top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Data-Driven Prediction for Industrial Processes and Their Applications / / by Jun Zhao, Wei Wang, Chunyang Sheng
Data-Driven Prediction for Industrial Processes and Their Applications / / by Jun Zhao, Wei Wang, Chunyang Sheng
Autore Zhao Jun
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XVI, 443 p. 167 illus., 128 illus. in color.)
Disciplina 006.312
Collana Information Fusion and Data Science
Soggetto topico Data mining
Manufactures
Artificial intelligence
Quality control
Reliability
Industrial safety
Operations research
Decision making
Data Mining and Knowledge Discovery
Manufacturing, Machines, Tools, Processes
Artificial Intelligence
Quality Control, Reliability, Safety and Risk
Operations Research/Decision Theory
ISBN 3-319-94051-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preface -- Introduction -- Why the prediction is required for industrial process -- Introduction to industrial process prediction -- Category of industrial process prediction -- Common-used techniques for industrial process prediction -- Brief summary -- Data preprocessing techniques -- Anomaly detection of data -- Correction of abnormal data -- Methods of packing missing data -- Data de-noising techniques -- Data fusion methods -- Discussion -- Industrial time series prediction -- Introduction -- Methods of phase space reconstruction -- Prediction modeling -- Benchmark prediction problems -- Cases of industrial applications -- Discussion -- Factor-based industrial process prediction -- Introduction -- Methods of determining factors -- Factor-based single-output model -- Factor-based multi-output model -- Cases of industrial applications -- Discussion -- Industrial Prediction intervals with data uncertainty -- Introduction -- Common-used techniques for prediction intervals -- Prediction intervals with noisy outputs -- Prediction intervals with noisy inputs and outputs -- Time series prediction intervals with missing input -- Industrial cases of prediction intervals -- Discussion -- Granular computing-based long term prediction intervals -- Introduction -- Basic theory of granular computing -- Techniques of granularity partition -- Long-term prediction model -- Granular-based prediction intervals -- Multi-dimension granular-based long term prediction intervals -- Discussion -- Parameters estimation and optimization -- Introduction -- Gradient-based methods -- Evolutionary algorithms -- Nonlinear Kalman-filter estimation -- Probabilistic methods -- Gamma-test based noise estimation -- Industrial applications -- Discussion -- Parallel computing considerations -- Introduction -- CUDA-based parallel acceleration -- Hadoop-based distributed computation -- Other techniques -- Industrial applications to parallel computing -- Discussion -- Prediction-based scheduling of industrial system -- Introduction -- Scheduling of blast furnace gas system -- Scheduling of coke oven gas system -- Scheduling of converter gas system -- Scheduling of oxygen system -- Predictive scheduling for plant-wide energy system -- Discussion.
Record Nr. UNINA-9910741150903321
Zhao Jun  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Science of Cyber Security : 6th International Conference, SciSec 2024, Copenhagen, Denmark, August 14–16, 2024, Proceedings / / edited by Jun Zhao, Weizhi Meng
Science of Cyber Security : 6th International Conference, SciSec 2024, Copenhagen, Denmark, August 14–16, 2024, Proceedings / / edited by Jun Zhao, Weizhi Meng
Autore Zhao Jun
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (715 pages)
Disciplina 025.04
Altri autori (Persone) MengWeizhi
Collana Lecture Notes in Computer Science
Soggetto topico Information storage and retrieval systems
Database management
Data mining
Machine learning
Application software
Information Storage and Retrieval
Database Management
Data Mining and Knowledge Discovery
Machine Learning
Computer and Information Systems Applications
ISBN 9789819624171
9789819624164
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- A Novel Scoring Algorithm Against HID Attacks Based on Static Text Feature Matching. -- Identifying Ransomware Functions through Microarchitectural Side-channel Analysis. -- STARMAP: Multi-machine Malware Analysis System for Lateral Movement Observation. -- LogSHIELD: A Graph-based Real-time Anomaly Detection Framework using Frequency Analysis. -- Completeness Analysis of Mobile Apps’ Privacy Policies by Using Deep Learning. -- Characterizing the Evolution of Psychological Tactics and Techniques Exploited by Malicious Emails. -- Matching Knowledge Graphs for Cybersecurity Countermeasures Selection. -- Graph-Based Profiling of Dependency Vulnerability Remediation. -- Characterizing the Evolution of Psychological Factors Exploited by Malicious Emails. -- An Enhanced Firewall for IoT Security. -- Exploring the Effects of Cybersecurity Awareness and Decision-Making Under Risk. -- SVSM-KMS: Safeguarding Keys for Cloud Services with Encrypted Virtualization. -- GNNexPIDS: An Interpretation Method for Provenance-based Intrusion Detection Based on GNNExplainer. -- Performance Evaluation of Lightweight Cryptographic Ciphers on ARM Processor for IoT Deployments. -- AutoCRAT: Automatic Cumulative Reconstruction of Alert Trees. -- FAF-BM: An Approach for False Alerts Filtering using BERT Model with Semi-supervised Active Learning. -- Smart Home Cyber Insurance Pricing. -- Exhaustive Exploratory Analysis of Low Degree Maximum Period NLFSRs By Graph Analysis. -- Integrating Consortium Blockchain and Attribute-Based Searchable Encryption for Automotive Threat Intelligence Sharing Model. -- Multi-Modal Multi-Task Tiered Expert (M3TTE): An Effective Method for CDN Website Classification. -- Malware Variant Detection Based on Knowledge Transfer and Ensemble Learning. -- An Efficient IOC-Driven BigData Tracing and Backtracking Model for Emergency Response. -- Integrating CP-ABE and Device Fingerprint into Federated Learning. -- Automatic Alert Categories Standardization for Heterogeneous Devices with Incomplete Semantic Knowledge Based on LSTM. -- Family Similarity-Enhanced Implicit Data Augmentation for Malware Classification.
Record Nr. UNINA-9910984582103321
Zhao Jun  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Science of Cyber Security : 6th International Conference, SciSec 2024, Copenhagen, Denmark, August 14–16, 2024, Proceedings / / edited by Jun Zhao, Weizhi Meng
Science of Cyber Security : 6th International Conference, SciSec 2024, Copenhagen, Denmark, August 14–16, 2024, Proceedings / / edited by Jun Zhao, Weizhi Meng
Autore Zhao Jun
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (715 pages)
Disciplina 025.04
Altri autori (Persone) MengWeizhi
Collana Lecture Notes in Computer Science
Soggetto topico Information storage and retrieval systems
Database management
Data mining
Machine learning
Application software
Information Storage and Retrieval
Database Management
Data Mining and Knowledge Discovery
Machine Learning
Computer and Information Systems Applications
ISBN 9789819624171
9789819624164
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- A Novel Scoring Algorithm Against HID Attacks Based on Static Text Feature Matching. -- Identifying Ransomware Functions through Microarchitectural Side-channel Analysis. -- STARMAP: Multi-machine Malware Analysis System for Lateral Movement Observation. -- LogSHIELD: A Graph-based Real-time Anomaly Detection Framework using Frequency Analysis. -- Completeness Analysis of Mobile Apps’ Privacy Policies by Using Deep Learning. -- Characterizing the Evolution of Psychological Tactics and Techniques Exploited by Malicious Emails. -- Matching Knowledge Graphs for Cybersecurity Countermeasures Selection. -- Graph-Based Profiling of Dependency Vulnerability Remediation. -- Characterizing the Evolution of Psychological Factors Exploited by Malicious Emails. -- An Enhanced Firewall for IoT Security. -- Exploring the Effects of Cybersecurity Awareness and Decision-Making Under Risk. -- SVSM-KMS: Safeguarding Keys for Cloud Services with Encrypted Virtualization. -- GNNexPIDS: An Interpretation Method for Provenance-based Intrusion Detection Based on GNNExplainer. -- Performance Evaluation of Lightweight Cryptographic Ciphers on ARM Processor for IoT Deployments. -- AutoCRAT: Automatic Cumulative Reconstruction of Alert Trees. -- FAF-BM: An Approach for False Alerts Filtering using BERT Model with Semi-supervised Active Learning. -- Smart Home Cyber Insurance Pricing. -- Exhaustive Exploratory Analysis of Low Degree Maximum Period NLFSRs By Graph Analysis. -- Integrating Consortium Blockchain and Attribute-Based Searchable Encryption for Automotive Threat Intelligence Sharing Model. -- Multi-Modal Multi-Task Tiered Expert (M3TTE): An Effective Method for CDN Website Classification. -- Malware Variant Detection Based on Knowledge Transfer and Ensemble Learning. -- An Efficient IOC-Driven BigData Tracing and Backtracking Model for Emergency Response. -- Integrating CP-ABE and Device Fingerprint into Federated Learning. -- Automatic Alert Categories Standardization for Heterogeneous Devices with Incomplete Semantic Knowledge Based on LSTM. -- Family Similarity-Enhanced Implicit Data Augmentation for Malware Classification.
Record Nr. UNISA-996647970003316
Zhao Jun  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Wireless and Satellite Systems [[electronic resource] ] : 13th EAI International Conference, WiSATS 2022, Virtual Event, Singapore, March 12-13, 2023, Proceedings / / edited by Jun Zhao
Wireless and Satellite Systems [[electronic resource] ] : 13th EAI International Conference, WiSATS 2022, Virtual Event, Singapore, March 12-13, 2023, Proceedings / / edited by Jun Zhao
Autore Zhao Jun
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (135 pages)
Disciplina 621.384
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer networks
Application software
Artificial intelligence
Computer networks—Security measures
Computer Communication Networks
Computer and Information Systems Applications
Artificial Intelligence
Mobile and Network Security
Soggetto non controllato Engineering
Technology & Engineering
ISBN 3-031-34851-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security and Privacy in Healthcare, Transportation, and Satellite Networks -- TF-Net: Deep Learning Empowered Tiny Feature Network for Night-time UAV Detection -- Study on detection of vascular inner wall with IVUS image -- Anomaly Detection for Connected Autonomous Vehicles using LSTM and Gaussian Naïve Bayes -- Detection Algorithms based on eigenvalues of sampling Covariance Matrix for Satellite Cognitive Network -- Advanced Technologies in Wireless Communication Systems -- Hybrid Beamforming Design for Multi-User Multi-Stream Communications with Terahertz Massive MIMO -- Photovoltaic Devices Design Based on Simultaneous Visible-light Information and Power Transfer Circuits -- Marketing in Wireless Communication: A Systematic Review -- A robust beamforming algorithm for satellite communication -- Network Efficiency and Reliability -- Average Age of Incorrect Information in Random Access Channels for IoT Systems.
Record Nr. UNISA-996546842903316
Zhao Jun  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Wireless and Satellite Systems : 13th EAI International Conference, WiSATS 2022, Virtual Event, Singapore, March 12-13, 2023, Proceedings / / edited by Jun Zhao
Wireless and Satellite Systems : 13th EAI International Conference, WiSATS 2022, Virtual Event, Singapore, March 12-13, 2023, Proceedings / / edited by Jun Zhao
Autore Zhao Jun
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (135 pages)
Disciplina 621.384
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer networks
Application software
Artificial intelligence
Computer networks—Security measures
Computer Communication Networks
Computer and Information Systems Applications
Artificial Intelligence
Mobile and Network Security
Soggetto non controllato Engineering
Technology & Engineering
ISBN 3-031-34851-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security and Privacy in Healthcare, Transportation, and Satellite Networks -- TF-Net: Deep Learning Empowered Tiny Feature Network for Night-time UAV Detection -- Study on detection of vascular inner wall with IVUS image -- Anomaly Detection for Connected Autonomous Vehicles using LSTM and Gaussian Naïve Bayes -- Detection Algorithms based on eigenvalues of sampling Covariance Matrix for Satellite Cognitive Network -- Advanced Technologies in Wireless Communication Systems -- Hybrid Beamforming Design for Multi-User Multi-Stream Communications with Terahertz Massive MIMO -- Photovoltaic Devices Design Based on Simultaneous Visible-light Information and Power Transfer Circuits -- Marketing in Wireless Communication: A Systematic Review -- A robust beamforming algorithm for satellite communication -- Network Efficiency and Reliability -- Average Age of Incorrect Information in Random Access Channels for IoT Systems.
Record Nr. UNINA-9910728952103321
Zhao Jun  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui