top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I / / edited by Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino
Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I / / edited by Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (760 pages)
Disciplina 006.3
Collana Communications in Computer and Information Science
Soggetto topico Data protection
Machine learning
Computer engineering
Computer networks
Image processing - Digital techniques
Computer vision
Social sciences - Data processing
Education - Data processing
Data and Information Security
Machine Learning
Computer Engineering and Networks
Computer Imaging, Vision, Pattern Recognition and Graphics
Computer Application in Social and Behavioral Sciences
Computers and Education
Intel·ligència artificial
Seguretat informàtica
Computació en núvol
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-030-78615-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Artificial Intelligence -- A Load Balancing Mechanism for a Multi-Controller Software Defined WiFi Network -- HGC:Hybrid Gradient Compression in Distributed Deep Learning -- Application of Lidar INS Integrated Positioning in Automatic Driving -- A Review of Named Entity Recognition in Chinese Medical Text -- Robust liver vessel extraction using DV-Net with D-BCE loss function -- Cloud computing-based graph convolutional network power consumption prediction method -- Intelligent Intrusion Detection of Measurement Automation System Based on Deep Learning -- LSTM-Exploit:Intelligent Penetration Based On LSTM Tool -- Pig target detection from image based on improved YOLO V3 -- ICPM: An Intelligent Compound Prediction Model Based on GA and GRNN -- A new method of halftoning and inverse halftoning based on GAN Network -- Sow Estrus Diagnosis from Sound Samples based on Improved Deep Learning -- Research on YOLO Model and its application in Fault Status recognition of freight trains -- Feedforward Deep Neural Network-Based Model for the Forecast of Severe Convective Wind -- Asynchronous Compatible D-ML System for Edge Devices -- Ball K-Medoids: Faster and Exacter -- GVNP: Global Vectors for Node Representation -- Investigation on Loan Approval Based on Convolutional Neural Network -- Chinese Verb-Object Collocation Knowledge Graph Construction and Application -- Optimal Deployment of Underwater Sensor Networks Based on Hungarian Algorithm -- Discrete Multi-Height Wind Farm Layout Optimization for Optimal Energy Output -- Multilevel Threshold Image Segmentation Based on Modified Moth-flame Optimization Algorithm -- Research on critical illness fundraising methods based on blockchain and smart contracts -- Collaboration Energy Efficiency with Mobile Edge Computing for Data Collection in IoT -- Improving the Transformer Translation Model with Back-Translation -- Rigid Image Registration based on Graph Matching -- A Multi-scale Fusion Method For Dense Crowd Counting -- Chinese text classification based on adversarial training -- Research on SVM Parameter Optimization Mechanism Based on Particle Swarm Optimization -- A parameter selection method based on reinforcement learning: the QoS-privacy trade-off for adversarial training framework -- Word Research on Sentiment Analysis of Foreign News Reports Concerning China Based On the Hybrid Model of Opinion Sentence and BLSTM-Attention -- Cascaded Convolutional Neural Network for Image Super-Resolution -- Risk Probability Forecast Technology of the Gust in Beijing Winter Olympic Games based on the Theory of Digital Image Processing -- Depth estimation based on optical flow and depth prediction -- The Algorithms for Word Segmentation and Named Entity Recognition of Chinese Medical Records -- Temperature forecasting based on LSTM in coastal city -- Recent Progress of Medical CT Image Processing based on Deep Learning -- Road Damage Detection and Classification based on M2det -- Weather Temperature Prediction Based on LSTM-Bayesian Optimization -- Research Situation and Development Trends of Deep Learning application in Meteorology -- Exploiting Spatial-Spectral Feature for Hyperspectral Image Classification based on 3-D CNN and Bi-LSTM -- Automated Methods for Symptom Normalization in Traditional Chinese Medicine Records -- A Nested Named Entity Recognition Method for Traditional Chinese Medicine Records -- Face Feature Extraction and Recognition Based on Lighted Deep Convolutional Neural Network -- Non-Orthogonal Multiple Access is Used for Power Allocation to MaximizeThroughput in Cognitive Radio Network Systems -- Research on Drug Response Prediction Model Based on Big Data -- A Cross-Modal Image-Text Retrieval System with Deep Learning -- Research on Behavioral Decision Reward Mechanism of Unmanned Swarm System in Confrontational Environment -- A Variable Step-Size based Iterative Algorithm for High-precision Ranging using FMCW Radar -- Research on the Smart Management and Service of Smart Classrooms in Colleges and Universities -- Performance Analysis of Hard Fusion Rules in Cognitive Radio Networks over Composite Channels -- Performance Analysis of Spectrum Sensing in Cognitive Radio Networks Based on AD Goodness of Fit under Noise Uncertainty -- Research on Prediction Algorithm for Heavy Overload of Main Equipment in Distribution Network -- Review of Attention Mechanism in Electric Power Systems -- Comprehensive review of intelligent operation and maintenance of power system in China -- An Incremental Learning Method for Fault Diagnosis Based on Random Forest -- Research on Short-term Flow Forecast of Intelligent Traffic -- Research on Stock Price Forecasting Based on BP Neural Network -- Trust Computing Model of online transaction based on Social Network and Mobile Agent -- An Adaptive Momentum Term based Optimization Method for Image Restoration -- Research on Situational Awareness Security Defense of Intrusion Link Based on Data Element Characteristic Network Transmission Signal -- Research on Proofreading Method of Semantic Collocation Error in Chinese.
Record Nr. UNINA-9910488693903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I / / edited by Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino
Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I / / edited by Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (760 pages)
Disciplina 006.3
Collana Communications in Computer and Information Science
Soggetto topico Data protection
Machine learning
Computer engineering
Computer networks
Image processing - Digital techniques
Computer vision
Social sciences - Data processing
Education - Data processing
Data and Information Security
Machine Learning
Computer Engineering and Networks
Computer Imaging, Vision, Pattern Recognition and Graphics
Computer Application in Social and Behavioral Sciences
Computers and Education
Intel·ligència artificial
Seguretat informàtica
Computació en núvol
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-030-78615-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Artificial Intelligence -- A Load Balancing Mechanism for a Multi-Controller Software Defined WiFi Network -- HGC:Hybrid Gradient Compression in Distributed Deep Learning -- Application of Lidar INS Integrated Positioning in Automatic Driving -- A Review of Named Entity Recognition in Chinese Medical Text -- Robust liver vessel extraction using DV-Net with D-BCE loss function -- Cloud computing-based graph convolutional network power consumption prediction method -- Intelligent Intrusion Detection of Measurement Automation System Based on Deep Learning -- LSTM-Exploit:Intelligent Penetration Based On LSTM Tool -- Pig target detection from image based on improved YOLO V3 -- ICPM: An Intelligent Compound Prediction Model Based on GA and GRNN -- A new method of halftoning and inverse halftoning based on GAN Network -- Sow Estrus Diagnosis from Sound Samples based on Improved Deep Learning -- Research on YOLO Model and its application in Fault Status recognition of freight trains -- Feedforward Deep Neural Network-Based Model for the Forecast of Severe Convective Wind -- Asynchronous Compatible D-ML System for Edge Devices -- Ball K-Medoids: Faster and Exacter -- GVNP: Global Vectors for Node Representation -- Investigation on Loan Approval Based on Convolutional Neural Network -- Chinese Verb-Object Collocation Knowledge Graph Construction and Application -- Optimal Deployment of Underwater Sensor Networks Based on Hungarian Algorithm -- Discrete Multi-Height Wind Farm Layout Optimization for Optimal Energy Output -- Multilevel Threshold Image Segmentation Based on Modified Moth-flame Optimization Algorithm -- Research on critical illness fundraising methods based on blockchain and smart contracts -- Collaboration Energy Efficiency with Mobile Edge Computing for Data Collection in IoT -- Improving the Transformer Translation Model with Back-Translation -- Rigid Image Registration based on Graph Matching -- A Multi-scale Fusion Method For Dense Crowd Counting -- Chinese text classification based on adversarial training -- Research on SVM Parameter Optimization Mechanism Based on Particle Swarm Optimization -- A parameter selection method based on reinforcement learning: the QoS-privacy trade-off for adversarial training framework -- Word Research on Sentiment Analysis of Foreign News Reports Concerning China Based On the Hybrid Model of Opinion Sentence and BLSTM-Attention -- Cascaded Convolutional Neural Network for Image Super-Resolution -- Risk Probability Forecast Technology of the Gust in Beijing Winter Olympic Games based on the Theory of Digital Image Processing -- Depth estimation based on optical flow and depth prediction -- The Algorithms for Word Segmentation and Named Entity Recognition of Chinese Medical Records -- Temperature forecasting based on LSTM in coastal city -- Recent Progress of Medical CT Image Processing based on Deep Learning -- Road Damage Detection and Classification based on M2det -- Weather Temperature Prediction Based on LSTM-Bayesian Optimization -- Research Situation and Development Trends of Deep Learning application in Meteorology -- Exploiting Spatial-Spectral Feature for Hyperspectral Image Classification based on 3-D CNN and Bi-LSTM -- Automated Methods for Symptom Normalization in Traditional Chinese Medicine Records -- A Nested Named Entity Recognition Method for Traditional Chinese Medicine Records -- Face Feature Extraction and Recognition Based on Lighted Deep Convolutional Neural Network -- Non-Orthogonal Multiple Access is Used for Power Allocation to MaximizeThroughput in Cognitive Radio Network Systems -- Research on Drug Response Prediction Model Based on Big Data -- A Cross-Modal Image-Text Retrieval System with Deep Learning -- Research on Behavioral Decision Reward Mechanism of Unmanned Swarm System in Confrontational Environment -- A Variable Step-Size based Iterative Algorithm for High-precision Ranging using FMCW Radar -- Research on the Smart Management and Service of Smart Classrooms in Colleges and Universities -- Performance Analysis of Hard Fusion Rules in Cognitive Radio Networks over Composite Channels -- Performance Analysis of Spectrum Sensing in Cognitive Radio Networks Based on AD Goodness of Fit under Noise Uncertainty -- Research on Prediction Algorithm for Heavy Overload of Main Equipment in Distribution Network -- Review of Attention Mechanism in Electric Power Systems -- Comprehensive review of intelligent operation and maintenance of power system in China -- An Incremental Learning Method for Fault Diagnosis Based on Random Forest -- Research on Short-term Flow Forecast of Intelligent Traffic -- Research on Stock Price Forecasting Based on BP Neural Network -- Trust Computing Model of online transaction based on Social Network and Mobile Agent -- An Adaptive Momentum Term based Optimization Method for Image Restoration -- Research on Situational Awareness Security Defense of Intrusion Link Based on Data Element Characteristic Network Transmission Signal -- Research on Proofreading Method of Semantic Collocation Error in Chinese.
Record Nr. UNISA-996464519403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II
Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II
Autore Sun Xingming
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2021
Descrizione fisica 1 online resource (766 pages)
Disciplina 006.3
Altri autori (Persone) ZhangXiaorui
XiaZhihua
BertinoElisa
Collana Lecture Notes in Computer Science
Soggetto topico Artificial intelligence
Intel·ligència artificial
Computació en núvol
Seguretat informàtica
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-030-78612-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910491029903321
Sun Xingming  
Cham : , : Springer International Publishing AG, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Congress on intelligent systems . Volume 1 : proceedings of CIS 2020 / / Harish Sharma [and four others] editors
Congress on intelligent systems . Volume 1 : proceedings of CIS 2020 / / Harish Sharma [and four others] editors
Pubbl/distr/stampa Gateway East, Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (789 pages)
Disciplina 006.3
Collana Advances in Intelligent Systems and Computing
Soggetto topico Artificial intelligence
Intel·ligència artificial
Internet de les coses
Seguretat informàtica
Computació en núvol
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 981-336-981-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- About the Editors -- Modelling Subjective Happiness with a Survey Poisson Model and XGBoost Using an Economic Security Approach -- 1 Introduction -- 2 Data and Descriptive Statistics -- 3 Methodology -- 3.1 Survey Poisson Model -- 3.2 XGBoost -- 3.3 Missing Data -- 4 Results -- 4.1 Results of the Sensitivity Analysis of Missing Data -- 4.2 Predicted Subjective Happiness -- 4.3 Regression Analysis -- 5 Conclusions -- References -- Monitoring Web-Based Evaluation of Online Reputation in Barcelona -- 1 Introduction -- 2 Methodology Description -- 2.1 Principal Component Analysis -- 2.2 Robust Compositional Regression Model -- 3 Data Description -- 4 Discussion of Results -- 5 Conclusions and Managerial Implications -- Appendix 1: Abbreviation and Corresponding Meaning of Fig. 1 -- Appendix 2: Abbreviation and Corresponding Meaning of Fig. 2 -- References -- Information Technology for the Synthesis of Optimal Spatial Configurations with Visualization of the Decision-Making Process -- 1 Introduction -- 2 Basic Concepts and Definitions -- 3 Configuration Space of Geometric Objects Based on Geometric Information -- 4 Information Technology Model for the Synthesis of Spatial Configurations -- 5 The Software Package Description -- 6 An Example of Implementing the Results -- 7 Conclusion -- References -- Hybrid Approach to Combinatorial and Logic Graph Problems -- 1 Introduction -- 2 The Problem Description -- 3 The Hybrid Approach -- 4 Hybrid Three-Level Algorithm -- 5 Objective Function -- 6 Experiments -- 7 Conclusion -- References -- Energy-Efficient Algorithms Used in Datacenters: A Survey -- 1 Introduction -- 2 Techniques Used in Datacenters to Maintain Energy Efficiency -- 3 Energy Efficiency Metrics Used in Datacenters -- 4 Different Types of Algorithms Used in Datacenters -- 5 Related Work -- 6 Conclusion.
References -- Software Log Anomaly Detection Method Using HTM Algorithm -- 1 Introduction -- 2 Background -- 3 Proposed Method -- 3.1 Log Parser -- 3.2 Method Overview -- 4 Evaluation -- 4.1 Experiment Setting -- 4.2 Input Format -- 4.3 Results -- 5 Conclusion -- References -- Logical Inference in Predicate Calculus with the Definition of Previous Statements -- 1 Introduction -- 2 Definition of the Problem -- 2.1 Meaningful Definition of the Problem -- 2.2 Formal Definition of the Problem -- 3 Basic Processing Procedures -- 3.1 Partial "Disjuncts Division" -- 3.2 Complete "Disjunct Division" -- 4 Procedure of Inference -- 5 Method of Inference -- 6 Conclusion -- References -- Congestion Management Considering Demand Response Programs Using Multi-objective Grasshopper Optimization Algorithm -- 1 Introduction -- 2 Materials and Methods -- 2.1 Demand Response Programs Cost -- 3 Multi-objective Grasshopper Optimization Algorithm -- 4 Results and Discussions -- 5 Conclusion -- Appendix: Parameters of MOGOA -- References -- A Hardware Accelerator Implementation of Multilayer Perceptron -- 1 Introduction -- 2 Literature Review -- 3 FFNN Computation Algorithm -- 4 Hardware Architecture -- 4.1 Neural Processing Element -- 4.2 Activation Function Block (AFB) -- 4.3 Network Control Sequences -- 4.4 Number of Clock Cycles of Execution -- 5 Results and Discussion -- 5.1 Hardware Blocks -- 5.2 Hardware Architecture of 3times3times2 MLP -- 5.3 Resource Utilization and Performance Evaluation -- 6 Application -- 7 Conclusion -- References -- Building a Classifier of Behavior Patterns for Semantic Search Based on Cuckoo Search Meta-heuristics -- 1 Introduction -- 2 Formulation of the Problem -- 3 Method for Building the Classifier of Behavior Pattern -- 4 Bio-inspired Algorithm Based on Cuckoo Search -- 5 Experimental Research -- 6 Conclusion -- References.
TETRA Enhancement Based on Adaptive Modulation -- 1 Introduction -- 2 The Proposed TETRA Modules Layers -- 3 The Proposed TETRA System Structure -- 4 Proposal Frame of Adaptive TETRA System -- 5 Simulation and Results -- 6 Conclusion -- References -- Dynamic Stability Enhancement of Grid Connected Wind System Using Grey Wolf Optimization Technique -- 1 Introduction -- 2 Grid Connected Wind Turbine System -- 3 Modeling of SMEs System -- 3.1 Modeling of VSC -- 3.2 Modeling of Chopper -- 4 Grey Wolf Optimization (GWO) Technique -- 5 Control Strategy of Wind System Using GWO -- 6 Simulation Results -- 7 Conclusion -- References -- A Comparative Analysis on Wide-Area Power System Control with Mitigation the Effects of an Imperfect Medium -- 1 Introduction -- 2 Modelling of the Test Power System -- 2.1 Kundur's Two-Area Four-Machine Test System -- 2.2 Selection of Control Location and Wide-Area Remote Signal -- 3 Control Techniques -- 3.1 Conventional PSS (CPSS) -- 3.2 Multi-band-based PSS (MB-PSS4B) -- 3.3 Linear Quadratic Gaussian (LQG) Controller -- 4 Noise in System -- 5 Results and Discussions -- 6 Conclusions -- References -- Adware Attack Detection on IoT Devices Using Deep Logistic Regression SVM (DL-SVM-IoT) -- 1 Introduction -- 2 Related Work -- 3 Theoretical Background -- 3.1 Delineation of IoT Adware Attacks Classification and Identification Using (DL-SVM-IoT) -- 4 Experimental Results and Comparison -- 5 Conclusion and Future Work -- References -- Intrusion Detection System for Securing Computer Networks Using Machine Learning: A Literature Review -- 1 Introduction -- 1.1 Machine Learning for IDS -- 1.2 Types of IDS -- 2 Review Questions -- 3 Papers in Review -- 4 Discussions -- 5 Conclusion -- References -- An Exploration of Entropy Techniques for Envisioning Announcement Period of Open Source Software -- 1 Introduction.
1.1 Information Measures -- 2 Predicting Bugs and Estimating Release Time of Software -- 3 Conclusion -- References -- Occurrence Prediction of Pests and Diseases in Rice of Weather Factors Using Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Data Collection -- 3.2 Data Preprocessing -- 3.3 Modeling of Data for Testing and Training Purpose -- 3.4 Machine Learning -- 4 Results -- 5 Conclusion -- 6 Future Scope -- References -- A Literature Review on Generative Adversarial Networks with Its Applications in Healthcare -- 1 Introduction -- 2 What are Generative Adversarial Networks or GANs -- 2.1 Generative Model -- 2.2 Discriminative Model -- 3 Applications of GANs or Generative Adversarial Networks in Healthcare -- 3.1 Electronic Health Record -- 3.2 Retinal Image Synthesis -- 3.3 Skin Lesion Analysis -- 3.4 Medical Image Segmentation -- 4 Discussion -- 4.1 Advantages -- 4.2 Disadvantages -- 4.3 Future Scope -- 5 Conclusion -- References -- A Federated Search System for Online Property Listings Based on SIFT Algorithm -- 1 Introduction -- 2 Online Federated Search System -- 2.1 Source Crawling -- 2.2 Collection Creation -- 2.3 User Interface -- 3 Implementing the Property Federated Search System -- 4 Evaluation and Discussions -- 5 Conclusions -- References -- Digital Brain Building a Key to Improve Cognitive Functions by an EEG-Controlled Videogames as Interactive Learning Platform -- 1 Introduction -- 1.1 User State Monitoring -- 1.2 Neurogaming Using NeuroSky -- 1.3 EEG Acquisition -- 1.4 Neuroergonomics Application -- 2 Methodology -- 2.1 Mathematical Model -- 2.2 Neurogame and Educational Concept -- 2.3 Brain Runner -- 2.4 Hybrid BCI -- 2.5 Interactive Session -- 3 Results -- 4 Conclusion -- References -- Intelligent Car Cabin Safety System Through IoT Application -- 1 Introduction -- 2 IoT (Internet of Things).
3 System Description and Principal -- 4 Methodology -- 5 Results and Discussions -- 6 Conclusions -- References -- Utilization of Delmia Software for Saving Cycle Time in Robotics Spot Welding -- 1 Introduction -- 2 Problem Statement -- 3 Evolutionary Approach -- 4 Simulation Experiments -- 5 Conclusion -- References -- Data Protection Techniques Over Multi-cloud Environment-A Review -- 1 Introduction -- 2 Literature Survey -- 3 Comparative Analysis or Research Scope -- 4 Visibility of Comparative Study -- 4.1 Description of Different Cloud Framework Used -- 4.2 Issued Addressed -- 4.3 Benefits -- 5 Identified Gaps in Literature Survey -- 6 Mathematical Model -- 7 Proposed Methodology or Related Work -- 8 Conclusion -- References -- Hierarchical Ontology Based on Word Sense Disambiguation of English to Hindi Language -- 1 Introduction -- 2 Proposed Methodology -- 3 Preprocessing of English/Hindi Questions File and Dictionary -- 3.1 Preprocessing -- 3.2 Dictionary Preprocessing -- 4 Ontology Development Module -- 4.1 Collection of Senses -- 4.2 Calculation of Weight TF -- 4.3 Hierarchical Ontology -- 5 Proposed Hierarchical Ontology Algorithm -- 5.1 Proposed Algorithm -- 6 Experiment and Results -- 7 Conclusion -- References -- Review Paper: Error Detection and Correction Onboard Nanosatellites -- 1 Introduction -- 2 Methodology -- 2.1 Space Radiation -- 2.2 Glitches and Upsets -- 2.3 Geomagnetism -- 2.4 EDAC Schemes -- 2.5 Implementing EDAC Systems -- 3 Discussion -- 4 Conclusion -- References -- Kerala Floods: Twitter Analysis Using Deep Learning Techniques -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Cleaning -- 3.3 Data Labeling -- 3.4 Data Division and Separation -- 4 Implementation and Results -- 5 Conclusion -- References -- An Improved DVFS Circuit & -- Error Correction Technique -- 1 Introduction.
2 Charge Pump Circuit.
Record Nr. UNINA-9910483511903321
Gateway East, Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital Transformation, Cyber Security and Resilience of Modern Societies / / edited by Todor Tagarev, Krassimir T. Atanassov, Vyacheslav Kharchenko, Janusz Kacprzyk
Digital Transformation, Cyber Security and Resilience of Modern Societies / / edited by Todor Tagarev, Krassimir T. Atanassov, Vyacheslav Kharchenko, Janusz Kacprzyk
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (483 pages) : illustrations
Disciplina 005.8
Collana Studies in Big Data
Soggetto topico Engineering - Data processing
Cooperating objects (Computer systems)
Computational intelligence
Big data
Data Engineering
Cyber-Physical Systems
Computational Intelligence
Big Data
Seguretat informàtica
Protecció de dades
Seguretat de les xarxes d'ordinadors
Dades massives
Computació en núvol
Soggetto genere / forma Llibres electrònics
ISBN 3-030-65722-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto An Insight into Multi-domain Command and Control Systems: Issues and Challenges -- Cloud Technologies for Building a System of Data Centres for Defence and Security -- Methodology for Organizational Design of Cyber Research Networks -- Managing Cyber-education Environments with Serverless Computing -- Unified Innovative Platform for Administration and Automated Management of Internationally Recognized Standards -- Digitalization and Cyber Resilience Model for the Bulgarian Academy of Sciences.
Record Nr. UNINA-9910483573303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Mobile, Secure, and Programmable Networking : 6th International Conference, MSPN 2020, Paris, France, October 28-29, 2020, Revised Selected Papers / / Samia Bouzefrane [and three others], editors
Mobile, Secure, and Programmable Networking : 6th International Conference, MSPN 2020, Paris, France, October 28-29, 2020, Revised Selected Papers / / Samia Bouzefrane [and three others], editors
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (X, 251 p. 100 illus., 72 illus. in color.)
Disciplina 005.8
Collana Computer Communication Networks and Telecommunications
Soggetto topico Cadena de blocs (Bases de dades)
Sistemes de seguretat
Computació en núvol
Computer networks - Security measures
Application software - Development
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-030-67550-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Graph Based Subjective Matching of Trusted Strings and Blockchain Based Filtering for Connected Vehicles -- Secure and Internet-Less Connectivity to a Blockchain Network for Limited Connectivity Bank Users -- Developing Customized & Secured Blockchains with Deep Federation Learning to Prevent Successive Attacks -- Toward a Blockchain-based technology in dealing with emergencies in Patient-centered Healthcare Systems -- Using process mining to identify file system metrics impacted by ransomware execution -- Efficient and Secure Statistical Port Scan Detection Scheme -- Fast and Flexible Elliptic Curve Cryptography for Dining Cryptographers Networks -- Efficient and Lightweight Polynomial-based Key Management Scheme for Dynamic Networks -- Parallel Applications Mapping onto Network on Chip Based on Heterogeneous MPSoCs -- Budget-aware performance optimization of workflows in multiple data center clouds -- IoT-Edge-Cloud Computing Framework for QoS-Aware Computation Offloading in Autonomous Mobile Agents: Modeling and Simulation -- Toward a Privacy Guard for Cloud-based Home Assistants and IoT Devices -- An Intelligent Agent-based Industrial IoT Framework for Time-Critical Data Stream Processing -- Optimal broadcasting algorithm for VANET system -- A Reaction-Diffusion and Gur Game Based Routing Algorithm for Wireless Sensor Networks -- Low Complexity Neural Network based digital predistortion for Memory Power.
Record Nr. UNISA-996464416103316
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Mobile, Secure, and Programmable Networking : 6th International Conference, MSPN 2020, Paris, France, October 28-29, 2020, Revised Selected Papers / / Samia Bouzefrane [and three others], editors
Mobile, Secure, and Programmable Networking : 6th International Conference, MSPN 2020, Paris, France, October 28-29, 2020, Revised Selected Papers / / Samia Bouzefrane [and three others], editors
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (X, 251 p. 100 illus., 72 illus. in color.)
Disciplina 005.8
Collana Computer Communication Networks and Telecommunications
Soggetto topico Cadena de blocs (Bases de dades)
Sistemes de seguretat
Computació en núvol
Computer networks - Security measures
Application software - Development
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-030-67550-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Graph Based Subjective Matching of Trusted Strings and Blockchain Based Filtering for Connected Vehicles -- Secure and Internet-Less Connectivity to a Blockchain Network for Limited Connectivity Bank Users -- Developing Customized & Secured Blockchains with Deep Federation Learning to Prevent Successive Attacks -- Toward a Blockchain-based technology in dealing with emergencies in Patient-centered Healthcare Systems -- Using process mining to identify file system metrics impacted by ransomware execution -- Efficient and Secure Statistical Port Scan Detection Scheme -- Fast and Flexible Elliptic Curve Cryptography for Dining Cryptographers Networks -- Efficient and Lightweight Polynomial-based Key Management Scheme for Dynamic Networks -- Parallel Applications Mapping onto Network on Chip Based on Heterogeneous MPSoCs -- Budget-aware performance optimization of workflows in multiple data center clouds -- IoT-Edge-Cloud Computing Framework for QoS-Aware Computation Offloading in Autonomous Mobile Agents: Modeling and Simulation -- Toward a Privacy Guard for Cloud-based Home Assistants and IoT Devices -- An Intelligent Agent-based Industrial IoT Framework for Time-Critical Data Stream Processing -- Optimal broadcasting algorithm for VANET system -- A Reaction-Diffusion and Gur Game Based Routing Algorithm for Wireless Sensor Networks -- Low Complexity Neural Network based digital predistortion for Memory Power.
Record Nr. UNINA-9910483102603321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Network function virtualization : concepts and applicability in 5G networks / / Ying Zhang
Network function virtualization : concepts and applicability in 5G networks / / Ying Zhang
Autore Zhang Ying <1982->
Pubbl/distr/stampa Hoboken, New Jersey : , : John Wiley & Sons, , 2018
Descrizione fisica 1 PDF (192 pages)
Disciplina 621.38456
Soggetto topico Computer network architectures
Virtual computer systems
Cloud computing
Computació en núvol
Sistemes virtuals (Informàtica)
Ordinadors, Xarxes d' - Arquitectures
ISBN 1-119-39065-6
1-119-39063-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Virtualization and cloud computing -- Network function virtualization -- Software-defined networks principles and applications -- SDN and NFV in 5G 84 -- Open source and research activities.
Record Nr. UNINA-9910270918503321
Zhang Ying <1982->  
Hoboken, New Jersey : , : John Wiley & Sons, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Network function virtualization : concepts and applicability in 5G networks / / Ying Zhang
Network function virtualization : concepts and applicability in 5G networks / / Ying Zhang
Autore Zhang Ying <1982->
Pubbl/distr/stampa Hoboken, New Jersey : , : John Wiley & Sons, , 2018
Descrizione fisica 1 PDF (192 pages)
Disciplina 621.38456
Soggetto topico Computer network architectures
Virtual computer systems
Cloud computing
Computació en núvol
Sistemes virtuals (Informàtica)
Ordinadors, Xarxes d' - Arquitectures
ISBN 1-119-39065-6
1-119-39063-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Virtualization and cloud computing -- Network function virtualization -- Software-defined networks principles and applications -- SDN and NFV in 5G 84 -- Open source and research activities.
Record Nr. UNINA-9910814687803321
Zhang Ying <1982->  
Hoboken, New Jersey : , : John Wiley & Sons, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the 2nd International Conference on Computational and Bio Engineering : CBE 2020 / / edited by S. Jyothi, D. M. Mamatha, Yu-Dong Zhang, K. Srujan Raju
Proceedings of the 2nd International Conference on Computational and Bio Engineering : CBE 2020 / / edited by S. Jyothi, D. M. Mamatha, Yu-Dong Zhang, K. Srujan Raju
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (773 pages)
Disciplina 004
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Artificial intelligence
Cloud Computing
Biomedical engineering
Biomaterials
Computational Intelligence
Artificial Intelligence
Biomedical Engineering and Bioengineering
Informàtica
Enginyeria biomèdica
Computació en núvol
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 981-16-1941-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Implementation of Healthcare System using Android Application Storing Health Records in Cloud -- Threshold and Segmentation based X-ray Imaging analysis for Covid-19 Detection -- Feature Based Squids Classification using Fuzzy Logic -- Comparative Analysis on Factors Affecting Accuracy of Seizure detection using EEG Signal Processing -- Predictive Analysis of damage occurred due to Natural Disasters using Whale-Optimization algorithm based Hybrid Computation -- Remote Access for Advanced Mobile Communication Systems -- A Study to assess the knowledge and opinion of Mid- Level Health Providers of Chittoor District regarding m-health -- Machine Learning Techniques for Identifying Diabetes and its Complications based on long non-coding RNAs -- Performance Comparison of semantic web data using virtual and cloud services -- Present and future prospective of Microbial Fibrinolytic Enzyme Production and its Applications -- Molecular docking of Bacterial laccases for the decolourisation of Textile Reactive Azo dyes -- Enhancing the Structure of Cyber Risks in Cloud Environment using Cloud Forensics Technique -- Application of Artificial Intelligence in Public Health Care in India -- An Adaptive Channel Assignment Strategy for Multi-Radio Multi-Channel Wireless Mesh Networks with Mobile Nodes Based on Internet Traffic -- Multi-Standard Schema Based Classification of Geospatial Metadata in Spatial Data Infrastructures using Feature Weight Induced Probabilistic Learning Scheme -- Text Summarization of Multiple Documents using Binary Fruit Fly Optimization Algorithm.
Record Nr. UNINA-9910502971703321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui