext Only Attack -- 6.5 Known Plaintext Attack -- 6.6 Performance Comparison -- 7 Conclusion -- References -- Plant Leaf Disease Detection and Classification: A Survey -- 1 Introduction -- 1.1 Motivation -- 2 Related Work -- 2.1 Disease Detection and Classification -- 2.2 Comparative Analysis -- 3 Findings -- 4 Conclusion -- References -- Performance Evaluation of K-SVCR in Multi-class Scenario -- 1 Introduction -- 2 Literature Review -- 3 K-Support Vector Classification Regression -- 4 Experimental Design -- 5 Conclusion and Future Scope -- References -- An Ensemble Method for Categorizing Cardiovascular Disease -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Dataset -- 3.2 Data Preprocessing -- 3.3 Feature Engineering -- 4 Model Training and Disease Classification -- 5 Model Performance Evaluation -- 6 Discussion and Conclusion -- References -- Intrusion Detection System for Internet of Medical Things -- 1 Introduction -- 2 IoMT -- 2.1 Components of IoMT -- 2.2 3-Layer Architecture -- 2.3 Intrusion Detection in IoMT -- 3 Integrative Technologies in IoMT.
3.1 Blockchain Technology.
Record Nr. UNINA-9910746297503321
Mishra Anurag  
Singapore : , : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Artificial intelligence for data-driven medical diagnosis / / edited by Deepak Gupta [and three others]
Artificial intelligence for data-driven medical diagnosis / / edited by Deepak Gupta [and three others]
Pubbl/distr/stampa Berlin ; ; Boston : , : De Gruyter, , [2021]
Descrizione fisica 1 online resource (328 pages)
Disciplina 006.3
Collana Intelligent Biomedical Data Analysis
Soggetto topico Artificial intelligence
ISBN 3-11-066832-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Frontmatter -- Preface -- Acknowledgment -- Contents -- List of contributors -- 1 Performance of CNN for predicting cancerous lung nodules using LightGBM -- 2 Deep learning-based cellular image analysis for intelligent medical diagnosis -- 3 Deep learning approaches in metastatic breast cancer detection -- 4 Machine learning: an ultimate solution for diagnosis and treatment of cancer -- 5 Artificial intelligence in medicine (AIM): machine learning in cancer diagnosis, prognosis and therapy -- 6 Diagnosis disease from medical databases using neural networks: a review -- 7 A novel neutrosophic approach-based filtering and Gaussian mixture modeling clustering for CT/MR images -- 8 Decentralized solutions for data collection and privacy in healthcare -- 9 Navigation from conventional to intelligent healthcare: adoption of Internet of health things for noncommunicable disease screening, diagnosis, monitoring and treatment in community settings -- 10 Automated gastric cancer detection and classification using machine learning -- 11 Artificial intelligence applications for medical diagnosis and production with 3D printing technologies -- 12 Detection of breast cancer using deep neural networks with transfer learning on histopathological images -- 13 A machine vision technique-based tongue diagnosis system in Ayurveda -- 14 Vine copula and artificial neural network models to analyze breast cancer data -- Index
Record Nr. UNINA-9910554496703321
Berlin ; ; Boston : , : De Gruyter, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber crime and forensic computing : modern principles, practices, and algorithms. / / edited by Gulshan Shrivastava, Deepak Gupta, Kavita Sharma
Cyber crime and forensic computing : modern principles, practices, and algorithms. / / edited by Gulshan Shrivastava, Deepak Gupta, Kavita Sharma
Pubbl/distr/stampa Berlin ; ; Boston : , : Walter de Gruyter GmbH, , [2021]
Descrizione fisica 1 online resource (242 pages)
Disciplina 364.168
Collana De Gruyter Frontiers in Computational Intelligence
Soggetto topico Computer crimes
ISBN 3-11-067747-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Contents -- About the editors -- A survey of popular digital forensic tools -- An insight review on multimedia forensics technology -- An overview on advanced multimedia forensic techniques and future direction -- Computer forensics and Cyber Crimes: COVID-19 perspective -- Biometric forensic tools for criminal investigation -- Deep learning for optimization of e-evidence -- Electronic voting machine security issues and solution protocol by physical unclonable function -- Machine learning for mobile malware analysis -- Mobile platform security: issues and countermeasures -- Data leakage detection in Wi-Fi networks -- Index.
Record Nr. UNINA-9910554250903321
Berlin ; ; Boston : , : Walter de Gruyter GmbH, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Fog, edge, and pervasive computing in intelligent IoT driven applications / / editors, Deepak Gupta, Aditya Khamparia
Fog, edge, and pervasive computing in intelligent IoT driven applications / / editors, Deepak Gupta, Aditya Khamparia
Pubbl/distr/stampa Hoboken, NJ : , : John Wiley & Sons, Incorporated : , : The Institute of Electricals and Electronics Engineers Press, , [2021]
Descrizione fisica 1 PDF
Disciplina 004.678
Soggetto topico Cloud computing
Distributed databases
Internet of things
Ubiquitous computing
ISBN 1-119-67010-1
1-119-67009-8
1-119-67008-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Fog, Edge and Pervasive Computing in Intelligent Internet of Things Driven Applications in Healthcare: Challenges, Limitations and Future Use / Afroj Alam, Sahar Qazi, Naiyar Iqbal, Khalid Raza -- Future Opportunistic Fog/Edge Computational Models and their Limitations / Sonia Singla, Naveen Kumar Bhati, S Aswath -- Automating Elicitation Technique Selection using Machine Learning / Hatim M Elhassan Ibrahim Dafallaa, Nazir Ahmad, Mohammed Burhanur Rehman, Iqrar Ahmad, Rizwan khan -- Machine Learning Frameworks and Algorithms for Fog and Edge Computing / Murali Mallikarjuna Rao Perumalla, Sanjay Kumar Singh, Aditya Khamparia, Anjali Goyal, Ashish Mishra -- Integrated Cloud Based Library Management in Intelligent IoT driven Applications / Md Robiul Alam Robel, Subrato Bharati, Prajoy Podder, M Rubaiyat Hossain Mondal -- A Systematic and Structured Review of Intelligent Systems for Diagnosis of Renal Cancer / Nikita, Harsh Sadawarti, Balwinder Kaur, Jimmy Singla -- Location Driven Edge Assisted Device and Solutions for Intelligent Transportation / Saravjeet Singh, Jaiteg Singh -- Design and Simulation of MEMS for Automobile Condition Monitoring Using COMSOL Multiphysics Simulator / Natasha Tiwari, Anil Kumar, Pallavi Asthana, Sumita Mishra, Bramah Hazela -- IoT Driven Healthcare Monitoring System / Md Robiul Alam Robel, Subrato Bharati, Prajoy Podder, M Rubaiyat Hossain Mondal -- Fog Computing as Future Perspective in Vehicular Ad hoc Networks / Harjit Singh, Vijay Laxmi, Arun Malik, Isha -- An Overview to Design an Efficient and Secure Fog-assisted Data Collection Method in the Internet of Things / Sofia, Arun Malik, Isha, Aditya Khamparia -- Role of Fog Computing Platform in Analytics of Internet of Things- Issues, Challenges and Opportunities / Mamoon Rashid, Umer Iqbal Wani -- A Medical Diagnosis of Urethral Stricture Using Intuitionistic Fuzzy Sets / Prabjot Kaur, Maria Jamal -- Security Attacks in Internet of Things / Rajit Nair, Preeti Sharma, Dileep Kumar Singh -- Fog Integrated Novel Architecture for Telehealth Services with Swift Medical Delivery / Inderpreet Kaur, Kamaljit Singh Saini, Jaiteg Singh Khaira -- Fruit Fly Optimization Algorithm for Intelligent IoT Applications / Satinder Singh Mohar, Sonia Goyal, Ranjit Kaur -- Optimization Techniques for Intelligent IoT Applications / Priyanka Pattnaik, Subhashree Mishra, Bhabani Shankar Prasad Mishra -- Optimization Techniques for Intelligent IoT Applications in Transport Processes / Muzafer Sara♯⁻evi♯⁷, Zoran Lon♯⁻arevi♯⁷, Adnan Hasanovi♯⁷ -- Role of Intelligent IOT Applications in Fog paradigm: Issues, Challenges and Future Opportunities / Priyanka Rajan Kumar, Sonia Goel -- Security and Privacy Issues in Fog/Edge/Pervasive Computing / Shweta Kaushik, Charu Gandhi -- Fog and Edge Driven Security & Privacy Issues in IoT Devices / Deepak Kumar Sharma, Aarti Goel, Pragun Mangla.
Record Nr. UNINA-9910554870703321
Hoboken, NJ : , : John Wiley & Sons, Incorporated : , : The Institute of Electricals and Electronics Engineers Press, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Fog, edge, and pervasive computing in intelligent IoT driven applications / / editors, Deepak Gupta, Aditya Khamparia
Fog, edge, and pervasive computing in intelligent IoT driven applications / / editors, Deepak Gupta, Aditya Khamparia
Pubbl/distr/stampa Hoboken, NJ : , : John Wiley & Sons, Incorporated : , : The Institute of Electricals and Electronics Engineers Press, , [2021]
Descrizione fisica 1 PDF
Disciplina 004.678
Soggetto topico Cloud computing
Distributed databases
Internet of things
Ubiquitous computing
ISBN 1-119-67010-1
1-119-67009-8
1-119-67008-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Fog, Edge and Pervasive Computing in Intelligent Internet of Things Driven Applications in Healthcare: Challenges, Limitations and Future Use / Afroj Alam, Sahar Qazi, Naiyar Iqbal, Khalid Raza -- Future Opportunistic Fog/Edge Computational Models and their Limitations / Sonia Singla, Naveen Kumar Bhati, S Aswath -- Automating Elicitation Technique Selection using Machine Learning / Hatim M Elhassan Ibrahim Dafallaa, Nazir Ahmad, Mohammed Burhanur Rehman, Iqrar Ahmad, Rizwan khan -- Machine Learning Frameworks and Algorithms for Fog and Edge Computing / Murali Mallikarjuna Rao Perumalla, Sanjay Kumar Singh, Aditya Khamparia, Anjali Goyal, Ashish Mishra -- Integrated Cloud Based Library Management in Intelligent IoT driven Applications / Md Robiul Alam Robel, Subrato Bharati, Prajoy Podder, M Rubaiyat Hossain Mondal -- A Systematic and Structured Review of Intelligent Systems for Diagnosis of Renal Cancer / Nikita, Harsh Sadawarti, Balwinder Kaur, Jimmy Singla -- Location Driven Edge Assisted Device and Solutions for Intelligent Transportation / Saravjeet Singh, Jaiteg Singh -- Design and Simulation of MEMS for Automobile Condition Monitoring Using COMSOL Multiphysics Simulator / Natasha Tiwari, Anil Kumar, Pallavi Asthana, Sumita Mishra, Bramah Hazela -- IoT Driven Healthcare Monitoring System / Md Robiul Alam Robel, Subrato Bharati, Prajoy Podder, M Rubaiyat Hossain Mondal -- Fog Computing as Future Perspective in Vehicular Ad hoc Networks / Harjit Singh, Vijay Laxmi, Arun Malik, Isha -- An Overview to Design an Efficient and Secure Fog-assisted Data Collection Method in the Internet of Things / Sofia, Arun Malik, Isha, Aditya Khamparia -- Role of Fog Computing Platform in Analytics of Internet of Things- Issues, Challenges and Opportunities / Mamoon Rashid, Umer Iqbal Wani -- A Medical Diagnosis of Urethral Stricture Using Intuitionistic Fuzzy Sets / Prabjot Kaur, Maria Jamal -- Security Attacks in Internet of Things / Rajit Nair, Preeti Sharma, Dileep Kumar Singh -- Fog Integrated Novel Architecture for Telehealth Services with Swift Medical Delivery / Inderpreet Kaur, Kamaljit Singh Saini, Jaiteg Singh Khaira -- Fruit Fly Optimization Algorithm for Intelligent IoT Applications / Satinder Singh Mohar, Sonia Goyal, Ranjit Kaur -- Optimization Techniques for Intelligent IoT Applications / Priyanka Pattnaik, Subhashree Mishra, Bhabani Shankar Prasad Mishra -- Optimization Techniques for Intelligent IoT Applications in Transport Processes / Muzafer Sara♯⁻evi♯⁷, Zoran Lon♯⁻arevi♯⁷, Adnan Hasanovi♯⁷ -- Role of Intelligent IOT Applications in Fog paradigm: Issues, Challenges and Future Opportunities / Priyanka Rajan Kumar, Sonia Goel -- Security and Privacy Issues in Fog/Edge/Pervasive Computing / Shweta Kaushik, Charu Gandhi -- Fog and Edge Driven Security & Privacy Issues in IoT Devices / Deepak Kumar Sharma, Aarti Goel, Pragun Mangla.
Record Nr. UNINA-9910830025303321
Hoboken, NJ : , : John Wiley & Sons, Incorporated : , : The Institute of Electricals and Electronics Engineers Press, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Handbook of Computer Networks and Cyber Security [[electronic resource] ] : Principles and Paradigms / / edited by Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta
Handbook of Computer Networks and Cyber Security [[electronic resource] ] : Principles and Paradigms / / edited by Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (xx, 959 pages) : illustrations
Disciplina 004.6
Soggetto topico Data protection
Computer communication systems
Computers
Artificial intelligence
Security
Computer Communication Networks
Information Systems and Communication Service
Artificial Intelligence
ISBN 3-030-22277-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Security Frameworks in Mobile Cloud Computing -- 2. An investigation study of Privacy Preserving in Cloud -- 3. Towards new quantitative security risk analysis models for information systems: A Cloud Computing case study -- 4. A Novel AckIBE based Secure Cloud Data Management Framework -- 5. A Practicable Machine Learning Solution for Security-cognizant Data Placement on Cloud Platforms -- 6. Threats behind default configurations of network devices: local network attacks and their countermeasures -- 7. Security and Privacy issues in Wireless Sensor and Body Area Networks -- 8. Preventing Security and Privacy Attacks in WBANs -- 9. Security in Underwater Wireless Sensor Networks -- 10. Security Issues in Cognitive Radio Ad Hoc Networks -- 11. Security and privacy in social networks: Data and Structural Anonymity -- 12. SOI FinFET for Computer Networks and Cyber Security Systems -- 13. Software Defined Networking: An Innovative Approach to Computer Networks -- 14. Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions -- 15. Survey on DDoS Attacks Techniques and Solutions in Software Defined Network -- 16. Classification of Cooperative Distributed Denial of Service Defense (DDoS) Schemes -- 17. Epidemic Modelling for the Spread of Bots through DDoS Attack in E-Commerce Network -- 18. Physical unclonable functions (puf) based security in iot: key challenges and solutions -- 19. Fog Computing: Applications and Secure Data Aggregation -- 20. A Comprehensive review of Distributed Denial of service (DDoS) Attacks in Fog Computing Environment -- 21. Secure Machine Learning scenario from Big Data in Cloud Computing via Internet of Things network -- 22. Heterogeneous-Internet of Vehicles (IoV) Communication in 21st Century: A comprehensive study -- 23. A Systematic Review on Security and Privacy Issues in Mobile Devices and Systems -- 24. Investigation of Security Issues in Distributed Systems Monitoring -- 25. An analysis of Provable Security Frameworks for RFID Security -- 26. Computational Techniques for Real Time Credit Card Fraud Detection -- 27. Requirements, Protocols and Security Challenges in Wireless Sensor Networks - An Industrial Perspective -- 28. Privacy Preservation of Electronic Health Record: Current Status and Future Direction -- 29. QKD protocols security between theory and engineering implementation -- 30. Survey of Security and Privacy issues on Biometric system -- 31. A Novel Session key Generation and Secure Communication Establishment Protocol Using Fingerprint Biometrics -- 32. Trees, CryptoSignatures and Cyberspace Mobile Agent Interfaces -- 33. Permutation-Substitution Based Image Encryption Algorithms using Pseudo Random Number Generators -- 34. Recent Trends in Document Authentication using Text Steganography -- 35. Machine Learning Based Intrusion Detection Techniques -- 36. Feature Selection using a Machine Learning to Classify a Malware -- 37. DeepDGA-MINet: Cost-Sensitive Deep Learning based Framework for Handling Multiclass Imbalanced DGA Detection -- 38. ABFT: Analytics to uplift Big Social Events Using Forensic Tools -- 39. HackIt: A Real-Time Simulation Tool for Studying Real-World Cyber-Attacks in the Laboratory.
Record Nr. UNISA-996465441903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Handbook of Computer Networks and Cyber Security : Principles and Paradigms / / edited by Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta
Handbook of Computer Networks and Cyber Security : Principles and Paradigms / / edited by Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (xx, 959 pages) : illustrations
Disciplina 004.6
Soggetto topico Data protection
Computer communication systems
Computers
Artificial intelligence
Security
Computer Communication Networks
Information Systems and Communication Service
Artificial Intelligence
ISBN 3-030-22277-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Security Frameworks in Mobile Cloud Computing -- 2. An investigation study of Privacy Preserving in Cloud -- 3. Towards new quantitative security risk analysis models for information systems: A Cloud Computing case study -- 4. A Novel AckIBE based Secure Cloud Data Management Framework -- 5. A Practicable Machine Learning Solution for Security-cognizant Data Placement on Cloud Platforms -- 6. Threats behind default configurations of network devices: local network attacks and their countermeasures -- 7. Security and Privacy issues in Wireless Sensor and Body Area Networks -- 8. Preventing Security and Privacy Attacks in WBANs -- 9. Security in Underwater Wireless Sensor Networks -- 10. Security Issues in Cognitive Radio Ad Hoc Networks -- 11. Security and privacy in social networks: Data and Structural Anonymity -- 12. SOI FinFET for Computer Networks and Cyber Security Systems -- 13. Software Defined Networking: An Innovative Approach to Computer Networks -- 14. Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions -- 15. Survey on DDoS Attacks Techniques and Solutions in Software Defined Network -- 16. Classification of Cooperative Distributed Denial of Service Defense (DDoS) Schemes -- 17. Epidemic Modelling for the Spread of Bots through DDoS Attack in E-Commerce Network -- 18. Physical unclonable functions (puf) based security in iot: key challenges and solutions -- 19. Fog Computing: Applications and Secure Data Aggregation -- 20. A Comprehensive review of Distributed Denial of service (DDoS) Attacks in Fog Computing Environment -- 21. Secure Machine Learning scenario from Big Data in Cloud Computing via Internet of Things network -- 22. Heterogeneous-Internet of Vehicles (IoV) Communication in 21st Century: A comprehensive study -- 23. A Systematic Review on Security and Privacy Issues in Mobile Devices and Systems -- 24. Investigation of Security Issues in Distributed Systems Monitoring -- 25. An analysis of Provable Security Frameworks for RFID Security -- 26. Computational Techniques for Real Time Credit Card Fraud Detection -- 27. Requirements, Protocols and Security Challenges in Wireless Sensor Networks - An Industrial Perspective -- 28. Privacy Preservation of Electronic Health Record: Current Status and Future Direction -- 29. QKD protocols security between theory and engineering implementation -- 30. Survey of Security and Privacy issues on Biometric system -- 31. A Novel Session key Generation and Secure Communication Establishment Protocol Using Fingerprint Biometrics -- 32. Trees, CryptoSignatures and Cyberspace Mobile Agent Interfaces -- 33. Permutation-Substitution Based Image Encryption Algorithms using Pseudo Random Number Generators -- 34. Recent Trends in Document Authentication using Text Steganography -- 35. Machine Learning Based Intrusion Detection Techniques -- 36. Feature Selection using a Machine Learning to Classify a Malware -- 37. DeepDGA-MINet: Cost-Sensitive Deep Learning based Framework for Handling Multiclass Imbalanced DGA Detection -- 38. ABFT: Analytics to uplift Big Social Events Using Forensic Tools -- 39. HackIt: A Real-Time Simulation Tool for Studying Real-World Cyber-Attacks in the Laboratory.
Record Nr. UNINA-9910366655603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Handbook of Reconstructive Flaps / / by: Hanasono, Matthew M., Butler, Charles E.
Handbook of Reconstructive Flaps / / by: Hanasono, Matthew M., Butler, Charles E.
Autore Adelman David M
Pubbl/distr/stampa New York, New York : , : Thieme, , [2021]
Descrizione fisica 1 online resource (382 pages)
Disciplina 617.95
Soggetto topico Flaps (Surgery)
ISBN 1-63853-010-6
1-62623-860-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910794377303321
Adelman David M  
New York, New York : , : Thieme, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui