Big Data Analytics and Computational Intelligence for Cybersecurity [[electronic resource] /] / edited by Mariya Ouaissa, Zakaria Boulouard, Mariyam Ouaissa, Inam Ullah Khan, Mohammed Kaosar |
Edizione | [1st ed. 2022.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
Descrizione fisica | 1 online resource (336 pages) |
Disciplina | 005.7 |
Collana | Studies in Big Data |
Soggetto topico |
Engineering - Data processing
Computational intelligence Big data Artificial intelligence Cooperating objects (Computer systems) Data Engineering Computational Intelligence Big Data Artificial Intelligence Cyber-Physical Systems |
ISBN | 3-031-05752-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | New Advancements in Cybersecurity: A Comprehensive Survey -- CPSs Communication using 5G Network in the Light of Security -- A Survey on Security Aspects in RPL Protocol over IoT Network -- Analysis of Cybersecurity Risks and their Mitigation for Work-from-Home Tools and Techniques -- A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IoT Layers -- Software-Defined Networking Security: A Comprehensive Review. |
Record Nr. | UNISA-996490366603316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Big Data Analytics and Computational Intelligence for Cybersecurity / / edited by Mariya Ouaissa, Zakaria Boulouard, Mariyam Ouaissa, Inam Ullah Khan, Mohammed Kaosar |
Edizione | [1st ed. 2022.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
Descrizione fisica | 1 online resource (336 pages) |
Disciplina |
005.7
005.8 |
Collana | Studies in Big Data |
Soggetto topico |
Engineering - Data processing
Computational intelligence Big data Artificial intelligence Cooperating objects (Computer systems) Data Engineering Computational Intelligence Big Data Artificial Intelligence Cyber-Physical Systems Dades massives Seguretat informàtica Intel·ligència computacional Objectes cooperants (Sistemes informàtics) |
Soggetto genere / forma | Llibres electrònics |
ISBN | 3-031-05752-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | New Advancements in Cybersecurity: A Comprehensive Survey -- CPSs Communication using 5G Network in the Light of Security -- A Survey on Security Aspects in RPL Protocol over IoT Network -- Analysis of Cybersecurity Risks and their Mitigation for Work-from-Home Tools and Techniques -- A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IoT Layers -- Software-Defined Networking Security: A Comprehensive Review. |
Record Nr. | UNINA-9910591042103321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computational intelligence for unmanned aerial vehicles communication networks / / Mariya Ouaissa [and four others], editors |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer International Publishing, , [2022] |
Descrizione fisica | 1 online resource (294 pages) |
Disciplina | 629.1326 |
Collana | Studies in Computational Intelligence |
Soggetto topico |
Drone aircraft - Control systems
Drone aircraft - Design and construction |
ISBN | 3-030-97113-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- About the Editors -- Machine Learning and AI Approach to Improve UAV Communication and Networking -- 1 Introduction -- 2 Literature Discussions -- 3 UAVs Characteristics -- 4 Artificial Intelligence and Machine Learning -- 4.1 Machine Learning Approaches -- 5 Unsupervised and Supervised ML for UAVs -- 5.1 Supervised-Based Learning -- 5.2 Unsupervised Learning Overview -- 6 Solution for UAVs-Based Issues -- 6.1 UAVs Coordination and Placement -- 6.2 Path Calculation -- 6.3 Virtual Reality in Drones -- 6.4 Abnormalities in Drone Monitoring -- 6.5 UAVs Detection -- 7 Interpretation and Future Practice -- 8 Conclusion -- References -- Implementation of Machine Learning Techniques in Unmanned Aerial Vehicle Control and Its Various Applications -- 1 Introduction -- 2 Classification of UAV -- 3 Unmanned Aerial Vehicle (UAV) Market Trends and Values -- 4 Machine Learning Techniques for UAV Applications -- 4.1 Linear Regression -- 4.2 Logistic Regression -- 4.3 Decision Tree (DT) -- 4.4 Random Forest (RF) -- 4.5 Support Vector Machine (SVM) -- 5 Applications of Machine Learning Techniques in UAV -- 6 Summary and Discussion -- 7 Conclusion -- References -- Machine Learning Techniques for UAV Trajectory Optimization-A Survey -- 1 Introduction -- 1.1 What is UAV? -- 1.2 Machine Learning with Artificial Intelligence -- 2 Survey Works -- 2.1 Issues on Physical Layer -- 2.2 Channel-Modeling -- 2.3 Interference Management -- 2.4 Configuration of Transmission Parameters -- 3 Resource Management and Network Planning -- 4 Open Issues -- 4.1 Implementation -- 4.2 Issues in Physical Layer -- 4.3 Issues in Security and Privacy -- 5 Conclusion -- References -- Metaheuristic Algorithms for Integrated Navigation Systems -- 1 Introduction -- 2 Expressing the Navigation Problem -- 2.1 Inertial Navigation -- 2.2 Integrated Navigation.
3 Optimization by Using Metaheuristic Algorithms -- 3.1 Genetic Algorithm -- 3.2 Particle Swarm Optimization -- 3.3 Inclined Planes System Optimization -- 3.4 Modified Inclined Planes System Optimization -- 4 Metaheuristic Algorithms for Designing Integrated Navigation Systems -- 5 Results -- 6 Conclusions -- References -- Security Threats in Flying Ad Hoc Network (FANET) -- 1 Introduction -- 2 Overview of FANET -- 2.1 Network Topology -- 2.2 Mobility Models -- 2.3 Node Mobility -- 2.4 Node Density -- 2.5 Localization -- 2.6 Power Consumption -- 2.7 Radio Propagation Model -- 3 Literature Review -- 4 Security in FANET -- 5 Security Challenges -- 5.1 Dynamic Network Topology -- 5.2 High Mobility -- 5.3 Error Tolerance -- 5.4 Latency Control -- 5.5 Key Distribution -- 5.6 Data Consistency -- 5.7 Location Awareness -- 5.8 Need of High Computational Ability -- 5.9 Privacy -- 5.10 Routing Protocol -- 5.11 Network Scalability -- 6 Security Services -- 6.1 Availability -- 6.2 Confidentiality -- 6.3 Data Integrity -- 6.4 Authentication -- 6.5 Non-repudiation -- 7 Types of Attackers -- 7.1 Basis of Membership -- 7.2 Basis of Intention -- 7.3 Basis of Activity -- 7.4 Basis of Scope -- 8 Security Threats -- 8.1 Attack on Availability -- 8.2 Attack on Confidentiality -- 8.3 Attack on Data Integrity -- 8.4 Attack on Authentication -- 8.5 Attack on Non-repudiation -- 9 Solution for Security Threats -- 9.1 SEAD -- 9.2 Ariadne -- 9.3 RobSAD -- 9.4 ARAN -- 9.5 SAODV -- 9.6 A-SAODV -- 9.7 One Time Cookie -- 10 Conclusion -- References -- Secure Communication Routing in FANETs: A Survey -- 1 Introduction -- 2 Literature Review -- 3 Wireless Communication -- 3.1 Mobility Models -- 3.2 Time-Dependent Mobility Models -- 3.3 Routing Protocols in FANETs -- 4 Conclusion -- References -- Impact of Routing Techniques and Mobility Models on Flying Ad Hoc Networks. 1 Introduction -- 1.1 Types of Networks -- 1.2 Traditional Network -- 2 Background Study -- 2.1 Mobile Ad Hoc Network (MANET) -- 2.2 Vehicular Ad Hoc Network (VANET) -- 2.3 Flying Ad Hoc Network (FANET) -- 2.4 Single, Multiple and Multiple-group UAVs Application Network -- 2.5 Classification of UAVs -- 2.6 Mobility Models -- 2.7 Routing Techniques -- 3 Conclusion and Future Direction -- References -- Analysis of Vulnerabilities in Cybersecurity in Unmanned Air Vehicles -- 1 Introduction -- 2 Motivation -- 3 Cybersecurity Threats -- 3.1 Spoofing -- 3.2 Tampering -- 3.3 Repudiation -- 3.4 Information Disclosure -- 3.5 Dos -- 3.6 Elevation of Privilege -- 4 Attacks -- 4.1 Spoofing Attack -- 4.2 Man in the Middle Attack -- 4.3 DoS Attack -- 4.4 Buffer Overflow Attack -- 4.5 Eaves Dropping Attack -- 5 Conclusion -- References -- Silent Listening to Detect False Data Injection Attack and Recognize the Attacker in Smart Car Platooning -- 1 Introduction -- 2 Related Works -- 2.1 Summary of Contributions -- 2.2 Chapter Organization -- 3 Research Method -- 3.1 FDI Attack Detection -- 3.2 FDI Attacker Recognition -- 3.3 Smart-Car Based Test Bed Creation for Sample Collection -- 3.4 Procedure -- 3.5 Instruments -- 3.6 Data Analysis Technique -- 4 Results and Discussion -- 4.1 Examining Correctness of Algorithms1 and 2 -- 4.2 Brief Answers for RQs -- 5 Conclusion -- References -- Taxonomy of UAVs GPS Spoofing and Jamming Attack Detection Methods -- 1 Introduction -- 1.1 Motivation Based on the Statical Reports -- 1.2 Classification of UAVs -- 1.3 Design Considerations of UAV -- 2 Taxonomy of UAV Routing Protocols -- 2.1 Topology Based Routing -- 2.2 Position-Based Routing -- 2.3 Hierarchical Routing -- 2.4 Probabilistic Routing Protocols -- 2.5 AI-Enabled Routing Protocols -- 2.6 Deterministic Routing Protocol -- 2.7 Stochastic Routing Protocols. 2.8 Social Network-Based Approach -- 3 Vulnerabilities in UAV -- 3.1 System-Related Vulnerabilities -- 3.2 Propagation Channel Vulnerabilities -- 3.3 Interference's Vulnerabilities -- 4 GPS Spoofing and Jamming Attacks -- 4.1 GPS Spoofing Attack -- 4.2 Jamming Attack -- 5 Literature Survey -- 6 Conclusion -- References -- Investigation on Challenges of Big Data Analytics in UAV Surveillance -- 1 Introduction -- 1.1 UAV Surveillance -- 1.2 Application of UAV Surveillance -- 1.3 Importance of UAV Surveillance -- 2 Big Data Analytics -- 2.1 Importance of Big Data Analytics -- 2.2 Significance of Big Data Analytics in UAV Surveillance -- 3 Background Study -- 4 Challenges of Big Data Analytics in UAV Surveillance -- 4.1 Safety -- 4.2 Privacy -- 4.3 Security -- 5 Conclusion -- References -- UAV-Based Photogrammetry and Seismic Zonation Approach for Earthquakes Hazard Analysis of Pakistan -- 1 Introduction -- 2 UAVs Impacts in Hazard Analysis and Rescue-Based Mission -- 3 Seismicity of the Area -- 4 Regional Tectonic Setup -- 4.1 Main Karakoram Thrust -- 4.2 Main Mantle Thrust -- 4.3 Main Boundary Thrust -- 5 Neighbor Embedding for Seismic Zonation -- 5.1 Manifold Learning -- 5.2 Seismicity of Pakistan -- 6 Bilinear Interpolation for Seismic Zonation -- 6.1 Directional Bilinear Interpolation Approach -- 6.2 Results and Interpration from Pakistan Bilinear-Based Interpolation -- 7 Conclusion -- References -- Optimizing UAV Path for Disaster Management in Smart Cities Using Metaheuristic Algorithms -- 1 Introduction -- 2 Related Study -- 2.1 Abbreviations -- 3 Mathematical Modeling and Metaheuristic Algorithm -- 3.1 Problem Statement -- 3.2 Path Optimization Using SFOA -- 4 Case Studies with Discussion -- 4.1 Scenario 1: General Environment -- 4.2 Scenario 2: Condense Obstacle Environment -- 4.3 Scenario 3: Maze Environment. 4.4 Scenario 4: Dynamic Environment -- 4.5 Performance Evaluation -- 5 Conclusion -- References -- UAV-Based Rescue System and Seismic Zonation for Hazard Analysis and Disaster Management -- 1 Introduction -- 2 Tectonic Setting of Kalabagh Area -- 2.1 Salt Range and Trans Indus Range Thrust -- 2.2 Surghar Fault -- 3 Approaches for Seismic Zonation of Kalabagh -- 3.1 Kriging Methodology -- 3.2 Cubic Convolution -- 4 Conclusion -- References -- Multi-sensor Fusion Methods for Unmanned Aerial Vehicles to Detect Environment Using Deep Learning Techniques -- 1 Introduction -- 1.1 Deep Learning in Object Detection -- 2 Multiple Sensors Fusion with CNN -- 2.1 ADAS (Advanced Driver Assistance System) -- 3 Multi-sensor Fusion Algorithm -- 3.1 Sensor Fusion Using FusionNet -- 3.2 Sensor Information Fusion Technology -- 3.3 CNN and Regression -- 4 Conclusion -- References -- General Parametric of Two Micro-Concentrator Photovoltaic Systems for Drone Application -- 1 Introduction -- 2 File Basic Concepts for Solar 4 Concentrators -- 3 Simulation Results -- 4 Conclusion -- References. |
Record Nr. | UNINA-9910558490603321 |
Cham, Switzerland : , : Springer International Publishing, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computational Intelligence in Internet of Agricultural Things / / edited by M. G. Sumithra, Malathy Sathyamoorthy, M. Manikandan, Rajesh Kumar Dhanaraj, Mariya Ouaissa |
Autore | Sumithra M. G |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (464 pages) |
Disciplina | 006.3 |
Altri autori (Persone) |
SathyamoorthyMalathy
ManikandanM DhanarajRajesh Kumar OuaissaMariya |
Collana | Studies in Computational Intelligence |
Soggetto topico |
Computational intelligence
Artificial intelligence Agriculture Computational Intelligence Artificial Intelligence |
ISBN | 3-031-67450-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | -- 1: Computational Intelligence and Internet of Things in the Agriculture Sector: An Introduction. -- 2: Role of Big Data Analytics in Intelligent Agriculture. -- 3: Machine learning-based remote monitoring and predictive analytics system for apple harvest storage: A statistical model based approach. -- 4: Revolutionizing Agriculture: Integrating IoT Cloud, And Machine Learning for Smart Farm Monitoring and Precision Agriculture. -- 5: Impact of Advanced Sensing Technologies in Agriculture with Soil, Crop, Climate and Farmland-based approaches using Internet of Things. -- 6: An analytical approach and concept mapping of agricultural issues using deep learning techniques. -- 7: Explainable AI for next generation Agriculture - Current Scenario and Future Prospects. -- 8: Barriers to implementing computational intelligence-based agriculture system. -- 9: Agri-Chain: A Blockchain-Empowered Smart Solution for Agricultural Industry. -- 10: Exploiting Internet of Things and AI-Enabled for Real-Time Decision Support in Precision Farming Practices. -- 11: Advancing Plant Disease Detection with Hybrid Models: Vision Transformer and CNN-Based Approaches. -- 12: Optimizing Agricultural Risk Management with Hybrid Block-chain and Fog Computing Architectures for Secure and Efficient Data Handling. -- 13: Innovating with Quantum Computing Approaches in Block-chain for Enhanced Security and Data Privacy in Agricultural IoT Systems. -- 14: Implementing Fog Computing in Precision Agriculture for Real-time Soil Health Monitoring and Data Management. -- 15: Empowering Farmers: An AI-Based Solution for Agricultural Challenges. -- 16: Artificial Intelligence in Agriculture: Potential Applications and Future Aspects. -- 17: Case study on Smart irrigation using Internet of Things and XAI Techniques. |
Record Nr. | UNINA-9910882897703321 |
Sumithra M. G | ||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computational Intelligence in Recent Communication Networks / / edited by Mariya Ouaissa, Zakaria Boulouard, Mariyam Ouaissa, Bassma Guermah |
Edizione | [1st ed. 2022.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
Descrizione fisica | 1 online resource (279 pages) |
Disciplina |
006.3
004.6 |
Collana | EAI/Springer Innovations in Communication and Computing |
Soggetto topico |
Computational intelligence
Telecommunication Artificial intelligence Computational Intelligence Communications Engineering, Networks Artificial Intelligence |
ISBN | 3-030-77185-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1. An Overview of Blockchain and 5G Networks -- Chapter 2. Deep Learning Approach for Interference Mitigation in FBMC/OQAM-MIMO Systems -- Chapter 3. Deep Learning in Non-Orthogonal Multiple Access for 5G and beyond Networks -- Chapter 4. Traffic Sign Detection: A Comparative Study between CNN and RNN -- Chapter 5. Merging Attack-Defense Tree and Game Theory to Analyze Vehicular Ad-Hoc Network Security -- Chapter 6. A Secure Vehicle to Everything (V2X) Communication Model for Intelligent Transportation System -- Chapter 7. A Novel Unsupervised Learning Method for Intrusion Detection in Software Defined Networks -- Chapter 8. Deep Reinforcement Learning Modeling of a V2V communication-based Bike Avoidance Protocol for Increased Vehicular Flow -- Chapter 9. Deep Learning-based Modeling for Pedestrian Perception and Decision Making in Refuge Island for Autonomous Driving -- Chapter 10. Machine Learning for Hate Speech Detection in Arabic Social Media -- Chapter 11. PDDL Planning and Ontologies, a Tool for Automatic Composition of Intentional-Contextual Web Services -- Chapter 12. QSAR anti-HIV Feature Selection and Prediction for Drug Discovery using Genetic Algorithm and Machine Learning Algorithms -- Chapter 13. Mining Electronic Health Records of patient using Linked Data for Ranking Diseases -- Chapter 14. Deep Neural Networks based Delay Driving the Alpha Factors Ranking based Clustering: Exploring the COVID-19 Pandemic’s Impact on the Economy and Markets -- Chapter 15. An Artificial Immune System for the Management of the Emergency Divisions. |
Record Nr. | UNINA-9910547297803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Homomorphic Encryption for Financial Cryptography [[electronic resource] ] : Recent Inventions and Challenges / / edited by V. Seethalakshmi, Rajesh Kumar Dhanaraj, S. Suganyadevi, Mariya Ouaissa |
Autore | Seethalakshmi V |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (302 pages) |
Disciplina | 005.824 |
Altri autori (Persone) |
DhanarajRajesh Kumar
SuganyadeviS OuaissaMariya |
Soggetto topico |
Data protection
Financial engineering Cryptography Data encryption (Computer science) Data protection—Law and legislation Data and Information Security Financial Technology and Innovation Cryptology Privacy |
ISBN | 3-031-35535-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1 -- Introduction to Homomorphic Encryption for Financial Cryptography -- Chapter 2 -- Survey on Homomorphic Encryption for Financial Cryptography Workout -- Chapter 3 Improved login interface algorithm for Financial Transactions using Visual Cryptographic Authentication -- Chapter 4 Securing shared data based on Homomorphic encryption schemes -- Chapter 5 Challenges and Opportunities associated with Homomorphic Encryption for Financial Cryptography -- Chapter 6 Homomorphic Encryption based Cloud Privacy-Preserving in Remote Ecg Monitoring and Surveillance -- Chapter 7 Enhancing Encryption Security against Cypher Attacks -- Chapter 8 Biometric Based Key Generation Using AES Algorithm for Real Time Security Applications -- Chapter 9 Financial Cryptography and its application in Blockchain -- Chapter 10 Algorithmic Strategies for Solving Complex Problems in Financial Cryptography.,- Chapter 11 Various Attacks on the implementation of Cryptographic Algorithms -- Chapter 12 A Survey on Private Keyword Sorting and Searching using Homomorphic Encryption -- Chapter 13 Multivariate Cryptosystem Based on a Quadratic Equation to Eliminate the Outliers Using Homomorphic Encryption Scheme. . |
Record Nr. | UNISA-996547955403316 |
Seethalakshmi V | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Homomorphic Encryption for Financial Cryptography : Recent Inventions and Challenges / / edited by V. Seethalakshmi, Rajesh Kumar Dhanaraj, S. Suganyadevi, Mariya Ouaissa |
Autore | Seethalakshmi V |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (302 pages) |
Disciplina | 005.824 |
Altri autori (Persone) |
DhanarajRajesh Kumar
SuganyadeviS OuaissaMariya |
Soggetto topico |
Data protection
Financial engineering Cryptography Data encryption (Computer science) Data protection—Law and legislation Data and Information Security Financial Technology and Innovation Cryptology Privacy |
ISBN | 3-031-35535-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1 -- Introduction to Homomorphic Encryption for Financial Cryptography -- Chapter 2 -- Survey on Homomorphic Encryption for Financial Cryptography Workout -- Chapter 3 Improved login interface algorithm for Financial Transactions using Visual Cryptographic Authentication -- Chapter 4 Securing shared data based on Homomorphic encryption schemes -- Chapter 5 Challenges and Opportunities associated with Homomorphic Encryption for Financial Cryptography -- Chapter 6 Homomorphic Encryption based Cloud Privacy-Preserving in Remote Ecg Monitoring and Surveillance -- Chapter 7 Enhancing Encryption Security against Cypher Attacks -- Chapter 8 Biometric Based Key Generation Using AES Algorithm for Real Time Security Applications -- Chapter 9 Financial Cryptography and its application in Blockchain -- Chapter 10 Algorithmic Strategies for Solving Complex Problems in Financial Cryptography.,- Chapter 11 Various Attacks on the implementation of Cryptographic Algorithms -- Chapter 12 A Survey on Private Keyword Sorting and Searching using Homomorphic Encryption -- Chapter 13 Multivariate Cryptosystem Based on a Quadratic Equation to Eliminate the Outliers Using Homomorphic Encryption Scheme. . |
Record Nr. | UNINA-9910736002003321 |
Seethalakshmi V | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The Rise of Quantum Computing in Industry 6. 0 Towards Sustainability : Revolutionizing Smart Disaster Management |
Autore | Reddy C. Kishor Kumar |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Cham : , : Springer, , 2025 |
Descrizione fisica | 1 online resource (286 pages) |
Altri autori (Persone) |
NagAnindya
OuaissaMariya BhushanBharat HanafiahMarlia Mohd |
Collana | Advances in Science, Technology and Innovation Series |
ISBN |
9783031733505
3031733509 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910917789003321 |
Reddy C. Kishor Kumar | ||
Cham : , : Springer, , 2025 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Soft Computing in Industry 5. 0 for Sustainability |
Autore | Reddy C. Kishor Kumar |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Cham : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (410 pages) |
Altri autori (Persone) |
SitholeThandiwe
OuaissaMariya ÖZERÖzen HanafiahMarlia M |
ISBN |
9783031693366
9783031693359 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910908374303321 |
Reddy C. Kishor Kumar | ||
Cham : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|