top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Distributed Computing and Networking [[electronic resource] ] : 14th International Conference, ICDCN 2013, Mumbai, India, January 3-6, 2013. Proceedings / / edited by Davide Frey, Michel Raynal, Saswati Sarkar, Rudrapatna K. Shyamasundar, Prasun Sinha
Distributed Computing and Networking [[electronic resource] ] : 14th International Conference, ICDCN 2013, Mumbai, India, January 3-6, 2013. Proceedings / / edited by Davide Frey, Michel Raynal, Saswati Sarkar, Rudrapatna K. Shyamasundar, Prasun Sinha
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XX, 466 p. 121 illus.)
Disciplina 004/.36
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer networks
Computer programming
Software engineering
Data protection
Algorithms
Application software
Computer Communication Networks
Programming Techniques
Software Engineering
Data and Information Security
Computer and Information Systems Applications
ISBN 3-642-35668-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Distributed algorithms and concurrent data structures -- Integration of heterogeneous wireless and wired networks -- Distributed operating systems -- Internetworking protocols and internet applications -- Distributed database systems -- Mobile and pervasive computing, context-aware distributed systems -- Embedded distributed systems -- Next generation and converged network architectures -- Experiments and performance evaluation of distributed systems -- Overlay and peer-to-peer networks and services -- Fault-tolerance, reliability, and availability -- Home networking and services -- Multiprocessor and multi-core architectures and algorithms -- Resource management and quality of service -- Self-organization, self-stabilization, and autonomic computing -- Network security and privacy -- High performance computing, grid computing, and cloud computing -- Energy-efficient networking and smart grids -- Security, cryptography, and game theory in distributed systems -- Sensor, PAN and ad-hoc networks -- Traffic engineering, pricing, network management.
Record Nr. UNISA-996465930003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Foundations of Software Technology and Theoretical Computer Science [[electronic resource] ] : 13th Conference, Bombay, India, December 15-17, 1993. Proceedings / / edited by Rudrapatna K. Shyamasundar
Foundations of Software Technology and Theoretical Computer Science [[electronic resource] ] : 13th Conference, Bombay, India, December 15-17, 1993. Proceedings / / edited by Rudrapatna K. Shyamasundar
Edizione [1st ed. 1993.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1993
Descrizione fisica 1 online resource (CDLXXVI, 462 p.)
Disciplina 004.0151
Collana Lecture Notes in Computer Science
Soggetto topico Computers
Software engineering
Computer logic
Programming languages (Electronic computers)
Mathematical logic
Theory of Computation
Software Engineering/Programming and Operating Systems
Logics and Meanings of Programs
Computation by Abstract Devices
Programming Languages, Compilers, Interpreters
Mathematical Logic and Formal Languages
ISBN 3-540-48211-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Some observations about the nature of computer science -- Essential intersection type assignment -- Label-selective ?-calculus syntax and confluence -- Conventional and uniqueness typing in graph rewrite systems -- A meta-language for typed object-oriented languages -- Preemption in concurrent systems -- Local versus non-local computation of length of digitized curves -- Data-independences of parallel random access machines -- Proving termination of logic programs by transforming them into equivalent term rewriting systems -- Completeness of hierarchical combinations of term rewriting systems -- Higher-order and semantic unification -- A conservative extension of first-order logic and its applications to theorem proving -- Well-founded Ordered Search (extended abstract) -- A real-time interval logic and its decision procedure -- On the semantics of optimization predicates in CLP languages -- Incremental algorithms for constraint solving and entailment over rational trees -- Proximity problems and the Voronoi diagram on a rectilinear plane with rectangular obstacles -- Feasibility of design in stereolithography -- Compact location problems -- On some communication complexity problems related to threshold functions -- Recursiveness over the complex numbers is time-bounded -- A lower bound for solvability of polynomial equations -- Reuse of proofs in software verification -- Induce-statements and induce-expressions: Constructs for inductive programming -- A graphic language based on timing diagrams -- Software technology: Integrating theory and practice -- Generating degrees of belief from statistical information: An overview -- Complexity results for 1-safe nets -- Some results about logical descriptions of non deterministic behaviours -- Order structures and generalisations of Szpilrajn's theorem -- ICSP and its relationship with ACSP and CSP -- On reduction-based process semantics -- Keeping track of the latest gossip: Bounded time-stamps suffice -- Time optimal self-stabilizing spanning tree algorithms -- Efficient algorithm to sort linear combinations of arrays -- A simple file structure for the weighted dictionary problem -- Searching, sorting and randomised algorithms for Central Elements and ideal counting in posets -- Learning classes of Regular and Linear Languages in Valiant's learnability framework.
Record Nr. UNISA-996465775203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1993
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Systems Security : 20th International Conference, ICISS 2024, Jaipur, India, December 16–20, 2024, Proceedings / / edited by Vishwas T. Patil, Ram Krishnan, Rudrapatna K. Shyamasundar
Information Systems Security : 20th International Conference, ICISS 2024, Jaipur, India, December 16–20, 2024, Proceedings / / edited by Vishwas T. Patil, Ram Krishnan, Rudrapatna K. Shyamasundar
Autore Patil Vishwas T
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (501 pages)
Disciplina 005.8
Altri autori (Persone) KrishnanRam
ShyamasundarRudrapatna K
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Computer engineering
Computer networks
Data and Information Security
Computer Engineering and Networks
Computer Communication Networks
ISBN 9783031800207
3031800206
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- System Security. -- Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms. -- An OS support for Tamper-resistant Software Execution Using Empty Interruptions. -- S-RFUP: Secure Remote Firmware Update Protocol. -- Securing Virtual Reality Apps Inter-Process Communication. -- Network Security. -- Securing the Web: Analysis of HTTP Security Headers in Popular Global Websites. -- Countering Subscription Concealed Identifier (SUCI)-Catchers in Cellular Communications. -- BP-MAP: A Secure and Convenient Mutual Authentication Protocol. -- Effects of Soft-Domain Transfer and Named Entity Information on Deception Detection. -- Paving the Way: Advancing V2X Safety Through Innovative Attack Generation and Analysis Framework (V2X-SAF). -- From Traits to Threats: Learning Risk Indicators of Malicious Insider using Psychometric Data. -- Identifying Insecure Network Configurations through Attack Modeling and Explainable AI. -- QIris: Quantum Implementation of Rainbow Table Attacks. -- Malware and Vulnerability Detection. -- Insights from Running 24 Static Analysis Tools on Open Source Software Repositories. -- REMEDII: Robust Malware Detection with Iterative and Intelligent Adversarial Training using GANs. -- Semantics-Based Static Vulnerability Detection of Solidity Using Abstract Interpretation. -- Privacy & Usability. -- Web Privacy Perceptions Amongst Indian Users. -- Enabling Privacy in IT Service Operations. -- Privacy-Preserving Photo Sharing: An SSI Use Case. -- Zone Recovery Attack on a Secure Privacy-Preserving Ride-Matching Protocol. -- Making EULA Great Again: A Novel Nudge Mechanism to Improve Readability, User Attention and Awareness. -- A Decoupling Mechanism for Transaction Privacy. -- AI Security. -- Protecting ownership of trained DNN models with Zero-Knowledge Proofs. -- MALAI: ML-based Attack on Learning With Error problem. -- Patch based backdoor attack on Deep Neural Networks. -- Industry Demo/Practice. -- Integrating Crypto-Based Payment Systems for Data Marketplaces: Enhancing Efficiency, Security, and User Autonomy. -- Ontologies for WAF configurations: when knowledge-graphs help troubleshooting. -- IntelliSOAR: Intelligent Alert Enrichment using Security Orchestration Automation and Response (SOAR). -- InTrust: An Asset Monitoring, Analysis and Vulnerability Assessment system for Zero Trust Network.
Record Nr. UNISA-996635664203316
Patil Vishwas T  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Systems Security [[electronic resource] ] : 15th International Conference, ICISS 2019, Hyderabad, India, December 16–20, 2019, Proceedings / / edited by Deepak Garg, N. V. Narendra Kumar, Rudrapatna K. Shyamasundar
Information Systems Security [[electronic resource] ] : 15th International Conference, ICISS 2019, Hyderabad, India, December 16–20, 2019, Proceedings / / edited by Deepak Garg, N. V. Narendra Kumar, Rudrapatna K. Shyamasundar
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (xviii, 345 pages) : illustrations
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data protection
Optical data processing
Computer communication systems
Special purpose computers
Application software
Database management
Security
Image Processing and Computer Vision
Computer Communication Networks
Special Purpose and Application-Based Systems
Information Systems Applications (incl. Internet)
Database Management
ISBN 3-030-36945-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Smart contracts -- Formal techniques -- Access control -- Machine learning -- Distributed systems -- Cryptography -- Online social networks -- Images and cryptography.
Record Nr. UNISA-996466200603316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Systems Security : 15th International Conference, ICISS 2019, Hyderabad, India, December 16–20, 2019, Proceedings / / edited by Deepak Garg, N. V. Narendra Kumar, Rudrapatna K. Shyamasundar
Information Systems Security : 15th International Conference, ICISS 2019, Hyderabad, India, December 16–20, 2019, Proceedings / / edited by Deepak Garg, N. V. Narendra Kumar, Rudrapatna K. Shyamasundar
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (xviii, 345 pages) : illustrations
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data protection
Optical data processing
Computer networks
Computers, Special purpose
Application software
Database management
Security
Image Processing and Computer Vision
Computer Communication Networks
Special Purpose and Application-Based Systems
Information Systems Applications (incl. Internet)
Database Management
ISBN 3-030-36945-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Smart contracts -- Formal techniques -- Access control -- Machine learning -- Distributed systems -- Cryptography -- Online social networks -- Images and cryptography.
Record Nr. UNINA-9910364954603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Systems Security [[electronic resource] ] : 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings / / edited by Rudrapatna K. Shyamasundar, Virendra Singh, Jaideep Vaidya
Information Systems Security [[electronic resource] ] : 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings / / edited by Rudrapatna K. Shyamasundar, Virendra Singh, Jaideep Vaidya
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XI, 415 p. 112 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data protection
Data structures (Computer science)
Computers and civilization
Computer communication systems
Computers
Law and legislation
Application software
Security
Data Structures and Information Theory
Computers and Society
Computer Communication Networks
Legal Aspects of Computing
Information Systems Applications (incl. Internet)
ISBN 3-319-72598-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy/cryptography -- Systems security -- Security analysis -- Identity management and access control -- Security attacks and detection -- Network security.
Record Nr. UNISA-996465741303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Systems Security : 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings / / edited by Rudrapatna K. Shyamasundar, Virendra Singh, Jaideep Vaidya
Information Systems Security : 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings / / edited by Rudrapatna K. Shyamasundar, Virendra Singh, Jaideep Vaidya
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XI, 415 p. 112 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data protection
Data structures (Computer science)
Information theory
Computers and civilization
Computer networks
Computers - Law and legislation
Information technology - Law and legislation
Application software
Data and Information Security
Data Structures and Information Theory
Computers and Society
Computer Communication Networks
Legal Aspects of Computing
Computer and Information Systems Applications
ISBN 3-319-72598-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy/cryptography -- Systems security -- Security analysis -- Identity management and access control -- Security attacks and detection -- Network security.
Record Nr. UNINA-9910484028003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Machine Learning and Big Data Analytics (Proceedings of International Conference on Machine Learning and Big Data Analytics (ICMLBDA) 2021)
Machine Learning and Big Data Analytics (Proceedings of International Conference on Machine Learning and Big Data Analytics (ICMLBDA) 2021)
Autore Misra Rajiv
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2021
Descrizione fisica 1 online resource (372 pages)
Altri autori (Persone) ShyamasundarRudrapatna K
ChaturvediAmrita
OmerRana
Collana Lecture Notes in Networks and Systems Ser.
Soggetto genere / forma Electronic books.
ISBN 3-030-82469-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Organizing Committee -- Chairman of Organizing Committee -- Members of Organizing Committee -- Scientific Committee -- Chairperson of Scientific Committee -- Members of Scientific Committee -- Contents -- Analysis on Applying the Capabilities of Deep Learning Based Method for Underwater Fish Species Classification -- 1 Introduction -- 2 Overview of Deep Learning -- 3 Review of Deep Learning Based Fish Classification Models -- 4 Performance Evaluation -- 5 Conclusion and Future Work -- References -- Bug Assignment Through Advanced Linguistic Operations -- 1 Introduction -- 2 Our Work -- 2.1 Data -- 2.2 Data Pre-processing -- 2.3 Classification Models -- 2.4 Similar Issues -- 2.5 Load Balancing -- 3 Accuracy -- 4 Conclusion -- References -- An Empirical Framework for Bangla Word Sense Disambiguation Using Statistical Approach -- 1 Introduction -- 2 Related Work -- 3 Dataset Preparation -- 3.1 Bangla Sense Annotated Corpus -- 4 Proposed BWSD Framework -- 4.1 Ambiguity Checker -- 4.2 Train Classifier -- 4.3 Actual Sense Prediction for Disambiguation -- 5 Experiments -- 5.1 Results -- 5.2 Comparison with Previous Techniques -- 6 Conclusion -- References -- Engagement Analysis of Students in Online Learning Environments -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Facial Expression Recognition -- 3.2 Gaze Detection -- 3.3 Ensemble Model -- 4 Results -- 4.1 Real-Time Engagement Analysis Capability -- 5 Conclusion -- References -- Static and Dynamic Hand Gesture Recognition for Indian Sign Language -- 1 Introduction -- 2 Related Work -- 3 Dataset and Methods -- 3.1 Description of Data Set -- 3.2 Methods -- 4 Experimental Model -- 4.1 Image Preprocessing -- 4.2 Image Segmentation -- 4.3 Feature Extraction -- 4.4 Classification -- 4.5 Prediction and Output Generation -- 5 Conclusion -- 6 Future Work.
References -- An Application of Transfer Learning: Fine-Tuning BERT for Spam Email Classification -- 1 Introduction -- 2 Literature Survey -- 2.1 Spam Email Classification -- 2.2 Fine-Tuning BERT for Classification -- 3 BERT Model Architecture -- 4 The Proposed Approach -- 4.1 Data Collection -- 4.2 Document Pre-processing -- 4.3 BERT Tokenizer -- 4.4 Fine-Tuning BERT and Hyper-parameter Setting -- 4.5 BERT as Classifier -- 5 State-Of-The Art Classification Techniques -- 5.1 Logistic Regression -- 5.2 Support Vector Machine (SVM) -- 5.3 Naïve Bayes (NB) -- 5.4 Random Forest -- 5.5 LSTM -- 6 Experiment and Results -- 6.1 Performance Evaluation Measures -- 6.2 Results and Discussion -- 7 Conclusion -- References -- Concurrent Vowel Identification Using the Deep Neural Network -- 1 Introduction -- 2 Methods -- 2.1 Stimuli -- 2.2 Neural Responses from the Auditory-Nerve Model -- 2.3 Deep Neural Network to Predict the Concurrent Vowel Scores -- 3 Results -- 4 General Discussions -- References -- Application of Artificial Intelligence to Predict the Degradation of Potential mRNA Vaccines Developed to Treat SARS-CoV-2 -- 1 Introduction -- 2 Current Work -- 3 Methodology -- 3.1 Data Used -- 3.2 Algorithm and Procedure -- 4 The LSTM and GRU Based AI Model -- 4.1 The Proposed Model -- 4.2 Training, Validation and Prediction -- 4.3 Evaluation -- 5 Results and Discussions -- 6 Conclusion -- References -- Explainable AI for Healthcare: A Study for Interpreting Diabetes Prediction -- 1 Introduction -- 2 Artificial Intelligence in Diabetes -- 2.1 Explainable Artificial Intelligence -- 2.2 Diabetes Dataset Description -- 3 Model-Agnostic Methods -- 3.1 Permutation Feature Importance and Feature Interaction -- 3.2 Partial Dependence Plot (PDP), Individual Conditional Expectation (ICE) and Accumulated Local Effects (ALE) Plot.
3.3 Local Interpretable Model-Agnostic Explanations (LIME) -- 3.4 Shapley Additive Explanations (SHAP) -- 4 Model Evaluation -- 5 Conclusion -- References -- QR Based Paperless Out-Patient Health and Consultation Records Sharing System -- 1 Introduction -- 2 Related Works -- 3 Motivations -- 4 System Description -- 5 Application Description -- 6 Implementation -- 7 Result Screenshots -- 8 Performance Evaluation and Future Work -- 9 Conclusion -- References -- Searching Pattern in DNA Sequence Using ECC-Diffie-Hellman Exchange Based Hash Function: An Efficient Approach -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Results and Discussion -- 5 Conclusion -- References -- Integrated Micro-Video Recommender Based on Hadoop and Web-Scrapper -- 1 Introduction -- 2 Related Work -- 3 Web-Scraper Using Selenium and Beautifulsoup -- 3.1 Selenium Web-Driver -- 3.2 Beautifulsoup -- 3.3 Implementation -- 3.4 Scraper for Search-History Extraction -- 3.5 Scraper for Keyword-Based Search and Extraction of Result -- 3.6 Scraper for Watch-History Extraction -- 4 Proposed Model -- 5 Keyword-Based Recommendation -- 6 Map-Reduce Programming Paradigm -- 7 User Based Collaborative Recommendation Using Map Reduce on Hadoop Platform -- 7.1 Implementation on Hadoop -- 8 Result -- 9 Conclusion -- References -- Comparison of Machine Learning Techniques to Predict Academic Performance of Students -- 1 Introduction -- 2 Literature Review -- 3 Research Model -- 4 Data Collection and Parameters -- 5 Research Methodology -- 5.1 Logistic Regression (LR) -- 5.2 Decision Tree (DT) -- 5.3 Artificial Neural Networks (ANN) -- 5.4 Naïve Bayes (NB) -- 5.5 Validation Methods and Performance Measure Parameters -- 6 Experiment and Result Analysis -- 7 Conclusion -- References -- Misinformation-A Challenge to Medical Sciences: A Systematic Review -- 1 Introduction.
2 What is Social Media and Why It is Proving to Be a Cause of Distress in the Field of Medical Sciences? -- 3 Various Methods to Correct Misinformation Related to Medical Sciences -- 4 Limitations of the Research -- 5 Recommendations for the Prevent of Misinformation -- 6 Conclusion -- References -- Comparative Analysis Grey Wolf Optimization Technique & -- Its Diverse Applications in E-Commerce Market Prediction -- 1 Introduction -- 2 Literature Review -- 3 GWO Algorithm -- 4 GWO Algorithm & -- Classification Analysis -- 5 Performance Comparison of Different Applications of GWO Algorithm -- 5.1 In Binary Problems -- 5.2 Dynamic & -- Restricted Problems Having Constraints -- 5.3 In Multi-criterion Problem -- 6 Performance Comparison of Different Techniques of E-commerce Market Prediction -- 7 Conclusion & -- Future Scope -- References -- Applying Extreme Gradient Boosting for Surface EMG Based Sign Language Recognition -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Experimental Setup -- 3.2 Dataset -- 3.3 Evaluation Metrics -- 3.4 Algorithm -- 4 Result and Discussion -- 5 Conclusion and Future Work -- References -- Automated Sleep Staging System Based on Ensemble Learning Model Using Single-Channel EEG Signal -- 1 Introduction -- 1.1 Related Work -- 2 Experimental Data -- 3 Methodology -- 3.1 Features Extraction -- 3.2 Feature Selection -- 3.3 Classification -- 4 Experimental Results -- 4.1 Feature Selection Results -- 4.2 Performance of Sleep Staging Using (SG-III) Dataset -- 4.3 Performance of Sleep Staging Using Proposed Ensemble Stacking Algorithm Using Subgroup-III Datasets -- 4.4 Summary of Results -- 5 Conclusion -- References -- Histopathological Image Classification Using Ensemble Transfer Learning -- 1 Introduction -- 2 Methodology -- 2.1 Transfer Learning Method -- 2.2 Ensemble Learning Method.
3 Evaluation of Proposed Ensemble Transfer Learning Model -- 3.1 Proposed Ensemble Transfer Learning Method -- 3.2 Evaluation of Proposed Ensemble Transfer Learning Method -- 4 Result -- 5 Conclusion -- References -- A Deep Feature Concatenation Approach for Lung Nodule Classification -- 1 Introduction -- 2 Preliminaries -- 2.1 AlexNet Architecture -- 2.2 ResNet Architecture -- 3 Proposed Work -- 4 Experiment Analysis -- 4.1 Data Description -- 4.2 Data Pre-processing -- 4.3 Data Augmentation -- 4.4 Training -- 4.5 Simulation -- 5 Conclusion -- References -- A Deep Learning Approach for Anomaly-Based Network Intrusion Detection Systems: A Survey and an Objective Comparison -- 1 Introduction -- 2 Theory -- 2.1 Network-Based Intrusion Detection Systems (NIDS) -- 2.2 NSL-KDD Dataset -- 3 Related Work -- 4 Relative Study of Techniques Applied in Network Intrusion Detection System -- 5 Implementation Strategies -- 5.1 Data Preprocessing -- 5.2 Self-taught Learning (STL) -- 6 Conclusion -- References -- Review of Security Aspects of 51 Percent Attack on Blockchain -- 1 Introduction -- 2 Background -- 3 Impacts of 51 percent Attack -- 4 Review of Literature -- 4.1 Analysis of Blockchain Security Aspects -- 4.2 Techniques for 51 percent Attack -- 5 Conclusion -- References -- Transfer Learning Based Convolutional Neural Network (CNN) for Early Diagnosis of Covid19 Disease Using Chest Radiographs -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset Used and Pre-processing -- 3.2 Architecture Used -- 3.3 Evaluation Parameters -- 4 Results -- 5 Conclusion -- References -- Review of Advanced Driver Assistance Systems and Their Applications for Collision Avoidance in Urban Driving Scenario -- 1 Introduction -- 2 Background and Need of Research -- 3 Advanced Driver Assistance Systems -- 3.1 Classification of ADAS Systems.
3.2 Sensors Used for Navigation Safety.
Altri titoli varianti Machine Learning and Big Data Analytics
Record Nr. UNINA-9910502990803321
Misra Rajiv  
Cham : , : Springer International Publishing AG, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui