The "Essence" of Network Security: An End-to-End Panorama / / edited by Mohuya Chakraborty, Moutushi Singh, Valentina E. Balas, Indraneel Mukhopadhyay
| The "Essence" of Network Security: An End-to-End Panorama / / edited by Mohuya Chakraborty, Moutushi Singh, Valentina E. Balas, Indraneel Mukhopadhyay |
| Edizione | [1st ed. 2021.] |
| Pubbl/distr/stampa | Springer Singapore, 2021 |
| Descrizione fisica | 1 online resource (XXXV, 289 p. 97 illus., 74 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Lecture Notes in Networks and Systems |
| Soggetto topico |
Telecommunication
Machine learning Cooperating objects (Computer systems) Big data Communications Engineering, Networks Machine Learning Cyber-Physical Systems Big Data |
| ISBN | 981-15-9317-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Introduction to Network Security Technologies -- A Systematic Review of Digital, Cloud and IoT Forensics -- Blockchain Based Framework for Managing Customer Consent in Open Banking -- A Comprehensive Study of Pros and Cons on Implementation of Block-chain for IoT device Security -- Role of Cryptography in Network Security -- Detection of Malicious URLs using Deep Learning Approach -- Software Defined Network Vulnerabilities -- Demystifying Security on NDN: A survey of Existing Attacks and Open Research Challenges -- Anonymous Traffic Network. |
| Record Nr. | UNINA-9910863276303321 |
| Springer Singapore, 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy [[electronic resource] ] : SPIoT-2020, Volume 1 / / edited by John MacIntyre, Jinghua Zhao, Xiaomeng Ma
| The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy [[electronic resource] ] : SPIoT-2020, Volume 1 / / edited by John MacIntyre, Jinghua Zhao, Xiaomeng Ma |
| Edizione | [1st ed. 2021.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
| Descrizione fisica | 1 online resource (XXXI, 884 p. 221 illus., 150 illus. in color.) |
| Disciplina | 620.00285 |
| Collana | Advances in Intelligent Systems and Computing |
| Soggetto topico |
Engineering—Data processing
Cooperating objects (Computer systems) Computational intelligence Machine learning Big data Data Engineering Cyber-Physical Systems Computational Intelligence Machine Learning Big Data |
| ISBN | 3-030-62743-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910483068103321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy [[electronic resource] ] : SPIoT-2020, Volume 2 / / edited by John MacIntyre, Jinghua Zhao, Xiaomeng Ma
| The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy [[electronic resource] ] : SPIoT-2020, Volume 2 / / edited by John MacIntyre, Jinghua Zhao, Xiaomeng Ma |
| Edizione | [1st ed. 2021.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
| Descrizione fisica | 1 online resource (XXXII, 863 p. 222 illus., 128 illus. in color.) |
| Disciplina | 004.678 |
| Collana | Advances in Intelligent Systems and Computing |
| Soggetto topico |
Engineering—Data processing
Cooperating objects (Computer systems) Computational intelligence Machine learning Big data Data Engineering Cyber-Physical Systems Computational Intelligence Machine Learning Big Data |
| ISBN | 3-030-62746-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910483082303321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy : SPIoT-2020, Volume 2 / / edited by John MacIntyre, Jinghua Zhao, Xiaomeng Ma
| The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy : SPIoT-2020, Volume 2 / / edited by John MacIntyre, Jinghua Zhao, Xiaomeng Ma |
| Edizione | [1st ed. 2021.] |
| Pubbl/distr/stampa | Springer International Publishing, 2021 |
| Descrizione fisica | 1 online resource (XXXII, 863 p. 222 illus., 128 illus. in color.) |
| Disciplina | 004.678 |
| Collana | Advances in Intelligent Systems and Computing |
| Soggetto topico |
Engineering—Data processing
Cooperating objects (Computer systems) Computational intelligence Machine learning Big data Data Engineering Cyber-Physical Systems Computational Intelligence Machine Learning Big Data |
| ISBN | 3-030-62746-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910863143603321 |
| Springer International Publishing, 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy : SPIoT-2020, Volume 1 / / edited by John MacIntyre, Jinghua Zhao, Xiaomeng Ma
| The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy : SPIoT-2020, Volume 1 / / edited by John MacIntyre, Jinghua Zhao, Xiaomeng Ma |
| Edizione | [1st ed. 2021.] |
| Pubbl/distr/stampa | Springer International Publishing, 2021 |
| Descrizione fisica | 1 online resource (XXXI, 884 p. 221 illus., 150 illus. in color.) |
| Disciplina | 620.00285 |
| Collana | Advances in Intelligent Systems and Computing |
| Soggetto topico |
Engineering—Data processing
Cooperating objects (Computer systems) Computational intelligence Machine learning Big data Data Engineering Cyber-Physical Systems Computational Intelligence Machine Learning Big Data |
| ISBN | 3-030-62743-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910863143703321 |
| Springer International Publishing, 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The 2021 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy : SPIoT-2021 Volume 2 / / edited by John Macintyre, Jinghua Zhao, Xiaomeng Ma
| The 2021 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy : SPIoT-2021 Volume 2 / / edited by John Macintyre, Jinghua Zhao, Xiaomeng Ma |
| Edizione | [1st ed. 2022.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
| Descrizione fisica | 1 online resource (999 pages) |
| Disciplina | 006.3 |
| Collana | Lecture Notes on Data Engineering and Communications Technologies |
| Soggetto topico |
Engineering - Data processing
Cooperating objects (Computer systems) Computational intelligence Big data Artificial intelligence Data Engineering Cyber-Physical Systems Computational Intelligence Big Data Artificial Intelligence |
| ISBN | 3-030-89511-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Analysis of Sentiment Tendency of Tourists' Comments Based on Text Mining -- Analysis of Smart City Construction Based on 5G Data Technology -- Prediction of Stock Price Based on Artificial Intelligence Algorithm -- Variation Translation Strategy System of Intangible Cultural Heritage Based on Data Mining -- A Computer-aided Comparative Study on Grammatical Cohesion in Abstracts of Sci-tech Journal Papers by Chinese and American Scholars -- Computer Graphics and Image Software in Advertising Design -- Design and Research of Production Information Management System for Project Based Mechanical Manufacturing Enterprises -- Impact of Computer Network Technology on Regional Economic Development -- Chaos Algorithm of Electrical Control System Based on Neural Network Technology -- Pulse Signal Acquisition System Based on Match Pursuit Algorithm -- Data Analysis of Power System Engineering Construction Based on PPSO Algorithm -- Reactive Optimization of Power System Based on K-means Algorithm -- Design and Structure Analysis of Manipulator based on Acceleration Sensor -- Discussion on Decision Tree Algorithm in University Teaching Management System. . |
| Record Nr. | UNINA-9910523725703321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The 2021 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy : SPIoT-2021 Volume 1 / / edited by John Macintyre, Jinghua Zhao, Xiaomeng Ma
| The 2021 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy : SPIoT-2021 Volume 1 / / edited by John Macintyre, Jinghua Zhao, Xiaomeng Ma |
| Edizione | [1st ed. 2022.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
| Descrizione fisica | 1 online resource (1169 pages) |
| Disciplina | 006.31 |
| Collana | Lecture Notes on Data Engineering and Communications Technologies |
| Soggetto topico |
Engineering - Data processing
Cooperating objects (Computer systems) Computational intelligence Big data Artificial intelligence Data Engineering Cyber-Physical Systems Computational Intelligence Big Data Artificial Intelligence |
| ISBN | 3-030-89508-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Application of Artificial Intelligence in Arrangement Creation -- Automatic Segmentation for Retinal Vessel Using Concatenate UNet++ -- Experimental Analysis of Mandarin Tone Pronunciation of Tibetan College Students for Artificial Intelligence Speech Recognition -- Exploration of Paths for Artificial Intelligence Technology to Promote Economic Development -- Influence of RPA Financial Robot on Financial Accounting and its Countermeasures -- Application of Artificial Intelligence Technology in English Online Learning Platform -- Spectral Identification Model of NIR Origin Based on Deep Extreme Learning Machine -- Frontier Application and Development Trend of Artificial Intelligence in New Media in the AI Era -- Analysis on the Application of Machine Learning Stock Selection Algorithm in the Financial Field -- Default Risk Prediction Based on Machine Learning under Big Data Analysis Technology -- Application of Intelligent Detection Technology and Machine Learning Algorithm in Music Intelligent System -- Application of 3D Computer Aided System in Dance Creation and Learning -- Data Selection and Machine Learning Algorithm Application under the Background of Big Data. . |
