Cyber warfare, security and space research : First International Conference, SPACSEC 2021, Jaipur, India, December 9-10, 2021 / / Sandeep Joshi [and four others] editors
| Cyber warfare, security and space research : First International Conference, SPACSEC 2021, Jaipur, India, December 9-10, 2021 / / Sandeep Joshi [and four others] editors |
| Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
| Descrizione fisica | 1 online resource (339 pages) |
| Disciplina | 629.1028 |
| Collana | Communications in computer and information science |
| Soggetto topico |
Astrionics
Computer security |
| ISBN | 3-031-15784-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Creation of Novel Database for Knowledge Repository on Cyber Security -- 1 Introduction -- 2 Related Work -- 2.1 Data Collection -- 2.2 Material and Methods -- 2.3 Mapping of Threats with Data Objects -- 2.4 Characterization Framework Categories -- 3 Data Model -- 4 Mathematical Modelling -- 5 Instances and Schemas -- 6 Data Model Preparing Techniques -- 7 Entity Relationship Introduction -- 7.1 ER Diagram Research -- 8 Result and Discussion -- 8.1 ER Diagram -- 8.2 Schema -- 8.3 Design of Database Model Tables -- 8.4 Query Processings -- 9 Conclusion -- References -- Brain Tumor Classification via UNET Architecture of CNN Technique -- 1 Introduction -- 2 UNET Architecture and Training -- 3 Related Work -- 4 Dataset Description Data Acquisition -- 4.1 Data Acquisition -- 4.2 Pre-processing -- 4.3 Transfer Learning -- 5 System Model -- 6 Proposed Methodology -- 7 Result and Discussion -- 8 Conclusion -- References -- Analysis of Various Supervised Machine Learning Algorithms for Intrusion Detection -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 The UNSW-NB15 Dataset -- 3.2 Feature Engineering -- 3.3 Preprocessing -- 3.4 Feature Selection -- 3.5 Machine Learning Algorithms -- 4 Results -- 5 Conclusion -- References -- Enhanced Security Mechanism for Cryptographic File Systems Using Trusted Computing -- 1 Introduction -- 2 Modules of Trusted Computing -- 2.1 Hardware Module - TPM Chip -- 2.2 Software Module - TSS -- 3 Safe Storage with TPM -- 3.1 RoT for Storage -- 3.2 Secure Storage TPM Commands -- 4 Measurements of Platform -- 5 TPM in CFS's -- 6 Implementation of Proposed Method -- 7 Evaluation of Performance -- 8 Conclusions and Future Work -- References -- Critical Analysis of IoT Ecosystem to Understand Security Threats and Challenges -- 1 Introduction -- 2 Related Works.
3 Architecture -- 3.1 IoT Object Ecosystem -- 3.2 Service Ecosystem -- 4 Object-Ecosystem Security -- 5 Service-Ecosystem Security -- 6 Discussion -- 7 Conclusion -- References -- Hyper-parameters Study for Breast Cancer Datasets: Enhancing Image Security and Accuracy for Prediction Class -- 1 Introduction -- 1.1 Related Work -- 2 Proposed Work -- 2.1 Dataset -- 3 Method and Modeling -- 3.1 Support Vector Machine -- 3.2 Proposed Model -- 4 Result Analysis -- 4.1 Measure of Performance Evaluation -- 5 Conclusion -- References -- An Efficient Image Encryption Technique Using Logistic Map and 2D-TCLM -- 1 Introduction -- 2 Related Works -- 3 Mathematical Preliminaries -- 3.1 Logistic Map -- 3.2 2D-TCLM -- 4 Proposed Image Encryption and Decryption -- 5 Experimental Results and Performance Analysis -- 5.1 Performance Analysis -- 6 Conclusion and Future Works -- References -- Learning Co-occurrence Embeddings for Sentence Classification -- 1 Introduction -- 2 Related Works -- 3 Proposed Model -- 3.1 Overview of the Proposed CNN Model -- 3.2 CNN Architecture -- 4 Experimental Results -- 4.1 Datasets -- 4.2 Results and Discussion -- 5 Conclusion and Future Scope -- References -- Preventing Fault Attacks on S-Boxes of AES-Like Block Ciphers -- 1 Introduction -- 2 Related Work -- 3 Designing Synthesized S-Boxes Using CA -- 3.1 Basics of the Design Primitive: Cellular Automata -- 3.2 S-Box Design -- 3.3 Inverse S-Box -- 3.4 The Synthetic NLCA Based S-Boxes -- 3.5 Cryptographic Properties of the S-Boxes -- 4 Designing Fault Resilient S-Boxes for AES-Like Block Ciphers -- 4.1 Fault Model -- 4.2 Design Approach -- 5 Result and Discussion -- 6 Conclusion -- References -- Privacy Preserving of Two Local Data Sites Using Global Random Forest Classification -- 1 Introduction -- 2 Privacy Preserving -- 3 Data Partitioning -- 4 Ensemble Learning. 4.1 Bootstrap Aggregating - Bagging -- 4.2 Random Forest Classification -- 5 Privacy Preserving Global Random Forest Classification-Horizontal -- 5.1 Process of Horizontal-PPGRF Algorithm -- 6 Privacy Preserving Global Random Forest Classification - Vertical -- 6.1 Process of Vertical-PPGRF Classification -- 7 Experiments and Results -- 7.1 Results of Horizontal-PPGRF -- 7.2 Privacy Analysis of Horizontal-PPGRF -- 7.3 Results of Vertical-PPGRF -- 7.4 Privacy Analysis of Vertical-PPGRF -- 8 Summary and Conclusions -- 9 Future Scope -- References -- Privacy Preserving and Secured Clustering of Distributed Data Using Self Organizing Map -- 1 Introduction -- 2 Background and Related Work -- 2.1 Data Partitioning -- 2.2 Data Perturbing -- 2.3 Secure Multiparty Computing -- 2.4 Clustering Using Self Organizing Map -- 3 Perturbation Based Privacy Preserving Clustering Using SOM: Horizontal-PPSOM -- 3.1 Process of Horizontal-PPSOM Algorithm -- 4 Cryptography Based Privacy Preserving Clustering Using SOM: Vertical-PPSOM -- 4.1 Process of Vertical-PPSOM Algorithm -- 5 Experiments and Results -- 5.1 Privacy Analysis of Horizontal-PPSOM -- 5.2 Privacy Analysis of Vertical PPSOM -- 6 Summary -- 7 Conclusions -- 8 Future Scope -- References -- Implementation of Intrusion Detection Systems in Distributed Architecture -- 1 Introduction -- 2 Literature Review -- 3 Architecture of the System -- 4 Design -- 4.1 Discrete Target Environments -- 4.2 Jenkins in Amazon Elastic Container Services (ECS) -- 4.3 Executing Slaves of Jenkins with ECS -- 4.4 Interaction Between AWS ECS and Jenkins Master -- 4.5 Interaction Between Jenkins Master and Jenkins Slave -- 5 Algorithms -- 5.1 Module 1 (Importing Libraries and Display Settings) -- 5.2 Module 2 (Loading Data and Viewing Data) -- 5.3 Module 3 (Descriptive Analysis of Data) -- 5.4 Module 4 (Scaling Numerical Attributes). 5.5 Module 5 (Encoding Categorical Attributes) -- 5.6 Module 6 (Feature Selection) -- 5.7 Module 7 (Dataset Partitioning) -- 5.8 Module 8 (Fitting Models) -- 5.9 Module 9 (Evaluating Models) -- 5.10 Module 10 (Validating Models) -- 5.11 Module 11 (Predicting Values) -- 6 Conclusions -- References -- Practical Phase Shift Model for RIS-Assisted D2D Communication Systems -- 1 Introduction -- 2 Related Works -- 2.1 D2D Communication -- 2.2 RIS-Assisted Communication -- 3 System Model -- 3.1 System Description -- 3.2 Interference Analysis -- 4 Practical Phase Shift Model -- 4.1 Sum Rate Maximization Problem Formulation -- 4.2 Practical Phase Shift Optimization -- 5 Performance Evaluation -- 5.1 Simulation Setup -- 5.2 Performance Evaluation -- 6 Conclusion -- References -- Recent Trend of Transform Domain Image Steganography Technique for Secret Sharing -- 1 Introduction -- 2 Literature Survey on Transform Domain Techniques -- 2.1 Discrete Cosine Transform -- 2.2 Discrete Wavelet Transform -- 2.3 Discrete Fourier Transform -- 3 Wavelet Family -- 3.1 Haar Wavelet -- 3.2 Daubechies Wavelet -- 3.3 Coiflets -- 3.4 Symlet -- 3.5 Biorthogonal Wavelet -- 3.6 Reverse Biorthogonal Wavelet -- 3.7 Meyer Wavelet -- 3.8 Curvelet Transform -- 3.9 Tetrolet Transform -- 4 Wavelet Selection -- 5 Comparative Study Between DCT, DWT, and DFT -- 6 Comparative Study Between Daubechies and Cofilet Wavelet -- 7 Conclusion -- References -- Design of a High Efficiency Access Control and Authentication Analysis Model for Cloud Deployments Using Pattern Analysis -- 1 Introduction -- 2 Literature Review -- 3 Proposed Pattern Analysis Engine for Mitigation of Cloud Access Control and Authentication Vulnerabilities in Cyber Networks -- 3.1 Directive for Header-Level Authentication -- 3.2 Momentary Pattern Analysis Engine for Header-Level Access Checking. 3.3 High Efficiency Logging Engine for Future IP Tracing and Attack Mitigation -- 4 Results Analysis and Comparison -- 5 Conclusion -- References -- A Study on Cyber Security in Various Critical IT Infrastructure Organizational Sectors: Challenges and Solutions -- 1 Introduction -- 2 Related Work -- 2.1 Cyber Security in Banking, Finance and Insurance Sector -- 2.2 Cyber Security in Government Sector -- 2.3 Cyber Security in Defense -- 2.4 Cyber Security in Power and Energy -- 2.5 Cyber Security in Telecom -- 2.6 Cyber Security in Health Sector -- 2.7 Cyber Security in Transport -- 2.8 Cyber Security in Strategic and Public Enterprises -- 3 Challenges -- 4 Motivation -- 5 Conclusion -- References -- Short-Delay Multipath Errors in NavIC Signals for Stationary Receivers -- 1 Introduction -- 2 Code Auto-correlation - No Multipath Error -- 2.1 Satellite Psuedorandom Code -- 2.2 Delay Lock Loop -- 2.3 Autocorrelation Function -- 3 Phase and Amplitude Errors Caused by Single Reflected Signal -- 4 Discriminator Function (Without Multipath Error) -- 5 Autocorrelation Function Perturbed by Multipath -- 6 Multipath-Affected Discriminator Function -- 7 Single-Reflection Errors of GPS and NavIC Signals: Illustrations -- 7.1 GPS Signal L1 Results for Validation -- 7.2 Multipath Errors for NavIC Signal -- 8 Multipath Error Envelopes -- 8.1 Effect of Correlator Spacing -- 8.2 Effect of Multipath-to-Signal Amplitude Ratio -- 8.3 Mean Error -- 9 NavIC Multipath Errors of a Stationary Receiver - A Case Study -- 9.1 Frequency Bandwidth of the Reflected Signals -- 9.2 Accord Receiver Doppler Shift Accuracy Specification -- 9.3 Real Multipath Errors in NavIC Signals: Illustration -- 10 Conclusion -- References -- Point Clouds Object Classification Using Part-Based Capsule Network -- 1 Introduction -- 2 Part-Based Capsule Network -- 2.1 Parts Segmentation. 2.2 Part-to-Whole Learning. |
| Record Nr. | UNINA-9910590053003321 |
| Cham, Switzerland : , : Springer, , [2022] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyber warfare, security and space research : First International Conference, SPACSEC 2021, Jaipur, India, December 9-10, 2021 / / Sandeep Joshi [and four others] editors
| Cyber warfare, security and space research : First International Conference, SPACSEC 2021, Jaipur, India, December 9-10, 2021 / / Sandeep Joshi [and four others] editors |
| Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
| Descrizione fisica | 1 online resource (339 pages) |
| Disciplina | 629.1028 |
| Collana | Communications in computer and information science |
| Soggetto topico |
Astrionics
Computer security |
| ISBN | 3-031-15784-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Creation of Novel Database for Knowledge Repository on Cyber Security -- 1 Introduction -- 2 Related Work -- 2.1 Data Collection -- 2.2 Material and Methods -- 2.3 Mapping of Threats with Data Objects -- 2.4 Characterization Framework Categories -- 3 Data Model -- 4 Mathematical Modelling -- 5 Instances and Schemas -- 6 Data Model Preparing Techniques -- 7 Entity Relationship Introduction -- 7.1 ER Diagram Research -- 8 Result and Discussion -- 8.1 ER Diagram -- 8.2 Schema -- 8.3 Design of Database Model Tables -- 8.4 Query Processings -- 9 Conclusion -- References -- Brain Tumor Classification via UNET Architecture of CNN Technique -- 1 Introduction -- 2 UNET Architecture and Training -- 3 Related Work -- 4 Dataset Description Data Acquisition -- 4.1 Data Acquisition -- 4.2 Pre-processing -- 4.3 Transfer Learning -- 5 System Model -- 6 Proposed Methodology -- 7 Result and Discussion -- 8 Conclusion -- References -- Analysis of Various Supervised Machine Learning Algorithms for Intrusion Detection -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 The UNSW-NB15 Dataset -- 3.2 Feature Engineering -- 3.3 Preprocessing -- 3.4 Feature Selection -- 3.5 Machine Learning Algorithms -- 4 Results -- 5 Conclusion -- References -- Enhanced Security Mechanism for Cryptographic File Systems Using Trusted Computing -- 1 Introduction -- 2 Modules of Trusted Computing -- 2.1 Hardware Module - TPM Chip -- 2.2 Software Module - TSS -- 3 Safe Storage with TPM -- 3.1 RoT for Storage -- 3.2 Secure Storage TPM Commands -- 4 Measurements of Platform -- 5 TPM in CFS's -- 6 Implementation of Proposed Method -- 7 Evaluation of Performance -- 8 Conclusions and Future Work -- References -- Critical Analysis of IoT Ecosystem to Understand Security Threats and Challenges -- 1 Introduction -- 2 Related Works.
3 Architecture -- 3.1 IoT Object Ecosystem -- 3.2 Service Ecosystem -- 4 Object-Ecosystem Security -- 5 Service-Ecosystem Security -- 6 Discussion -- 7 Conclusion -- References -- Hyper-parameters Study for Breast Cancer Datasets: Enhancing Image Security and Accuracy for Prediction Class -- 1 Introduction -- 1.1 Related Work -- 2 Proposed Work -- 2.1 Dataset -- 3 Method and Modeling -- 3.1 Support Vector Machine -- 3.2 Proposed Model -- 4 Result Analysis -- 4.1 Measure of Performance Evaluation -- 5 Conclusion -- References -- An Efficient Image Encryption Technique Using Logistic Map and 2D-TCLM -- 1 Introduction -- 2 Related Works -- 3 Mathematical Preliminaries -- 3.1 Logistic Map -- 3.2 2D-TCLM -- 4 Proposed Image Encryption and Decryption -- 5 Experimental Results and Performance Analysis -- 5.1 Performance Analysis -- 6 Conclusion and Future Works -- References -- Learning Co-occurrence Embeddings for Sentence Classification -- 1 Introduction -- 2 Related Works -- 3 Proposed Model -- 3.1 Overview of the Proposed CNN Model -- 3.2 CNN Architecture -- 4 Experimental Results -- 4.1 Datasets -- 4.2 Results and Discussion -- 5 Conclusion and Future Scope -- References -- Preventing Fault Attacks on S-Boxes of AES-Like Block Ciphers -- 1 Introduction -- 2 Related Work -- 3 Designing Synthesized S-Boxes Using CA -- 3.1 Basics of the Design Primitive: Cellular Automata -- 3.2 S-Box Design -- 3.3 Inverse S-Box -- 3.4 The Synthetic NLCA Based S-Boxes -- 3.5 Cryptographic Properties of the S-Boxes -- 4 Designing Fault Resilient S-Boxes for AES-Like Block Ciphers -- 4.1 Fault Model -- 4.2 Design Approach -- 5 Result and Discussion -- 6 Conclusion -- References -- Privacy Preserving of Two Local Data Sites Using Global Random Forest Classification -- 1 Introduction -- 2 Privacy Preserving -- 3 Data Partitioning -- 4 Ensemble Learning. 4.1 Bootstrap Aggregating - Bagging -- 4.2 Random Forest Classification -- 5 Privacy Preserving Global Random Forest Classification-Horizontal -- 5.1 Process of Horizontal-PPGRF Algorithm -- 6 Privacy Preserving Global Random Forest Classification - Vertical -- 6.1 Process of Vertical-PPGRF Classification -- 7 Experiments and Results -- 7.1 Results of Horizontal-PPGRF -- 7.2 Privacy Analysis of Horizontal-PPGRF -- 7.3 Results of Vertical-PPGRF -- 7.4 Privacy Analysis of Vertical-PPGRF -- 8 Summary and Conclusions -- 9 Future Scope -- References -- Privacy Preserving and Secured Clustering of Distributed Data Using Self Organizing Map -- 1 Introduction -- 2 Background and Related Work -- 2.1 Data Partitioning -- 2.2 Data Perturbing -- 2.3 Secure Multiparty Computing -- 2.4 Clustering Using Self Organizing Map -- 3 Perturbation Based Privacy Preserving Clustering Using SOM: Horizontal-PPSOM -- 3.1 Process of Horizontal-PPSOM Algorithm -- 4 Cryptography Based Privacy Preserving Clustering Using SOM: Vertical-PPSOM -- 4.1 Process of Vertical-PPSOM Algorithm -- 5 Experiments and Results -- 5.1 Privacy Analysis of Horizontal-PPSOM -- 5.2 Privacy Analysis of Vertical PPSOM -- 6 Summary -- 7 Conclusions -- 8 Future Scope -- References -- Implementation of Intrusion Detection Systems in Distributed Architecture -- 1 Introduction -- 2 Literature Review -- 3 Architecture of the System -- 4 Design -- 4.1 Discrete Target Environments -- 4.2 Jenkins in Amazon Elastic Container Services (ECS) -- 4.3 Executing Slaves of Jenkins with ECS -- 4.4 Interaction Between AWS ECS and Jenkins Master -- 4.5 Interaction Between Jenkins Master and Jenkins Slave -- 5 Algorithms -- 5.1 Module 1 (Importing Libraries and Display Settings) -- 5.2 Module 2 (Loading Data and Viewing Data) -- 5.3 Module 3 (Descriptive Analysis of Data) -- 5.4 Module 4 (Scaling Numerical Attributes). 5.5 Module 5 (Encoding Categorical Attributes) -- 5.6 Module 6 (Feature Selection) -- 5.7 Module 7 (Dataset Partitioning) -- 5.8 Module 8 (Fitting Models) -- 5.9 Module 9 (Evaluating Models) -- 5.10 Module 10 (Validating Models) -- 5.11 Module 11 (Predicting Values) -- 6 Conclusions -- References -- Practical Phase Shift Model for RIS-Assisted D2D Communication Systems -- 1 Introduction -- 2 Related Works -- 2.1 D2D Communication -- 2.2 RIS-Assisted Communication -- 3 System Model -- 3.1 System Description -- 3.2 Interference Analysis -- 4 Practical Phase Shift Model -- 4.1 Sum Rate Maximization Problem Formulation -- 4.2 Practical Phase Shift Optimization -- 5 Performance Evaluation -- 5.1 Simulation Setup -- 5.2 Performance Evaluation -- 6 Conclusion -- References -- Recent Trend of Transform Domain Image Steganography Technique for Secret Sharing -- 1 Introduction -- 2 Literature Survey on Transform Domain Techniques -- 2.1 Discrete Cosine Transform -- 2.2 Discrete Wavelet Transform -- 2.3 Discrete Fourier Transform -- 3 Wavelet Family -- 3.1 Haar Wavelet -- 3.2 Daubechies Wavelet -- 3.3 Coiflets -- 3.4 Symlet -- 3.5 Biorthogonal Wavelet -- 3.6 Reverse Biorthogonal Wavelet -- 3.7 Meyer Wavelet -- 3.8 Curvelet Transform -- 3.9 Tetrolet Transform -- 4 Wavelet Selection -- 5 Comparative Study Between DCT, DWT, and DFT -- 6 Comparative Study Between Daubechies and Cofilet Wavelet -- 7 Conclusion -- References -- Design of a High Efficiency Access Control and Authentication Analysis Model for Cloud Deployments Using Pattern Analysis -- 1 Introduction -- 2 Literature Review -- 3 Proposed Pattern Analysis Engine for Mitigation of Cloud Access Control and Authentication Vulnerabilities in Cyber Networks -- 3.1 Directive for Header-Level Authentication -- 3.2 Momentary Pattern Analysis Engine for Header-Level Access Checking. 3.3 High Efficiency Logging Engine for Future IP Tracing and Attack Mitigation -- 4 Results Analysis and Comparison -- 5 Conclusion -- References -- A Study on Cyber Security in Various Critical IT Infrastructure Organizational Sectors: Challenges and Solutions -- 1 Introduction -- 2 Related Work -- 2.1 Cyber Security in Banking, Finance and Insurance Sector -- 2.2 Cyber Security in Government Sector -- 2.3 Cyber Security in Defense -- 2.4 Cyber Security in Power and Energy -- 2.5 Cyber Security in Telecom -- 2.6 Cyber Security in Health Sector -- 2.7 Cyber Security in Transport -- 2.8 Cyber Security in Strategic and Public Enterprises -- 3 Challenges -- 4 Motivation -- 5 Conclusion -- References -- Short-Delay Multipath Errors in NavIC Signals for Stationary Receivers -- 1 Introduction -- 2 Code Auto-correlation - No Multipath Error -- 2.1 Satellite Psuedorandom Code -- 2.2 Delay Lock Loop -- 2.3 Autocorrelation Function -- 3 Phase and Amplitude Errors Caused by Single Reflected Signal -- 4 Discriminator Function (Without Multipath Error) -- 5 Autocorrelation Function Perturbed by Multipath -- 6 Multipath-Affected Discriminator Function -- 7 Single-Reflection Errors of GPS and NavIC Signals: Illustrations -- 7.1 GPS Signal L1 Results for Validation -- 7.2 Multipath Errors for NavIC Signal -- 8 Multipath Error Envelopes -- 8.1 Effect of Correlator Spacing -- 8.2 Effect of Multipath-to-Signal Amplitude Ratio -- 8.3 Mean Error -- 9 NavIC Multipath Errors of a Stationary Receiver - A Case Study -- 9.1 Frequency Bandwidth of the Reflected Signals -- 9.2 Accord Receiver Doppler Shift Accuracy Specification -- 9.3 Real Multipath Errors in NavIC Signals: Illustration -- 10 Conclusion -- References -- Point Clouds Object Classification Using Part-Based Capsule Network -- 1 Introduction -- 2 Part-Based Capsule Network -- 2.1 Parts Segmentation. 2.2 Part-to-Whole Learning. |
| Record Nr. | UNISA-996485665703316 |
| Cham, Switzerland : , : Springer, , [2022] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Next Generation Systems and Networks : Proceedings of BITS EEE CON 2022 / / edited by Hari Om Bansal, Pawan K. Ajmera, Sandeep Joshi, Ramesh C. Bansal, Chandra Shekhar
| Next Generation Systems and Networks : Proceedings of BITS EEE CON 2022 / / edited by Hari Om Bansal, Pawan K. Ajmera, Sandeep Joshi, Ramesh C. Bansal, Chandra Shekhar |
| Autore | Bansal Hari Om |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (518 pages) |
| Disciplina | 621.382 |
| Altri autori (Persone) |
AjmeraPawan K
JoshiSandeep BansalRamesh C ShekharChandra |
| Collana | Lecture Notes in Networks and Systems |
| Soggetto topico |
Telecommunication
Automatic control Robotics Automation Computer networks—Security measures Wireless communication systems Mobile communication systems Artificial intelligence Communications Engineering, Networks Control, Robotics, Automation Mobile and Network Security Wireless and Mobile Communication Artificial Intelligence |
| ISBN | 981-9904-83-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Real-Time Video Monitoring for Fall Detection-an Overview -- Implementation of Master-Slave Communication using MQTT Protocol -- An Algorithm for Customizing Slicing Floor Plan Design -- A Prediction Model for Real Estate Price using Machine Learning -- Efficient ASIC Implementation of Artificial Neural Network with Posit Representation of Floating-Point Numbers -- Machine Learning Based Stock Market Prediction -- Nature-Inspired Optimization Algorithm Assisted Optimal Sensor Node Positioning for Precision Agriculture Applications in Asymmetric Fields -- Performance Analysis of All-Optical Relaying for UWOC over EGG Oceanic Turbulence -- Stock Price Prediction using GRU and BiLSTM Models -- Evaluation of BERT Model for Aspect Based Sentiment Analysis -- Solidly Mounted BAW Resonator For 5G Application on AlN Thin Films -- Design and Investigation of PMUT Sensor for Medical Imaging Applications. |
| Record Nr. | UNINA-9910734856703321 |
Bansal Hari Om
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||