top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Achieving and Sustaining Secured Business Operations : An Executive’s Guide to Planning and Management / / by Neelesh Ajmani, Dinesh Kumar
Achieving and Sustaining Secured Business Operations : An Executive’s Guide to Planning and Management / / by Neelesh Ajmani, Dinesh Kumar
Autore Ajmani Neelesh
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2017
Descrizione fisica 1 online resource (XVIII, 168 p. 39 illus. in color.)
Disciplina 005.8
Soggetto topico Computer security
Systems and Data Security
ISBN 1-4842-3099-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Current Practices -- Chapter 2: Next Practices: Business Centric Security and Risk Management -- Chapter 3: Secured Business Model -- Chapter 4: Secured Operating Model -- Chapter 5: Secured Management Model -- Chapter 6: Securing Effectiveness -- Chapter 7: Making It Real.- .
Record Nr. UNINA-9910254561903321
Ajmani Neelesh  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Auction Based Resource Provisioning in Cloud Computing / / by Gaurav Baranwal, Dinesh Kumar, Zahid Raza, Deo Prakash Vidyarthi
Auction Based Resource Provisioning in Cloud Computing / / by Gaurav Baranwal, Dinesh Kumar, Zahid Raza, Deo Prakash Vidyarthi
Autore Baranwal Gaurav
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (125 pages)
Disciplina 004.6782
Collana SpringerBriefs in Computer Science
Soggetto topico Algorithms
Computer communication systems
Application software
Information storage and retrieval
Algorithm Analysis and Problem Complexity
Computer Communication Networks
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
ISBN 981-10-8737-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Introduction -- Chapter 2. Auction Theory -- Chapter 3. Forward Auction based Cloud Resource Provisioning -- Chapter 4. Reverse Auction based Cloud Resource Provisioning -- Chapter 5. Double Auction based cloud Resource Provisioning -- Chapter 6. Epilogue. .
Record Nr. UNINA-9910299289203321
Baranwal Gaurav  
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Emergent Converging Technologies and Biomedical Systems : Select Proceedings of the 3rd International Conference, ETBS 2023
Emergent Converging Technologies and Biomedical Systems : Select Proceedings of the 3rd International Conference, ETBS 2023
Autore Jain Shruti
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (715 pages)
Altri autori (Persone) MarriwalaNikhil
SinghPushpendra
TripathiC. C
KumarDinesh
Collana Lecture Notes in Electrical Engineering Series
ISBN 981-9986-46-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- About This Book -- Contents -- About the Editors -- On Parameterized Picture Fuzzy Discriminant Information Measure in Medical Diagnosis Problem -- 1 Introduction -- 2 Preliminaries -- 3 Doubly Parameterized Picture Fuzzy Discriminant Measure -- 4 Solving Medical Diagnosis Problem with Parameterized Measure -- 4.1 Medical Diagnosis -- 5 Conclusions and Scope for Future Work -- References -- Fuzzy Vendor-Buyer Trade Credit Inventory Model-Pentagonal Numbers in Permissible Limits Delay in Account Settlement with Supervised Learning -- 1 Introduction -- 2 Extension of the Lagrangian Method for Fuzzy Vendor-Buyer Trade Credit Inventory Model -- 3 Methodology for Fuzzy Vendor-Buyer Trade Credit Inventory Model -- 3.1 Grade Mean Integration Representation Technique (GMIRT) for Fuzzy Vendor-Buyer Trade Credit Inventory Model[11, 14] -- 4 Highly Integrated Optimization Model with Processing Orders, Cost Savings, and Allowable Payment Delays -- 4.1 Notations -- 5 Mathematical Model for Fuzzy Vendor-Buyer Trade Credit Inventory Model -- 5.1 Inventory Model of Crisp Production Quantity (CPQ) for Fuzzy Vendor-Buyer Trade Credit Inventory Model -- 5.2 Inventory Model for Fuzzy Production Quantity for Fuzzy Vendor-Buyer Trade Credit Inventory Model -- 6 Numerical Analysis for Fuzzy Vendor-Buyer Trade Credit Inventory Model -- 7 Supervised Learning (Sl) for Fuzzy Vendor-Buyer Trade Credit Inventory Model -- 8 Conclusion -- 9 Results and Discussions -- References -- Comparative Analysis of Hardware and Software Utilization in the Implementation of 4-Bit Counter Using Different FPGAs Families -- 1 Introduction -- 2 Related Work -- 3 Implementation on 4-bit Counter Using Different FPGAs Families and Results -- 4 Comparative Analysis of 4-bit Counter Using Different FPGAs Boards -- 5 Conclusion -- References.
Soil Monitoring Robot for Precision Farming -- 1 Introduction -- 2 Literature Survey -- 3 Materials and Methods -- 4 Results and Discussions -- 5 Conclusion -- References -- Accountability of Immersive Technologies in Dwindling the Reverberations of Fibromyalgia -- 1 Introduction -- 2 Virtual Reality -- 3 Augmented Reality -- 4 Mixed Reality -- 5 Reality-Virtuality Continuum -- 6 Fibromyalgia -- 7 Literature Survey -- 8 Conclusion -- References -- A 233-Bit Elliptic Curve Processor for IoT Applications -- 1 Introduction -- 2 Related Work -- 3 Design -- 4 Results and Discussion -- 5 Conclusion and Future Work -- References -- Numerical Simulation and Modeling of Improved PI Controller Based DVR for Voltage Sag Compensation -- 1 Introduction -- 2 Related Works -- 3 Dynamic Voltage Restorer (DVR) -- 4 Proposed Methodology -- 5 Simulation and Results -- 6 Conclusions -- References -- Alternate Least Square and Root Polynomial Based Colour-Correction Method for High Dimensional Environment -- 1 Introduction -- 1.1 Motivation -- 2 Literature Review -- 3 Proposed Work -- 3.1 Methodology -- 4 Results Obtained -- 4.1 Performance Evaluation -- 5 Conclusion -- References -- An Automatic Parkinson's Disease Classification System Using Least Square Support Vector Machine -- 1 Introduction -- 2 Material -- 3 Methodology -- 3.1 Data Pre-Processing -- 3.2 Feature Selection -- 3.3 Handling Imbalanced Dataset -- 3.4 Least Square Support Vector Machine (LSSVM) -- 4 Results and Discussion -- 5 Conclusion -- References -- Generation Cost Minimization in Microgrids Using Optimization Algorithms -- 1 Introduction -- 2 Problem Statement -- 3 Proposed Methodology -- 3.1 Multi-verse Optimizer Algorithm -- 3.2 Improved Multi-verse Optimizer Algorithm -- 4 Simulation Discussion -- 4.1 Dataset Description -- 4.2 Experimental Results -- 5 Conclusion -- References.
Diagnosis of Mental Health from Social Networking Posts: An Improved ML-Based Approach -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data Collection and Pre-processing -- 3.2 Feature Engineering -- 3.3 ML Algorithms -- 4 Evaluation and Results -- 4.1 Dataset -- 4.2 Data Analysis -- 4.3 Results -- 5 Conclusion -- References -- Smart Health Monitoring System for Elderly People -- 1 Introduction -- 2 Literature Survey -- 2.1 Paper Contributions -- 2.2 Paper Organization -- 3 Proposed Health Monitoring System -- 4 Results and Discussions -- 5 Conclusion and Future Scope -- References -- Impact of Covid-19 and Subsequent Usage of IoT -- 1 Introduction -- 2 Impact of COVID-19 -- 2.1 Education System -- 2.2 Healthcare System -- 2.3 Travel and Tourism -- 2.4 Industrial and Economy -- 3 Usage of IoT -- 3.1 Education System -- 3.2 Healthcare System -- 3.3 Travel and Tourism System -- 3.4 Industry and Economy System -- 4 Conclusions and Future Scope -- References -- Design of Battery Monitoring System for Converted Electric Cycles -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 OLED Display -- 3.2 Voltage Sensor -- 3.3 Hub Motor -- 3.4 DC Battery -- 4 Results and Discussion -- 5 Conclusions -- References -- Image Denoising Framework Employing Auto Encoders for Image Reconstruction -- 1 Introduction -- 2 Methodology -- 3 Results and Discussion -- 4 Conclusion and Future Work -- References -- Server Access Pattern Analysis Based on Weblogs Classification Methods -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Log Collection -- 4 Data Pre-processing -- 4.1 Log Templating -- 4.2 Learning and Pattern Evaluation -- 4.3 Linear Support Vector Machine (LSVM) -- 4.4 Random Forest -- 4.5 K-nearest Neighbor -- 5 Result and Discussion -- 5.1 Dataset Description -- 6 Conclusion -- References.
Multilingual Emotion Recognition from Continuous Speech Using Transfer Learning -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 3.1 System Setup -- 3.2 Model Architecture -- 4 Dataset Description -- 4.1 RAVDESS Dataset -- 4.2 PU Dataset -- 4.3 PU Dataset with Augmented Noise -- 5 Results Analysis -- 5.1 Model Training & -- Hyperparameter Tuning -- 5.2 Effect of Hidden Dropout Rate, and Number of Attention Heads -- 5.3 Overview of the Model Training -- 6 Conclusion -- References -- Violence Detection Using DenseNet and LSTM -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Background Suppression -- 3.2 Frame Difference Algorithm -- 3.3 DenseNet -- 3.4 LSTM -- 3.5 DenseLSTM -- 4 Result and Discussion -- 5 Conclusion -- References -- Financial Technology and Competitive Landscape in the Banking Industry of Bangladesh: An Exploratory Focus -- 1 Introduction -- 2 Literature Review -- 3 Research Objectives -- 4 Data and Methodology -- 5 Results and Discussion -- 6 Recommendation -- 7 Concluding Remarks -- References -- Review on Deep Learning-Based Classification Techniques for Cocoa Quality Testing -- 1 Introduction -- 2 Literature Review -- 3 Deep Learning -- 4 Analysis -- 4.1 Types of Cocoa Beans -- 5 Conclusion -- References -- A Curated Study on Machine Learning Based Algorithms and Sensors for Drone Technology in Various Application -- 1 Introduction -- 2 Related Work -- 3 System Overview -- 4 Results/Comparison -- 5 Conclusion -- References -- Automatic Detection of Coagulation of Blood in Brain Using Deep Learning Approach -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Architecture -- 3.2 Data Collection -- 3.3 Pre-processing -- 3.4 Model Training -- 3.5 Evaluation Metrics -- 3.6 Prediction -- 4 Conclusion -- References.
DeepPose: A 2D Image Based Automated Framework for Human Pose Detection and a Trainer App Using Deep Learning -- 1 Introduction -- 1.1 Motivation and Objectives -- 2 Literature Survey -- 3 Proposed Framework -- 3.1 Dataset Description -- 4 Experimentation and Results -- 5 Conclusions and Future Directions -- References -- Phylogenetic Study of Surface Glycoprotein (S1 Spike Protein) Sequence of SARS-CoV-2 Virus -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Selection of SARS-CoV-2 Virus S1 Spike Protein Sequences -- 3.2 Building of Phylogenetic Tree -- 3.3 Visualization of the Phylogenetic Tree -- 4 Results -- 4.1 Selection of SARS-CoV-2 Virus S1 Spike Protein Sequences -- 4.2 Building of Phylogenetic Tree -- 4.3 Visualization of Phylogenetic Tree -- 5 Discussion -- 6 Conclusion -- References -- Pervasive and Wearable Computing and Networks -- 1 Introduction -- 2 History of Pervasive and Wearable Computing -- 3 Literature Review -- 4 Challenges and Review of Pervasive and Wearable Computing -- 5 Methodology -- 6 Implementation -- 7 Result -- 8 Conclusion -- References -- Power of Image-Based Digit Recognition with Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Dataset Description -- 5 Results and Discussion -- 6 Conclusion -- References -- Open-Source Gesture-Powered Augmented Reality-Based Remote Assistance Tool for Industrial Application: Challenges and Improvisation -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 Research Proposal and Description -- 4.1 Proposed Architecture -- 4.2 Application Usage Description -- 5 Methodology and Hypotheses Development -- 6 Case Study/Evaluated Result -- 7 Conclusion -- References -- Enhancing Biometric Performance Through Mitigation of Sleep-Related Breaches -- 1 Introduction -- 2 Literature Review -- 3 Problem Statement -- 4 Proposed Work.
5 Conclusion.
Record Nr. UNINA-9910841859203321
Jain Shruti  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Mobile Radio Communications and 5G Networks : Proceedings of Fourth MRCN 2023
Mobile Radio Communications and 5G Networks : Proceedings of Fourth MRCN 2023
Autore Marriwala Nikhil Kumar
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2024
Descrizione fisica 1 online resource (800 pages)
Altri autori (Persone) DhingraSunil
JainShruti
KumarDinesh
Collana Lecture Notes in Networks and Systems Series
ISBN 981-9707-00-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- Deep Learning Assisted Diagnosis of Parkinson's Disease -- 1 Introduction -- 2 Materials and Methodology -- 3 Results and Discussions -- 4 Conclusion and Future Directions -- References -- Deep Learning: How to Apply Machine Learning and Deep Learning Methods to Audio Analysis -- 1 Introduction -- 2 Discussion -- 3 Review Work -- 4 Methodology -- 5 Result -- 6 Conclusion and Future Scope -- References -- Naive Bayes Classifier-Based Smishing Detection Framework to Reduce Cyber Attack -- 1 Introduction -- 2 Related Work -- 3 Proposed Algorithm and Methodology of Work -- 4 Results and Discussions -- 5 Conclusion -- References -- A Novel System for Finding Shortest Path in a Network Routing Using Hybrid Evolutionary Algorithm -- 1 Introduction -- 1.1 Large-Scale Structure of the Universe -- 1.2 Limited Memory -- 1.3 Self-aware -- 1.4 Machine Learning Using Big Bang Shortest Path -- 2 Discussion Literature Review -- 2.1 Materials and Methods -- 2.2 Model Deployment -- 2.3 Feature Extraction -- 2.4 Model Evaluation -- 2.5 Model Deploymen -- 2.6 Case Study: Machine Learning -- 3 Drawing Conclusions -- 3.1 Research Methodology for Studying "The Big Bang Theory" Using Machine Learning -- 4 Methodology for Finding the Shortest Path -- 5 Result -- 6 Conclusions and Future Scope -- References -- Emotion Analysis and Gender Identification Using Partial Face Detection -- 1 Introduction -- 2 Literature Review -- 3 Methodology/ Experimental -- 3.1 Method -- 3.2 Loss Function -- 3.3 Partial Face Detection -- 4 Results and Discussions -- 4.1 Experimentation -- 4.2 Flow of the Project -- 5 Conclusion -- 6 Conclusion -- References -- Data Security Threats Arising Between a Cloud and Its Users -- 1 Introduction -- 2 Cloud Classification -- 2.1 Service Models -- 2.2 Cloud Deployment Models.
3 Essentials Characteristics -- 4 Cloud Security Challenges -- 5 Data/Storage Issues -- 6 Related Work -- 7 Conclusion -- References -- Machine Learning Assisted Software Transplantation: A Baseline Technique -- 1 Introduction -- 2 Need for Software Transplantation -- 3 Motivation Backing This Work -- 3.1 Deficient Training Resources -- 3.2 Inadequate Knowledge of Other Frameworks -- 3.3 Oversized Exemplar (Re-training not Feasible) -- 3.4 Transplant Time and Training Time -- 3.5 Accomplishing the Same Accuracy -- 4 Proposed Transplantation -- 4.1 Implementation -- 5 Results and Discussions -- 5.1 Transplant Time and Training Time -- 5.2 Accuracy -- 5.3 Other Important Metrics -- 5.4 Summary of Exemplar Performance -- 6 Validation -- 7 Related Work -- 8 Conclusion and Future Work -- 9 Limitations -- References -- Gold and Silver Price Prediction in Indian Market Using Machine Learning Algorithm -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Dataset -- 4.1 Data Record -- 5 Implementation and Design -- 5.1 Implementing the CNN Model -- 5.2 Implementation of the LSTM Model -- 6 Result Analysis -- 7 Conclusion -- References -- Fog-centric IoT Smart Healthcare: Architecture, Applications, and Case Study -- 1 Introduction -- 2 Fog-Driven IoHT Architecture -- 3 IoT Healthcare Services and Applications -- 3.1 Assisting Diagnosis and Treatment -- 3.2 Health Management -- 3.3 Disease Prevention/Risk Monitoring -- 3.4 Assisting Drug Research -- 3.5 Virtual Assistant -- 4 A Use Case Scenario: Smart Gloves with Fog-driven IoT Architecture -- 5 Conclusion -- References -- Responsive Mechanism for Cloud Offloading Data Intrusion Detection Using Spark-Machine Learning Model -- 1 Introduction -- 1.1 Limitations in CODIDS -- 1.2 Problem Statement -- 1.3 Key Contributions to the Paper Organization -- 2 Related Work.
2.1 Features Dimensionality Reduction Approaches -- 2.2 Novel Perspective -- 3 Proposed Method -- 3.1 Workflow -- 3.2 Label Encoder Pseudo Code -- 3.3 Classification Models -- 4 Experimental Results -- 4.1 Encoding of Categorical Attributes -- 5 Results and Analysis -- 6 Conclusion -- References -- Impact of COVID-19 on People -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Research Queries -- 2.2 Strategy of Search -- 2.3 Inclusion/Exclusion Criteria -- 2.4 Dataset -- 3 Related Work -- 3.1 Impact on Health -- 3.2 Impact on Education -- 3.3 Impact on Employment -- 3.4 Impact Based on Other Factors -- 3.5 Summarized Impact of COVID-19 on the Economy -- 3.6 Summary on Related Studies -- 4 Discussion -- 4.1 Analysis on Health -- 4.2 Analysis on Education -- 4.3 Analysis on Economy -- 5 Results -- 6 Conclusion and Future Scope -- References -- Video Analysis Using Deep Learning in Smart Gadget for Women Saftey -- 1 Introduction -- 2 Theory and Formula -- 3 Experimental Setup -- 4 Implementation Using Opencv and Deploying the Model in Raspberry-Pi -- 5 Darknet Architecture -- 6 Setting up Twilio Notifications -- 7 Future Scope -- 8 Conclusion and Results -- References -- Compression of Medical Images Using Lifting Haar Wavelet Transform for Teleradiology Applications -- 1 Introduction -- 2 Lifting Wavelet Transform for Medical Image Compression -- 3 Results and Discussion -- 4 Conclusion -- References -- Leveraging Content Based Image Retrieval Using Data Mining for Efficient Image Exploration -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach for CBIR -- 4 Conclusion -- References -- Image Enhancement and Restoration: Deep Learning for Image Dehazing -- 1 Introduction -- 2 Survey Methodology -- 3 Literature Review -- 3.1 Approaches to Solve Image Dehazing Approaches -- 3.2 Datasets Used for Evaluation of Approaches -- 3.3 Evaluation Metrics.
4 Issues and Challenges -- 5 Conclusion and Future Work -- References -- Hate Speech Detection in Social Media Using Ensemble Method in Classifiers -- 1 Introduction -- 2 Related Work -- 3 Methodologies -- 3.1 Random Forest Classifier -- 3.2 Support Vector Machine -- 3.3 Bagging Classifier -- 3.4 Adaboost Classifier -- 3.5 Gradient Boosting Classifier -- 3.6 TF-IDF Vectorization -- 4 Implementation -- 4.1 Accuracy Score -- 4.2 Precision Score -- 4.3 Recall Score -- 4.4 F1 Score -- 5 Discussion and Future Work -- 6 Conclusion -- References -- Detection and Classification of Neuro-Degenerative Disease via EfficientNetB7 -- 1 Introduction -- 2 Related Work -- 2.1 Arguments -- 3 Materials Used -- 3.1 Dataset Description and Pre-processing -- 4 Experimental Setup -- 5 Results and Discussion -- 5.1 Pre-processing and Time Delay Embedding -- 5.2 Pattern Classification -- 5.3 Experimental Environments -- 6 Conclusion -- References -- An Empirical Study of Rainfall Prediction Using Various Regression Models -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 3.1 Methodology -- 3.2 ML Algorithms -- 3.3 Evaluation Metrics -- 4 Results and Analysis -- 5 Conclusion -- References -- A Novel Ensemble Approach for Colon Cancer Detection Over the Multiclass Colon Dataset -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Dataset Description -- 3.2 Pre-processing -- 3.3 Feature Extraction -- 3.4 Ensemble Model -- 4 Model Evaluation Parameter -- 5 Result Analysis -- 6 Comparative Analysis -- 7 Discussion -- 8 Conclusion -- References -- Area and Energy Efficient Booth Radix-4 Signed Multiplier Using Verilog -- 1 Introduction -- 2 Work Done -- 3 Results -- 3.1 Software Used -- 4 Reports -- 4.1 Critical Path Delay -- 5 Conclusion -- 6 Future Scope -- References.
Enhancing Power Quality Improvement Using Model Predictive Controlled System with DPFC -- 1 Introduction -- 2 Operation of DPFC -- 3 Proposed Block Diagram of DPFC and 8-Bus System with Closed Loop FOPID/MPC System -- 3.1 Wind System Modelling -- 4 Controller Technology -- 4.1 FOPID Controller Design -- 4.2 MPC Controller Design -- 5 Simulation Results -- 5.1 Diagram of an 8-Bus System with Closed Loop DPFC and FOPID Controller -- 5.2 Diagram of an 8-Bus System with Closed Loop DPFC and MPC -- 6 Conclusion -- Appendix -- References -- Leveraging Machine Learning for Comprehensive Analysis of Maternal Health: Predicting Health Risks and Improving Antenatal Care -- 1 Introduction -- 1.1 Machine Learning in Healthcare -- 1.2 Motivation -- 1.3 Contributions of the Research -- 1.4 Outline of the Paper -- 2 Materials and Methods -- 2.1 Dataset Collection and Pre-Processing -- 2.2 Methodology -- 3 Results -- 4 Analysis -- 4.1 Performance Evaluation -- 5 Conclusion -- References -- Enhancing Information Security for Text-Based Data Hiding Using Midpoint Folding Approach: A Comparative Analysis -- 1 Introduction and Background -- 2 Proposed Work -- 3 Performance Parameters -- 3.1 PSNR (Peak Signal to Noise Ratio) -- 3.2 MSE (Mean Squared Error) -- 3.3 WPSNR (Weighted PSNR) -- 3.4 SSIM (Structured Similarity Index) -- 3.5 Embedding Capacity -- 4 Results and Discussion -- 5 Conclusion -- References -- Design and Parametric Variation Assessment of Extended Source Double Gate Tunnel Field-Effect Transistor (ESDGTFET) for Enhanced Performance -- 1 Introduction -- 2 Device Structure Description -- 3 Simulation Parameters and Setup -- 4 Results and Discussion -- 4.1 DC Characteristics -- 4.2 Transconductance -- 4.3 Capacitive Analysis -- 4.4 Cut-Off Frequency -- 5 Conclusion -- References -- A Review on Facial Anti-spoofing Techniques -- 1 Introduction.
1.1 Face Spoofing Tactics.
Record Nr. UNINA-9910855384403321
Marriwala Nikhil Kumar  
Singapore : , : Springer Singapore Pte. Limited, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Techniques for assessment of Parkinsonism for diagnosis and rehabilitation / / Sridhar P. Arjunan, Dinesh Kant Kumar, editors
Techniques for assessment of Parkinsonism for diagnosis and rehabilitation / / Sridhar P. Arjunan, Dinesh Kant Kumar, editors
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Singapore : , : Springer, , [2022]
Descrizione fisica 1 online resource (X, 167 p. 5 illus., 4 illus. in color.)
Disciplina 616.833
Collana Series in bioengineering
Soggetto topico Parkinson's disease - Diagnosis
ISBN 981-16-3055-0
981-16-3056-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Parkinson’s Disease -- 2. Measuring Parkinson’s Disease symptoms -- 3. Demographics profiles of Parkinson’s Disease -- 4.Tremors and Bradykinesia -- 5. Handwriting of Parkinson’s Disease -- 6. Gait and Posture -- 7. Olfactory -- 8. Eye Gaze and Facial expression -- 9. Voice symptoms -- 10. Treatment of Parkinson’s Disease -- 11. Misdiagnosis of Parkinson’s Disease -- 12. Modelling of Basal Ganglia of Parkinson’s Disease.
Record Nr. UNINA-9910743261303321
Singapore : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui