top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Intelligent Informatics / / edited by El-Sayed M. El-Alfy, Sabu M. Thampi, Hideyuki Takagi, Selwyn Piramuthu, Thomas Hanne
Advances in Intelligent Informatics / / edited by El-Sayed M. El-Alfy, Sabu M. Thampi, Hideyuki Takagi, Selwyn Piramuthu, Thomas Hanne
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (663 p.)
Disciplina 006.3
620
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computational intelligence
Artificial intelligence
Computational Intelligence
Artificial Intelligence
ISBN 3-319-11218-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ""Preface""; ""Organization""; ""Contents""; ""Artificial Immune System Based Image Enhancement Technique""; ""1 Introduction""; ""2 Methodology""; ""2.1 Overview of Artificial Immune System""; ""2.2 Functions Used""; ""2.3 Proposed Method""; ""3 Results and Discussions""; ""4 Conclusions""; ""References""; ""Grayscale to Color Map Transformation for Efficient Image Analysis on Low Processing Devices""; ""1 Introduction""; ""2 Proposed Grayscale to Color Transform""; ""3 Experimental Results and Analysis""; ""3.1 k-Means Clustering Algorithm""; ""3.2 Applications and Scopes""
""4 Conclusion and Future""""References""; ""Automatic Classification of Brain MRI Images Using SVM and Neural Network Classifiers""; ""1 Introduction""; ""2 Related Works""; ""3 Design of the CAD System""; ""3.1 Preprocessing""; ""3.2 Segmentation""; ""3.3 Classification""; ""4 Experimental Results""; ""4.1 Data Set Used""; ""4.2 Performance Analysis of FCM on Original and Reduced Image Data""; ""4.3 Parameters Used for Classifier Evaluation""; ""4.4 Experiments Conducted""; ""5 Conclusion and Future Work""; ""References""
""An Investigation of fSVD and Ridgelet Transform for Illumination and Expression Invariant Face Recognition""""1 Introduction""; ""2 Proposed Methodology""; ""2.1 flustered SVD (fSVD)""; ""2.2 Ridgelet Transform""; ""2.3 Classification""; ""3 Experimental Results and Performance Analysis""; ""4 Conclusion""; ""References""; ""Coslets: A Novel Approach to Explore Object Taxonomy in Compressed DCT Domain for Large Image Datasets""; ""1 Introduction""; ""2 Proposed Method""; ""2.1 Segmentation in Complex Hybrid Color Space""; ""2.2 Feature Extraction and Classification""
""3 Experimental Results and Performance Analysis""""3.1 Caltech - 101 Dataset""; ""3.2 Caltech - 256 Dataset""; ""4 Discussion and Conclusion""; ""References""; ""AI Based Automated Identification and Estimation of Noise in Digital Images""; ""1 Introduction""; ""2 Probabilistic Neural Network (PNN)[2]""; ""3 Methodology""; ""3.1 Noise Identification Stage""; ""3.2 Noise Level Estimation Stage""; ""4 Implementation and Results""; ""5 Conclusion""; ""References""; ""SV-M/D: Support Vector Machine-Singular Value Decomposition Based Face Recognition""; ""1 Introduction""; ""2 Methodology""
""2.1 Support Vector Machine (SVM)""""2.2 Singular Value Decomposition (SVD)""; ""3 Results and Discussion""; ""4 Conclusion""; ""Appendix I - Solving for Dual Optimization Problem6""; ""Appendix II - Mercer-Hilbert-Schmidt Theorem""; ""References""; ""A New Single Image Dehazing Approach Using Modified Dark Channel Prior ""; ""1 Introduction""; ""2 Related Work""; ""2.1 Optical Model of Hazy Images""; ""2.2 Dark Channel Prior""; ""2.3 Transmission Estimation""; ""2.4 Restoration of Input Image""; ""3 Proposed Meth hodology""; ""3.1 Convert RGB to o LAB Color Space""
""3.2 Estimation of R Refined Transmission Map Using Dark Channel Prior""
Record Nr. UNINA-9910299669703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Signal Processing and Intelligent Recognition Systems [[electronic resource] ] : 5th International Symposium, SIRS 2019, Trivandrum, India, December 18–21, 2019, Revised Selected Papers / / edited by Sabu M. Thampi, Rajesh M. Hegde, Sri Krishnan, Jayanta Mukhopadhyay, Vipin Chaudhary, Oge Marques, Selwyn Piramuthu, Juan M. Corchado
Advances in Signal Processing and Intelligent Recognition Systems [[electronic resource] ] : 5th International Symposium, SIRS 2019, Trivandrum, India, December 18–21, 2019, Revised Selected Papers / / edited by Sabu M. Thampi, Rajesh M. Hegde, Sri Krishnan, Jayanta Mukhopadhyay, Vipin Chaudhary, Oge Marques, Selwyn Piramuthu, Juan M. Corchado
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (xiii, 400 pages)
Disciplina 621.3822
Collana Communications in Computer and Information Science
Soggetto topico Artificial intelligence
Computers
Computer organization
Optical data processing
Computer science—Mathematics
Coding theory
Information theory
Artificial Intelligence
Information Systems and Communication Service
Computer Systems Organization and Communication Networks
Computer Imaging, Vision, Pattern Recognition and Graphics
Mathematics of Computing
Coding and Information Theory
ISBN 981-15-4828-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intelligent Recognition Techniques and Applications -- Acoustic Identification of Nocturnal Bird Species -- Internet of Assistants: Humans Can Get Assistance Anywhere Anytime and Any Areas -- Artificial Intelligence Enabled Online Non-Intrusive Load Monitoring Embedded in Smart Plugs -- Using Evaluation Data Analytics in Environmental Education Projects -- Identifying the Influential User Based on User Interaction Model for Twitter Data -- Rank Level Fusion of Multimodal Biometrics Based on Cross-Entropy Monte Carlo Method -- Multilingual Phone Recognition: Comparison of Traditional Versus Common Multilingual Phone-set Approaches and Applications in Code-Switching -- Estimation of Bone Mineral Density Using Machine Learning Approach -- CNN Based Periocular Recognition Using Multispectral Images -- Obstructive Pulmonary Disease Prediction Through Heart Structure Analysis -- Speaker Specific Formant Dynamics of Vowels -- User Recognition Using Cognitive Psychology Based Behavior Modeling in Online Social Networks -- Indian Semi-Acted Facial Expression (iSAFE) Dataset for Human Emotions Recognition -- Deep Learning Approach for Intelligent Named Entity Recognition of Cyber Security -- A Chronic Psychiatric Disorder Detection Using Ensemble Classification -- Voice Controlled Media Player: A Use Case to Demonstrate an On-Premise Speech Command Recognition System -- Efficient Traffic Signboard Recognition System Using Convolutional Networks -- Development of a Novel Database in Gujarati Language for Spoken Digits Classification -- Modeling Vehicle Fall Detection Event Using Internet of Things -- Signal and Image Processing -- A Scalable Feature Selection and Opinion Miner Using Whale Optimization Algorithm -- Reliability and Connectivity Improve the Ranking Principle -- Distributed Detection of a Non-cooperative Target with Multiplicative Fading -- Data Aggregation Using Distributed Compressive Sensing in WSNs -- A Modified Approach for the Removal of Impulse Noise from Mammogram Images -- Comparison of Noninvasive Blood Glucose Estimation Using Various Regression Models -- SVD Diagonal Matrix Reconstruction Using OMP -- Channel Estimation Using Adaptive Cuckoo Search Based Wiener Filter -- Down Link:: Error-rate Performance of Cognitive D-STTD MC-IDMA System -- An Approach for Color Retinal Image Enhancement Using Linearly Quantile Separated Histogram Equalization and DCT Based Local Contrast Enhancement -- Recurrence Network-Based Approach to Distinguish Between Chaotic and Quasiperiodic Solution -- Non Linear Analysis of the Effect of Stimulation on Epileptic Signals Generated at Right Hippocampus -- What are 3GPP 5G Phase 1 and 2 and What Comes After.
Record Nr. UNISA-996465466203316
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Signal Processing and Intelligent Recognition Systems : 5th International Symposium, SIRS 2019, Trivandrum, India, December 18–21, 2019, Revised Selected Papers / / edited by Sabu M. Thampi, Rajesh M. Hegde, Sri Krishnan, Jayanta Mukhopadhyay, Vipin Chaudhary, Oge Marques, Selwyn Piramuthu, Juan M. Corchado
Advances in Signal Processing and Intelligent Recognition Systems : 5th International Symposium, SIRS 2019, Trivandrum, India, December 18–21, 2019, Revised Selected Papers / / edited by Sabu M. Thampi, Rajesh M. Hegde, Sri Krishnan, Jayanta Mukhopadhyay, Vipin Chaudhary, Oge Marques, Selwyn Piramuthu, Juan M. Corchado
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (xiii, 400 pages)
Disciplina 621.3822
Collana Communications in Computer and Information Science
Soggetto topico Artificial intelligence
Computers
Computer organization
Optical data processing
Computer science—Mathematics
Coding theory
Information theory
Artificial Intelligence
Information Systems and Communication Service
Computer Systems Organization and Communication Networks
Computer Imaging, Vision, Pattern Recognition and Graphics
Mathematics of Computing
Coding and Information Theory
ISBN 981-15-4828-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intelligent Recognition Techniques and Applications -- Acoustic Identification of Nocturnal Bird Species -- Internet of Assistants: Humans Can Get Assistance Anywhere Anytime and Any Areas -- Artificial Intelligence Enabled Online Non-Intrusive Load Monitoring Embedded in Smart Plugs -- Using Evaluation Data Analytics in Environmental Education Projects -- Identifying the Influential User Based on User Interaction Model for Twitter Data -- Rank Level Fusion of Multimodal Biometrics Based on Cross-Entropy Monte Carlo Method -- Multilingual Phone Recognition: Comparison of Traditional Versus Common Multilingual Phone-set Approaches and Applications in Code-Switching -- Estimation of Bone Mineral Density Using Machine Learning Approach -- CNN Based Periocular Recognition Using Multispectral Images -- Obstructive Pulmonary Disease Prediction Through Heart Structure Analysis -- Speaker Specific Formant Dynamics of Vowels -- User Recognition Using Cognitive Psychology Based Behavior Modeling in Online Social Networks -- Indian Semi-Acted Facial Expression (iSAFE) Dataset for Human Emotions Recognition -- Deep Learning Approach for Intelligent Named Entity Recognition of Cyber Security -- A Chronic Psychiatric Disorder Detection Using Ensemble Classification -- Voice Controlled Media Player: A Use Case to Demonstrate an On-Premise Speech Command Recognition System -- Efficient Traffic Signboard Recognition System Using Convolutional Networks -- Development of a Novel Database in Gujarati Language for Spoken Digits Classification -- Modeling Vehicle Fall Detection Event Using Internet of Things -- Signal and Image Processing -- A Scalable Feature Selection and Opinion Miner Using Whale Optimization Algorithm -- Reliability and Connectivity Improve the Ranking Principle -- Distributed Detection of a Non-cooperative Target with Multiplicative Fading -- Data Aggregation Using Distributed Compressive Sensing in WSNs -- A Modified Approach for the Removal of Impulse Noise from Mammogram Images -- Comparison of Noninvasive Blood Glucose Estimation Using Various Regression Models -- SVD Diagonal Matrix Reconstruction Using OMP -- Channel Estimation Using Adaptive Cuckoo Search Based Wiener Filter -- Down Link:: Error-rate Performance of Cognitive D-STTD MC-IDMA System -- An Approach for Color Retinal Image Enhancement Using Linearly Quantile Separated Histogram Equalization and DCT Based Local Contrast Enhancement -- Recurrence Network-Based Approach to Distinguish Between Chaotic and Quasiperiodic Solution -- Non Linear Analysis of the Effect of Stimulation on Epileptic Signals Generated at Right Hippocampus -- What are 3GPP 5G Phase 1 and 2 and What Comes After.
Record Nr. UNINA-9910410044603321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data Intelligence and Cognitive Informatics : Proceedings of ICDICI 2023
Data Intelligence and Cognitive Informatics : Proceedings of ICDICI 2023
Autore Jacob I. Jeena
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2024
Descrizione fisica 1 online resource (579 pages)
Altri autori (Persone) PiramuthuSelwyn
Falkowski-GilskiPrzemyslaw
Collana Algorithms for Intelligent Systems Series
ISBN 981-9979-62-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- About the Editors -- Automatic Sentence Classification: A Crucial Component of Sentiment Analysis -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Data Collection -- 3.2 Pre-processing -- 3.3 Tokenization of Data -- 3.4 Algorithm Feeding -- 3.5 Best Model Selection -- 4 Result and Discussion -- 4.1 Statistical Analysis -- 4.2 Accuracy Graph -- 4.3 Confusion Matrix -- 4.4 Classification Report -- 5 Conclusion and Future Work -- References -- Real-Time Health Monitoring System of Patients on Utilizing Red Tacton -- 1 Introduction -- 2 Implementation -- 3 Proposed Methodology -- 4 Results -- 5 Conclusion -- References -- An Efficient Botnet Detection Using Machine Learning and Deep Learning -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Load Dataset -- 3.2 Data Pre-Processing -- 3.3 Feature Selection -- 3.4 Handling Class Imbalance -- 3.5 Partition Dataset in Training and Testing -- 3.6 Apply ML/DL Models -- 3.7 Bot Detection -- 3.8 Model Evaluation -- 4 Experiments and Results -- 5 Conclusion -- References -- Wavelet Selection for Novel MD5-Protected DWT-Based Double Watermarking and Image Hiding Algorithm -- 1 Introduction -- 2 Related Works -- 3 Methodology Used -- 3.1 Architecture of Proposed System -- 3.2 Watermark Embedder -- 3.3 Watermark Extractor -- 4 Experimental Results -- 4.1 Pseudorandomness in Watermark Embedding -- 4.2 Performance Evaluation Metrics -- 4.3 Selection of Wavelet -- 4.4 Watermark Embedding and Extraction -- 4.5 Image Hiding -- 5 Conclusion and Future Work -- References -- Chaotic Map Based Encryption Algorithm for Secured Medical Data Analytics -- 1 Introduction -- 2 Related Work -- 3 Existing Techniques -- 3.1 Algorithm -- 3.2 Cryptography -- 3.3 Encryption -- 3.4 Decryption -- 3.5 Key -- 3.6 Steganography -- 3.7 Symmetric Encryption.
4 Proposed Methodology -- 4.1 Secret Key Generation -- 4.2 Hahn's Discrete Orthogonal Moment -- 4.3 QR Code -- 4.4 Modified Logistic Map -- 5 Results and Discussions -- References -- Gold Price Forecast Using Variational Mode Decomposition-Aided Long Short-Term Model Tuned by Modified Whale Optimization Algorithm -- 1 Introduction -- 2 Background and Related Works -- 2.1 LSTM Overview -- 2.2 Variation Mode Decomposition Details -- 2.3 Metaheuristics Optimization -- 2.4 AI Applications for Gold Price Forecasting -- 3 Whale Optimization Algorithm -- 3.1 Elementary WOA -- 3.2 Proposed Improved WOA Algorithm Used in Time-Series Forecasting Framework -- 4 Experimental Setup -- 4.1 Results and Discussion -- 5 Conclusion -- References -- Requirements for a Career in Information Security: A Comprehensive Review -- 1 Introduction -- 2 Cybersecurity Foundation -- 2.1 Information Security Expertise -- 2.2 Duties and Tasks of an IS Professional -- 2.3 Job Nature and Requirements -- 3 Research Approach -- 3.1 Words Used to Search -- 3.2 Selection Criteria -- 3.3 Rejection Criteria -- 3.4 Data Gathering -- 3.5 Quality Appraisal -- 4 Results -- 5 Conclusion -- References -- Intrusion Detection Using Bloom and XOR Filters -- 1 Introduction -- 2 Literature Survey -- 3 NIDS Implementation Using Bloom Filter -- 4 NIDS Implementation Using XOR Filter -- 5 Experimental Results and Discussions -- 6 Conclusions and Future Work -- References -- A Model for Privacy-Preservation of User Query in Location-Based Services -- 1 Introduction -- 2 Related Work and Literature Survey -- 3 Methodology -- 4 Results -- 5 Conclusion -- 6 Future Work -- References -- A GPS Based Bus Tracking and Unreserved Ticketing System Using QR Based Verification and Validation -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 System Architecture -- 5 System Functionality.
5.1 QR Code -- 5.2 Crowd Management -- 5.3 GPS Location -- 5.4 Automatic Ticket Expiry -- 5.5 Passenger Application -- 5.6 Conductor Application -- 6 Backend -- 6.1 Seat Availability -- 6.2 Passenger Information -- 6.3 Administrative Information -- 7 Conclusion and Future Scope -- References -- FileFox: A Blockchain-Based File Storage Using Ethereum and IPFS -- 1 Introduction -- 2 Background -- 2.1 Blockchain Storage -- 2.2 INFURA -- 2.3 Truffle -- 2.4 MetaMask -- 3 Related Work -- 4 Proposed System -- 5 Implementation -- 6 Result and Discussion -- 7 Conclusion and Future Scope -- References -- Minimizing Web Diversion Using Query Classification and Text Mining -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Dataset -- 3.2 Feature Extraction -- 3.3 Semantic Matching -- 3.4 Web Query Classification -- 3.5 Machine Learning Models -- 3.6 Deep Learning Models -- 3.7 Evaluation Metrics -- 4 Results and Discussion -- 5 Future Scope -- 6 Conclusion -- References -- Connect: A Secure Approach for Collaborative Learning by Building a Social Media Platform -- 1 Introduction -- 1.1 Critical Characteristics of Social Media Are as Follows -- 1.2 Social Media Platforms -- 1.3 Need for Using Collaborative Learning -- 1.4 Challenges and Issues to Build Social Networking -- 1.5 Cloud Computing -- 1.6 Encryption -- 1.7 Importance of Social Media Platforms for Collaborative Learning -- 1.8 Advantages of Collaborative Learning for Faculty-To-Faculty Interaction -- 1.9 Security Concerns While Building a Social Media Platform -- 1.10 Conventional Threats -- 1.11 Modern Threats -- 1.12 Targeted Threats -- 1.13 Reasons Behind Online Social Media Security -- 2 Literature Review -- 2.1 Encryption Techniques Used -- 3 Summary of Literature Review -- 3.1 Importance of the Study.
3.2 The Opportunities that Will Be Provided Among the Users of the System Are as Follows -- 4 Proposed System -- 4.1 Proposed Algorithmic Process -- 5 Discussion -- 6 Conclusion -- References -- Smart Analytics System for Digital Farming -- 1 Introduction -- 2 Need for the Study -- 3 Related Works -- 4 Proposed Work -- 5 Conclusion -- References -- Sarcasm Detection for Marathi and the role of emoticons -- 1 Introduction -- 2 Related Work -- 3 Dataset and Annotation -- 3.1 Distribution of Tweets -- 3.2 Emoji Analysis -- 4 Pre-processing of Tweets -- 4.1 Cleaning of Tweets -- 4.2 Tokenization -- 5 Feature Extraction and Sarcasm Detection -- 5.1 Sentence Embedding Using Language Model -- 5.2 Embeddings for Emojis in the Tweet -- 6 Experiments and Result Analysis -- 7 Conclusion -- References -- Fleet Management Mobile Application Using GPS Shortest Path -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 Modules -- 3.2 Algorithm Used -- 3.3 Database -- 4 Result and Discussion -- 5 Conclusions -- References -- Finger Vein Biometric System Based on Convolutional Neural Network -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 3.1 Image Enhancement -- 3.2 Features Extraction -- 3.3 AES Encryption and Decryption -- 3.4 Convolution Neural Network -- 4 Result and Discussion -- 4.1 Image Enhancement -- 4.2 Feature Extraction -- 4.3 AES Encryption and Decryption -- 5 Conclusion -- References -- Embedding and Extraction of Data in Speech for Covert Communication -- 1 Introduction -- 2 Literature Survey -- 3 Existing Methodology -- 4 Proposed Methodology -- 5 Results and Evaluation -- 5.1 Results -- 5.2 Evaluation Metrics -- 6 Conclusion and Future Work -- References -- A Machine Learning Based Model for Classification of Customer Service's Email -- 1 Introduction -- 2 Problem Statement.
2.1 Shared Inboxes Fail in Managing the Emails as the Number Grows -- 3 Proposed Solution -- 3.1 Advantages of Email Multi-folder Categorization for Better Customer Support -- 3.2 Email with Multi-folder Categorization Works Well with a Database System -- 3.3 Work Together to Solve Problems at a Fast Pace -- 3.4 Provide Support in the 100% Context -- 3.5 Measure Individual Performance with Intuitive Reports -- 3.6 Architecture of Automatic Classification of Email -- 4 Research Methodology -- 4.1 Classification of Email Using the Technique of Machine Learning -- 4.2 Machine Learning Terminologies Used in Classification -- 4.3 Support Vector Machine -- 4.4 Advantages and Disadvantages for Using Support Vector Machine -- 4.5 Validation Tool/Dataset Used -- 5 Results -- 6 Conclusion -- 7 Limitations and Future Scope -- References -- Intelligent Identification and Multiclass Segmentation of Agricultural Crops Problem Areas by Neural Network Methods -- 1 Introduction -- 2 Methods and Materials -- 3 Results and Discussion -- 3.1 Justification of the Segmentation DNN Architecture -- 3.2 Learning Outcomes Developed by DNN -- 3.3 Discussion of the Results -- 4 Conclusions -- References -- Perishable Products: Enhancing Delivery Time Efficiency with Big Data, AI, and IoT -- 1 Introduction -- 2 Delivery Time in Our Context -- 2.1 Optimizing Delivery Time in Transportation: Exploring Algorithmic Approaches -- 2.2 Objective -- 2.3 Advantage -- 2.4 Challenger -- 2.5 Delivery Time Description -- 3 The Proposed Optimization -- 3.1 Model System -- 3.2 The Proposed Optimization for Delivery Time -- 3.3 Specification Parameter -- 4 Optımızatıon Results Analysis -- 4.1 Comparing CT with Integrated Recent Transportation Technologies -- 4.2 Evaluation and Comparison of Optimization Results -- 5 Conclusion -- References -- CNN Approach for Identification of Medicinal Plants.
1 Introduction.
Record Nr. UNINA-9910799231503321
Jacob I. Jeena  
Singapore : , : Springer Singapore Pte. Limited, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Future Network Systems and Security : 5th International Conference, FNSS 2019, Melbourne, VIC, Australia, November 27–29, 2019, Proceedings / / edited by Robin Doss, Selwyn Piramuthu, Wei Zhou
Future Network Systems and Security : 5th International Conference, FNSS 2019, Melbourne, VIC, Australia, November 27–29, 2019, Proceedings / / edited by Robin Doss, Selwyn Piramuthu, Wei Zhou
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (viii, 248 pages)
Disciplina 005.8
004.6
Collana Communications in Computer and Information Science
Soggetto topico Data protection
Computer communication systems
Application software
Computers
Data mining
Artificial intelligence
Security
Computer Communication Networks
Information Systems Applications (incl. Internet)
Computing Milieux
Data Mining and Knowledge Discovery
Artificial Intelligence
ISBN 3-030-34353-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Emerging Networks and Applications -- Security, Privacy and Trust -- Security Analytics and Forensics.
Record Nr. UNINA-9910349269503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Future Network Systems and Security : 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedings / / edited by Robin Doss, Selwyn Piramuthu, Wei Zhou
Future Network Systems and Security : 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedings / / edited by Robin Doss, Selwyn Piramuthu, Wei Zhou
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (X, 207 p. 75 illus.)
Disciplina 004.6
Collana Communications in Computer and Information Science
Soggetto topico Data protection
Computer security
Application software
Computer communication systems
Data encryption (Computer science)
Computers and civilization
Security
Systems and Data Security
Information Systems Applications (incl. Internet)
Computer Communication Networks
Cryptology
Computers and Society
ISBN 3-319-94421-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Secure design and verication -- Security, privacy and ethics -- Big data and applications of future network systems.
Record Nr. UNINA-9910299314603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Future Network Systems and Security : Third International Conference, FNSS 2017, Gainesville, FL, USA, August 31 - September 2, 2017, Proceedings / / edited by Robin Doss, Selwyn Piramuthu, Wei Zhou
Future Network Systems and Security : Third International Conference, FNSS 2017, Gainesville, FL, USA, August 31 - September 2, 2017, Proceedings / / edited by Robin Doss, Selwyn Piramuthu, Wei Zhou
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (X, 199 p. 60 illus.)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Computer communication systems
Application software
Computers and civilization
Data protection
Computer system failures
Computers
Law and legislation
Computer Communication Networks
Information Systems Applications (incl. Internet)
Computers and Society
Security
System Performance and Evaluation
Legal Aspects of Computing
ISBN 3-319-65548-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Protocol design and secure implementation -- Security protocols and attack countermeasures -- Big data and future applications.
Record Nr. UNINA-9910254834103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Future Network Systems and Security : Second International Conference, FNSS 2016, Paris, France, November 23-25, 2016, Proceedings / / edited by Robin Doss, Selwyn Piramuthu, Wei Zhou
Future Network Systems and Security : Second International Conference, FNSS 2016, Paris, France, November 23-25, 2016, Proceedings / / edited by Robin Doss, Selwyn Piramuthu, Wei Zhou
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (X, 195 p. 81 illus.)
Disciplina 004.6
Collana Communications in Computer and Information Science
Soggetto topico Computer communication systems
Computer security
Application software
Computers and civilization
Data mining
Computer Communication Networks
Systems and Data Security
Information Systems Applications (incl. Internet)
Computers and Society
Data Mining and Knowledge Discovery
ISBN 3-319-48021-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Technology -- Communications -- Systems and security aspects of relevance to future networks.
Record Nr. UNINA-9910255016703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Future Network Systems and Security : First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings / / edited by Robin Doss, Selwyn Piramuthu, Wei ZHOU
Future Network Systems and Security : First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings / / edited by Robin Doss, Selwyn Piramuthu, Wei ZHOU
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (X, 195 p. 75 illus.)
Disciplina 004.6
Collana Communications in Computer and Information Science
Soggetto topico Computer communication systems
Computer security
Computer Communication Networks
Systems and Data Security
ISBN 3-319-19210-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Technology -- Communications -- Systems and security aspects of relevance to future networks.
Record Nr. UNINA-9910299234403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
MobiSecServ : 2019 Fifth Conference on Mobile and Secure Services : Miami Beach, Miami, FL, USA, 2-3 March 2019 / / editors, Pascal Urien, Selwyn Piramuthu ; sponsored by Institute of Electrical and Electronics Engineers
MobiSecServ : 2019 Fifth Conference on Mobile and Secure Services : Miami Beach, Miami, FL, USA, 2-3 March 2019 / / editors, Pascal Urien, Selwyn Piramuthu ; sponsored by Institute of Electrical and Electronics Engineers
Pubbl/distr/stampa Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2019
Descrizione fisica 1 online resource (561 pages)
Disciplina 621
Soggetto topico Mobile communication systems - Security measures
ISBN 1-5386-7700-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910318347703321
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui