top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advanced Computational Intelligence Techniques for Virtual Reality in Healthcare / / edited by Deepak Gupta, Aboul Ella Hassanien, Ashish Khanna
Advanced Computational Intelligence Techniques for Virtual Reality in Healthcare / / edited by Deepak Gupta, Aboul Ella Hassanien, Ashish Khanna
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (241 pages)
Disciplina 006.3
Collana Studies in Computational Intelligence
Soggetto topico Computational intelligence
Artificial intelligence
Virtual reality in medicine
ISBN 9783030352523
3030352528
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto World of Virtual Reality (VR) in Healthcare -- Towards a VIREAL Platform: Virtual Reality in Cognitive and Behavioural Training for Autistic Individuals -- Assisting Students To Understand Mathematical Graphs Using Virtual Reality Application -- Short Time Frequency Analysis of Theta Activity for the Diagnosis of Bruxism on EEG Sleep Record -- Hand Gesture Recognition for Human Computer Interaction and its Applications in Virtual Reality -- Fluid Dynamics in Healthcare Industries: Computational Intelligence Prospective -- A Novel Approach Towards using Big Data and IoT for Improving the Efficiency of m-Health Systems -- Using Artificial Intelligence to Bring Accurate Real-Time Simulation To Virtual Reality -- Application Of Chicken Swarm Optimization In Detection of Cancer and Virtual Reality -- Computational Fluid Dynamics Simulations with Applications in Virtual Reality Aided Health Care Diagnostics -- Data Analysis and Classification of Cardiovascular Disease and Risk Factors Associated With it in India.
Record Nr. UNINA-9910483983103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced machine intelligence and signal processing / / Deepak Gupta [and three others], editors
Advanced machine intelligence and signal processing / / Deepak Gupta [and three others], editors
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore Pte Ltd., , [2022]
Descrizione fisica 1 online resource (859 pages)
Disciplina 006.31
Collana Lecture notes in electrical engineering
Soggetto topico Machine learning
Signal processing
ISBN 981-19-0840-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910580150803321
Singapore : , : Springer Nature Singapore Pte Ltd., , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in IoT and Security with Computational Intelligence : Proceedings of ICAISA 2023, Volume 2 / / edited by Anurag Mishra, Deepak Gupta, Girija Chetty
Advances in IoT and Security with Computational Intelligence : Proceedings of ICAISA 2023, Volume 2 / / edited by Anurag Mishra, Deepak Gupta, Girija Chetty
Autore Mishra Anurag
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (418 pages)
Disciplina 004.678
Altri autori (Persone) GuptaDeepak
ChettyGirija
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Internet of things
Data protection
Computational Intelligence
Internet of Things
Data and Information Security
ISBN 9789819950881
9819950880
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- Comparative Study of Metaheuristic Algorithms for Scheduling in Cloud Computing Based on QoS Parameters -- 1 Introduction -- 1.1 Contributions -- 2 Review Literature -- 3 Scheduling Approaches -- 3.1 Heuristic Approaches -- 3.2 Metaheuristic Approaches -- 4 Problem Description and QoS Parameters -- 5 Comparative Analysis of PSO, GA, and ACO -- 6 Conclusion and Future Work -- References -- Impact of Spatial Distribution of Repeated Samples on the Geometry of Hyperplanes -- 1 Introduction -- 2 Review of SVM Classifiers -- 2.1 Support Vector Machine (SVM) -- 3 Experimental Setup, Results, and Analysis -- 3.1 Dataset Used -- 3.2 Algorithm -- 3.3 Case 1 and Case 3: Repeating the Left-Side Support Vectors Belonging to the Positive and Negative Classes -- 3.4 Case 2 and Case 4: Repeating the Right-Side Support Vectors Belonging to the Positive and Negative Classes -- 4 Conclusion and Future Directions -- References -- IoT-Based Smart Farming for Sustainable Agriculture -- 1 Introduction -- 2 Methodology -- 2.1 IoT in Indian Agriculture and Its Applications -- 2.2 Agridat Package in RStudio -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- ELM-Based Liver Disease Prediction Model -- 1 Introduction -- 2 Extreme Learning Machine -- 3 Dataset -- 4 Proposed Methodology -- 5 Result and Discussion -- 5.1 Performance Analysis of ELM Using 80:20 Training-Testing Ratio -- 5.2 Performance Analysis of ELM Using 70:30 Training-Testing Ratio -- 5.3 Comparison with Other Published Works Done in the Same Domain -- 6 Conclusion -- References -- Intercompatibility of IoT Devices Using Matter: Next-Generation IoT Connectivity Protocol -- 1 Introduction -- 1.1 Current Alternatives -- 2 Need for Matter -- 2.1 Smart Home Ecosystems -- 2.2 Consumer and Manufacturer Standpoint -- 2.3 Security.
3 What is Matter -- 3.1 Architecture -- 3.2 Security -- 4 Thread for Matter -- 5 Outcome -- 5.1 Moving Forward -- References -- Role of Node Centrality for Information Dissemination in Delhi Metro Network -- 1 Introduction -- 1.1 Our Contributions -- 2 Characteristics of the Network -- 2.1 Structural Properties -- 2.2 Centrality Metrics -- 3 Methodology -- 3.1 Construction of Delhi Metro Network -- 3.2 Information Diffusion Model -- 4 Results -- 4.1 Identifying Prominent Metro Stations -- 4.2 Role of the Central Most Station on Information Dissemination -- 4.3 Identifying Efficient Centrality Measure by Regression Analysis -- 4.4 Connectivity Analysis -- 5 Conclusion -- References -- Biometric Iris Recognition System's Software and Hardware Implementation Using LabVIEW Tool -- 1 Introduction -- 2 Methodology -- 3 Drawbacks of the Research Works Done by Earlier Researchers -- 4 Image Analysis and the Image Recognition Algorithmic Steps -- 5 Recognition of Iris Procedures Utilizing Sing DIP Summaries -- 6 Overview of the LabVIEW Concepts -- 7 Proposed Contributions -- 8 Conclusions -- References -- A Unique Method of Detection of Edges and Circles of Multiple Objects in Imaging Scenarios Using Line Descriptor Concepts -- 1 Introduction -- 2 Block-Diagrams/Flow-Charts -- 3 Chain Coding Process -- 4 Approaches -- 5 Introductory Remarks -- 6 Line Descriptors -- 7 Program/Algorithm Developed -- 8 Conclusion -- References -- Robotic Vision: Simultaneous Localization And Mapping (SLAM) and Object Recognition -- 1 Introduction -- 2 Literature Survey -- 3 LiDAR SLAM -- 4 YOLO_v4 -- 5 Hardware Used -- 6 Results -- 7 Conclusion -- References -- Optimum Value of Cyclic Prefix (CP) to Reduce Bit Error Rate (BER) in OFDM -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 4 Simulation Flowchart -- 5 Results and Conclusion.
5.1 BPSK (Binary Phase Shift Keying) -- 5.2 QPSK (Quadrature Phase Shift Keying) -- 5.3 16-QAM (16-Quadrature Amplitude Multiplexing) -- 5.4 32-QAM (32-Quadrature Amplitude Multiplexing) -- References -- Optimum Sizing of Solar/Wind/Battery Storage in Hybrid Energy System Using Improved Particle Swarm Optimization and Firefly Algorithm -- 1 Introduction -- 2 System Configuration, Mathematical Modeling of Components of Hybrid Renewable Energy System, Objective Function and Constraints -- 2.1 Mathematical Modeling of Components of Hybrid Energy System: [15, 17] -- 2.2 Objective Function and Constraints -- 3 Size Optimization Algorithms -- 3.1 Improved Particle Swarm Optimization (IPSO) [15, 17, 18] -- 3.2 Firefly Algorithm (FA): [11, 12, 16]: -- 3.3 Procedure for Implementing IPSO [18] and FA -- 3.4 Comparison of Optimization Methods IPSO and FA -- 4 Results and Discussions -- 5 Conclusions -- References -- Fuzzy Based MPPT Control of Multiport Boost Converter for Solar Based Electric Vehicle -- 1 Introduction -- 2 Proposed System -- 3 Solar PV -- 3.1 Solar PV Array -- 3.2 Fuzzy-Based MPPT Control -- 4 Non-isolated Multiport Boost Converter -- 4.1 Double Output Mode -- 5 Proposed Controller -- 6 Results -- 7 Conclusion -- References -- Image Classification Model Based on Machine Learning Using GAN and CNN Algorithm -- 1 Introduction -- 1.1 Face Detection -- 1.2 Developing Face Recognition Software -- 2 Literature Review -- 3 Experimental Investigation -- 3.1 Description of Modules -- 3.2 Response and Conversation -- 4 Result Analysis -- 5 Data Visualization Techniques -- 6 Conclusion -- References -- Role of Natural Language Processing for Text Mining of Education Policy in Rajasthan -- 1 Introduction -- 1.1 Interpretation with ML for NLP -- 1.2 About Education Policy 2020 -- 2 Methodology -- 2.1 Code and Executed Screenshots of Python for NLP.
