.. Annual International Conference on Energy Aware Computing Systems and Applications |
Pubbl/distr/stampa | Piscataway, NJ : , : IEEE |
Disciplina | 004 |
Soggetto topico | Computer systems |
Soggetto genere / forma | Conference papers and proceedings. |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996280617703316 |
Piscataway, NJ : , : IEEE | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
.. Annual International Conference on Energy Aware Computing Systems and Applications |
Pubbl/distr/stampa | Piscataway, NJ : , : IEEE |
Disciplina | 004 |
Soggetto topico | Computer systems |
Soggetto genere / forma | Conference papers and proceedings. |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910625163003321 |
Piscataway, NJ : , : IEEE | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
.. International Symposium on Computing and Networking |
Pubbl/distr/stampa | Piscataway, NJ : , : IEEE, , [2013]- |
Disciplina | 004 |
Soggetto topico |
Electronic data processing - Distributed processing
Computer networks Computer systems |
Soggetto genere / forma | Conference papers and proceedings. |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996280236103316 |
Piscataway, NJ : , : IEEE, , [2013]- | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
.. International Symposium on Computing and Networking |
Pubbl/distr/stampa | Piscataway, NJ : , : IEEE, , [2013]- |
Disciplina | 004 |
Soggetto topico |
Electronic data processing - Distributed processing
Computer networks Computer systems |
Soggetto genere / forma | Conference papers and proceedings. |
ISSN | 2379-1888 |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti |
CANDAR ..
Proceedings Computing and Networking (CANDAR), ... International Symposium on |
Record Nr. | UNINA-9910625184403321 |
Piscataway, NJ : , : IEEE, , [2013]- | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
.. International Symposium on Computing and Networking |
Pubbl/distr/stampa | Piscataway, NJ : , : IEEE, , [2013]- |
Disciplina | 004 |
Soggetto topico |
Electronic data processing - Distributed processing
Computer networks Computer systems |
Soggetto genere / forma | Conference papers and proceedings. |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910873653103321 |
Piscataway, NJ : , : IEEE, , [2013]- | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
12th International Conference on Information Systems and Advanced Technologies "ICISAT 2022" : intelligent information, data science and decision support system / / Mohamed Ridda Laouar [and four others] editors |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2023] |
Descrizione fisica | 1 online resource (586 pages) |
Disciplina | 006.3 |
Collana | Lecture notes in networks and systems |
Soggetto topico |
Computational intelligence
Computer systems |
ISBN | 3-031-25344-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Contents -- Modelling of Propagation Loss for Single Trees Using Simulated Coppice at Microwave Frequencies -- 1 Introduction -- 2 Measurement Details -- 3 Conclusion -- References -- A New Collective Simulated Annealing with Adapted Objective Function for Web Service Selection -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Experimentation -- 5 Case Study -- 6 Conclusion -- References -- An Image Encryption-Based Method for Handwritten Digit Recognition -- 1 Introduction -- 2 Related Works -- 3 Image Encryption Systems -- 3.1 RSA Encryption -- 3.2 ECC Encryption -- 3.3 Chaos Encryption -- 3.4 Knight Encryption -- 3.5 Arnold Encryption -- 3.6 Joseph Encryption -- 4 Proposed Method -- 5 Experimentation and Results -- 6 Conclusion and Perspectives -- References -- The Malaysian Higher Education Students' Perceptions and Acceptance Toward Mobile Learning During the COVID-19 Pandemic -- 1 Introduction -- 1.1 Mobile Learning in Malaysia During the COVID-19 Pandemic -- 2 Purpose and Objectives of the Study -- 3 The Conceptual Framework -- 4 Methodology -- 5 Results and Discussion -- 5.1 Respondent Profile -- 5.2 Perceptions of Mobile Technology Adoption -- 5.3 Mobile Learning Perceptions and Acceptance During the COVID-19 Pandemic -- 5.4 Open-Ended Items -- 6 Conclusion -- References -- Face Masks Use and Face Perception: Social Judgments and Emotion Recognition -- 1 Introduction -- 2 Key Parameters -- 2.1 Sex Recognition -- 2.2 Age Estimation -- 2.3 Trustworthiness -- 2.4 Attractiveness -- 2.5 Approachability -- 2.6 Emotion Perception -- 3 The Current Study -- 3.1 Participants -- 3.2 Materials and Stimuli -- 4 Design -- 4.1 Procedure -- 4.2 Data Analysis -- 5 Results -- 5.1 Experiment 1 -- 5.2 Experiment 2 -- 6 Discussion -- References.
Bibliometric Analysis of Research Publication Trends on the ICT Use in Government Institutions from 2015-2022 -- 1 Introduction -- 2 Literature Review -- 2.1 Use ICT in Government -- 2.2 Bibliometrics Analysis -- 3 Research Methods -- 4 Finding and Discussion -- 4.1 Analysis of Global Publication -- 4.2 Mapping of Co-occurrences Analysis -- 4.3 Topic Classification and Theme Descriptions -- 5 Conclusion -- References -- A Paring-Free ID-Based Authenticated Key Agreement Protocol for IoT Environment -- 1 Introduction -- 1.1 Motivation -- 1.2 Outline of Paper -- 2 Related Work -- 3 Technical Background -- 3.1 Diffie Hellman Key Agreement Protocol -- 3.2 Elliptic Curve Cryptography -- 3.3 ECDL Hard Problem -- 3.4 Computational Diffie-Hellman Hard (CDHP) Problem -- 3.5 Identity-Based Encryption -- 4 Proposed Scheme -- 4.1 Setup -- 4.2 Private Key Extraction -- 4.3 Session Key Agreement -- 5 Security Analysis -- 5.1 MITM Attack -- 5.2 Known Provisionally Information Attack -- 5.3 Known Key Attack -- 5.4 Perfect Forward Security -- 5.5 PKG Forward Security -- 5.6 No Key Dominant -- 5.7 Replication and Unidentified Key Share Attack -- 6 Conclusion -- References -- Intention to Use Hackathon by Information Technology Programming Students -- 1 Introduction -- 2 Literature Review -- 3 Research Methodology -- 3.1 Material, Methods, Research Population and Sample -- 3.2 Instrument Development and Research Hypothesis -- 4 Results and Discussion -- 4.1 Reliability Analysis -- 4.2 Factor Analysis -- 4.3 Level of Hackathon Acceptance -- 4.4 Correlation Analysis -- 5 Conclusion, Recommendation, and Future Studies -- References -- Clustering Algorithms for Wireless Sensor Networks: A Review -- 1 Introduction -- 2 Overview on Clustering Mechanism -- 3 Analysis of Relevant Clustering Algorithms in WSNs -- 3.1 Literature Review. 3.2 Classification of Clustering Techniques -- 4 Comparison Between Some Relevant Clustering Algorithms -- 5 Conclusion -- References -- Vision Sensor Surveillance for Online Stationary Object Detection Based on Basic Sequential Clustering -- 1 Introduction -- 2 Method Schema -- 3 Background Model and Foreground Estimation -- 4 Stationary Luggage Detection -- 4.1 Stationary Object Detection -- 4.2 MRF Framework -- 4.3 Stationary Human Event Elimination -- 5 Experimental Results -- 6 Conclusion -- References -- A Fuzzy Navigation Approach Using the Intelligent Lights Algorithm for an Autonomous Mobile Robot -- 1 Introduction -- 2 Related Works -- 2.1 Smarts Light Control System -- 2.2 Fuzzy Logic -- 2.3 Bee Colony Optimization (BCO) -- 2.4 Artificial Bee Colony -- 2.5 Neural Network -- 2.6 Particle Swarm Optimization -- 2.7 Genetic Algorithm -- 3 Methodology -- 3.1 The Smart Lights Control System -- 3.2 Discussion -- 4 Conclusion -- References -- Emotion Analysis of Social Media Content for Mental Health Improvement -- 1 Introduction -- 1.1 Anxiety -- 1.2 Stress -- 1.3 Depression -- 1.4 Loneliness -- 1.5 Eating Disorders -- 2 Overview -- 3 Methodology -- 3.1 Data Preprocessing -- 3.2 Sentiment Analysis of Tweet Content -- 3.3 Emotion Analysis of Tweet Content -- 4 Discussion -- 5 Limitations -- 6 Conclusion and Perspectives -- References -- Named Entity Recognition for Algerian Arabic Dialect in Social Media -- Abstract -- 1 Introduction -- 2 Algerian Dialect: Overview and Specificities -- 3 Related Work -- 4 Methodology -- 5 Arabic Pre-trained Models -- 5.1 AraBERT -- 5.2 MARBERT -- 5.3 ARBERT -- 5.4 DziriBERT -- 5.5 mBERT -- 6 Experiments -- 6.1 Dataset -- 6.2 Experimentation Setup -- 7 Results -- 8 Discussion -- 9 Conclusion -- References -- Protection of Nurse-Sys Platform from Man-In the Middle Attacks -- 1 Introduction. 2 Hardware Design and Testing -- 3 Neuro-Fuzzy Modeling -- 4 Attack Session Hijacking -- 5 Results and Discussion -- 5.1 Temperature Sensor Design -- 5.2 Analyzing Data in Server -- 6 Conclusion -- References -- On the Effectiveness of Dimensionality Reduction Techniques on High Dimensionality Datasets -- 1 Introduction -- 2 Materials and Method -- 2.1 Related Works -- 2.2 Data Normalization -- 2.3 Dimensionality Reduction Methods -- 3 Dataset Evaluation -- 4 Results and Discussion -- 5 Conclusion -- References -- Industries Application of Type-2 Fuzzy Logic -- 1 Introduction -- 2 T2FL is Used in Pattern Classification -- 3 T2FL is Used in the Classification -- 4 T2FL is Used in Intelligent Control -- 5 T2FL is Used in Other Regions of Use -- 5.1 Assembly Plants and Companies are Standard Techniques -- 5.2 Uses in the Manufacturing and Service Sectors -- 5.3 Uses Relating to Communication and Technologies -- 6 A Broad Review of the Industry and Its Prospects -- 7 Discussion -- 8 Conclusion -- References -- New Research Methodology to Analyze Time Series and Correlations' Reliability -- 1 Introduction -- 2 The Framework -- 2.1 CReMIT Module -- 2.2 Analysis Module (AM) -- 2.3 Random Correlations (RC) -- 3 Implementation of the Framework -- 4 Conclusion -- References -- A Comparative Study of Filter Feature Selection Methods on Microarray Data -- 1 Introduction -- 2 Related Works -- 3 Methods and Materials -- 3.1 ReliefF -- 3.2 Chi-Square -- 3.3 Mutual Information -- 3.4 Fisher Score -- 3.5 F-Score -- 3.6 Laplacian Score -- 3.7 Conditional Mutual Information Maximization (CMIM) -- 3.8 Minimum Redundancy Maximum Relevance -- 4 Results and Discussion -- 4.1 Datasets -- 5 Conclusion -- References -- Glaucoma Detection Using Optimal Batch Size for Transfer Learning and Ensemble Model Techniques -- 1 Introduction -- 2 Related Works -- 2.1 Pre-trained CNN. 2.2 Generative Models -- 3 Contribution of the Paper -- 4 Method Overview -- 4.1 Pre-processing -- 4.2 Fine-Tuned Models -- 4.3 Batch Size Optimization -- 4.4 Ensemble Models -- 5 Experimental Results -- 5.1 Datasets Presentation -- 5.2 Method Performance -- 5.3 Training Time and Accuracy Comparison -- 5.4 Comparative Results -- 6 Discussions -- 7 Conclusion -- References -- A Semantic Interoperability Approach for Heterogeneous Meteorology Big IoT Data -- 1 Introduction -- 2 Related Work -- 3 Approach Overview -- 3.1 BID Sensing Module -- 3.2 BID Semantic Module -- 3.3 BID Cloud Module -- 4 Use Case and Implementation -- 4.1 Analysis of Collected Data -- 4.2 Creation and Population of the SWR Ontology -- 4.3 Querying the KB and Viewing Data -- 4.4 Publication of SWR on LOD Cloud -- 4.5 Using SWR on the Web -- 5 Conclusion and Future Work -- References -- Delineation of Raining Cloud Using a WkNN from Multispectral Data of SEVIRI Radiometer -- 1 Introduction -- 2 Region of Study and Data -- 2.1 Region of Study -- 2.2 The Data -- 3 Methodology -- 3.1 Application -- 4 Results and Discussion -- 5 Conclusions -- References -- Water Quality Monitoring Systems for Sub-saharan Africa: Towards an Effectiveness Framework -- 1 Introduction -- 2 Background -- 3 Effectiveness Framework -- 4 Research Design and Methodology -- 5 Findings and Discussion -- 5.1 In Situ Water Quality Monitoring Systems (In Situ) -- 5.2 Wireless Sensor Network Water Quality Monitoring Systems (WSN) -- 5.3 IoT and Cloud Computing Smart Water Quality Monitoring Systems (SWQMS) -- 5.4 Summary of Findings -- 6 Conclusion -- References -- Insect Recognition and Classification Using Optimized Densely Connected Convolutional Neural Network -- 1 Introduction -- 2 Literature Review -- 2.1 Automated Insect Species Identification Models -- 2.2 Local Feature Based Insect Recognition. 2.3 Combination Model. |
Altri titoli varianti | Twelfth International Conference on Information Systems and Advanced Technologies "ICISAT 2022" |
Record Nr. | UNINA-9910647785303321 |
Cham, Switzerland : , : Springer, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
2005 IEEE Systems & Information Engineering Design Symposium : University of Virginia |
Pubbl/distr/stampa | [Place of publication not identified], : Dept of Systems and Information Engineering University of Virginia, 2005 |
Disciplina | 003 |
Soggetto topico |
Systems engineering
System design Computer systems Mechanical Engineering Engineering & Applied Sciences Industrial & Management Engineering |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996206258803316 |
[Place of publication not identified], : Dept of Systems and Information Engineering University of Virginia, 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
2005 IEEE Systems & Information Engineering Design Symposium : University of Virginia |
Pubbl/distr/stampa | [Place of publication not identified], : Dept of Systems and Information Engineering University of Virginia, 2005 |
Disciplina | 003 |
Soggetto topico |
Systems engineering
System design Computer systems Mechanical Engineering Engineering & Applied Sciences Industrial & Management Engineering |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910872449703321 |
[Place of publication not identified], : Dept of Systems and Information Engineering University of Virginia, 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
2006 IEEE International Conference on Computer Systems and Applications : Sharjah, United Arab Emirates : March 8-11, 2006 |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE, 2006 |
Disciplina | 004 |
Soggetto topico |
Computer systems
Software engineering Computer networks Mobile communication systems Engineering & Applied Sciences Computer Science |
ISBN | 1-5090-9448-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996207689103316 |
[Place of publication not identified], : IEEE, 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
2006 IEEE International Conference on Computer Systems and Applications : Sharjah, United Arab Emirates : March 8-11, 2006 |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE, 2006 |
Disciplina | 004 |
Soggetto topico |
Computer systems
Software engineering Computer networks Mobile communication systems Engineering & Applied Sciences Computer Science |
ISBN | 1-5090-9448-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910145624803321 |
[Place of publication not identified], : IEEE, 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|