| Record Nr. | UNINA-9910523725603321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications / / edited by George A. Tsihrintzis, Shiuh-Jeng Wang, Iuon-Chang Lin
| 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications / / edited by George A. Tsihrintzis, Shiuh-Jeng Wang, Iuon-Chang Lin |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (406 pages) |
| Disciplina | 006.3 |
| Collana | Smart Innovation, Systems and Technologies |
| Soggetto topico |
Computational intelligence
Artificial intelligence Engineering - Data processing Big data Engineering mathematics Computational Intelligence Artificial Intelligence Data Engineering Big Data Mathematical and Computational Engineering Applications |
| ISBN | 3-031-05491-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Reversible Data Hiding in Encrypted Image Based on MSB Inversion -- Comments on the Visual Binary QR Code -- NLP-based Hardware Solution for Censoring Audio on Over-the-top (OTT) Media Services -- Efficient Steganographic Method Based on Modulo Cube -- Reversible Data Hiding Based on Bidirectional Generalized Integer Transform -- An RFID Ownership Transfer based on Multiple Owners with Different Weights -- Fuzzy C-Means based Feature Selection Mechanism for Wireless Intrusion Detection -- Real Time Drowsiness Detection Based on Facial Dynamic Features -- Collision Avoidance in Crowded Zone using Adversarial Reinforcement Learning -- Reconfigurable PM2.5 Sensor Green Deployment Mechanism Based on Blockchain Technology. |
| Record Nr. | UNINA-9910633913203321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The 8th International Conference on Advanced Machine Learning and Technologies and Applications (AMLTA2022) / / edited by Aboul Ella Hassanien, Rawya Y. Rizk, Václav Snášel, Rehab F. Abdel-Kader
| The 8th International Conference on Advanced Machine Learning and Technologies and Applications (AMLTA2022) / / edited by Aboul Ella Hassanien, Rawya Y. Rizk, Václav Snášel, Rehab F. Abdel-Kader |
| Edizione | [1st ed. 2022.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
| Descrizione fisica | 1 online resource (708 pages) |
| Disciplina |
006.3
006.31 |
| Collana | Lecture Notes on Data Engineering and Communications Technologies |
| Soggetto topico |
Computational intelligence
Artificial intelligence Big data Engineering - Data processing Computational Intelligence Artificial Intelligence Big Data Data Engineering |
| ISBN | 3-031-03918-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Preface -- Organization -- Honorary Chair -- General Chairs -- Co-chairs -- International Advisory Board -- Publication Chair -- Program Chairs -- Publicity Chairs -- Technical Program Committee -- Local Arrangement Chairs -- Contents -- Deep Learning and Applications -- Plant Leaf Diseases Detection and Identification Using Deep Learning Model -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 4 Experimental Results -- 5 Conclusions -- References -- Reinforcement Learning for Developing an Intelligent Warehouse Environment -- 1 Introduction -- 2 Machine Learning Techniques -- 3 Results and Discussion -- 4 Conclusion and Future Research -- References -- A Low-Cost Multi-sensor Deep Learning System for Pavement Distress Detection and Severity Classification -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Overall System Architecture -- 3.2 Deep Learning Distress Detection -- 3.3 Dataset and Training Information -- 3.4 Projection onto the Depth 3D Point Cloud and ROI Filtering -- 4 Case Study: Pothole Severity Classification -- 5 Experimental Results -- 5.1 Results for the Distress Detection -- 5.2 Results for Pothole Severity Classification -- 6 Conclusion -- References -- An Intrusion Detection Model Based on Deep Learning and Multi-layer Perceptron in the Internet of Things (IoT) Network -- 1 Introduction -- 2 Related Work -- 2.1 Multi Agent Systems for IDS -- 2.2 Fuzzy Systems for IDS -- 2.3 Game Theory Models for IDS -- 3 Architecture of the Proposed Intrusion Detection System -- 3.1 Pre-processing and Feature Engineering -- 3.2 Deep Learning Layer -- 3.3 Evaluation Layer -- 4 The Experimental Results -- 5 Comparison Between Proposed Models and the Others -- 6 Conclusion -- References -- Transfer Learning and Recurrent Neural Networks for Automatic Arabic Sign Language Recognition -- 1 Introduction.
2 Related Work -- 3 Arabic Sign Language Dataset -- 4 Methodology -- 4.1 Prepare the Dataset -- 4.2 Extract the Spatial Features -- 4.3 Extract the Temporal Features -- 4.4 Video Augmentation -- 5 Experimental and Results -- 5.1 Experiment Settings -- 5.2 Models Results -- 6 Conclusion and Future Works -- References -- Robust Face Mask Detection Using Local Binary Pattern and Deep Learning -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 4 Experimental Results -- 5 Conclusion -- References -- Steganography Adaptation Model for Data Security Enhancement in Ad-Hoc Cloud Based V-BOINC Through Deep Learning -- 1 Introduction -- 1.1 Ad-Hoc Cloud Computing -- 1.2 Deep Steganography -- 1.3 Contribution -- 1.4 Paper Organization -- 2 Literature Review -- 3 Proposed Solution -- 4 Experiment -- 5 Discussion and Analysis -- 6 Conclusion -- References -- Performance of Different Deep Learning Models for COVID-19 Detection -- 1 Introduction -- 2 Deep Learning (DL) -- 2.1 The DL-Algorithms Steps in COVID-19 Diagnosis -- 2.2 DL-Models for COVID-19 Detection -- 3 Discussion -- 4 Conclusion -- References -- Deep Learning-Based Apple Leaves Disease Identification Approach with Imbalanced Data -- 1 Introduction -- 2 Basics and Background -- 2.1 Data Imbalance -- 2.2 Convolutional Neural Networks -- 2.3 Transfer Learning -- 3 The Proposed Approach -- 3.1 Dataset Description -- 3.2 Data Preprocessing Phase -- 3.3 Training Phase -- 3.4 Evaluation Phase -- 4 Experimental Results and Analysis -- 4.1 Data Imbalance Problem -- 4.2 Data Augmentation -- 4.3 Setup of the Experiment -- 4.4 Evaluation of the Model -- 5 Conclusion and Future Work -- References -- Commodity Image Retrieval Based on Image and Text Data -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Image and Text Feature Fusion -- 3.2 Target Function -- 4 Experiment -- 4.1 Evaluation Metrics. 4.2 Datasets -- 4.3 Experimental Details -- 4.4 Experimental Results and Analysis -- 5 Conclusion -- References -- Machine Learning Technologies -- Artificial Intelligence Based Solutions to Smart Warehouse Development: A Conceptual Framework -- 1 Introduction -- 2 SWOT Analysis -- 2.1 Strengths -- 2.2 Weaknesses -- 2.3 Opportunities -- 2.4 Threats -- 3 Proposed Solutions and Current Approaches -- 3.1 WO Strategy (Improve): Testbed as a Trial for Investment Decision -- 3.2 WO Strategy (Improve): AI-Powered Solutions -- 3.3 SO Strategy (Attack): AI Resource Development -- 4 Conclusions and Future Research -- References -- Long-Short Term Memory Model with Univariate Input for Forecasting Individual Household Electricity Consumption -- 1 Introduction -- 2 Related Works -- 3 Deep Learning Models for Load Forecasting -- 3.1 LSTM and LSTM-ED Neural Networks -- 3.2 CNN-LSTM Neural Networks -- 3.3 GRU Neural Networks -- 3.4 BiLSTM Neural Networks -- 3.5 ConvLSTM Neural Networks -- 4 Results and Discussion -- 4.1 Dataset Description -- 4.2 Evaluation Metrics -- 4.3 Prediction Results of ConvLSTM -- 4.4 Discussion of the Forecasting Models -- 5 Conclusion and Future Work -- References -- DNA-Binding-Proteins Identification Based on Hybrid Features Extraction from Hidden Markov Model -- 1 Introduction -- 2 Materials and Methods -- 2.1 Datasets -- 2.2 Encoding -- 2.3 Framing -- 2.4 Hybrid Visual HMM Structure -- 2.5 Features Extraction -- 2.6 Classifier -- 3 Results and Discussions -- 4 Conclusions -- References -- Machine Learning Based Mobile Applications for Cardiovascular Diseases (CVDs) -- 1 Introduction -- 2 ML Based m-Health for CVDs -- 3 Characteristics of the Commercially Available CVDs Mobile Applications -- 4 Future Requirements -- 5 Conclusion -- References -- Regression Analysis for Remaining Useful Life Prediction of Aircraft Engines. 1 Introduction -- 2 Related Work -- 3 Aircraft Engine System -- 4 Proposed Model for Predicting the RUL -- 5 Experimental Results and Discussion -- 6 Conclusion and Future Work -- References -- Applying Machine Learning Technology to Perform Automatic Provisioning of the Optical Transport Network -- 1 Introduction -- 2 The Challenges in the Current Model of the Supervision of the OTN -- 3 Proposed Model for the Automatic Provision of the OTN -- 4 Results and Discussion -- 5 Conclusion and Future Work -- References -- Robo-Nurse Healthcare Complete System Using Artificial Intelligence -- 1 Introduction -- 1.1 Related Work -- 2 Research Method -- 2.1 Software Implementation -- 2.2 Hardware Implementation -- 2.3 External Design Implementation -- 3 Results and Discussions -- 4 Conclusion -- References -- Resolving Context Inconsistency Approach Based on Random Forest Tree -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 3.1 IoT Data Collection Phase -- 3.2 Context Inconsistency Validator -- 3.3 Best Resolution Selection -- 3.4 Random Forest Tree -- 4 Experimental Results and Evaluations -- 5 Conclusion and Future Directions -- References -- Arduino Line Follower Using Fuzzy Logic Control -- 1 Introduction -- 2 Methodology -- 2.1 Lab Simulation -- 2.2 The ATmega328p Microcontroller -- 2.3 Voltage Regulator -- 2.4 Circuit Diagram Explanation -- 2.5 Microcontroller-Motor Driver IC Interface -- 2.6 Microcontroller-IR Sensor Module Interface -- 2.7 Microcontroller-Variable Resistor Interface -- 2.8 Arduino IDE Interface with Microcontroller -- 3 Summary of Methodology -- 4 Physical Modeling -- 4.1 Block Diagram -- 4.2 Flow Chart -- 4.3 Working Principle -- 5 Result and Analysis -- 6 Conclusion -- References -- Evaluating Adaptive Facade Performance in Early Building Design Stage: An Integrated Daylighting Simulation and Machine Learning. 1 Introduction -- 2 Related Works -- 3 Building as a Machine and Machine Learning in Architecture -- 4 Adaptive Facade -- 5 Methodology -- 5.1 Data Collection: Available Forms of Kinetic Façade Systems -- 5.2 Data Preparation: Applying System Possibility Scores -- 5.3 Data Exploration and Case Study Setup -- 5.4 Prediction Stage: Applying the KNN Algorithm as a Selective Filter -- 6 Systems Modeling and Simulation -- 7 Results and Discussion -- 8 Conclusion -- References -- LTE Downlink Scheduling with Soft Policy Gradient Learning -- 1 Introduction -- 2 Downlink Resource Allocation in LTE -- 3 Related Work -- 4 DSPG Scheduler: The Proposed Scheduling Algorithm -- 4.1 Problem Statement -- 4.2 Model Design -- 5 Simulation Implementation and Results -- 6 Conclusions -- References -- Predicting the Road Accidents Severity Using Artificial Neural Network -- 1 Introduction -- 2 Literature Review -- 3 Dataset -- 4 The Proposed Methodology -- 5 Results and Discussions -- 5.1 Attributes vs Accident Severity -- 5.2 Accident Severity Prediction Results -- 6 Conclusion -- References -- Predicting the Intention to Use Audi and Video Teaching Styles: An Empirical Study with PLS-SEM and Machine Learning Models -- 1 Introduction -- 2 Theoretical Framework -- 2.1 Technology Acceptance Model (TAM) -- 2.2 Flow Theory -- 2.3 Virtual Reality Attributes -- 3 Research Methodology -- 3.1 Data Collection -- 3.2 Personal/Demographic Information -- 3.3 Study Instrument -- 3.4 Survey Structure -- 4 Findings and Discussion -- 4.1 Data Analysis -- 4.2 Convergent Validity -- 4.3 Discriminant Validity -- 4.4 Hypotheses Testing Using PLS-SEM -- 4.5 Hypothesis Testing Using Machine Learning Algorithms -- 5 Discussion of Results -- References -- Intellgenet Systems and Applications. Immunity of Signals Transmission Using Secured Unequal Error Protection Scheme with Various Packet Format. |
| Record Nr. | UNINA-9910561300503321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Active Learning to Minimize the Possible Risk of Future Epidemics / / by KC Santosh, Suprim Nakarmi
| Active Learning to Minimize the Possible Risk of Future Epidemics / / by KC Santosh, Suprim Nakarmi |
| Autore | Santosh K. C |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (107 pages) |
| Disciplina | 006.3 |
| Altri autori (Persone) | NakarmiSuprim |
| Collana | SpringerBriefs in Computational Intelligence |
| Soggetto topico |
Computational intelligence
Artificial intelligence Machine learning Big data Computational Intelligence Artificial Intelligence Machine Learning Big Data |
| ISBN |
9789819974429
9819974429 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Introduction -- Active learning – what, when, and where to deploy? -- Active learning – review (cases) -- Active learning – methodology -- Active learning – validation -- Case study: Is my cough sound Covid-19?. |
| Record Nr. | UNINA-9910768179903321 |
Santosh K. C
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||