3 Results -- 4 Conclusion -- References -- Multilingual and Cross Lingual Audio Emotion Analysis Using RNN -- 1 Introduction -- 2 Related Work -- 3 Methods and Materials -- 3.1 Database -- 3.2 Data Augmentation Technique -- 3.3 Feature Extraction -- 3.4 Convolution Neural Network -- 3.5 LSTM Model -- 4 Proposed Model Framework -- 5 Experimental Results and Discussion- -- 5.1 Some Potential Comparison Studies Based on Mono-lingual Database -- 5.2 Multilingual Database Analysis -- 5.3 Cross-Lingual Database Analysis -- 6 Conclusions -- References -- Multi-modality Brain Tumor Segmentation of MRI Images Using ResUnet with Attention Mechanism -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Preprocessing and Data Augmentation -- 3.2 ResUnet with Attention Mechanism -- 4 Results and Discussion -- 4.1 Dataset (BraTs 2020) -- 4.2 Experimental Setup -- 4.3 Performance Metrics -- 4.4 Results and Discussion -- 5 Conclusion and Future Scope -- References -- CPF Analysis for Identification of Voltage Collapse Point and Voltage Stability of an IEEE-5 Bus System Using STATCOM -- 1 Introduction -- 2 System Structure -- 3 Simulation Results and Discussion -- 4 Conclusion -- References -- Analysis of Various Blockchain-Based Solutions for Electronic Health Record System -- 1 Introduction -- 2 Blockchain Technology/Fundamentals -- 3 Blockchain Development Tools -- 4 Blockchain for EHR -- 5 Comparative Analysis of Existing Blockchain-Based Solutions -- 6 Conclusion -- References -- Coordinated Network of Sensors Over 5G for High-Resolution Protection of City Assets During Earthquakes -- 1 Introduction -- 1.1 Current Technology for Earthquake Early Warning -- 1.2 Proposed Dense Network of Sensors for Individual Asset Damage Assessment -- 2 Mini-Seismic Stations -- 3 Sensors Coordination -- 3.1 Asynchronous Sensor Coordination Algorithm.
3.2 Latency Measurements -- 4 Performance-Based Damage Assessment -- 5 Infrastructures Interdependencies Integration (I2SIM) -- 6 Conclusion -- References -- Detection of COVID-19 Using Medical Image Processing -- 1 Introduction -- 2 Contribution of Medical Image Processing in COVID-19 -- 3 Medical Image Processing with Deep Learning in COVID-19 -- 4 Conclusions -- References -- Text Encryption Using ECC and Chaotic Map -- 1 Introduction -- 2 Preliminaries -- 2.1 Mathematical Computation with Elliptic Curve Over a Finite Field -- 2.2 Chaotic System -- 3 Data Grouping -- 4 Proposed Methodology -- 4.1 Encryption Algorithm -- 4.2 Decryption Algorithm -- 5 Experimental Simulation -- 6 Experimental Analysis -- 6.1 Key Space -- 6.2 Key Sensitivity -- 6.3 Histogram Analysis -- 6.4 Ciphertext Only Attack -- 6.5 Known Plaintext Attack -- 6.6 Performance Comparison -- 7 Conclusion -- References -- Plant Leaf Disease Detection and Classification: A Survey -- 1 Introduction -- 1.1 Motivation -- 2 Related Work -- 2.1 Disease Detection and Classification -- 2.2 Comparative Analysis -- 3 Findings -- 4 Conclusion -- References -- Performance Evaluation of K-SVCR in Multi-class Scenario -- 1 Introduction -- 2 Literature Review -- 3 K-Support Vector Classification Regression -- 4 Experimental Design -- 5 Conclusion and Future Scope -- References -- An Ensemble Method for Categorizing Cardiovascular Disease -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Dataset -- 3.2 Data Preprocessing -- 3.3 Feature Engineering -- 4 Model Training and Disease Classification -- 5 Model Performance Evaluation -- 6 Discussion and Conclusion -- References -- Intrusion Detection System for Internet of Medical Things -- 1 Introduction -- 2 IoMT -- 2.1 Components of IoMT -- 2.2 3-Layer Architecture -- 2.3 Intrusion Detection in IoMT -- 3 Integrative Technologies in IoMT.
3.1 Blockchain Technology.
Record Nr. UNINA-9910746297503321
Mishra Anurag  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Artificial intelligence for data-driven medical diagnosis / / edited by Deepak Gupta [and three others]
Artificial intelligence for data-driven medical diagnosis / / edited by Deepak Gupta [and three others]
Pubbl/distr/stampa Berlin ; ; Boston : , : De Gruyter, , [2021]
Descrizione fisica 1 online resource (328 pages)
Disciplina 006.3
Collana Intelligent Biomedical Data Analysis
Soggetto topico Artificial intelligence
ISBN 3-11-066832-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Frontmatter -- Preface -- Acknowledgment -- Contents -- List of contributors -- 1 Performance of CNN for predicting cancerous lung nodules using LightGBM -- 2 Deep learning-based cellular image analysis for intelligent medical diagnosis -- 3 Deep learning approaches in metastatic breast cancer detection -- 4 Machine learning: an ultimate solution for diagnosis and treatment of cancer -- 5 Artificial intelligence in medicine (AIM): machine learning in cancer diagnosis, prognosis and therapy -- 6 Diagnosis disease from medical databases using neural networks: a review -- 7 A novel neutrosophic approach-based filtering and Gaussian mixture modeling clustering for CT/MR images -- 8 Decentralized solutions for data collection and privacy in healthcare -- 9 Navigation from conventional to intelligent healthcare: adoption of Internet of health things for noncommunicable disease screening, diagnosis, monitoring and treatment in community settings -- 10 Automated gastric cancer detection and classification using machine learning -- 11 Artificial intelligence applications for medical diagnosis and production with 3D printing technologies -- 12 Detection of breast cancer using deep neural networks with transfer learning on histopathological images -- 13 A machine vision technique-based tongue diagnosis system in Ayurveda -- 14 Vine copula and artificial neural network models to analyze breast cancer data -- Index
Record Nr. UNINA-9910554496703321
Berlin ; ; Boston : , : De Gruyter, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber crime and forensic computing : modern principles, practices, and algorithms. / / edited by Gulshan Shrivastava, Deepak Gupta, Kavita Sharma
Cyber crime and forensic computing : modern principles, practices, and algorithms. / / edited by Gulshan Shrivastava, Deepak Gupta, Kavita Sharma
Pubbl/distr/stampa Berlin ; ; Boston : , : Walter de Gruyter GmbH, , [2021]
Descrizione fisica 1 online resource (242 pages)
Disciplina 364.168
Collana De Gruyter Frontiers in Computational Intelligence
Soggetto topico Computer crimes
ISBN 3-11-067747-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Contents -- About the editors -- A survey of popular digital forensic tools -- An insight review on multimedia forensics technology -- An overview on advanced multimedia forensic techniques and future direction -- Computer forensics and Cyber Crimes: COVID-19 perspective -- Biometric forensic tools for criminal investigation -- Deep learning for optimization of e-evidence -- Electronic voting machine security issues and solution protocol by physical unclonable function -- Machine learning for mobile malware analysis -- Mobile platform security: issues and countermeasures -- Data leakage detection in Wi-Fi networks -- Index.
Record Nr. UNINA-9910554250903321
Berlin ; ; Boston : , : Walter de Gruyter GmbH, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Fog, edge, and pervasive computing in intelligent IoT driven applications / / editors, Deepak Gupta, Aditya Khamparia
Fog, edge, and pervasive computing in intelligent IoT driven applications / / editors, Deepak Gupta, Aditya Khamparia
Pubbl/distr/stampa Hoboken, NJ : , : John Wiley & Sons, Incorporated : , : The Institute of Electricals and Electronics Engineers Press, , [2021]
Descrizione fisica 1 PDF
Disciplina 004.678
Soggetto topico Cloud computing
Distributed databases
Internet of things
Ubiquitous computing
ISBN 1-119-67010-1
1-119-67009-8
1-119-67008-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Fog, Edge and Pervasive Computing in Intelligent Internet of Things Driven Applications in Healthcare: Challenges, Limitations and Future Use / Afroj Alam, Sahar Qazi, Naiyar Iqbal, Khalid Raza -- Future Opportunistic Fog/Edge Computational Models and their Limitations / Sonia Singla, Naveen Kumar Bhati, S Aswath -- Automating Elicitation Technique Selection using Machine Learning / Hatim M Elhassan Ibrahim Dafallaa, Nazir Ahmad, Mohammed Burhanur Rehman, Iqrar Ahmad, Rizwan khan -- Machine Learning Frameworks and Algorithms for Fog and Edge Computing / Murali Mallikarjuna Rao Perumalla, Sanjay Kumar Singh, Aditya Khamparia, Anjali Goyal, Ashish Mishra -- Integrated Cloud Based Library Management in Intelligent IoT driven Applications / Md Robiul Alam Robel, Subrato Bharati, Prajoy Podder, M Rubaiyat Hossain Mondal -- A Systematic and Structured Review of Intelligent Systems for Diagnosis of Renal Cancer / Nikita, Harsh Sadawarti, Balwinder Kaur, Jimmy Singla -- Location Driven Edge Assisted Device and Solutions for Intelligent Transportation / Saravjeet Singh, Jaiteg Singh -- Design and Simulation of MEMS for Automobile Condition Monitoring Using COMSOL Multiphysics Simulator / Natasha Tiwari, Anil Kumar, Pallavi Asthana, Sumita Mishra, Bramah Hazela -- IoT Driven Healthcare Monitoring System / Md Robiul Alam Robel, Subrato Bharati, Prajoy Podder, M Rubaiyat Hossain Mondal -- Fog Computing as Future Perspective in Vehicular Ad hoc Networks / Harjit Singh, Vijay Laxmi, Arun Malik, Isha -- An Overview to Design an Efficient and Secure Fog-assisted Data Collection Method in the Internet of Things / Sofia, Arun Malik, Isha, Aditya Khamparia -- Role of Fog Computing Platform in Analytics of Internet of Things- Issues, Challenges and Opportunities / Mamoon Rashid, Umer Iqbal Wani -- A Medical Diagnosis of Urethral Stricture Using Intuitionistic Fuzzy Sets / Prabjot Kaur, Maria Jamal -- Security Attacks in Internet of Things / Rajit Nair, Preeti Sharma, Dileep Kumar Singh -- Fog Integrated Novel Architecture for Telehealth Services with Swift Medical Delivery / Inderpreet Kaur, Kamaljit Singh Saini, Jaiteg Singh Khaira -- Fruit Fly Optimization Algorithm for Intelligent IoT Applications / Satinder Singh Mohar, Sonia Goyal, Ranjit Kaur -- Optimization Techniques for Intelligent IoT Applications / Priyanka Pattnaik, Subhashree Mishra, Bhabani Shankar Prasad Mishra -- Optimization Techniques for Intelligent IoT Applications in Transport Processes / Muzafer Sara♯⁻evi♯⁷, Zoran Lon♯⁻arevi♯⁷, Adnan Hasanovi♯⁷ -- Role of Intelligent IOT Applications in Fog paradigm: Issues, Challenges and Future Opportunities / Priyanka Rajan Kumar, Sonia Goel -- Security and Privacy Issues in Fog/Edge/Pervasive Computing / Shweta Kaushik, Charu Gandhi -- Fog and Edge Driven Security & Privacy Issues in IoT Devices / Deepak Kumar Sharma, Aarti Goel, Pragun Mangla.
Record Nr. UNINA-9910554870703321
Hoboken, NJ : , : John Wiley & Sons, Incorporated : , : The Institute of Electricals and Electronics Engineers Press, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Fog, edge, and pervasive computing in intelligent IoT driven applications / / editors, Deepak Gupta, Aditya Khamparia
Fog, edge, and pervasive computing in intelligent IoT driven applications / / editors, Deepak Gupta, Aditya Khamparia
Pubbl/distr/stampa Hoboken, NJ : , : John Wiley & Sons, Incorporated : , : The Institute of Electricals and Electronics Engineers Press, , [2021]
Descrizione fisica 1 PDF
Disciplina 004.678
Soggetto topico Cloud computing
Distributed databases
Internet of things
Ubiquitous computing
ISBN 1-119-67010-1
1-119-67009-8
1-119-67008-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Fog, Edge and Pervasive Computing in Intelligent Internet of Things Driven Applications in Healthcare: Challenges, Limitations and Future Use / Afroj Alam, Sahar Qazi, Naiyar Iqbal, Khalid Raza -- Future Opportunistic Fog/Edge Computational Models and their Limitations / Sonia Singla, Naveen Kumar Bhati, S Aswath -- Automating Elicitation Technique Selection using Machine Learning / Hatim M Elhassan Ibrahim Dafallaa, Nazir Ahmad, Mohammed Burhanur Rehman, Iqrar Ahmad, Rizwan khan -- Machine Learning Frameworks and Algorithms for Fog and Edge Computing / Murali Mallikarjuna Rao Perumalla, Sanjay Kumar Singh, Aditya Khamparia, Anjali Goyal, Ashish Mishra -- Integrated Cloud Based Library Management in Intelligent IoT driven Applications / Md Robiul Alam Robel, Subrato Bharati, Prajoy Podder, M Rubaiyat Hossain Mondal -- A Systematic and Structured Review of Intelligent Systems for Diagnosis of Renal Cancer / Nikita, Harsh Sadawarti, Balwinder Kaur, Jimmy Singla -- Location Driven Edge Assisted Device and Solutions for Intelligent Transportation / Saravjeet Singh, Jaiteg Singh -- Design and Simulation of MEMS for Automobile Condition Monitoring Using COMSOL Multiphysics Simulator / Natasha Tiwari, Anil Kumar, Pallavi Asthana, Sumita Mishra, Bramah Hazela -- IoT Driven Healthcare Monitoring System / Md Robiul Alam Robel, Subrato Bharati, Prajoy Podder, M Rubaiyat Hossain Mondal -- Fog Computing as Future Perspective in Vehicular Ad hoc Networks / Harjit Singh, Vijay Laxmi, Arun Malik, Isha -- An Overview to Design an Efficient and Secure Fog-assisted Data Collection Method in the Internet of Things / Sofia, Arun Malik, Isha, Aditya Khamparia -- Role of Fog Computing Platform in Analytics of Internet of Things- Issues, Challenges and Opportunities / Mamoon Rashid, Umer Iqbal Wani -- A Medical Diagnosis of Urethral Stricture Using Intuitionistic Fuzzy Sets / Prabjot Kaur, Maria Jamal -- Security Attacks in Internet of Things / Rajit Nair, Preeti Sharma, Dileep Kumar Singh -- Fog Integrated Novel Architecture for Telehealth Services with Swift Medical Delivery / Inderpreet Kaur, Kamaljit Singh Saini, Jaiteg Singh Khaira -- Fruit Fly Optimization Algorithm for Intelligent IoT Applications / Satinder Singh Mohar, Sonia Goyal, Ranjit Kaur -- Optimization Techniques for Intelligent IoT Applications / Priyanka Pattnaik, Subhashree Mishra, Bhabani Shankar Prasad Mishra -- Optimization Techniques for Intelligent IoT Applications in Transport Processes / Muzafer Sara♯⁻evi♯⁷, Zoran Lon♯⁻arevi♯⁷, Adnan Hasanovi♯⁷ -- Role of Intelligent IOT Applications in Fog paradigm: Issues, Challenges and Future Opportunities / Priyanka Rajan Kumar, Sonia Goel -- Security and Privacy Issues in Fog/Edge/Pervasive Computing / Shweta Kaushik, Charu Gandhi -- Fog and Edge Driven Security & Privacy Issues in IoT Devices / Deepak Kumar Sharma, Aarti Goel, Pragun Mangla.
Record Nr. UNINA-9910830025303321
Hoboken, NJ : , : John Wiley & Sons, Incorporated : , : The Institute of Electricals and Electronics Engineers Press, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Handbook of Computer Networks and Cyber Security [[electronic resource] ] : Principles and Paradigms / / edited by Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta
Handbook of Computer Networks and Cyber Security [[electronic resource] ] : Principles and Paradigms / / edited by Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (xx, 959 pages) : illustrations
Disciplina 004.6
Soggetto topico Data protection
Computer communication systems
Computers
Artificial intelligence
Security
Computer Communication Networks
Information Systems and Communication Service
Artificial Intelligence
ISBN 3-030-22277-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Security Frameworks in Mobile Cloud Computing -- 2. An investigation study of Privacy Preserving in Cloud -- 3. Towards new quantitative security risk analysis models for information systems: A Cloud Computing case study -- 4. A Novel AckIBE based Secure Cloud Data Management Framework -- 5. A Practicable Machine Learning Solution for Security-cognizant Data Placement on Cloud Platforms -- 6. Threats behind default configurations of network devices: local network attacks and their countermeasures -- 7. Security and Privacy issues in Wireless Sensor and Body Area Networks -- 8. Preventing Security and Privacy Attacks in WBANs -- 9. Security in Underwater Wireless Sensor Networks -- 10. Security Issues in Cognitive Radio Ad Hoc Networks -- 11. Security and privacy in social networks: Data and Structural Anonymity -- 12. SOI FinFET for Computer Networks and Cyber Security Systems -- 13. Software Defined Networking: An Innovative Approach to Computer Networks -- 14. Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions -- 15. Survey on DDoS Attacks Techniques and Solutions in Software Defined Network -- 16. Classification of Cooperative Distributed Denial of Service Defense (DDoS) Schemes -- 17. Epidemic Modelling for the Spread of Bots through DDoS Attack in E-Commerce Network -- 18. Physical unclonable functions (puf) based security in iot: key challenges and solutions -- 19. Fog Computing: Applications and Secure Data Aggregation -- 20. A Comprehensive review of Distributed Denial of service (DDoS) Attacks in Fog Computing Environment -- 21. Secure Machine Learning scenario from Big Data in Cloud Computing via Internet of Things network -- 22. Heterogeneous-Internet of Vehicles (IoV) Communication in 21st Century: A comprehensive study -- 23. A Systematic Review on Security and Privacy Issues in Mobile Devices and Systems -- 24. Investigation of Security Issues in Distributed Systems Monitoring -- 25. An analysis of Provable Security Frameworks for RFID Security -- 26. Computational Techniques for Real Time Credit Card Fraud Detection -- 27. Requirements, Protocols and Security Challenges in Wireless Sensor Networks - An Industrial Perspective -- 28. Privacy Preservation of Electronic Health Record: Current Status and Future Direction -- 29. QKD protocols security between theory and engineering implementation -- 30. Survey of Security and Privacy issues on Biometric system -- 31. A Novel Session key Generation and Secure Communication Establishment Protocol Using Fingerprint Biometrics -- 32. Trees, CryptoSignatures and Cyberspace Mobile Agent Interfaces -- 33. Permutation-Substitution Based Image Encryption Algorithms using Pseudo Random Number Generators -- 34. Recent Trends in Document Authentication using Text Steganography -- 35. Machine Learning Based Intrusion Detection Techniques -- 36. Feature Selection using a Machine Learning to Classify a Malware -- 37. DeepDGA-MINet: Cost-Sensitive Deep Learning based Framework for Handling Multiclass Imbalanced DGA Detection -- 38. ABFT: Analytics to uplift Big Social Events Using Forensic Tools -- 39. HackIt: A Real-Time Simulation Tool for Studying Real-World Cyber-Attacks in the Laboratory.
Record Nr. UNISA-996465441903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Handbook of Computer Networks and Cyber Security : Principles and Paradigms / / edited by Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta
Handbook of Computer Networks and Cyber Security : Principles and Paradigms / / edited by Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (xx, 959 pages) : illustrations
Disciplina 004.6
Soggetto topico Data protection
Computer networks
Computers
Artificial intelligence
Security
Computer Communication Networks
Information Systems and Communication Service
Artificial Intelligence
ISBN 9783030222772
3030222772
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Security Frameworks in Mobile Cloud Computing -- 2. An investigation study of Privacy Preserving in Cloud -- 3. Towards new quantitative security risk analysis models for information systems: A Cloud Computing case study -- 4. A Novel AckIBE based Secure Cloud Data Management Framework -- 5. A Practicable Machine Learning Solution for Security-cognizant Data Placement on Cloud Platforms -- 6. Threats behind default configurations of network devices: local network attacks and their countermeasures -- 7. Security and Privacy issues in Wireless Sensor and Body Area Networks -- 8. Preventing Security and Privacy Attacks in WBANs -- 9. Security in Underwater Wireless Sensor Networks -- 10. Security Issues in Cognitive Radio Ad Hoc Networks -- 11. Security and privacy in social networks: Data and Structural Anonymity -- 12. SOI FinFET for Computer Networks and Cyber Security Systems -- 13. Software Defined Networking: An Innovative Approach to Computer Networks -- 14. Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions -- 15. Survey on DDoS Attacks Techniques and Solutions in Software Defined Network -- 16. Classification of Cooperative Distributed Denial of Service Defense (DDoS) Schemes -- 17. Epidemic Modelling for the Spread of Bots through DDoS Attack in E-Commerce Network -- 18. Physical unclonable functions (puf) based security in iot: key challenges and solutions -- 19. Fog Computing: Applications and Secure Data Aggregation -- 20. A Comprehensive review of Distributed Denial of service (DDoS) Attacks in Fog Computing Environment -- 21. Secure Machine Learning scenario from Big Data in Cloud Computing via Internet of Things network -- 22. Heterogeneous-Internet of Vehicles (IoV) Communication in 21st Century: A comprehensive study -- 23. A Systematic Review on Security and Privacy Issues in Mobile Devices and Systems -- 24. Investigation of Security Issues in Distributed Systems Monitoring -- 25. An analysis of Provable Security Frameworks for RFID Security -- 26. Computational Techniques for Real Time Credit Card Fraud Detection -- 27. Requirements, Protocols and Security Challenges in Wireless Sensor Networks - An Industrial Perspective -- 28. Privacy Preservation of Electronic Health Record: Current Status and Future Direction -- 29. QKD protocols security between theory and engineering implementation -- 30. Survey of Security and Privacy issues on Biometric system -- 31. A Novel Session key Generation and Secure Communication Establishment Protocol Using Fingerprint Biometrics -- 32. Trees, CryptoSignatures and Cyberspace Mobile Agent Interfaces -- 33. Permutation-Substitution Based Image Encryption Algorithms using Pseudo Random Number Generators -- 34. Recent Trends in Document Authentication using Text Steganography -- 35. Machine Learning Based Intrusion Detection Techniques -- 36. Feature Selection using a Machine Learning to Classify a Malware -- 37. DeepDGA-MINet: Cost-Sensitive Deep Learning based Framework for Handling Multiclass Imbalanced DGA Detection -- 38. ABFT: Analytics to uplift Big Social Events Using Forensic Tools -- 39. HackIt: A Real-Time Simulation Tool for Studying Real-World Cyber-Attacks in the Laboratory.
Record Nr. UNINA-9910366655603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Handbook of Reconstructive Flaps / / by: Hanasono, Matthew M., Butler, Charles E.
Handbook of Reconstructive Flaps / / by: Hanasono, Matthew M., Butler, Charles E.
Autore Adelman David M
Pubbl/distr/stampa New York, New York : , : Thieme, , [2021]
Descrizione fisica 1 online resource (382 pages)
Disciplina 617.95
Soggetto topico Flaps (Surgery)
ISBN 1-63853-010-6
1-62623-860-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910794377303321
Adelman David M  
New York, New York : , : Thieme, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui