top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
DCNET 2014 : proceedings of the 5th International Conference on Data Communication Networking : Vienna, Austria, 28-30 August, 2014 / / Mohammad S. Obaidat, editor
DCNET 2014 : proceedings of the 5th International Conference on Data Communication Networking : Vienna, Austria, 28-30 August, 2014 / / Mohammad S. Obaidat, editor
Pubbl/distr/stampa Setúbal, Portugal : , : SCITEPRESS, , 2014
Descrizione fisica 1 online resource (various pagings) : illustrations
Disciplina 004.6
Soggetto topico Computer networks
ISBN 989-8565-94-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti 2014 5th International Conference on Data Communication Networking
Record Nr. UNINA-9910137016403321
Setúbal, Portugal : , : SCITEPRESS, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
DCNET 2014 : proceedings of the 5th International Conference on Data Communication Networking : Vienna, Austria, 28-30 August, 2014 / / Mohammad S. Obaidat, editor
DCNET 2014 : proceedings of the 5th International Conference on Data Communication Networking : Vienna, Austria, 28-30 August, 2014 / / Mohammad S. Obaidat, editor
Pubbl/distr/stampa Setúbal, Portugal : , : SCITEPRESS, , 2014
Descrizione fisica 1 online resource (various pagings) : illustrations
Disciplina 004.6
Soggetto topico Computer networks
ISBN 989-8565-94-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti 2014 5th International Conference on Data Communication Networking
Record Nr. UNISA-996280964503316
Setúbal, Portugal : , : SCITEPRESS, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
E-business and telecommunications : 17th International Conference on E-Business and Telecommunications, ICETE 2020, online event, July 8-10, 2020 : revised selected papers / / Mohammad S. Obaidat, Jalel Ben-Othman (editors)
E-business and telecommunications : 17th International Conference on E-Business and Telecommunications, ICETE 2020, online event, July 8-10, 2020 : revised selected papers / / Mohammad S. Obaidat, Jalel Ben-Othman (editors)
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (243 pages)
Disciplina 621.382
Collana Communications in computer and information science
Soggetto topico Telecommunication systems
ISBN 3-030-90428-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- An Improved Bit Masking Technique to Enhance Covert Channel Attacks in Everyday IT Systems -- 1 Introduction -- 1.1 Contribution -- 1.2 Structure -- 2 Related Work -- 3 Building Blocks -- 3.1 Bit-Masking -- 3.2 Acquiring White Traffic -- 3.3 Matching Algorithm -- 4 Methodology -- 5 Attack Implementations -- 5.1 Improved Version 1 -- 5.2 Improved Version 2 -- 6 Experiments and Results -- 6.1 Performance Tests -- 6.2 Attack Evasion Tests -- 7 Conclusion -- References -- Security and Complexity of a New Variant of the McEliece Cryptosystem Using Non-linear Convolutional Codes -- 1 Introduction -- 2 A New Non-linear Convolutional Encoding/Decoding Algorithm -- 2.1 Non-linear Convolutional Cryptosystem -- 2.2 New Encoding/Decoding Algorithm Using Non-linear Convolutional Code -- 3 A New Variant of the Mceliece Cryptosystem -- 3.1 The Classical McEliece Cryptosystem -- 3.2 The New Variant of the McEliece Cryptosystem [14] -- 4 Cryptographic Algorithm Metrics -- 4.1 Key Size Analysis -- 4.2 Complexity Analysis -- 5 Cryptanalysis -- 5.1 Structural Attack [14] -- 5.2 Decoding Attack [14] -- 6 Results and Discussion -- 6.1 Structural Attack -- 6.2 Decoding Attack -- 6.3 Comparison with Existing McEliece Cryptosystems -- 7 Conclusion -- Appendix -- Transition Tables -- References -- A Secure Distributed Hash-Based Encryption Mode of Operation Suited for Big Data Systems -- 1 Introduction -- 2 Related Work -- 3 Proposed Solution -- 3.1 Distributed Cipher Block Chaining: DCBC -- 3.2 Target Criteria -- 3.3 How Does DCBC Work? -- 3.4 Encryption and Decryption in DCBC -- 3.5 IV Generator -- 4 Security Properties -- 4.1 CPA Security -- 4.2 Blockwise Adaptive Chosen Plaintext Attack Security -- 5 Theoretical Performance Cost -- 5.1 Assumptions -- 5.2 Cost Function C -- 5.3 Theoretical Performance Comparison.
6 Theoretical Diffusion -- 6.1 The Probability of a Bit Flipping -- 6.2 Probability of at Least M Bits Flipping -- 7 Conclusion and Future Work -- References -- An Assurance Framework and Process for Hybrid Systems -- 1 Introduction -- 2 Assurance Requirements -- 3 Assurance Framework -- 4 REST Interface -- 4.1 OpenAPI Document -- 4.2 Component REST API -- 5 Assurance Process -- 5.1 Building Blocks -- 5.2 Assurance Process -- 6 Walkthrough and Experiments -- 6.1 Process in Execution -- 6.2 Experiments -- 7 Comparison with Existing Solutions -- 8 Conclusions -- References -- PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE -- 1 Introduction -- 1.1 Motivation -- 1.2 Contributions and Structure -- 1.3 Related Work -- 2 Framework and Preliminaries -- 3 Pitfalls in Out-of-Band Authentication -- 3.1 Inattentive Users and Partial Preimage Attacks -- 3.2 Case Study -- 4 Authentication in Secure Email and Messaging via PAKE -- 4.1 Public Key Authentication via PAKE -- 4.2 An Instantiation Based on SPAKE2 -- 4.3 Selecting a PAKE Protocol -- 4.4 Transport Mechanism -- 5 Enhancements to Secure Email and Messaging by PAKE -- 5.1 Key Management and Authentication Improvements -- 5.2 Cryptographic Properties Enabled by PAKE -- 5.3 Cryptographic Enhancements to Email and Messaging -- 5.4 Comparison -- 6 Implementation: PakeMail -- 6.1 Cryptographic Details -- 6.2 PAKE Protocol Carried Out over Email -- 6.3 Implemented Scenarios -- 6.4 Performance -- 6.5 Further Design and Security Considerations -- 7 Security and Low-Entropy Secrets -- 8 Further Directions -- References -- Practically Efficient Attribute-Based Encryption for Compartmented and Multilevel Access Structures -- 1 Introduction -- 2 Preliminaries -- 3 Our Contribution -- 3.1 Motivation and Main Goal -- 3.2 Our Scheme for CASs.
3.3 Variations on the Same Theme: The Case of MASs -- 4 Extension to Multiple-Input Boolean Trees -- 5 Implementation -- 6 Conclusions -- References -- Analysis of In-Place Randomized Bit-Flipping Decoders for the Design of LDPC and MDPC Code-Based Cryptosystems -- 1 Introduction -- 2 Notation and Background -- 3 In-Place Randomized Bit-Flipping Decoder -- 3.1 An In-Place, Randomized Bit-Flipping Decoder -- 3.2 Modeling of the Bit-Flipping Probabilities -- 4 Validation of DFR Models and Cryptosystem Design -- 4.1 Experimental Validation of DFR Models -- 4.2 Design of Code-Based Cryptosystems -- 5 Related Work and Discussion -- 6 Conclusion -- References -- Business Analyst Tasks for Requirement Elicitation -- 1 Introduction -- 2 Systematic Literature Review -- 3 Business Analyst for Agile Method Driven Requirement Elicitation -- 4 Business Analyst in Ontology Driven Requirement Engineering -- 5 Case Study on Non-formal Education System Development -- 6 Conclusions -- References -- Chained Transaction Protocol Automated Verification Using Cl-AtSe -- 1 Introduction -- 2 Chained Transaction Protocol -- 2.1 Exchange Sub-protocol -- 2.2 Resolution 1 Sub-protocol -- 2.3 Resolution 2 Sub-protocol -- 3 Overview of AVISPA Tool -- 3.1 AVISPA Tool -- 3.2 High Level Protocol Specification Language -- 4 Automated Verification of Chained Transaction Protocol -- 4.1 Agent's Basic Roles -- 4.2 Protocol's Sessions Composed Roles -- 4.3 Environment Role -- 4.4 Security Requirements -- 4.5 Verification Results -- 5 Conclusions -- References -- Overall Feasibility of RF Energy Harvesting for IoT -- 1 Introduction -- 2 Constraints -- 2.1 Ambient Energy -- 2.2 Energy Consumption -- 3 Choice of Storage Capacitor -- 4 Rectifier -- 5 Overall System Feasibility -- 5.1 Theoretical Model -- 5.2 Application of the Model -- 6 Conclusion -- References -- Author Index.
Record Nr. UNINA-9910508446903321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
E-business and telecommunications : 17th International Conference on E-Business and Telecommunications, ICETE 2020, online event, July 8-10, 2020 : revised selected papers / / Mohammad S. Obaidat, Jalel Ben-Othman (editors)
E-business and telecommunications : 17th International Conference on E-Business and Telecommunications, ICETE 2020, online event, July 8-10, 2020 : revised selected papers / / Mohammad S. Obaidat, Jalel Ben-Othman (editors)
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (243 pages)
Disciplina 621.382
Collana Communications in computer and information science
Soggetto topico Telecommunication systems
ISBN 3-030-90428-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- An Improved Bit Masking Technique to Enhance Covert Channel Attacks in Everyday IT Systems -- 1 Introduction -- 1.1 Contribution -- 1.2 Structure -- 2 Related Work -- 3 Building Blocks -- 3.1 Bit-Masking -- 3.2 Acquiring White Traffic -- 3.3 Matching Algorithm -- 4 Methodology -- 5 Attack Implementations -- 5.1 Improved Version 1 -- 5.2 Improved Version 2 -- 6 Experiments and Results -- 6.1 Performance Tests -- 6.2 Attack Evasion Tests -- 7 Conclusion -- References -- Security and Complexity of a New Variant of the McEliece Cryptosystem Using Non-linear Convolutional Codes -- 1 Introduction -- 2 A New Non-linear Convolutional Encoding/Decoding Algorithm -- 2.1 Non-linear Convolutional Cryptosystem -- 2.2 New Encoding/Decoding Algorithm Using Non-linear Convolutional Code -- 3 A New Variant of the Mceliece Cryptosystem -- 3.1 The Classical McEliece Cryptosystem -- 3.2 The New Variant of the McEliece Cryptosystem [14] -- 4 Cryptographic Algorithm Metrics -- 4.1 Key Size Analysis -- 4.2 Complexity Analysis -- 5 Cryptanalysis -- 5.1 Structural Attack [14] -- 5.2 Decoding Attack [14] -- 6 Results and Discussion -- 6.1 Structural Attack -- 6.2 Decoding Attack -- 6.3 Comparison with Existing McEliece Cryptosystems -- 7 Conclusion -- Appendix -- Transition Tables -- References -- A Secure Distributed Hash-Based Encryption Mode of Operation Suited for Big Data Systems -- 1 Introduction -- 2 Related Work -- 3 Proposed Solution -- 3.1 Distributed Cipher Block Chaining: DCBC -- 3.2 Target Criteria -- 3.3 How Does DCBC Work? -- 3.4 Encryption and Decryption in DCBC -- 3.5 IV Generator -- 4 Security Properties -- 4.1 CPA Security -- 4.2 Blockwise Adaptive Chosen Plaintext Attack Security -- 5 Theoretical Performance Cost -- 5.1 Assumptions -- 5.2 Cost Function C -- 5.3 Theoretical Performance Comparison.
6 Theoretical Diffusion -- 6.1 The Probability of a Bit Flipping -- 6.2 Probability of at Least M Bits Flipping -- 7 Conclusion and Future Work -- References -- An Assurance Framework and Process for Hybrid Systems -- 1 Introduction -- 2 Assurance Requirements -- 3 Assurance Framework -- 4 REST Interface -- 4.1 OpenAPI Document -- 4.2 Component REST API -- 5 Assurance Process -- 5.1 Building Blocks -- 5.2 Assurance Process -- 6 Walkthrough and Experiments -- 6.1 Process in Execution -- 6.2 Experiments -- 7 Comparison with Existing Solutions -- 8 Conclusions -- References -- PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE -- 1 Introduction -- 1.1 Motivation -- 1.2 Contributions and Structure -- 1.3 Related Work -- 2 Framework and Preliminaries -- 3 Pitfalls in Out-of-Band Authentication -- 3.1 Inattentive Users and Partial Preimage Attacks -- 3.2 Case Study -- 4 Authentication in Secure Email and Messaging via PAKE -- 4.1 Public Key Authentication via PAKE -- 4.2 An Instantiation Based on SPAKE2 -- 4.3 Selecting a PAKE Protocol -- 4.4 Transport Mechanism -- 5 Enhancements to Secure Email and Messaging by PAKE -- 5.1 Key Management and Authentication Improvements -- 5.2 Cryptographic Properties Enabled by PAKE -- 5.3 Cryptographic Enhancements to Email and Messaging -- 5.4 Comparison -- 6 Implementation: PakeMail -- 6.1 Cryptographic Details -- 6.2 PAKE Protocol Carried Out over Email -- 6.3 Implemented Scenarios -- 6.4 Performance -- 6.5 Further Design and Security Considerations -- 7 Security and Low-Entropy Secrets -- 8 Further Directions -- References -- Practically Efficient Attribute-Based Encryption for Compartmented and Multilevel Access Structures -- 1 Introduction -- 2 Preliminaries -- 3 Our Contribution -- 3.1 Motivation and Main Goal -- 3.2 Our Scheme for CASs.
3.3 Variations on the Same Theme: The Case of MASs -- 4 Extension to Multiple-Input Boolean Trees -- 5 Implementation -- 6 Conclusions -- References -- Analysis of In-Place Randomized Bit-Flipping Decoders for the Design of LDPC and MDPC Code-Based Cryptosystems -- 1 Introduction -- 2 Notation and Background -- 3 In-Place Randomized Bit-Flipping Decoder -- 3.1 An In-Place, Randomized Bit-Flipping Decoder -- 3.2 Modeling of the Bit-Flipping Probabilities -- 4 Validation of DFR Models and Cryptosystem Design -- 4.1 Experimental Validation of DFR Models -- 4.2 Design of Code-Based Cryptosystems -- 5 Related Work and Discussion -- 6 Conclusion -- References -- Business Analyst Tasks for Requirement Elicitation -- 1 Introduction -- 2 Systematic Literature Review -- 3 Business Analyst for Agile Method Driven Requirement Elicitation -- 4 Business Analyst in Ontology Driven Requirement Engineering -- 5 Case Study on Non-formal Education System Development -- 6 Conclusions -- References -- Chained Transaction Protocol Automated Verification Using Cl-AtSe -- 1 Introduction -- 2 Chained Transaction Protocol -- 2.1 Exchange Sub-protocol -- 2.2 Resolution 1 Sub-protocol -- 2.3 Resolution 2 Sub-protocol -- 3 Overview of AVISPA Tool -- 3.1 AVISPA Tool -- 3.2 High Level Protocol Specification Language -- 4 Automated Verification of Chained Transaction Protocol -- 4.1 Agent's Basic Roles -- 4.2 Protocol's Sessions Composed Roles -- 4.3 Environment Role -- 4.4 Security Requirements -- 4.5 Verification Results -- 5 Conclusions -- References -- Overall Feasibility of RF Energy Harvesting for IoT -- 1 Introduction -- 2 Constraints -- 2.1 Ambient Energy -- 2.2 Energy Consumption -- 3 Choice of Storage Capacitor -- 4 Rectifier -- 5 Overall System Feasibility -- 5.1 Theoretical Model -- 5.2 Application of the Model -- 6 Conclusion -- References -- Author Index.
Record Nr. UNISA-996464404803316
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Modeling and simulation of computer networks and systems : methodologies and applications / / edited by Mohammad S. Obaidat, Petros Nicopolitidis, Faouzi Zarai
Modeling and simulation of computer networks and systems : methodologies and applications / / edited by Mohammad S. Obaidat, Petros Nicopolitidis, Faouzi Zarai
Autore Obaidat Mohammad
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam, [Netherlands] : , : Morgan Kaufmann, , 2015
Descrizione fisica 1 online resource (965 p.)
Disciplina 006
Soggetto topico Computer networks
Simulation methods
Soggetto genere / forma Electronic books.
ISBN 0-12-800887-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ""Front Cover""; ""Modeling and Simulation of Computer Networks and Systems""; ""Copyright Page""; ""Contents""; ""List of Contributors""; ""Preface""; ""Overview and Goals""; ""Features of the Book""; ""Organization and Scanning of Chapters""; ""Target Audience""; ""Acknowledgements""; ""1 Protocols and services in computer networks and systems""; ""1 Wireless and mobile technologies and protocols and their performance evaluation""; ""1 Introduction""; ""2 Wireless and mobile technologies""; ""2.1 2G and 2.5G technologies""; ""2.1.1 GSM""
""2.1.2 2.5G technology: general packet radio service""""2.1.3 EDGE""; ""2.2 3G mobile technologies""; ""2.2.1 UMTS""; ""2.2.2 High speed downlink packet access""; ""2.2.3 High speed uplink packet access""; ""2.2.4 HSPA""; ""2.2.5 HSPA+""; ""2.2.6 LTE and LTE-A technologies""; ""3 LTE""; ""3.1 E-UTRAN""; ""3.2 Evolved packet core""; ""3.2.1 Serving gateway""; ""3.2.2 Packet data network gateway""; ""3.2.3 Mobility management entity""; ""3.2.4 Home subscriber server""; ""3.2.5 Policy and charging rules function""; ""3.3 LTE radio protocol architecture""; ""3.3.1 Physical layer""
""3.3.2 Medium access layer (MAC)""""3.3.3 Radio link control (RLC)""; ""3.3.4 Packet data convergence control (PDCP)""; ""3.3.5 Radio resource control (RRC)""; ""3.3.6 Non-access stratum protocols""; ""4 LTE-advanced""; ""4.1 LTE-A key technologies""; ""4.1.1 Carrier aggregation""; ""4.1.2 Enhanced MIMO""; ""4.1.3 Relays""; ""4.1.4 Coordinated multiple point transmission and reception""; ""4.2 LTE-A radio protocol architecture""; ""4.3 Comparison of LTE and LTE-A""; ""5 Wireless local area network""; ""6 Simulation of wireless networks""; ""6.1 Wireless network simulation tools""
""6.1.1 Network simulator 2""""6.1.2 Optimized network engineering tool""; ""6.1.3 OMNeT++""; ""6.1.4 GloMoSim""; ""6.1.5 LTE-Sim""; ""6.2 Mobility models""; ""6.2.1 Random walk mobility model""; ""6.2.2 Random waypoint mobility model""; ""6.2.3 Other mobility models""; ""6.3 Metrics of mobility models""; ""6.4 Case studies and simulation results""; ""7 Conclusion""; ""References""; ""2 Network planning and designing""; ""1 Introduction""; ""2 TCP in MANET""; ""2.1 Problems of TCP in MANET""; ""3 MANET Routing Protocols""; ""4 Related work""; ""5 Presentation of CL-TCP-OLSR""
""6 Evaluation of CL-TCP-OLSR""""6.1 Evaluation environment""; ""6.2 Evaluation parameters""; ""6.2.1 Effect of mobility""; ""6.2.1.1 Effect of network density (number of nodes)""; ""6.2.1.2 Energy consumption""; ""7 Conclusion and future work""; ""Acknowledgements""; ""References""; ""3 Rate adaptation algorithms for reliable multicast transmissions in wireless LANs""; ""1 Introduction""; ""1.1 Modulation schemes and theoretical throughput""; ""2 Related work""; ""3 The 802.11aa group address transmission service""; ""3.1 The 802.11aa group addressed transmission service""
""3.1.1 Directed multicast service""
Record Nr. UNISA-996426329903316
Obaidat Mohammad  
Amsterdam, [Netherlands] : , : Morgan Kaufmann, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Proceedings of the 2016 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS) : part of SummerSim 2016 Multiconference : Montreal, Quebec, Canada, July 24-27, 2016 / / Mohammad S. Obaidat [and six others], editors ; IEEE Communications Society
Proceedings of the 2016 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS) : part of SummerSim 2016 Multiconference : Montreal, Quebec, Canada, July 24-27, 2016 / / Mohammad S. Obaidat [and six others], editors ; IEEE Communications Society
Pubbl/distr/stampa Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2016
Descrizione fisica 1 online resource (507 pages)
Disciplina 004.24
Soggetto topico Electronic digital computers - Evaluation
Telecommunication systems - Evaluation
ISBN 1-5108-2423-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910332521203321
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the 2016 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS) : part of SummerSim 2016 Multiconference : Montreal, Quebec, Canada, July 24-27, 2016 / / Mohammad S. Obaidat [and six others], editors ; IEEE Communications Society
Proceedings of the 2016 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS) : part of SummerSim 2016 Multiconference : Montreal, Quebec, Canada, July 24-27, 2016 / / Mohammad S. Obaidat [and six others], editors ; IEEE Communications Society
Pubbl/distr/stampa Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2016
Descrizione fisica 1 online resource (507 pages)
Disciplina 004.24
Soggetto topico Electronic digital computers - Evaluation
Telecommunication systems - Evaluation
ISBN 1-5108-2423-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996580862903316
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Simulation and Modeling Methodologies, Technologies and Applications : 10th International Conference, SIMULTECH 2020 Lieusaint - Paris, France, July 8-10, 2020 Revised Selected Papers / / edited by Mohammad S. Obaidat, Tuncer Oren, Floriano De Rango
Simulation and Modeling Methodologies, Technologies and Applications : 10th International Conference, SIMULTECH 2020 Lieusaint - Paris, France, July 8-10, 2020 Revised Selected Papers / / edited by Mohammad S. Obaidat, Tuncer Oren, Floriano De Rango
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (244 pages)
Disciplina 003.3
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Engineering mathematics
Computational Intelligence
Engineering Mathematics
ISBN 3-030-84811-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Conference Chair -- Program Chair -- Program Committee -- Additional Reviewers -- Invited Speakers -- Contents -- Application of Photogrammetric Object Reconstruction for Simulation Environments in the Context of Inland Waterways -- 1 Introduction -- 2 Toolchain -- 3 Changes for the Application at Inland Waterways -- 4 Comparison of the Photogrammetric Reconstruction Programs -- 4.1 Quality -- 4.2 Computational Effort -- 5 Conclusion -- 6 Outlook -- References -- On-demand Simulation of Future Mobility Based on Apache Kafka -- 1 Introduction -- 2 Related Work -- 3 Architecture -- 3.1 Communication -- 3.2 Scenario Description -- 3.3 Simulation Domain and Layer -- 3.4 Life-Cycle of a Simulation Scenario -- 4 Publish/Subscribe Communication -- 4.1 Quality of Service -- 4.2 Kafka -- 4.3 Topic Structure -- 5 Distributing Simulation Scenarios -- 5.1 Partitioned Simulations -- 5.2 Multi-level Simulations -- 5.3 Co-simulations -- 6 Time Synchronization -- 6.1 Time Synchronization Paradigms -- 6.2 Implemented Synchronization Mechanism -- 7 Performance Evaluation -- 8 Conclusion -- References -- Augmentation of Sunflower-Weed Segmentation Classification with Unity Generated Imagery Including Near Infrared Sensor Data -- 1 Introduction -- 2 Related Work -- 2.1 CNNs in Precision Agriculture -- 3 Sunflower Dataset -- 4 Simulated Crop -- 4.1 Unity Level -- 5 CNN Deep Learning Training -- 5.1 Dataset Distribution -- 5.2 Evaluation Method -- 6 Results -- 6.1 Discussion -- 7 Conclusion -- References -- Simulation and Optimization of an Industrial Sulfuric Acid Plant with Contact Process Using Python-Unisim Design -- 1 Introduction -- 2 Process Description -- 3 Sulfuric Acid Plant Simulation -- 3.1 Sulfur Burner Simulation -- 3.2 Catalytic Conversion Reactor Simulation -- 3.3 Absorption Towers Simulation.
3.4 Heat Exchangers Simulation -- 3.5 Reaction Rate Parameters Estimation -- 3.6 Python-Unisim Communication -- 4 Results and Discussion -- 4.1 Model Validation -- 4.2 Parametric Study -- 5 Conclusion -- References -- HUBCAP: A Novel Collaborative Approach to Model-Based Design of Cyber-Physical Systems -- 1 Introduction -- 2 Challenges of Model-Based Design of CPS -- 3 The HUBCAP Collaboration Platform -- 4 The HUBCAP Sandbox Concept -- 4.1 Architecture -- 4.2 Security -- 4.3 Limitations -- 5 Catalogues of Models and MBD Services -- 5.1 Model Catalogue -- 5.2 MBD Services -- 5.3 Collaborate on a Joint HUBCAP Sandbox -- 6 The Open Call Funding Programme -- 7 Conclusion and Future Work -- References -- A Modeling Framework for an Innovative e-Health Service: The Hospital at Home -- 1 Introduction -- 2 Methodological Framework -- 3 The Hospital at Home Service -- 3.1 The As-Is Model of Hospital at Home -- 3.2 As-Is Model Simulations -- 3.3 e-Health Technologies -- 3.4 Simulations and Results -- 4 HaH and Telemedicine for COVID-19 Emergency -- 5 Conclusions -- References -- Dynamics of the Spatial Motion of the Long Boom Manipulator Based on Nonlinear Beam Element -- 1 Introduction -- 2 Methodology -- 2.1 Geometrically Exact Euler-Bernoulli Beam -- 2.2 Discrete Method of the Spline Beam Element -- 2.3 The Virtual Power Equations of the Element -- 3 The Modeling of Long Boom Manipulator: Folding Boom System -- 3.1 The Rigid Body Modeling -- 3.2 The Flexible Body Modeling -- 3.3 The Close Loop Constraints -- 3.4 The Dynamic Equations of the Complete System -- 4 Simulation and Analysis -- 4.1 Numerical Smooth -- 4.2 Initial Configuration and Selected Parameters -- 4.3 The Comparison with NODYA Calculation -- 4.4 The Simulation of the Spatial Motion -- 5 Conclusion and Outlook -- References.
Malaria Control: Epidemic Progression Calculation Based on Individual Mobility Data -- 1 Introduction -- 2 Related Work -- 2.1 Epidemic Modeling Approaches -- 2.2 Malaria Modeling Approach -- 3 Mobility Data Model -- 3.1 Simulating Individuals Mobility -- 4 Discrete Malaria Model -- 4.1 Global Model Overview -- 4.2 Discrete Patch Model -- 4.3 Discrete Individuals Model -- 5 Model Computation -- 5.1 Overview of the Computation Steps -- 5.2 Computing State Change Probabilities -- 5.3 Scalable Model Computation -- 6 Implementation and Validation -- 6.1 Experimental Setup -- 6.2 Experimental Objectives and Method -- 6.3 Impact of Individual Mobility -- 6.4 Relevance of the Model to Match the Kedougou Real Case -- 6.5 Vector Control Efficiency -- 7 Discussion -- 8 Conclusion -- References -- Investigation of Induced Loads, Stresses, Strains and Vibrations in a High Pressure Multistage Centrifugal Pump -- 1 Introduction -- 2 Model Description -- 3 Mathematical Formulation -- 3.1 Liquid Flow Velocity and Pressure -- 3.2 Axial and Radial Forces -- 3.3 Stress and Strains -- 3.4 Vibration Equations -- 4 Results and Discussion -- 4.1 Case Study -- 4.2 Comparison of the Results -- 5 Conclusion -- References -- A Novel Approach to Energy Management in Large Passenger and Cruise Ships: Integrating Simulation and Machine Learning Models -- 1 Introduction -- 2 Related Work -- 3 The Architecture of the Overall Solution -- 3.1 Example Use Cases -- 3.2 Architecture Details -- 3.3 Integration Aspects -- 4 The Proposed Approach -- 4.1 Agent-Based Simulation -- 4.2 ML Algorithms -- 5 Experimental Evaluation -- 5.1 Night Club -- 5.2 Kindergarten -- 5.3 Casino -- 5.4 Restaurant -- 6 Data Analysis and Synthesis -- 7 Statistical Validation of the Insights Produced by Machine Learning Models -- 8 Concluding Remarks and Future Work Directions -- References -- Author Index.
Record Nr. UNINA-9910523893703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui