top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
AI-Based Advanced Optimization Techniques for Edge Computing
AI-Based Advanced Optimization Techniques for Edge Computing
Autore Kumar Mohit
Edizione [1st ed.]
Pubbl/distr/stampa Newark : , : John Wiley & Sons, Incorporated, , 2025
Descrizione fisica 1 online resource (481 pages)
Disciplina 006.3
Altri autori (Persone) SrivastavaGautam
SinghAshutosh Kumar
DubeyKalka
ISBN 9781394287048
1394287046
9781394287062
1394287062
9781394287055
1394287054
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9911020105703321
Kumar Mohit  
Newark : , : John Wiley & Sons, Incorporated, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Federated learning for multimedia data processing and security in industry 5.0 / / edited by Gautam Srivastava and Thippa Reddy Gadekallu
Federated learning for multimedia data processing and security in industry 5.0 / / edited by Gautam Srivastava and Thippa Reddy Gadekallu
Pubbl/distr/stampa Stevenage, Herts : , : The Institution of Engineering and Technology, , [2025]
Descrizione fisica 1 online resource : illustrations (chiefly color)
Collana IET Security Series
Soggetto topico Federated learning (Machine learning)
ISBN 1-83724-349-2
1-83953-758-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ; 1 Federated learning-enabled 5G and beyond for Industry 5.0 / Chamitha De Alwis -- ; 2 Federated learning for optimized communication in Industry 5.0 / Dasari Bhulakshmi, Gokul Yenduri, Praveen Kumar Reddy Maddikunta, Celestine Iwendi and Thippa Reddy Gadekallu -- ; 3 Federated learning enabled digital twins for Industry 5.0: perspectives, challenges, and future directions / Dasaradharami Reddy Kandati, Supriya Y, Gokul Yenduri, Praveen Kumar Reddy Maddikunta, Thippa Reddy Gadekallu and Abdul Wahid -- ; 4 Collaborative intelligence: federated learning-enabled edge computing in Industry 5.0 / M Ramalingam, Gokul Yenduri, Praveen Kumar Reddy Maddikunta, Praveen Kumar Donta and Thippa Reddy Gadekallu -- ; 5 Infusion of federated learning for cybersecurity in Industry 5.0 / G. Chemmalar Selvi, G. Deepti Raj, G. Lakshmi Priya, Gokul Yenduri, Praveen Kumar Reddy Maddikunta, Abdul Rehman Javed and Thippa Reddy Gadekallu -- ; 6 Cybersecurity with blockchain for digital twins / Rutvij H. Jhaveri and Ashish Patel -- ; 7 Blockchain-based federated learning for Industry 5.0 applications / Rukhsana Ruby, Zehua Wang and Lu Wang -- ; 8 Blockchain implementation of public key infrastructure for Industry 5.0 applications / Rukhsana Ruby, Salabat Khan, Zehua Wang and Lu Wang -- ; 9 Federated learning for Supply Chain Management 5.0 / Bushra Tahir and Muhammad Tariq -- ; 10 Federated learning for cobots in Industry 5.0 / Pawan Hegde, Gokul Yenduri, Praveen Kumar Reddy Maddikunta, Ben Othman Soufiene and Thippa Reddy Gadekallu -- ; 11 Federated learning in medical education in Industry 5.0 / Y. Supriya, Dasari Bhulakshmi, Sweta Bhattacharya, Thippa Reddy Gadekallu, Rajesh Kaluri, S. Sumathy, Srinivas Koppu, Pratik Vyas, David J. Brown and Mufti Mahmud -- ; 12 A comprehensive survey on enhanced privacy techniques for federated learning in healthcare systems / Dasaradharami Reddy Kandati and Thippa Reddy Gadekallu -- ; 13 FL for secured medical image analysis / Thien Huynh-The and Tan Do-Duy -- Conclusion / Gautam Srivastava.
Record Nr. UNINA-9911006942903321
Stevenage, Herts : , : The Institution of Engineering and Technology, , [2025]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of International Conference on Network Security and Blockchain Technology : ICNSBT 2025 / / edited by Debasis Giri, Georgios Kambourakis, SK Hafizul Islam, Gautam Srivastava, Tanmoy Maitra
Proceedings of International Conference on Network Security and Blockchain Technology : ICNSBT 2025 / / edited by Debasis Giri, Georgios Kambourakis, SK Hafizul Islam, Gautam Srivastava, Tanmoy Maitra
Autore Giri Debasis
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (600 pages)
Disciplina 621.382
Altri autori (Persone) KambourakisGeorgios
IslamS. K. Hafizul
SrivastavaGautam
MaitraTanmoy
Collana Lecture Notes in Networks and Systems
Soggetto topico Telecommunication
Computer networks - Security measures
Cryptography
Data encryption (Computer science)
Artificial intelligence
Communications Engineering, Networks
Mobile and Network Security
Cryptology
Artificial Intelligence
ISBN 981-9663-48-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto FPGA Implementation of LSB Steganography Without Multiplier and Divider -- Cryptanalysis and improvement on low cost CL-ASS for wireless sensor networks -- Image Steganography with Efficient Utilization of Difference of Gaussian Edge Detection and Dilation -- LBP based Robust medical image watermarking in wavelet domain -- Cryptanalysis over Xu et al.’s CLAS scheme for VANETs -- Optimizing Cybersecurity Defences: Leveraging YARA Rules for Enhanced Detection of Custom PDF Spyware -- Template security in Biometrics system for fingerprint minutiae templates using Fuzzy vault method -- A Multilingual PDF Text-to-Speech Converter with Translation Capabilities -- An Image Watermarking approach using Hybrid GWO-GA in IWT Domain -- Developing a Secure Authentication and Key Agreement Protocol for Internet of Vehicles (IOV) Utilizing 5G Networks -- On Detection of Phishing URLs using Plant Propagation Algorithm -- Phishing URL Detection via Machine Learning: A Comprehensive Survey -- A Novel Synonym-Based Attack Algorithm for Generating Undetectable Adversarial Text Examples in Machine Learning -- Open-Audit: Enhancing Software Compliance with Blockchain and Zero-Knowledge Proofs -- Privacy-Preserved Efficient Contact Tracing in Contact Graph Components of Body Area Networks using Blockchain -- Integration of Blockchain to Internet of Things (IoT) -- Anomaly Detection in IoT Networks Using WGAN-GP: A Novel Approach for Robust IoT Security -- Urban Resilience: Using Autoencoder-Decoder LSTM Model with Green Roofs and Vertical Gardens to Combat Air Pollution -- Smart Cities' Clean Air: Federated Bidirectional Long Short-term Memory for Enhanced Air Quality Index Forecasting -- Min-Cart: An Eco-Friendly Approach to Minimize Air Pollution and Carbon Footprint -- Augmented Transfer Learning for Skin Cancer Detection: Enhancing Accuracy using Edge Detection -- Advanced Brain Tumor Classification with UNet Segmentation and Deep Maxout Classifier Techniques -- Enhancing Classification of Gemstones through Deep Learning Analysis: A Comparative Study -- LSTM-Based Image Enrichment and Description Generation to Enhance Visual Perception for Visually Challenged People -- Deforestation Detection Using Domain Adversarial Neural Network -- GeoLands: Machine Learning-Powered Landslide Risk Assessment -- Performance Improvement of an Automated Alzheimer Classification System -- Integrated Energy-Efficient Air Pollution Prediction and Control Framework -- Automatic Detection and Classification of Brain Tumors Using Deep Learning Model.
Record Nr. UNINA-9911031568003321
Giri Debasis  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Recent Advances in Social Data and Artificial Intelligence 2019
Recent Advances in Social Data and Artificial Intelligence 2019
Autore Srivastava Hari Mohan
Pubbl/distr/stampa Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022
Descrizione fisica 1 online resource (498 p.)
Soggetto topico Computer science
Information technology industries
Soggetto non controllato ABMS
advanced multicomponential discretization models
artificial intelligence
asymmetry
automatic speech recognition
behavior analysis
blockchain
breakpoint test
business
centrality metric
client/server
cloud computing
color revolution operator
combinatorial optimization problem
community detection
complex networks
context-aware
contingencies
crude oil price
cryptography
cybernetics
data acquisition
data management
data processing
data science
data-discretization methods
data-mining techniques
DBLP platform
decision tree
deep factorization
deep reinforcement learning
detection technology
digital services
digital teacher training
digitalization
electronic health records
Facebook advertising post
fashion recommendation
feature selection
feature-selection methods
geometric analysis
graph visualisation
gravitational degree
gravity model
greedy strategy
H-index
Hadoop
health information management
healthcare data
heuristics method
hierarchical information
ice-snow tourism
ICT infrastructure
imperialist competitive algorithm
industry data applications
innovation
keyphrase extraction
label propagation algorithm
lidar scanning signal
linear kernel
lossless signal transmission
machine learning
markov switching
micro-distortion
modularity increment
multi-channel weighted fusion loss
multi-layer neural network
multilayer network
multiple granularity features
natural language processing
nature-inspired algorithm
NP-hard problem
overlapping community discovery
pancreatic cancer
partial key exposure attack
person re-identification
plant root
polynomial kernel
post engagement
predictive analytics
preference analysis
privacy
Python
quality of service
RBF kernel
recommendation system
replace face-to-face education
robust partial least squares path modeling
RSA cryptanalysis
RSA cryptosystem
security
service composition
service time-cost
Siamese Multiple Granularity Network
social behavior
social data science
social media marketing
social network
social network simulation
social networking satisfaction
social networks
Spark
speech corpus
stock market
structural change
sustainable development
symmetrical designing
tag information
TCD1209DG
technology acceptance
tele-education
telemedicine
temporal links prediction
text corpus
text mining
topic model
twin support vector machine
Twitter
two expansions
two-tier partition algorithm
unsupervised method
visual analytics
visual style
weighted non-negative matrix factorization
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910585943903321
Srivastava Hari Mohan  
Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and Risk Analysis for Intelligent Edge Computing [[electronic resource] /] / edited by Gautam Srivastava, Uttam Ghosh, Jerry Chun-Wei Lin
Security and Risk Analysis for Intelligent Edge Computing [[electronic resource] /] / edited by Gautam Srivastava, Uttam Ghosh, Jerry Chun-Wei Lin
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (244 pages)
Disciplina 005.8
Collana Advances in Information Security
Soggetto topico Computer networks
Data protection - Law and legislation
Machine learning
Cryptography
Data encryption (Computer science)
Computer Communication Networks
Privacy
Machine Learning
Cryptology
ISBN 3-031-28150-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chap I Introduction to Cloud/Edge Computing -- Chap II Big Data Analytics and Security over the Cloud: Characteristics, Analytics, Integration and Security -- Chap III Federated Learning enabled Edge computing -- security for Internet of Medical Things: Concepts, Challenges and Open issues -- Chap IV Embedded Edge and Cloud Intelligence -- Chap V The Analysis on Impact of Cyber Security Threats on Smart Grids -- Chap VI Intelligent Intrusion Detection algorithm based on multi-attack for Edge-Assisted Internet of Things -- Chap VII Secure Data Analysis and Data Privacy -- Chap VIII A Novel Trust evaluation and Reputation data Management based Security System Model for Mobile Edge Computing Network -- Chap IX Network Security System in Mobile Edge Computing-to-IoMT Networks using Distributed Approach -- Chap X Wireless and Mobile Security in Edge Computing -- Chap XI An intelligent facial expression recognizer using modified 1 ResNet-110 using Edge Computing -- Chap XII Blockchain Based Simulated Virtual Machine Placement Hybrid Approach for Decentralized cloud and edge computing environment and Edge Computing.
Record Nr. UNISA-996546823403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security and Risk Analysis for Intelligent Edge Computing / / edited by Gautam Srivastava, Uttam Ghosh, Jerry Chun-Wei Lin
Security and Risk Analysis for Intelligent Edge Computing / / edited by Gautam Srivastava, Uttam Ghosh, Jerry Chun-Wei Lin
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (244 pages)
Disciplina 005.8
Collana Advances in Information Security
Soggetto topico Computer networks
Data protection - Law and legislation
Machine learning
Cryptography
Data encryption (Computer science)
Computer Communication Networks
Privacy
Machine Learning
Cryptology
ISBN 3-031-28150-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chap I Introduction to Cloud/Edge Computing -- Chap II Big Data Analytics and Security over the Cloud: Characteristics, Analytics, Integration and Security -- Chap III Federated Learning enabled Edge computing -- security for Internet of Medical Things: Concepts, Challenges and Open issues -- Chap IV Embedded Edge and Cloud Intelligence -- Chap V The Analysis on Impact of Cyber Security Threats on Smart Grids -- Chap VI Intelligent Intrusion Detection algorithm based on multi-attack for Edge-Assisted Internet of Things -- Chap VII Secure Data Analysis and Data Privacy -- Chap VIII A Novel Trust evaluation and Reputation data Management based Security System Model for Mobile Edge Computing Network -- Chap IX Network Security System in Mobile Edge Computing-to-IoMT Networks using Distributed Approach -- Chap X Wireless and Mobile Security in Edge Computing -- Chap XI An intelligent facial expression recognizer using modified 1 ResNet-110 using Edge Computing -- Chap XII Blockchain Based Simulated Virtual Machine Placement Hybrid Approach for Decentralized cloud and edge computing environment and Edge Computing.
Record Nr. UNINA-9910734830203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui