top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances on P2P, Parallel, Grid, Cloud and Internet Computing : Proceedings of the 13th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2018) / / edited by Fatos Xhafa, Fang-Yie Leu, Massimo Ficco, Chao-Tung Yang
Advances on P2P, Parallel, Grid, Cloud and Internet Computing : Proceedings of the 13th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2018) / / edited by Fatos Xhafa, Fang-Yie Leu, Massimo Ficco, Chao-Tung Yang
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (511 pages)
Disciplina 004.35
Collana Lecture Notes on Data Engineering and Communications Technologies
Soggetto topico Electrical engineering
Computational intelligence
Application software
Communications Engineering, Networks
Computational Intelligence
Information Systems Applications (incl. Internet)
ISBN 3-030-02607-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Fault-tolerant Fog Computing Models in the IoT -- Semi-synchronocity Enabling Protocol and Pulsed Injection Protocol for a Distributed Ledger System -- Texture Estimation System of Snacks Using Neural Network Considering Sound and Load -- A Real-time Fog Computing Approach for Healthcare Environment -- A Model for Data Enrichment over IoT Streams at Edges of Internet -- Threshold Based Load Balancer for Efficient Resource Utilization of Smart Grid Using Cloud Computing -- A Fuzzy-based System for Selection of IoT Devices in Opportunistic Networks Considering Number of Past Encounters -- Hill Climbing Load Balancing Algorithm on Fog Computing. .
Record Nr. UNINA-9910337464303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Innovative computing : IC 2020 / / Chao-Tung Yang, Yan Pei, Jia-Wei Chang, editors
Innovative computing : IC 2020 / / Chao-Tung Yang, Yan Pei, Jia-Wei Chang, editors
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Gateway East, Singapore : , : Springer, , [2020]
Descrizione fisica 1 online resource (XXIII, 1954 p. 540 illus., 355 illus. in color.)
Disciplina 621.39
Collana Lecture Notes in Electrical Engineering
Soggetto topico Computer engineering
ISBN 981-15-5959-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Computer Science -- 2. Electronic Engineering -- 3. Networking -- 4. Multimedia -- 5. Internet of Things -- 6. Big Data -- 7. Management of Information System.
Record Nr. UNINA-9910427684803321
Gateway East, Singapore : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Innovative computing : IC 2020 / / Chao-Tung Yang, Yan Pei, Jia-Wei Chang, editors
Innovative computing : IC 2020 / / Chao-Tung Yang, Yan Pei, Jia-Wei Chang, editors
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Gateway East, Singapore : , : Springer, , [2020]
Descrizione fisica 1 online resource (XXIII, 1954 p. 540 illus., 355 illus. in color.)
Disciplina 621.39
Collana Lecture Notes in Electrical Engineering
Soggetto topico Computer engineering
ISBN 981-15-5959-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Computer Science -- 2. Electronic Engineering -- 3. Networking -- 4. Multimedia -- 5. Internet of Things -- 6. Big Data -- 7. Management of Information System.
Record Nr. UNISA-996465370603316
Gateway East, Singapore : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Smart grid and internet of things : 5th EAI international conference, SGIoT 2021, virtual event, December 18-19, 2021, proceedings / / edited by Yi-Bing Lin, Der-Jiunn Deng, Chao-Tung Yang
Smart grid and internet of things : 5th EAI international conference, SGIoT 2021, virtual event, December 18-19, 2021, proceedings / / edited by Yi-Bing Lin, Der-Jiunn Deng, Chao-Tung Yang
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (170 pages)
Disciplina 354.81150006
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Internet of things
ISBN 3-031-20398-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Applications on Internet of Things -- Intellectual Property Protection of Zhuang Nationality Funeral Culture on Internet of Things -- 1 Introduction -- 2 Literature Review of Intangible Cultural Heritage -- 2.1 Researches on the Intellectual Property Rights of the Intangible Cultural Heritage -- 2.2 Researches on the Digital Protection of Intangible Cultural Heritage -- 3 Analysis of the Intangible Cultural Heritage Problems -- 4 Countermeasures for Intellectual Property Protection of Zhuang Nationality Funeral Culture -- 4.1 Countermeasures for the Trademark Protection of Guangxi Zhuang Nationality Funeral Culture -- 4.2 Countermeasures for the Copyright Protection of Guangxi Zhuang Nationality Funeral Culture -- 4.3 Countermeasures for Protecting Guangxi Zhuang Nationality Funeral Culture by Using the Big Data -- 5 Conclusion -- References -- China IoT UBI Car Insurance Regulatory Development Trend -- 1 Introduction -- 2 Introduction -- 2.1 Research on Driving Behavior -- 2.2 Research on Risk Assessment of UBI and Construction of Related Data Model -- 2.3 Research on the Dilemma of UBI in China -- 3 Analysis of UBI in China -- 3.1 History of UBI in China -- 3.2 UBI Technology in China -- 3.3 China IoT UBI Car Insurance System -- 3.4 CHina's Auto Insurance Laws and Regulations -- 4 CHINA's Regulatory Measures for IoT UBI -- 4.1 Legislative Supervision -- 4.2 Supervision from Government -- 4.3 Supervision of Enterprises -- 5 Conclusion -- References -- Constructing a Violence Recognition Technique for Elderly Patients with Lower Limb Disability -- 1 Introduction -- 2 Literature Review -- 2.1 Posture Detection Method Based on Human Skeleton Extraction -- 2.2 Analysis and Comparison Based on the Human Skeleton Extraction Method -- 2.3 Violent Incident Detection Based on Image Recognition.
3 Data Collection and Human Skeleton Extraction -- 3.1 Data Collection in Daily Care Environment -- 3.2 Human Skeleton Extraction Based on OpenPose -- 4 Real-Time Violence Detection Method -- 4.1 Extraction of Feature Values -- 4.2 Model Pre-training Stage -- 4.3 Real-Time Violence Detection Stage -- 5 Results -- 6 Conclusions -- References -- Aquaculture Monitoring Systems Based on Lightweight Kubernetes and Rancher -- 1 Introduction -- 2 Literature Review -- 2.1 LoraWAN -- 2.2 Rancher Kubernetes Engine -- 2.3 Docker -- 2.4 InfluxDB -- 3 System Design -- 3.1 Edge Devices -- 3.2 Network -- 4 Experimental Results -- 4.1 Edge Devices -- 4.2 Networks and Sensors -- 5 Discussion -- 6 Conclusion -- References -- Design and Implementation of Water Monitoring Using LoRa and NB-IoT -- 1 Introduction -- 2 Background Review and Related Study -- 2.1 The Internet of Things (IoT) -- 2.2 The Array of Things (AoT) -- 2.3 NB-IoT -- 2.4 Related Study -- 3 System Architecture -- 4 Experimental Results -- 4.1 Device Installation -- 4.2 Water Monitoring System -- 5 Conclusion -- References -- InterWorking Function for Mission Critical Push to Talk Services -- 1 Introduction -- 1.1 Background -- 1.2 Motivation -- 1.3 Goal and Contributions -- 2 The Design and Implementation of the IWF Prototype Platform -- 2.1 System Architecture -- 2.2 Related Protocols -- 3 Group Configuration Procedures -- 3.1 Requesting the List of Existing Groups -- 3.2 Requesting the List of Affiliated Groups -- 3.3 Affiliation -- 3.4 De-affiliation -- 4 Floor Control -- 5 Procedures for Initiating Group Call -- 5.1 LMR User Initiates Group Call -- 5.2 MC User Initiates Group Call -- 6 Verification of the Implemented Procedures -- 6.1 Group Configuration -- 6.2 LMR User Initiating Group Call -- 6.3 MC User Initiating Group Call -- 7 Conclusion -- References.
Communication Security, Big Data, Neural Networks and Machine Learning -- Lightweight Privacy-Preserving Data Aggregation Scheme Based on Elliptic Curve Cryptography for Smart Grid Communications -- 1 Introduction -- 2 Related Works and Limitations -- 2.1 Generic System Model -- 2.2 Preliminaries -- 2.3 Adversary Model -- 2.4 Security Requirements -- 3 Proposed Scheme -- 4 Security Analysis and Performance Evaluation -- 4.1 Security Requirements Analysis -- 4.2 Performance Evaluation -- 4.3 Computation Cost -- 4.4 Communication Cost -- 5 Conclusion -- References -- Design and Implementation of Distributed Image Recognition App with Federal Learning Techniques -- 1 Introduction -- 2 Background Review and Related Works -- 2.1 Federated Learning -- 2.2 Convolutional Neural Networks -- 2.3 Kotlin -- 3 Background Review and Related Works -- 4 Experimental Results -- 4.1 The Hardware and Software Environment -- 4.2 Datasets -- 4.3 Implementation of App System -- 5 Conclusion -- References -- Improving Vision Clarity and Object Detection Accuracy in Heavy Rain Base on Neural Network -- 1 Introduction -- 2 Related Works -- 2.1 Object Detection -- 2.2 Image Restoration -- 3 Methods -- 3.1 Networks -- 3.2 Obtaining Rain and Restoring Street Images -- 3.3 Tracking Object Recognition Accuracy -- 4 Result -- 5 Conclusions -- References -- An Enhanced Location-Data Differential Privacy Protection Method Based on Filter -- 1 Introduction -- 2 Related Work -- 3 Differential Privacy -- 3.1 Differential Privacy Conceptions -- 3.2 Mechanisms to Achieving Differential Privacy -- 4 Location Data Query Differential Privacy Protection Algorithm Based on Filter Mechanism -- 4.1 Location Data -- 4.2 Location Data Query Privacy Protection Mechanism -- 4.3 Kalman Filtering Mechanism -- 5 Experimental Evaluation -- 5.1 Experimental Datasets and Environment.
5.2 Validation of Parameter R Selection in Filter Mechanism -- 5.3 Experiment and Analysis -- 6 Conclusions -- References -- Big Data Grave Register Information Management System Outside Cemeteries Under Internet of Things -- 1 Introduction -- 2 Literature Review -- 3 The Analysis of Tomb Information Management System Through Big Data -- 3.1 Data Collection of Tomb Information Management System -- 3.2 Data Analysis of Tomb Information Management System -- 4 The Construction of Big Data Tomb Information Management System -- 5 Conclusion -- References -- Critical Feature Selection and Machine Learning-based Models for Monofacial and Bifacial Photovoltaics -- 1 Introduction -- 2 Methodology -- 2.1 Simulations Model Details -- 2.2 Range of Parameters -- 2.3 Selection of Locations -- 2.4 Feature Selection -- 2.5 Machine Learning Model -- 3 Results and Discussion -- 4 Conclusion -- References -- Study on the Discovery of Personal Information on the Network of People Diagnosed with COVID-19 -- 1 Introduction -- 2 Literature Review -- 3 Problem Analysis -- 3.1 Global Pandemic Situation and Impact Analysis -- 3.2 Analysis of the Current Situation of Disclosure of Personal Information of COVID-19 Patients -- 3.3 Analysis of Information Disclosure of COVID-19 Confirmed Patients -- 4 Perfection and Suggestions -- 4.1 Balance Between Public Interests and Private Interests -- 4.2 Improve the System of Personal Privacy Information Disclosure -- 5 Summarize -- References -- Author Index.
Record Nr. UNISA-996499854003316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Smart grid and internet of things : 5th EAI international conference, SGIoT 2021, virtual event, December 18-19, 2021, proceedings / / edited by Yi-Bing Lin, Der-Jiunn Deng, Chao-Tung Yang
Smart grid and internet of things : 5th EAI international conference, SGIoT 2021, virtual event, December 18-19, 2021, proceedings / / edited by Yi-Bing Lin, Der-Jiunn Deng, Chao-Tung Yang
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (170 pages)
Disciplina 354.81150006
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Internet of things
ISBN 3-031-20398-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Applications on Internet of Things -- Intellectual Property Protection of Zhuang Nationality Funeral Culture on Internet of Things -- 1 Introduction -- 2 Literature Review of Intangible Cultural Heritage -- 2.1 Researches on the Intellectual Property Rights of the Intangible Cultural Heritage -- 2.2 Researches on the Digital Protection of Intangible Cultural Heritage -- 3 Analysis of the Intangible Cultural Heritage Problems -- 4 Countermeasures for Intellectual Property Protection of Zhuang Nationality Funeral Culture -- 4.1 Countermeasures for the Trademark Protection of Guangxi Zhuang Nationality Funeral Culture -- 4.2 Countermeasures for the Copyright Protection of Guangxi Zhuang Nationality Funeral Culture -- 4.3 Countermeasures for Protecting Guangxi Zhuang Nationality Funeral Culture by Using the Big Data -- 5 Conclusion -- References -- China IoT UBI Car Insurance Regulatory Development Trend -- 1 Introduction -- 2 Introduction -- 2.1 Research on Driving Behavior -- 2.2 Research on Risk Assessment of UBI and Construction of Related Data Model -- 2.3 Research on the Dilemma of UBI in China -- 3 Analysis of UBI in China -- 3.1 History of UBI in China -- 3.2 UBI Technology in China -- 3.3 China IoT UBI Car Insurance System -- 3.4 CHina's Auto Insurance Laws and Regulations -- 4 CHINA's Regulatory Measures for IoT UBI -- 4.1 Legislative Supervision -- 4.2 Supervision from Government -- 4.3 Supervision of Enterprises -- 5 Conclusion -- References -- Constructing a Violence Recognition Technique for Elderly Patients with Lower Limb Disability -- 1 Introduction -- 2 Literature Review -- 2.1 Posture Detection Method Based on Human Skeleton Extraction -- 2.2 Analysis and Comparison Based on the Human Skeleton Extraction Method -- 2.3 Violent Incident Detection Based on Image Recognition.
3 Data Collection and Human Skeleton Extraction -- 3.1 Data Collection in Daily Care Environment -- 3.2 Human Skeleton Extraction Based on OpenPose -- 4 Real-Time Violence Detection Method -- 4.1 Extraction of Feature Values -- 4.2 Model Pre-training Stage -- 4.3 Real-Time Violence Detection Stage -- 5 Results -- 6 Conclusions -- References -- Aquaculture Monitoring Systems Based on Lightweight Kubernetes and Rancher -- 1 Introduction -- 2 Literature Review -- 2.1 LoraWAN -- 2.2 Rancher Kubernetes Engine -- 2.3 Docker -- 2.4 InfluxDB -- 3 System Design -- 3.1 Edge Devices -- 3.2 Network -- 4 Experimental Results -- 4.1 Edge Devices -- 4.2 Networks and Sensors -- 5 Discussion -- 6 Conclusion -- References -- Design and Implementation of Water Monitoring Using LoRa and NB-IoT -- 1 Introduction -- 2 Background Review and Related Study -- 2.1 The Internet of Things (IoT) -- 2.2 The Array of Things (AoT) -- 2.3 NB-IoT -- 2.4 Related Study -- 3 System Architecture -- 4 Experimental Results -- 4.1 Device Installation -- 4.2 Water Monitoring System -- 5 Conclusion -- References -- InterWorking Function for Mission Critical Push to Talk Services -- 1 Introduction -- 1.1 Background -- 1.2 Motivation -- 1.3 Goal and Contributions -- 2 The Design and Implementation of the IWF Prototype Platform -- 2.1 System Architecture -- 2.2 Related Protocols -- 3 Group Configuration Procedures -- 3.1 Requesting the List of Existing Groups -- 3.2 Requesting the List of Affiliated Groups -- 3.3 Affiliation -- 3.4 De-affiliation -- 4 Floor Control -- 5 Procedures for Initiating Group Call -- 5.1 LMR User Initiates Group Call -- 5.2 MC User Initiates Group Call -- 6 Verification of the Implemented Procedures -- 6.1 Group Configuration -- 6.2 LMR User Initiating Group Call -- 6.3 MC User Initiating Group Call -- 7 Conclusion -- References.
Communication Security, Big Data, Neural Networks and Machine Learning -- Lightweight Privacy-Preserving Data Aggregation Scheme Based on Elliptic Curve Cryptography for Smart Grid Communications -- 1 Introduction -- 2 Related Works and Limitations -- 2.1 Generic System Model -- 2.2 Preliminaries -- 2.3 Adversary Model -- 2.4 Security Requirements -- 3 Proposed Scheme -- 4 Security Analysis and Performance Evaluation -- 4.1 Security Requirements Analysis -- 4.2 Performance Evaluation -- 4.3 Computation Cost -- 4.4 Communication Cost -- 5 Conclusion -- References -- Design and Implementation of Distributed Image Recognition App with Federal Learning Techniques -- 1 Introduction -- 2 Background Review and Related Works -- 2.1 Federated Learning -- 2.2 Convolutional Neural Networks -- 2.3 Kotlin -- 3 Background Review and Related Works -- 4 Experimental Results -- 4.1 The Hardware and Software Environment -- 4.2 Datasets -- 4.3 Implementation of App System -- 5 Conclusion -- References -- Improving Vision Clarity and Object Detection Accuracy in Heavy Rain Base on Neural Network -- 1 Introduction -- 2 Related Works -- 2.1 Object Detection -- 2.2 Image Restoration -- 3 Methods -- 3.1 Networks -- 3.2 Obtaining Rain and Restoring Street Images -- 3.3 Tracking Object Recognition Accuracy -- 4 Result -- 5 Conclusions -- References -- An Enhanced Location-Data Differential Privacy Protection Method Based on Filter -- 1 Introduction -- 2 Related Work -- 3 Differential Privacy -- 3.1 Differential Privacy Conceptions -- 3.2 Mechanisms to Achieving Differential Privacy -- 4 Location Data Query Differential Privacy Protection Algorithm Based on Filter Mechanism -- 4.1 Location Data -- 4.2 Location Data Query Privacy Protection Mechanism -- 4.3 Kalman Filtering Mechanism -- 5 Experimental Evaluation -- 5.1 Experimental Datasets and Environment.
5.2 Validation of Parameter R Selection in Filter Mechanism -- 5.3 Experiment and Analysis -- 6 Conclusions -- References -- Big Data Grave Register Information Management System Outside Cemeteries Under Internet of Things -- 1 Introduction -- 2 Literature Review -- 3 The Analysis of Tomb Information Management System Through Big Data -- 3.1 Data Collection of Tomb Information Management System -- 3.2 Data Analysis of Tomb Information Management System -- 4 The Construction of Big Data Tomb Information Management System -- 5 Conclusion -- References -- Critical Feature Selection and Machine Learning-based Models for Monofacial and Bifacial Photovoltaics -- 1 Introduction -- 2 Methodology -- 2.1 Simulations Model Details -- 2.2 Range of Parameters -- 2.3 Selection of Locations -- 2.4 Feature Selection -- 2.5 Machine Learning Model -- 3 Results and Discussion -- 4 Conclusion -- References -- Study on the Discovery of Personal Information on the Network of People Diagnosed with COVID-19 -- 1 Introduction -- 2 Literature Review -- 3 Problem Analysis -- 3.1 Global Pandemic Situation and Impact Analysis -- 3.2 Analysis of the Current Situation of Disclosure of Personal Information of COVID-19 Patients -- 3.3 Analysis of Information Disclosure of COVID-19 Confirmed Patients -- 4 Perfection and Suggestions -- 4.1 Balance Between Public Interests and Private Interests -- 4.2 Improve the System of Personal Privacy Information Disclosure -- 5 Summarize -- References -- Author Index.
Record Nr. UNINA-9910632477003321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui