top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
6GN for Future Wireless Networks [[electronic resource] ] : 5th EAI International Conference, 6GN 2022, Harbin, China, December 17-18, 2022, Proceedings, Part I / / edited by Ao Li, Yao Shi, Liang Xi
6GN for Future Wireless Networks [[electronic resource] ] : 5th EAI International Conference, 6GN 2022, Harbin, China, December 17-18, 2022, Proceedings, Part I / / edited by Ao Li, Yao Shi, Liang Xi
Autore Li Ao
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (343 pages)
Disciplina 004.6
Altri autori (Persone) ShiYao
XiLiang
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer networks
Coding theory
Information theory
Education—Data processing
Computer Communication Networks
Coding and Information Theory
Computers and Education
ISBN 3-031-36011-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Resource Allocation for 6G Networks -- OLSR Protocol Optimization Based on Node and Link Stability -- Dynamic Computation Offloading and Resource Allocation for Multi-access Edge Computing Networks -- Technical Design of an Ad-hoc Network Topology Simulation System -- Electromagnetic Propagation Path And Signal Attenuation Prediction Based On DEM Electronic Map -- Multi-Object Tracking Based on YOLOX and DeepSORT Algorithm -- Embedding with Bounding Box Contracting for Multi-Object Tracking -- Cross-Stage Fusion Network Based on Multi-Modal Hyperspectral Image Classification -- Higher accuracy yolov5 based safety helmet detection -- Landslide Detection of 6G Satellite Images using multi-level Transformer Network -- Survey on Anti-jamming Technology of UAV Communication -- Research on Building Emergency Supply Chain Decision-making Platform Using Big Data Mining Technology -- Security and Privacy for 6G Networks -- Design and Implementation of Ad Hoc Communication Demonstration System -- Design and Implementation of a Dual Channel Speech Signal Transceiver System Based on FPGA -- Network Coding Based Efficient Topology Construction and Flow Allocation Method for Satellite Networks -- Critical Separation Hashing for Cross-modal Retrieval -- An Improved DBSCAN algorithm to analyze taxi pick-up hotspots -- Classification of deforestation factors in 6G satellite forest images -- Classification of deforestation factors in 6G satellite forest images -- 6G Network Traffic Intrusion Detection using Multiresolution Auto-Encoder and Feature Matching Discriminator -- A Design of Information Extraction Method on CNC Machine Tools using C/S Structure -- Hierarchical system architecture design of UAV cluster based on mission requirements -- Reconstruction of smart phone camera effect parameter management subsystem -- Big data mining and pattern analysis techniques for 6G Networks -- An Empirical Analysis of the Tax Inspection and Law Enforcement Risk of Changchun Taxation Bureau in the Era of Big Data -- Research on the Challenges and Countermeasures of Tax Collection and Administration under the Digital Economy -- Financial Pressure, Efficiency of Tax Collection and Administration and Regional Heterogeneity -—Take the “2018 Consolidation of State and Local Taxes” as an Exampl e -- Efficiency measurement of financial subsidies for agricultural insurance and analysis of provincial differences–A Study Based on Super-SBM Model and Malmquist Index -- Research on the Impact of Digital Economy on Local Tax Revenue—PVAR Model Analysis Based on Chinese Provincial Panel Data -- Research on the influence of tax burden on the research and development level of logistics enterprises -- Tax Policy, Technological Innovation and Industrial Structure Upgrading – Based on Mediating Effect Model Test -- Research on the Equalization Level of Public Services Under Urban-Rural Integration Development in Heilongjiang Province Based on Empirical Data Analysis -- Application Research of Electronic Invoice System Based on Blockchain Technology ——Taking Shenzhen City as an Example -- Design of an algorithm of fault diagnosis based on the multiple source vibration signals.
Record Nr. UNISA-996546832603316
Li Ao  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
6GN for Future Wireless Networks [[electronic resource] ] : 5th EAI International Conference, 6GN 2022, Harbin, China, December 17-18, 2022, Proceedings, Part II / / edited by Ao Li, Yao Shi, Liang Xi
6GN for Future Wireless Networks [[electronic resource] ] : 5th EAI International Conference, 6GN 2022, Harbin, China, December 17-18, 2022, Proceedings, Part II / / edited by Ao Li, Yao Shi, Liang Xi
Autore Li Ao
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (364 pages)
Disciplina 004.6
Altri autori (Persone) ShiYao
XiLiang
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer networks
Coding theory
Information theory
Education—Data processing
Computer Communication Networks
Coding and Information Theory
Computers and Education
ISBN 3-031-36014-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Artificial intelligent techniques for 6G Networks -- Dual-point side-fed circularly polarized microstrip antenna design -- A semi-supervised classification method for 6G remote sensing images based on Pseudo-label and false representation recognition -- Establishment of Soil Quantitative Detection Model Based on Sparrow Search Algorithm -- Soil Temperature and Humidity Detection System Based on Machine Learning and Computer Vision -- Extraction of soybean pod features based on computer vision -- Artificial Intelligence Cross-Domain Fusion Pattern Recognition Based on Intelligent Robot Algorithm -- Cross-Border Technology Integration in the Field of Artificial Intelligence Based on Neural Network Algorithm -- Research on ad hoc network routing protocol for UAV application -- Research on Emergency Communication Technology of UAV Based on D2D -- China Mobile network architecture for 6G -- Mobile Edge Computing for 6G Networks -- 3D Battlefield Radiation Source Location Tracking Algorithm -- Server Selection and Resource Allocation for Energy Minimization in Satellite Edge Computing -- Comprehensive Interference Analysis for ZC-NOMA -- Soybean pods and stems segmentation based on an improved Watershed -- Design and implementation of garbage classification system based on convolutional neural network -- Study on the effect of total Se content of Chinese cabbage fermentation broth on its quality evaluation based on wireless environmental monitorin -- Development Road Map and Planning Mode of Artificial Intelligence Technology Under the Background of Internet Information -- Artificial Intelligence Technology in Computer Vision and Network Field -- Research on precise ideological and political education in colleges and universities based on the analysis of student group portraits -- Heterogeneous Edge Network of Agricultural and Forestry Plant Protection UAV Research on Computing Offload and Resource Management -- Unmanned Aerial Vehicle Communication for 6G Networks -- Research on Anycast Scheduling Algorithm in Edge Computing Networks -- Research on UAV Communication Technology Based on 6G network -- Synchronization technology for underwater acoustic mobile communication -- UAV path planning based on APF-Q-learning -- Simulation analysis of Inter-digital electrodes sensor based on HFSS -- 6G Network Security Technology Based on Artificial Intelligence -- Research on Key Technologies of agricultural and forestry plant protection UAV -- The Development Demand and Application Prospect of Intelligentization in the Logistics Industry for 6G Technology -- Challenges and Reflections on Vocational Education in 6G Era.
Record Nr. UNISA-996546844203316
Li Ao  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
6GN for Future Wireless Networks : 5th EAI International Conference, 6GN 2022, Harbin, China, December 17-18, 2022, Proceedings, Part II / / edited by Ao Li, Yao Shi, Liang Xi
6GN for Future Wireless Networks : 5th EAI International Conference, 6GN 2022, Harbin, China, December 17-18, 2022, Proceedings, Part II / / edited by Ao Li, Yao Shi, Liang Xi
Autore Li Ao
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (364 pages)
Disciplina 004.6
621.38456
Altri autori (Persone) ShiYao
XiLiang
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer networks
Coding theory
Information theory
Education—Data processing
Computer Communication Networks
Coding and Information Theory
Computers and Education
ISBN 3-031-36014-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Artificial intelligent techniques for 6G Networks -- Dual-point side-fed circularly polarized microstrip antenna design -- A semi-supervised classification method for 6G remote sensing images based on Pseudo-label and false representation recognition -- Establishment of Soil Quantitative Detection Model Based on Sparrow Search Algorithm -- Soil Temperature and Humidity Detection System Based on Machine Learning and Computer Vision -- Extraction of soybean pod features based on computer vision -- Artificial Intelligence Cross-Domain Fusion Pattern Recognition Based on Intelligent Robot Algorithm -- Cross-Border Technology Integration in the Field of Artificial Intelligence Based on Neural Network Algorithm -- Research on ad hoc network routing protocol for UAV application -- Research on Emergency Communication Technology of UAV Based on D2D -- China Mobile network architecture for 6G -- Mobile Edge Computing for 6G Networks -- 3D Battlefield Radiation Source Location Tracking Algorithm -- Server Selection and Resource Allocation for Energy Minimization in Satellite Edge Computing -- Comprehensive Interference Analysis for ZC-NOMA -- Soybean pods and stems segmentation based on an improved Watershed -- Design and implementation of garbage classification system based on convolutional neural network -- Study on the effect of total Se content of Chinese cabbage fermentation broth on its quality evaluation based on wireless environmental monitorin -- Development Road Map and Planning Mode of Artificial Intelligence Technology Under the Background of Internet Information -- Artificial Intelligence Technology in Computer Vision and Network Field -- Research on precise ideological and political education in colleges and universities based on the analysis of student group portraits -- Heterogeneous Edge Network of Agricultural and Forestry Plant Protection UAV Research on Computing Offload and Resource Management -- Unmanned Aerial Vehicle Communication for 6G Networks -- Research on Anycast Scheduling Algorithm in Edge Computing Networks -- Research on UAV Communication Technology Based on 6G network -- Synchronization technology for underwater acoustic mobile communication -- UAV path planning based on APF-Q-learning -- Simulation analysis of Inter-digital electrodes sensor based on HFSS -- 6G Network Security Technology Based on Artificial Intelligence -- Research on Key Technologies of agricultural and forestry plant protection UAV -- The Development Demand and Application Prospect of Intelligentization in the Logistics Industry for 6G Technology -- Challenges and Reflections on Vocational Education in 6G Era.
Record Nr. UNINA-9910734875603321
Li Ao  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
6GN for Future Wireless Networks : 5th EAI International Conference, 6GN 2022, Harbin, China, December 17-18, 2022, Proceedings, Part I / / edited by Ao Li, Yao Shi, Liang Xi
6GN for Future Wireless Networks : 5th EAI International Conference, 6GN 2022, Harbin, China, December 17-18, 2022, Proceedings, Part I / / edited by Ao Li, Yao Shi, Liang Xi
Autore Li Ao
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (343 pages)
Disciplina 004.6
621.38456
Altri autori (Persone) ShiYao
XiLiang
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer networks
Coding theory
Information theory
Education—Data processing
Computer Communication Networks
Coding and Information Theory
Computers and Education
ISBN 3-031-36011-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Resource Allocation for 6G Networks -- OLSR Protocol Optimization Based on Node and Link Stability -- Dynamic Computation Offloading and Resource Allocation for Multi-access Edge Computing Networks -- Technical Design of an Ad-hoc Network Topology Simulation System -- Electromagnetic Propagation Path And Signal Attenuation Prediction Based On DEM Electronic Map -- Multi-Object Tracking Based on YOLOX and DeepSORT Algorithm -- Embedding with Bounding Box Contracting for Multi-Object Tracking -- Cross-Stage Fusion Network Based on Multi-Modal Hyperspectral Image Classification -- Higher accuracy yolov5 based safety helmet detection -- Landslide Detection of 6G Satellite Images using multi-level Transformer Network -- Survey on Anti-jamming Technology of UAV Communication -- Research on Building Emergency Supply Chain Decision-making Platform Using Big Data Mining Technology -- Security and Privacy for 6G Networks -- Design and Implementation of Ad Hoc Communication Demonstration System -- Design and Implementation of a Dual Channel Speech Signal Transceiver System Based on FPGA -- Network Coding Based Efficient Topology Construction and Flow Allocation Method for Satellite Networks -- Critical Separation Hashing for Cross-modal Retrieval -- An Improved DBSCAN algorithm to analyze taxi pick-up hotspots -- Classification of deforestation factors in 6G satellite forest images -- Classification of deforestation factors in 6G satellite forest images -- 6G Network Traffic Intrusion Detection using Multiresolution Auto-Encoder and Feature Matching Discriminator -- A Design of Information Extraction Method on CNC Machine Tools using C/S Structure -- Hierarchical system architecture design of UAV cluster based on mission requirements -- Reconstruction of smart phone camera effect parameter management subsystem -- Big data mining and pattern analysis techniques for 6G Networks -- An Empirical Analysis of the Tax Inspection and Law Enforcement Risk of Changchun Taxation Bureau in the Era of Big Data -- Research on the Challenges and Countermeasures of Tax Collection and Administration under the Digital Economy -- Financial Pressure, Efficiency of Tax Collection and Administration and Regional Heterogeneity -—Take the “2018 Consolidation of State and Local Taxes” as an Exampl e -- Efficiency measurement of financial subsidies for agricultural insurance and analysis of provincial differences–A Study Based on Super-SBM Model and Malmquist Index -- Research on the Impact of Digital Economy on Local Tax Revenue—PVAR Model Analysis Based on Chinese Provincial Panel Data -- Research on the influence of tax burden on the research and development level of logistics enterprises -- Tax Policy, Technological Innovation and Industrial Structure Upgrading – Based on Mediating Effect Model Test -- Research on the Equalization Level of Public Services Under Urban-Rural Integration Development in Heilongjiang Province Based on Empirical Data Analysis -- Application Research of Electronic Invoice System Based on Blockchain Technology ——Taking Shenzhen City as an Example -- Design of an algorithm of fault diagnosis based on the multiple source vibration signals.
Record Nr. UNINA-9910734887603321
Li Ao  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ad-Hoc, Mobile, and Wireless Networks [[electronic resource] ] : 18th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2019, Luxembourg, Luxembourg, October 1–3, 2019, Proceedings / / edited by Maria Rita Palattella, Stefano Scanzio, Sinem Coleri Ergen
Ad-Hoc, Mobile, and Wireless Networks [[electronic resource] ] : 18th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2019, Luxembourg, Luxembourg, October 1–3, 2019, Proceedings / / edited by Maria Rita Palattella, Stefano Scanzio, Sinem Coleri Ergen
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XV, 645 p. 262 illus., 188 illus. in color.)
Disciplina 004.685
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer communication systems
Special purpose computers
Computer system failures
Application software
Coding theory
Information theory
Data encryption (Computer science)
Computer Communication Networks
Special Purpose and Application-Based Systems
System Performance and Evaluation
Information Systems Applications (incl. Internet)
Coding and Information Theory
Cryptology
ISBN 3-030-31831-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996466445403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Ad-Hoc, Mobile, and Wireless Networks : 18th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2019, Luxembourg, Luxembourg, October 1–3, 2019, Proceedings / / edited by Maria Rita Palattella, Stefano Scanzio, Sinem Coleri Ergen
Ad-Hoc, Mobile, and Wireless Networks : 18th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2019, Luxembourg, Luxembourg, October 1–3, 2019, Proceedings / / edited by Maria Rita Palattella, Stefano Scanzio, Sinem Coleri Ergen
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XV, 645 p. 262 illus., 188 illus. in color.)
Disciplina 004.685
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer communication systems
Special purpose computers
Computer system failures
Application software
Coding theory
Information theory
Data encryption (Computer science)
Computer Communication Networks
Special Purpose and Application-Based Systems
System Performance and Evaluation
Information Systems Applications (incl. Internet)
Coding and Information Theory
Cryptology
ISBN 3-030-31831-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910349278103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Concepts for Intelligent Vision Systems [[electronic resource] ] : 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedings / / edited by Sebastiano Battiato, Jacques Blanc-Talon, Giovanni Gallo, Wilfried Philips, Dan Popescu, Paul Scheunders
Advanced Concepts for Intelligent Vision Systems [[electronic resource] ] : 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedings / / edited by Sebastiano Battiato, Jacques Blanc-Talon, Giovanni Gallo, Wilfried Philips, Dan Popescu, Paul Scheunders
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XXI, 897 p. 389 illus.)
Disciplina 004
Collana Image Processing, Computer Vision, Pattern Recognition, and Graphics
Soggetto topico Computer security
Data encryption (Computer science)
Coding theory
Information theory
E-commerce
Management information systems
Computer science
Computers and civilization
Systems and Data Security
Cryptology
Coding and Information Theory
e-Commerce/e-business
Management of Computing and Information Systems
Computers and Society
ISBN 3-319-25903-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- About the Volume Editors -- Organization -- Contents -- Low-Level Image Processing -- BNRFBE Method for Blur Estimation in Document Images -- 1 Introduction -- 2 Blur Analysis -- 3 Blur Measuring -- 3.1 Principle of the Measurement -- 3.2 Text Blur Measurement -- 4 Experiments -- 4.1 Simulated Blur -- 4.2 Influence of Working Zone Z -- 4.3 Real Images -- 4.4 DIQA Database -- 5 Conclusion -- References -- Edge Width Estimation for Defocus Map from a Single Image -- 1 Introduction -- 2 Edge Width -- 2.1 Gaussian Edge Model -- 2.2 Estimation of Edge Width -- 2.3 The Edge Width Estimation Algorithm -- 3 Defocus Blur Estimation -- 3.1 Sparse Defocus Map -- 3.2 Full Defocus Map -- 4 Results and Discussion -- 4.1 Possible Improvement -- 5 Conclusion -- References -- RSD-DOG: A New Image Descriptor Based on Second Order Derivatives -- 1 Introduction -- 1.1 Related Work -- 2 Directional Filter -- 3 Ridge and Valley Detection Using Difference of Gaussian Filters -- 3.1 Difference of Half Smoothing Filters (DHSF) -- 3.2 Estimating the Direction of Second Order Statistics Such as Ridges and Valleys -- 4 Descriptor Construction -- 5 Experiments and Results -- 5.1 Dataset and Evaluation -- 5.2 Descriptor Performance -- 6 Conclusion -- References -- Ringing Artifact Suppression Using Sparse Representation -- 1 Introduction -- 2 Ringing Suppression -- 2.1 Problem Formulation -- 2.2 Joint Sparse Coding -- 2.3 Ringing Suppression Method -- 3 Evaluation -- 4 Conclusion -- References -- Patch-Based Mathematical Morphology for Image Processing, Segmentation and Classification -- 1 Introduction -- 2 Patch Complete Lattice Learning -- 2.1 Complete Lattice from Patches -- 2.2 Complete Lattice Learning -- 2.3 Patch-Based MM Operators -- 3 Applications -- 3.1 Color Image Processing -- 3.2 Color Image Segmentation.
3.3 Color Image Texture Classification -- 4 Conclusion -- References -- Time Ordering Shuffling for Improving Background Subtraction -- 1 Introduction -- 2 Time Shuffling Strategies -- 2.1 Principle -- 2.2 Random Time Shuffling Strategy -- 2.3 Deterministic Time Shuffling Strategies -- 2.4 Implementation of the Deterministic Strategies -- 3 Experiments and Results -- 3.1 Initialization -- 3.2 Dataset -- 3.3 Background Subtraction Algorithms -- 3.4 Results and Interpretation -- 4 Conclusions -- References -- Fast and Low Power Consumption Outliers Removal for Motion Vector Estimation -- 1 Introduction -- 2 Proposed Method -- 2.1 Pre-processing -- 2.2 Advanced Voting -- 2.3 Motion Estimation Model -- 3 Experimental Results -- 4 Computational Cost Comparison -- 5 Conclusion -- References -- Adaptive Scale Selection for Multiscale Image Denoising -- 1 Introduction -- 2 Motivation of the Work -- 2.1 Atomic Representation and Time-Scale Evolution -- 2.2 Rational Dilation Wavelet Transform -- 3 Scale Selection -- 3.1 Packets of Atoms -- 3.2 Scale Selection Algorithm -- 4 Adaptive RDWT -- 5 Preliminary Experimental Results -- 6 Conclusions -- References -- Secure Signal Processing Using Fully Homomorphic Encryption -- 1 Introduction -- 2 Related Work -- 3 Fully Homomorphic Encryption -- 4 Encrypted Natural Logarithm -- 5 Brightness/Contrast Filter Theory -- 6 Experimental Results -- 7 Conclusion -- References -- Video Processing and Camera Networks -- Towards a Bayesian Video Denoising Method -- 1 Introduction -- 2 Bayesian Video Denoising -- 2.1 A Nonlocal Bayesian Principle -- 2.2 Learning the a Priori Model -- 2.3 Description of the Algorithm -- 2.4 Computational Complexity -- 3 Results -- 4 Conclusions -- References -- Collaborative, Context Based Activity Control Method for Camera Networks -- 1 Introduction -- 2 Related Work.
3 The Implemented Algorithm -- 4 The Test Setup -- 5 Results and Discussion -- 6 Conclusions -- References -- EFIC: Edge Based Foreground Background Segmentation and Interior Classification for Dynamic Camera Viewpoints -- 1 Introduction -- 2 Edge Based Foreground Background Segmentation -- 2.1 Previous Work -- 2.2 Foreground Shape Correction -- 2.3 Ghost Removal -- 3 Camera Motion Detection -- 3.1 Optical Flow -- 3.2 Flow Based Camera Motion Detection -- 4 Camera Motion Compensation -- 4.1 Affine Image Transformation -- 4.2 Distinction Between Panning/Tilting and Jitter -- 4.3 Jitter Compensation -- 4.4 Panning/Tilting Compensation -- 5 Experiments -- 6 Conclusions -- References -- A Unified Camera Calibration from Arbitrary Parallelograms and Parallepipeds -- 1 Introduction -- 2 Preliminaries -- 2.1 Parallelogram Parameterization -- 3 Projections of Parallelograms -- 3.1 Canonic Homography -- 3.2 Measurement Matrix of Homographies -- 4 Parameter Estimation -- 4.1 Rescaling the Measurement Matrix -- 4.2 Factorization -- 4.3 Resolving Affine Ambiguity -- 4.4 Computing Camera Parameters -- 5 Merging Information from Parallelepipeds -- 6 Experimental Results -- 6.1 Simulated Experiment -- 6.2 Real Image Experiment -- 7 Conclusion -- References -- Motion Compensation Based on Robust Global Motion Estimation: Experiments and Applications -- 1 Introduction -- 2 Related Work -- 2.1 Problem Statement -- 2.2 Geometric Feature-Based Methods -- 2.3 Direct Methods -- 3 Proposed Method -- 3.1 Outlines of the Method -- 3.2 Detailed Method -- 3.3 A Hybrid Pyramidal Method Robust to Large Motion -- 3.4 Motion Estimation Robust to Occlusions and Moving Objects -- 4 Experimental Framework and Results -- 4.1 Problem Statement -- 4.2 Experiments -- 4.3 Criteria -- 4.4 Results -- 5 Applications -- 5.1 Stabilisation -- 5.2 Panorama Creation.
5.3 Moving Target Detection and Tracking -- 6 Conclusion and Future Work -- References -- Bayesian Fusion of Back Projected Probabilities (BFBP): Co-occurrence Descriptors for Tracking in Complex Environments -- 1 Introduction -- 2 Related Work -- 3 Probabilstic Color Co-occurrence Modeling -- 4 Bayesian Fusion of Multiple Co-occurrence Back Projections -- 5 Experimental Evaluations -- 6 Conclusion -- References -- Embedded System Implementation for Vehicle Around View Monitoring -- 1 Introduction -- 2 Surrounding Image Construction -- 2.1 Rectification -- 2.2 Bird's-Eye-View Transformation -- 2.3 Image Stitching -- 3 Embedded System Implementation -- 3.1 Hardware System Architecture -- 3.2 Performance Optimization -- 4 Experimental Results -- 4.1 Calibration Result -- 4.2 Result of Bird's-Eye-View Transformation -- 4.3 Obtaining 360 Surrounding View Image -- 4.4 Real-Time Stitching Performance and Precision -- 5 Conclusion -- References -- Motion and Tracking -- Cosine-Sine Modulated Filter Banks for Motion Estimation and Correction -- 1 Introduction -- 2 Cosine-Sine Modulated Filter Bank -- 3 Motion Estimation -- 3.1 The Error Function -- 3.2 Hierarchical Motion Estimation with CSMFB -- 4 Results -- 4.1 Motion Estimation -- 4.2 Motion Correction -- 4.3 Phase Shift Correction -- 4.4 Motion Correction in Magnetic Resonance Imaging -- 5 Conclusions -- Fast and Robust Variational Optical Flow for High-Resolution Images Using SLIC Superpixels -- 1 Introduction -- 2 Existing Work Using (Over)Segmentation -- 3 Existing Superpixel Methods -- 3.1 gSLIC Superpixels -- 3.2 (g)SLIC in Our Proposed Workflow -- 4 Variational Optical Flow on the Superpixel Grid -- 5 Experiments and Results -- 6 Conclusion -- 7 Future Work -- References -- Depth-Based Filtration for Tracking Boost -- 1 Introduction -- 2 Proposed Approach -- 2.1 Pixel Filtration.
2.2 Tracking Stage -- 2.3 Detection Stage -- 2.4 Occlusion Handling -- 2.5 Recenter and Resize -- 2.6 Learning Stage -- 3 Experimental Results -- 3.1 Success Rate -- 3.2 Precision -- 3.3 Efficiency -- 4 Conclusion -- Robust Fusion of Trackers Using Online Drift Prediction -- 1 Introduction -- 2 Related Work -- 3 Our Approach -- 3.1 Drift Predictor -- 3.2 Computation of the Fusion Bounding Box -- 3.3 Object Model Reinitialization or Update -- 4 Fusion Experiments and Results -- 4.1 Video Dataset -- 4.2 Evaluation Protocol -- 4.3 Implementation -- 4.4 Results -- 5 Conclusion -- References -- Bootstrapping Computer Vision and Sensor Fusion for Absolute and Relative Vehicle Positioning -- 1 Introduction -- 2 Fusion Approach -- 3 Visual Features -- 4 Improved GPS Method -- 5 Dynamic Map -- References -- Detection of Social Groups in Pedestrian Crowds Using Computer Vision -- 1 Introduction -- 2 Proposed Methodology -- 3 Bottom up Hierarchical Clustering -- 4 Experimental Results -- 5 Conclusions -- References -- Single Image Visual Obstacle Avoidance for Low Power Mobile Sensing -- 1 Introduction -- 2 Navigating Around Obstacles -- 2.1 Relative Focus Maps -- 2.2 Obstacle Avoidance -- 2.3 Implementation -- 3 Evaluation -- 4 Conclusions and Future Work -- References -- ROS-Based SLAM for a Gazebo-Simulated Mobile Robot in Image-Based 3D Model of Indoor Environment -- 1 Introduction -- 2 System Setup -- 2.1 Choice of a Robot for Simulation in Gazebo -- 2.2 PR-2 Robot Description and Simulation -- 2.3 AR-601M Robot Description and Simulation -- 3 Camera-Based 3D Model of Indoor Environment -- 3.1 Indoor Environment Shooting with Camera -- 3.2 Image-Based 3D Modeling of Indoor Environment -- 4 ROS-Based SLAM Using Gazebo in Image-Based 3D Model of Indoor Environment -- 4.1 Robot Simulation in Gazebo -- 4.2 ROS-Based SLAM Simulation in Gazebo -- References.
Security, Forensics and Biometrics.
Record Nr. UNISA-996466421203316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advanced Concepts for Intelligent Vision Systems : 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedings / / edited by Sebastiano Battiato, Jacques Blanc-Talon, Giovanni Gallo, Wilfried Philips, Dan Popescu, Paul Scheunders
Advanced Concepts for Intelligent Vision Systems : 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedings / / edited by Sebastiano Battiato, Jacques Blanc-Talon, Giovanni Gallo, Wilfried Philips, Dan Popescu, Paul Scheunders
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XXI, 897 p. 389 illus.)
Disciplina 004
Collana Image Processing, Computer Vision, Pattern Recognition, and Graphics
Soggetto topico Computer security
Data encryption (Computer science)
Coding theory
Information theory
E-commerce
Management information systems
Computer science
Computers and civilization
Systems and Data Security
Cryptology
Coding and Information Theory
e-Commerce/e-business
Management of Computing and Information Systems
Computers and Society
ISBN 3-319-25903-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- About the Volume Editors -- Organization -- Contents -- Low-Level Image Processing -- BNRFBE Method for Blur Estimation in Document Images -- 1 Introduction -- 2 Blur Analysis -- 3 Blur Measuring -- 3.1 Principle of the Measurement -- 3.2 Text Blur Measurement -- 4 Experiments -- 4.1 Simulated Blur -- 4.2 Influence of Working Zone Z -- 4.3 Real Images -- 4.4 DIQA Database -- 5 Conclusion -- References -- Edge Width Estimation for Defocus Map from a Single Image -- 1 Introduction -- 2 Edge Width -- 2.1 Gaussian Edge Model -- 2.2 Estimation of Edge Width -- 2.3 The Edge Width Estimation Algorithm -- 3 Defocus Blur Estimation -- 3.1 Sparse Defocus Map -- 3.2 Full Defocus Map -- 4 Results and Discussion -- 4.1 Possible Improvement -- 5 Conclusion -- References -- RSD-DOG: A New Image Descriptor Based on Second Order Derivatives -- 1 Introduction -- 1.1 Related Work -- 2 Directional Filter -- 3 Ridge and Valley Detection Using Difference of Gaussian Filters -- 3.1 Difference of Half Smoothing Filters (DHSF) -- 3.2 Estimating the Direction of Second Order Statistics Such as Ridges and Valleys -- 4 Descriptor Construction -- 5 Experiments and Results -- 5.1 Dataset and Evaluation -- 5.2 Descriptor Performance -- 6 Conclusion -- References -- Ringing Artifact Suppression Using Sparse Representation -- 1 Introduction -- 2 Ringing Suppression -- 2.1 Problem Formulation -- 2.2 Joint Sparse Coding -- 2.3 Ringing Suppression Method -- 3 Evaluation -- 4 Conclusion -- References -- Patch-Based Mathematical Morphology for Image Processing, Segmentation and Classification -- 1 Introduction -- 2 Patch Complete Lattice Learning -- 2.1 Complete Lattice from Patches -- 2.2 Complete Lattice Learning -- 2.3 Patch-Based MM Operators -- 3 Applications -- 3.1 Color Image Processing -- 3.2 Color Image Segmentation.
3.3 Color Image Texture Classification -- 4 Conclusion -- References -- Time Ordering Shuffling for Improving Background Subtraction -- 1 Introduction -- 2 Time Shuffling Strategies -- 2.1 Principle -- 2.2 Random Time Shuffling Strategy -- 2.3 Deterministic Time Shuffling Strategies -- 2.4 Implementation of the Deterministic Strategies -- 3 Experiments and Results -- 3.1 Initialization -- 3.2 Dataset -- 3.3 Background Subtraction Algorithms -- 3.4 Results and Interpretation -- 4 Conclusions -- References -- Fast and Low Power Consumption Outliers Removal for Motion Vector Estimation -- 1 Introduction -- 2 Proposed Method -- 2.1 Pre-processing -- 2.2 Advanced Voting -- 2.3 Motion Estimation Model -- 3 Experimental Results -- 4 Computational Cost Comparison -- 5 Conclusion -- References -- Adaptive Scale Selection for Multiscale Image Denoising -- 1 Introduction -- 2 Motivation of the Work -- 2.1 Atomic Representation and Time-Scale Evolution -- 2.2 Rational Dilation Wavelet Transform -- 3 Scale Selection -- 3.1 Packets of Atoms -- 3.2 Scale Selection Algorithm -- 4 Adaptive RDWT -- 5 Preliminary Experimental Results -- 6 Conclusions -- References -- Secure Signal Processing Using Fully Homomorphic Encryption -- 1 Introduction -- 2 Related Work -- 3 Fully Homomorphic Encryption -- 4 Encrypted Natural Logarithm -- 5 Brightness/Contrast Filter Theory -- 6 Experimental Results -- 7 Conclusion -- References -- Video Processing and Camera Networks -- Towards a Bayesian Video Denoising Method -- 1 Introduction -- 2 Bayesian Video Denoising -- 2.1 A Nonlocal Bayesian Principle -- 2.2 Learning the a Priori Model -- 2.3 Description of the Algorithm -- 2.4 Computational Complexity -- 3 Results -- 4 Conclusions -- References -- Collaborative, Context Based Activity Control Method for Camera Networks -- 1 Introduction -- 2 Related Work.
3 The Implemented Algorithm -- 4 The Test Setup -- 5 Results and Discussion -- 6 Conclusions -- References -- EFIC: Edge Based Foreground Background Segmentation and Interior Classification for Dynamic Camera Viewpoints -- 1 Introduction -- 2 Edge Based Foreground Background Segmentation -- 2.1 Previous Work -- 2.2 Foreground Shape Correction -- 2.3 Ghost Removal -- 3 Camera Motion Detection -- 3.1 Optical Flow -- 3.2 Flow Based Camera Motion Detection -- 4 Camera Motion Compensation -- 4.1 Affine Image Transformation -- 4.2 Distinction Between Panning/Tilting and Jitter -- 4.3 Jitter Compensation -- 4.4 Panning/Tilting Compensation -- 5 Experiments -- 6 Conclusions -- References -- A Unified Camera Calibration from Arbitrary Parallelograms and Parallepipeds -- 1 Introduction -- 2 Preliminaries -- 2.1 Parallelogram Parameterization -- 3 Projections of Parallelograms -- 3.1 Canonic Homography -- 3.2 Measurement Matrix of Homographies -- 4 Parameter Estimation -- 4.1 Rescaling the Measurement Matrix -- 4.2 Factorization -- 4.3 Resolving Affine Ambiguity -- 4.4 Computing Camera Parameters -- 5 Merging Information from Parallelepipeds -- 6 Experimental Results -- 6.1 Simulated Experiment -- 6.2 Real Image Experiment -- 7 Conclusion -- References -- Motion Compensation Based on Robust Global Motion Estimation: Experiments and Applications -- 1 Introduction -- 2 Related Work -- 2.1 Problem Statement -- 2.2 Geometric Feature-Based Methods -- 2.3 Direct Methods -- 3 Proposed Method -- 3.1 Outlines of the Method -- 3.2 Detailed Method -- 3.3 A Hybrid Pyramidal Method Robust to Large Motion -- 3.4 Motion Estimation Robust to Occlusions and Moving Objects -- 4 Experimental Framework and Results -- 4.1 Problem Statement -- 4.2 Experiments -- 4.3 Criteria -- 4.4 Results -- 5 Applications -- 5.1 Stabilisation -- 5.2 Panorama Creation.
5.3 Moving Target Detection and Tracking -- 6 Conclusion and Future Work -- References -- Bayesian Fusion of Back Projected Probabilities (BFBP): Co-occurrence Descriptors for Tracking in Complex Environments -- 1 Introduction -- 2 Related Work -- 3 Probabilstic Color Co-occurrence Modeling -- 4 Bayesian Fusion of Multiple Co-occurrence Back Projections -- 5 Experimental Evaluations -- 6 Conclusion -- References -- Embedded System Implementation for Vehicle Around View Monitoring -- 1 Introduction -- 2 Surrounding Image Construction -- 2.1 Rectification -- 2.2 Bird's-Eye-View Transformation -- 2.3 Image Stitching -- 3 Embedded System Implementation -- 3.1 Hardware System Architecture -- 3.2 Performance Optimization -- 4 Experimental Results -- 4.1 Calibration Result -- 4.2 Result of Bird's-Eye-View Transformation -- 4.3 Obtaining 360 Surrounding View Image -- 4.4 Real-Time Stitching Performance and Precision -- 5 Conclusion -- References -- Motion and Tracking -- Cosine-Sine Modulated Filter Banks for Motion Estimation and Correction -- 1 Introduction -- 2 Cosine-Sine Modulated Filter Bank -- 3 Motion Estimation -- 3.1 The Error Function -- 3.2 Hierarchical Motion Estimation with CSMFB -- 4 Results -- 4.1 Motion Estimation -- 4.2 Motion Correction -- 4.3 Phase Shift Correction -- 4.4 Motion Correction in Magnetic Resonance Imaging -- 5 Conclusions -- Fast and Robust Variational Optical Flow for High-Resolution Images Using SLIC Superpixels -- 1 Introduction -- 2 Existing Work Using (Over)Segmentation -- 3 Existing Superpixel Methods -- 3.1 gSLIC Superpixels -- 3.2 (g)SLIC in Our Proposed Workflow -- 4 Variational Optical Flow on the Superpixel Grid -- 5 Experiments and Results -- 6 Conclusion -- 7 Future Work -- References -- Depth-Based Filtration for Tracking Boost -- 1 Introduction -- 2 Proposed Approach -- 2.1 Pixel Filtration.
2.2 Tracking Stage -- 2.3 Detection Stage -- 2.4 Occlusion Handling -- 2.5 Recenter and Resize -- 2.6 Learning Stage -- 3 Experimental Results -- 3.1 Success Rate -- 3.2 Precision -- 3.3 Efficiency -- 4 Conclusion -- Robust Fusion of Trackers Using Online Drift Prediction -- 1 Introduction -- 2 Related Work -- 3 Our Approach -- 3.1 Drift Predictor -- 3.2 Computation of the Fusion Bounding Box -- 3.3 Object Model Reinitialization or Update -- 4 Fusion Experiments and Results -- 4.1 Video Dataset -- 4.2 Evaluation Protocol -- 4.3 Implementation -- 4.4 Results -- 5 Conclusion -- References -- Bootstrapping Computer Vision and Sensor Fusion for Absolute and Relative Vehicle Positioning -- 1 Introduction -- 2 Fusion Approach -- 3 Visual Features -- 4 Improved GPS Method -- 5 Dynamic Map -- References -- Detection of Social Groups in Pedestrian Crowds Using Computer Vision -- 1 Introduction -- 2 Proposed Methodology -- 3 Bottom up Hierarchical Clustering -- 4 Experimental Results -- 5 Conclusions -- References -- Single Image Visual Obstacle Avoidance for Low Power Mobile Sensing -- 1 Introduction -- 2 Navigating Around Obstacles -- 2.1 Relative Focus Maps -- 2.2 Obstacle Avoidance -- 2.3 Implementation -- 3 Evaluation -- 4 Conclusions and Future Work -- References -- ROS-Based SLAM for a Gazebo-Simulated Mobile Robot in Image-Based 3D Model of Indoor Environment -- 1 Introduction -- 2 System Setup -- 2.1 Choice of a Robot for Simulation in Gazebo -- 2.2 PR-2 Robot Description and Simulation -- 2.3 AR-601M Robot Description and Simulation -- 3 Camera-Based 3D Model of Indoor Environment -- 3.1 Indoor Environment Shooting with Camera -- 3.2 Image-Based 3D Modeling of Indoor Environment -- 4 ROS-Based SLAM Using Gazebo in Image-Based 3D Model of Indoor Environment -- 4.1 Robot Simulation in Gazebo -- 4.2 ROS-Based SLAM Simulation in Gazebo -- References.
Security, Forensics and Biometrics.
Record Nr. UNINA-9910484986803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Video Coding Systems / / by Wen Gao, Siwei Ma
Advanced Video Coding Systems / / by Wen Gao, Siwei Ma
Autore Gao Wen
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (244 p.)
Disciplina 003.54
004
006.37
006.6
Soggetto topico Coding theory
Information theory
Multimedia information systems
Signal processing
Image processing
Speech processing systems
Optical data processing
Coding and Information Theory
Multimedia Information Systems
Signal, Image and Speech Processing
Image Processing and Computer Vision
ISBN 3-319-14243-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Video Coding Basic Principle -- An Overview of AVS2 Standard -- Prediction Coding -- Transform and Quantization -- Entropy Coding -- In-Loop Filter -- Scene Video Coding -- Video Coding Optimization and Application System -- Intelligent Video System -- Image and Video Quality Assessment -- Hot Research Topics in Video Coding and Systems.
Record Nr. UNINA-9910298996003321
Gao Wen  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advancements in Smart Computing and Information Security : First International Conference, ASCIS 2022, Rajkot, India, November 24–26, 2022, Revised Selected Papers, Part II / / edited by Sridaran Rajagopal, Parvez Faruki, Kalpesh Popat
Advancements in Smart Computing and Information Security : First International Conference, ASCIS 2022, Rajkot, India, November 24–26, 2022, Revised Selected Papers, Part II / / edited by Sridaran Rajagopal, Parvez Faruki, Kalpesh Popat
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (315 pages)
Disciplina 330
006.3
Collana Communications in Computer and Information Science
Soggetto topico Artificial intelligence
Computer networks
Computer systems
Coding theory
Information theory
Application software
Data protection
Artificial Intelligence
Computer Communication Networks
Computer System Implementation
Coding and Information Theory
Computer and Information Systems Applications
Data and Information Security
ISBN 3-031-23095-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Abstracts of Keynotes -- Post-pandemic Applications of AI and Machine Learning -- Smart and Soft Computing Methods for Prioritizing Software Requirements in Large-Scale Software Projects -- Your Readiness for Industry 4.0 -- Securing NexGen Automotives - Threats and Trends -- Cyber Attacks Classification and Attack Handling Methods Using Machine Learning Methods -- The Internet of Things (IoT) Ecosystem Revolution in the World of Global Sports -- Orchestration of Containers: Role of Artificial Intelligence -- Enterprise Cybersecurity Strategies in the Cloud -- Contents - Part II -- Contents - Part I -- Cyber Security -- A Comprehensive Study on Cyber Legislation in G20 Countries -- 1 Introduction -- 2 Literature Review -- 2.1 Argentina -- 2.2 Australia -- 2.3 Brazil -- 2.4 Canada -- 2.5 China -- 2.6 France -- 2.7 Germany -- 2.8 India -- 2.9 Indonesia -- 2.10 Italy -- 2.11 Japan -- 2.12 South Korea -- 2.13 Mexico -- 2.14 Russia -- 2.15 Saudi Arabia -- 2.16 South Africa -- 2.17 Turkey -- 2.18 United Kingdom -- 2.19 United State of America -- 2.20 European Union -- 3 Conclusions -- References -- Image Encryption Algorithm Based on Timeout, Pixel Transposition and Modified Fisher-Yates Shuffling -- 1 Introduction -- 2 Proposed Work -- 2.1 Key Generation -- 2.2 Encryption Process -- 2.3 Decryption Process -- 3 Library and Packages -- 4 Performance Analysis and Results -- 4.1 NPCR & -- UACI Test -- 4.2 Mean Square Error (MSE) -- 4.3 Root Mean Square Error (RMSE) -- 4.4 Peak Signal to Noise Ratio (PSNR) -- 4.5 Key Space Analysis -- 4.6 Key Sensitivity Test -- 4.7 Encryption Time -- 4.8 Correlation Analysis -- 4.9 Mono-bit Test -- 4.10 Entropy Analysis -- 4.11 Average Difference (AD) and Maximum Difference (MD) -- 4.12 Structural Content (SC) -- 5 Conclusion -- References.
EXAM: Explainable Models for Analyzing Malicious Android Applications -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Data Set Preparation -- 3.2 Feature Extraction -- 3.3 Pre-processing the Feature Set and FVT Creation -- 3.4 Model Preparation and Classification -- 3.5 Obfuscation of Samples -- 3.6 Interpretation of Results Using SHAP -- 4 Experiments and Results -- 4.1 Evaluation Measures -- 4.2 Research Questions -- 4.3 Comparison with State-of-the-Art Approaches -- 5 Conclusion -- References -- Data Encryption Approach Using Hybrid Cryptography and Steganography with Combination of Block Ciphers -- 1 Introduction -- 1.1 Research Contribution -- 1.2 Paper Organisation -- 2 Related Work in the Domain -- 3 Proposed Methodology -- 4 Results and Discussions -- 5 Conclusion -- References -- Mitigation and Prevention Methods for Distributed Denial-of-Service Attacks on Network Servers -- 1 Introduction -- 2 Proposed Survey -- 2.1 Motivation for DDoS Attacks -- 2.2 Attack Strategies and Phases -- 2.3 Attack Methods -- 3 Prevention Methods -- 3.1 Prevention Using Filters -- 3.2 Secure Overlay -- 3.3 Honeypots -- 3.4 Load Balancing -- 3.5 Additional Security Patches -- 4 DDoS Mitigation Methods -- 4.1 Detection of DDoS Attacks -- 5 Conclusion -- References -- A Machine Learning Framework for Automatic Detection of Malware -- 1 Introduction -- 2 Literature Review -- 3 Proposed Framework -- 4 Experimental Results -- 5 Conclusion and Future Work -- References -- DNNdroid: Android Malware Detection Framework Based on Federated Learning and Edge Computing -- 1 Introduction -- 2 Related Work -- 3 Datasets -- 4 Machine Learning Technique -- 5 Proposed Framework Architecture -- 6 Evaluation of Proposed Framework -- 7 Comparison of Proposed Framework -- 7.1 Comparison on the Basis of Framework Available in the Literature.
7.2 Comparison of the Proposed Framework with Different Anti-virus Scanners -- 8 Experimental Findings -- 9 Conclusion -- References -- An Improved Symmetric Key Encryption Method Using Randomized Matrix Generation -- 1 Introduction -- 2 Types of Encryption Technique -- 2.1 AES -- 2.2 DES -- 2.3 Blowfish -- 3 Proposed Technique -- 3.1 Random Key Generation Algorithm -- 3.2 Text Message Encryption Algorithm -- 3.3 Text Message Decryption Algorithm -- 4 Matrix Operations -- 4.1 Matrix Determinant -- 4.2 Matrix Multiplication -- 4.3 Matrix Transpose Operation -- 5 Performance Analysis -- 5.1 Implementation of System -- 5.2 Text Encryption Algorithms Performance Analysis -- 5.3 Analysis of Complexity for Random Key Generation -- 5.4 Analysis of Execution Time -- 5.5 Analysis of Throughput -- 6 Conclusion -- References -- Performance Analyses of Black Hole Attack in AODV Routing Protocol in Vanet Using NS3 -- 1 Introduction -- 1.1 AODV Routing Protocol -- 1.2 Black Hole Attack -- 1.3 Literature Survey -- 1.4 Simulation Set-Up -- 1.5 Result Analyses -- 1.6 Conclusion -- References -- Comparative Analysis of Several Approaches of Encoding Audio Files -- 1 Introduction -- 2 Overview of Cryptography -- 3 Aims of Cryptography -- 3.1 The Many Forms that Cryptography Can Take -- 4 Cryptographic Algorithms at a Glance -- 4.1 DES -- 4.2 3DES -- 4.3 AES -- 4.4 Blowfish -- 4.5 RC4 -- 4.6 Twofish -- 4.7 ThreeFish -- 5 Background and Related Works -- 5.1 Related Research and Development on Audio Encryption -- 6 Recent Works on Audio Encryption -- 7 Limitations -- 8 Conclusion -- References -- A Secure Mechanism for Safeguarding Cloud Infrastructure -- 1 Introduction -- 2 Literature Review -- 3 Types of Security in Cloud Computing -- 3.1 Information Security -- 3.2 Identity Security -- 3.3 Network Security -- 3.4 Software Security -- 3.5 Infrastructure Security.
4 Security Concerns in Cloud -- 4.1 Virtualization -- 4.2 Public-Cloud Storage -- 4.3 Multitenancy -- 4.4 Identity and Access Management (IAM) -- 5 Security of Data in Cloud-Computing -- 6 Major Security Challenges -- 6.1 Internal Attacks -- 6.2 Partial/Incomplete Data Deletion -- 6.3 Interception of Data -- 6.4 Failure of Isolation -- 7 Using Encryption for Data Protection -- 7.1 Block-Cipher -- 7.2 Stream Ciphers -- 7.3 Hash Functions -- 8 Case Study on Cloud Based Cyber Security Model for Identification of Safe and Malicious Request -- 9 Conclusion -- References -- Phishing URLs Detection Using Machine Learning -- 1 Introduction -- 2 Related Work -- 2.1 Literature Review -- 2.2 URLs Descriptions -- 3 Research Methodology -- 4 Result and Analysis -- 4.1 Result -- 4.2 Analysis -- 5 Conclusion -- References -- Android Malware Detection with Classification Based on Hybrid Analysis and N-gram Feature Extraction -- 1 Introduction -- 1.1 Average Cost of a Data Breach -- 1.2 Growth Rate of Malware Infections -- 1.3 India and Asia Statistics on Malware Attacks -- 1.4 Trends in the Number of Attacks -- 1.5 Users Attacked by Malware -- 2 Research Objective/Problem Statement -- 3 Challenges in Malware Detection -- 4 Theoretical Framework -- 5 Hypothesis Declaration -- 6 Methodology -- 7 Approach -- 8 Outline of the Work Proposed -- 8.1 Process for the Proposed Scheme of Work -- 9 Conclusion -- 10 Further Research -- References -- Industry -- Image Processing and Deep Neural Networks for Face Mask Detection -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 3.1 Machine Learning Approach -- 3.2 Supervised Learning -- 3.3 Unsupervised Learning -- 3.4 Viola Jones algorithm -- 4 Mathematical Formulation -- 5 Results and Discussion -- 6 Conclusion -- References -- An Analysis of Lightweight Cryptographic Algorithms for IoT-Applications.
1 Introduction -- 2 Introduction of IoT -- 3 Software and Hardware Performance Metrics -- 4 Research Directions and Open Research Challenges -- 5 Conclusion -- Appendix 1 -- Hardware and Software Performances of LWC Algorithm -- References -- Permissioned Blockchain-Based Solution to Document Processing in the Real Estate Industry -- 1 Introduction -- 1.1 Blockchain Technology -- 1.2 Indian Real Estate Sector -- 1.3 Impact of Blockchain Technology on the Indian Real Estate Sector -- 2 Related Research Work and Limitations -- 2.1 Summarization of Recent Research Work -- 2.2 Research Gap -- 3 Proposed Research Work -- 3.1 Designed Framework and Components -- 3.2 Core Transaction Process Flow -- 3.3 Proposed Algorithms -- 3.4 Deployment -- 4 Conclusion and Future Scope -- References -- Automatic Evaluation of Free Text Answers: A Review -- 1 Introduction -- 2 Related Work -- 3 A Systematic Review -- 4 Discussion -- 5 Conclusions and Future Work -- References -- Blockchain Federated Learning Framework for Privacy-Preservation -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 4 Performance Evaluation -- 4.1 Datasets -- 4.2 Simulation Setup -- 4.3 Evaluation Metrics -- 4.4 Results and Discussion -- 5 Conclusion -- References -- Path Planning and Static Obstacle Avoidance for Unmanned Aerial Systems -- 1 Introduction -- 2 Methodology -- 2.1 A* Search -- 2.2 Rapidly-Exploring Random Tree -- 2.3 Ant Colony Optimization -- 2.4 Imitation Learning -- 3 Results and Discussion -- 4 Conclusion and Future Work -- References -- Comparative Study of Various Algorithms for Vehicle Detection and Counting in Traffic -- 1 Introduction -- 2 Literature Review -- 2.1 YOLO Real-Time Object Tracking -- 3 Methodology -- 3.1 YOLOv3 Architecture -- 3.2 YOLOv4 Architecture -- 3.3 YOLOv5 Architecture -- 3.4 YOLOv6 Architecture -- 3.5 YOLOv7 Architecture.
4 Results and Discussion.
Record Nr. UNINA-9910644266803321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui