The 11th International Conference on EUropean Transnational Educational (ICEUTE 2020) / / edited by Álvaro Herrero, Carlos Cambra, Daniel Urda, Javier Sedano, Héctor Quintián, Emilio Corchado |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
Descrizione fisica | 1 online resource (450 pages) |
Disciplina |
371.33
378.016 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Computational intelligence
Engineering—Data processing Education Computational Intelligence Data Engineering Education, general |
ISBN | 3-030-57799-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910733724103321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The 12th Conference on Information Technology and Its Applications : Proceedings of the International Conference CITA 2023 / / edited by Ngoc Thanh Nguyen, Hoa Le-Minh, Cong-Phap Huynh, Quang-Vu Nguyen |
Autore | Nguyen Ngoc Thanh |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (414 pages) |
Disciplina | 004 |
Altri autori (Persone) |
Le-MinhHoa
HuynhCong Phap NguyenQuang-Vu |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Engineering—Data processing
Computational intelligence Artificial intelligence Data Engineering Computational Intelligence Artificial Intelligence |
ISBN | 3-031-36886-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Conference Organization -- Contents -- Data Science and Artificial Intelligence -- A New ConvMixer-Based Approach for Diagnosis of Fault Bearing Using Signal Spectrum -- 1 Introduction -- 2 Related Work -- 2.1 Conv-Mixer Neural Networks -- 2.2 Siamese Neural Networks -- 3 Methodology -- 3.1 General Architecture for Failure Diagnosis -- 3.2 The Proposed Siamese-Based Conv-Mixer Model -- 3.3 Diagnosis Network -- 4 Experiment -- 4.1 Datasets -- 4.2 Training -- 4.3 Results -- 4.4 Comparison -- 5 Conclusion -- References -- Differentially-Private Distributed Machine Learning with Partial Worker Attendance: A Flexible and Efficient Approach -- 1 Introduction -- 1.1 Background -- 1.2 Our Contributions -- 1.3 Paper Organization -- 2 Preliminaries -- 3 Our Proposed Algorithm -- 4 Experiments -- 5 Conclusion -- References -- Building Legal Knowledge Map Repository with NLP Toolkits -- 1 Introduction -- 2 Legal Knowledge Maps -- 2.1 Modeling -- 2.2 Hierarchy of Legislation -- 2.3 Legal Ontology Design -- 2.4 Legal Knowledge Map Construction -- 3 Implementation -- 3.1 Materials -- 3.2 Vietnamese NLP Toolkits -- 3.3 Building VLegalKMaps as Linked Data -- 4 Validations -- 4.1 Experiment Setup -- 4.2 Case Study -- 4.3 Statistics and Discussions -- 5 Conclusions and Future Works -- References -- Classification of Ransomware Families Based on Hashing Techniques -- 1 Introduction -- 2 Overview of Hashing Techniques in Malware Analysis -- 3 The Proposed Method -- 3.1 The Combined Analysis Method of Imphash, File Level Ssdeep Hashing, and Section Level Ssdeep Hashing -- 3.2 Preparing the Database -- 3.3 Predictive Model -- 3.4 Evaluation Criteria -- 4 Evaluations and Results -- 4.1 Experiment with Test Set Containing only Ransomware -- 4.2 Experiment with Test Set Containing both Malicious and Benign Samples.
4.3 Advantages and Limitations of the Proposed Method -- 5 Conclusions -- References -- Towards a New Multi-tasking Learning Approach for Human Fall Detection -- 1 Introduction -- 2 Related Work -- 2.1 Simulated Falls -- 2.2 Real Falls -- 2.3 Multi-task Learning -- 2.4 Summary -- 3 Multi-task Deep Neural Network for Fall Detection -- 3.1 Multiple Classifiers -- 3.2 Temporal Convolutional Network as a Feature Extractor -- 3.3 Re-sampling for Class and Task Balance -- 3.4 Data Augmentation -- 4 Experiments -- 4.1 Datasets -- 4.2 Experiment Settings -- 4.3 Evaluation and Discussion -- 5 Conclusion and Future Work -- References -- A Comparative Study of Wrapper Feature Selection Techniques in Software Fault Prediction -- 1 Introduction -- 2 Related Work -- 3 Feature Selection -- 3.1 Software Metrics -- 3.2 Genetic Algorithm -- 3.3 Particle Swarm Optimization -- 3.4 Whale Optimization Algorithm -- 3.5 Cuckoo Search -- 3.6 Mayfly Algorithm -- 3.7 Binary Bat Algorithm -- 3.8 Feature Selection Details -- 4 Methodology -- 4.1 Proposed Approach -- 4.2 VanillaGAN for Handling Imbalanced Data -- 4.3 Dataset -- 4.4 Evaluation Measurement -- 5 Experimental Result -- 6 Conclusion -- References -- Incorporating Natural Language-Based and Sequence-Based Features to Predict Protein Sumoylation Sites -- 1 Introduction -- 2 Methodology -- 2.1 Data Preparation and Pre-processing -- 2.2 Feature Extraction and Encoding -- 2.3 Model Construction, Learning and Evaluation -- 3 Results and Discussion -- 3.1 Impact of Amino Acid Composition and Single Features -- 3.2 Impact of Hybrid Features -- 3.3 RSXSUMO Model Construction -- 3.4 Comparison with Other Predictors -- 4 Conclusion -- References -- A Model for Alliance Partner Selection Based on GM (1, 1) and DEA Frameworks - Case of Vietnamese Coffee Industry -- 1 Introduction -- 2 Related Works -- 2.1 Strategic Alliance. 2.2 Grey Forecasting Model -- 2.3 Data Envelopment Analysis -- 3 Proposal Research -- 4 Case Study -- 4.1 DMU Collection -- 4.2 Inputs and Outputs Selection -- 4.3 Forecast the Performance of All DMU by GM (1, 1) Model. -- 4.4 Analysis Performance Before Alliance -- 4.5 Analysis the Performance After Alliance -- 5 Conclusions -- References -- Car Detector Based on YOLOv5 for Parking Management -- 1 Introduction -- 2 Related Works -- 2.1 Traditional Machine Learning-Based Methods -- 2.2 CNN-Based Methods -- 3 Methodology -- 3.1 Proposed Network Architecture -- 3.2 Loss Function -- 4 Experiments -- 4.1 Datasets -- 4.2 Experimental Setup -- 4.3 Experimental Results -- 4.4 Ablation Study -- 5 Conclusion -- References -- Deep Learning-Based Approach for Automatic Detection of Malaria in Peripheral Blood Smear Images -- 1 Introduction -- 2 Related Works -- 3 Experiments -- 3.1 Data Collection -- 3.2 Exploratory Data Analysis -- 3.3 Two-Stage Approach -- 4 Results and Discussions -- 4.1 Evaluation Metrics -- 4.2 Results -- 5 Conclusion -- References -- An Improved Transfer Learning-Based Approach for Detecting Abnormal Cervical Cells from Pap Smear Microscopic Images -- 1 Introduction -- 2 Abnormal Cervical Cells and Preprocessing Data -- 2.1 Abnormal Cervical Cells -- 2.2 Exploratory Data Analysis and Preprocessing -- 3 Transfer Learning and Proposed Approach -- 3.1 ResNet50v2 -- 3.2 EfficientNetv2L -- 3.3 Proposed Approach Based on Transfer Learning -- 4 Experimental Results -- 5 Conclusion -- References -- Digital Economy -- Emotional Intelligence and Social Media Site Experiences' Effects on College Choice Behavior: The Mediating Role of Brand Attitude -- 1 Introduction -- 2 Theoretical Background and Hypotheses -- 2.1 Website Experiences and Emotional intelligence -- 2.2 The Attitude Toward Website Model - AWS Model. 2.3 The Research Model and Hypotheses -- 3 Research Method -- 4 Research Result -- 4.1 Descriptive Data Statistics -- 4.2 Reliability Test Results -- 4.3 Exploratory Factor Analysis (EFA) Results -- 4.4 Research Model Testing -- 5 Discussion -- 6 Conclusion -- References -- Image and Natural Language Processing -- A Multi Context Decoder-based Network with Applications for Polyp Segmentation in Colonoscopy Images -- 1 Introduction -- 2 Related Work -- 2.1 Vision Transformer -- 2.2 Fusion On Multi Resolution Feature Map -- 3 Methodology -- 3.1 Overview -- 3.2 Generate Context Feature Map (GCF) -- 3.3 Decoder Block -- 4 Experiments -- 4.1 Dataset -- 4.2 Evaluation Metrics -- 4.3 Implementation Details -- 4.4 Representative Results -- 4.5 Comparative Results -- 5 Conclusion -- References -- AMG-Mixer: A Multi-Axis Attention MLP-Mixer Architecture for Biomedical Image Segmentation -- 1 Introduction -- 2 Related Work -- 3 Proposed Network Architecture -- 3.1 AxialMBConv Token Mix and Mixer Building Block -- 3.2 Multi-scale Multi-axis MLP Gated (MS-MAMG) -- 3.3 Decoder Unit -- 4 Experiments -- 4.1 Datasets -- 4.2 Training Strategy -- 4.3 Evaluation Metrics -- 4.4 Representative Results -- 4.5 Comparative Results -- 5 Conclusion -- References -- Investigating YOLO Models for Rice Seed Classification -- 1 Introduction -- 2 Methodology -- 2.1 YOLOv5 -- 2.2 YOLOv6 -- 2.3 YOLOv7 -- 3 Experiments and Results -- 3.1 Data Description -- 3.2 Performance Indicator -- 3.3 Result and Discussion -- 4 Conclusion -- References -- Extending OCR Model for Font and Style Classification -- 1 Introduction -- 2 Related Works -- 3 Methods -- 3.1 Problem Formulation -- 3.2 Overview -- 3.3 Encoder -- 3.4 Decoder -- 3.5 Image-wise Font Clsasification -- 3.6 Style Classification -- 3.7 Loss Function -- 4 Experiments -- 4.1 Experiment Setting -- 4.2 Benchmarks. 4.3 Experiment Result and Discussion -- 5 Conclusion -- References -- STG-SimVP: Spatiotemporal GAN-Based SimVP for Video Prediction -- 1 Introduction -- 2 Related Work -- 2.1 Video Frame Synthesis -- 2.2 Generative Adversarial Networks - GAN -- 2.3 SimVP -- 3 Proposed Methods -- 3.1 STG-SimVP -- 3.2 Dual Discriminators -- 3.3 Objective Function -- 4 Experiments -- 4.1 Datasets -- 4.2 Training Details -- 4.3 Comparisons With State-of-the-Art Methods -- 5 Ablation Study -- 6 Limitations -- 7 Conclusion -- References -- Tritention U-Net: A Modified U-Net Architecture for Lung Tumor Segmentation -- 1 Introduction -- 2 Tritention U-Net Architechture (TU-Net) -- 2.1 Architechture Overview -- 2.2 Backbone U-Net Architecture -- 2.3 Tritention Gate -- 3 Experimental and Results -- 3.1 Dataset -- 3.2 Experimental Setup -- 3.3 Results -- 4 Conclusion -- References -- Multi-modal with Multiple Image Filters for Facial Emotion Recognition -- 1 Introduction -- 2 Multiple Filter Levels for FER -- 2.1 Multiple Model -- 2.2 Dropping Pixels - Processor -- 2.3 Blurring Image - Processor -- 3 Experimental and Results -- 3.1 Dataset -- 3.2 Experimental Setup -- 3.3 Results -- 4 Conclusion -- References -- Few-Shots Novel Space-Time View Synthesis from Consecutive Photos -- 1 Introduction -- 2 Related Work -- 3 Proposed Methods -- 3.1 Background: Neural Scene Flow Fields (NSFF) -- 3.2 NSFF with Encoder -- 4 Experiments -- 4.1 Implement Details -- 4.2 Evaluations -- 5 Limitations -- 6 Conclusion -- References -- Information Technology Skills Extractor for Job Descriptions in vku-ITSkills Dataset Using Natural Language Processing -- 1 Introduction -- 2 Preliminary -- 3 Construct IT Skills Dictionary and vku-ITSkills Dataset -- 4 The Proposed NLP Pipeline for IT Skills Extractor -- 4.1 Tokenizer -- 4.2 Transformers Based Token Embedding. 4.3 Part of Speech (POS) Tagging, Noun Phrases and Combination Rules. |
Record Nr. | UNINA-9910736019003321 |
Nguyen Ngoc Thanh
![]() |
||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
13th International Conference on Information Systems and Advanced Technologies “ICISAT 2023” : New Trends in Artificial Intelligence, Computing and Decision Making. Volume 2 / / edited by Mohamed Ridda Laouar, Valentina Emilia Balas, Vincenzo Piuri, Dana Rad, Zineb Touati Hamad, Abbas Cheddad |
Autore | Laouar Mohamed Ridda |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (203 pages) |
Disciplina | 006.3 |
Altri autori (Persone) |
BalasValentina Emilia
PiuriVincenzo RadDana Touati HamadZineb CheddadAbbas |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Computational intelligence
Engineering - Data processing Computational Intelligence Data Engineering |
ISBN | 3-031-60594-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Contents -- Perspectives of TinyML-Based Self-management in IoT-Based Systems -- 1 Introduction -- 2 Background Information -- 2.1 Self-management -- 2.2 IoT-Based Systems -- 3 Self-management Issues in IoT-Based Systems -- 3.1 Increasing Complexity of IoT Software Systems -- 3.2 Challenges Specific to Self-management of IoT-Based Systems -- 4 Needs and Requirements for an Effective Self-management Solution -- 5 TinyML -- 5.1 Definition -- 5.2 Fundamental Principles of TinyML -- 6 TinyML-Based Self-management for IoT-Based Systems -- 6.1 Motivations -- 6.2 Current Limitations -- 7 Future Prospects and Opportunities -- 7.1 Evolution of TinyML and Related Techniques -- 7.2 Integrating TinyML into Existing IoT Management Architectures -- 7.3 Practical Implications and Potential Applications -- 8 Conclusion -- References -- Blockchain Technology for Absence Tracking -- 1 Introduction and Related Works -- 2 Preliminaries -- 2.1 Principale of Blockchain Technology -- 2.2 Smart Contracts -- 2.3 Transaction -- 2.4 Wallet -- 3 Our Approach -- 3.1 Global Architecture of Our System -- 4 Experimentation -- 5 Discussion -- 6 Conclusion -- References -- Deep Neural Network Binary Classification for Malware Detection: A Parametric Study -- 1 Introduction -- 2 Malware Detection Techniques -- 3 State of the Art -- 4 Datasets -- 5 Used Deep Learning Architecture -- 6 Results and Discussion -- 7 Conclusion and Perspectives -- References -- An Overview of Formal Verification of Network-on-Chip (NoC) Methods -- 1 Introduction -- 2 Network on Chip Architecture -- 3 Network on Chip and Formal Verification -- 4 Related Works -- 5 Conclusion -- References -- Image Classification Using a Deep Convolutional Neural Network -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 4 Experimental Results -- 5 Conclusion -- References.
Handwriting Recognition Using HOG and Gabor Features -- 1 Introduction -- 2 Related Works -- 3 Proposed Methods -- 4 Experimental Results -- 5 Conclusions -- References -- Application of Faster-RCNN with Detectron2 for Effective Breast Tumor Detection in Mammography -- 1 Introduction -- 2 Related Works -- 3 Method -- 3.1 Data Preparation and Augmentation -- 3.2 Detection Model -- 4 Experiment and Results -- 4.1 Dataset -- 4.2 Dataset Preprocessing -- 4.3 Evaluation and Performance -- 4.4 Our Model -- 4.5 Results and Discussion -- 5 Conclusion -- References -- Explaining Machine Learning Based Speed Anomaly Detection System Using eXplainable Artificial Intelligence -- 1 Introduction -- 2 Related Literature Review -- 3 The Proposed Method -- 3.1 The System Model -- 3.2 Dataset Description -- 3.3 The Methodology -- 4 Results and Discussion -- 4.1 Comparisons Between Classifiers -- 4.2 Comparison with Recent Works in the Literature -- 4.3 Explanation -- 5 Conclusion and Future Work -- References -- Enhanced CNN Architecture with Comprehensive Performance Metrics for Emotion Recognition -- 1 Introduction -- 2 Literature Survey -- 2.1 CNN Approach for Emotion Recognition via EEG -- 2.2 Real-Time Evaluation Algorithm for Noncontact Heart Rate Variability Monitoring -- 2.3 System of Emotion Recognition and Judgment and Its Application in Adaptive Interactive Game -- 2.4 Dual-Branch Dynamic Graph Convolution Based Adaptive Transformer Feature Fusion Network for EEG Emotion Recognition -- 2.5 Adaptive Gamification in Science Education -- 3 Problem Statement -- 4 Proposed Methodology -- 5 Result -- 6 Conclusion -- References -- Pelican Search Optimization for MANETs Routing -- 1 Introduction -- 2 Related Works -- 3 Proposed Approach AODVPE -- 3.1 Source of Inspiration -- 4 Implementation and Experimental Results -- 4.1 Implementation Details. 4.2 Results and Discussion -- 5 Discussion -- 6 Conclusion -- References -- Detection of Obstructive Sleep Apnea Based on Deep Learning Models from ECG Signals: A Review -- 1 Introduction -- 2 Methodology -- 2.1 Datasets -- 2.2 Preprocessing and Segmentation -- 2.3 Deep Learning Architectures -- 2.4 Performance Metrics -- 3 Deep Learning Techniques for OSA Detection -- 4 Discussion -- 5 Conclusion -- References -- MPPT Controller Based on Adaptive Pid Based on Programmed Gains for Maximum Power Point Tracking in a Photovoltaic Power Plant with a Battery Load -- 1 Introduction -- 2 General Diagram of the PV System -- 3 General Diagram of the PV System -- 3.1 Mathematical Model -- 4 Simulink Library Model -- 4.1 Design of DC/DC Step-Down Converter (Buck) -- 4.2 Adaptive PID Controller with Programmed Gains -- 5 Controller Performance Indexes -- 5.1 PV Module Validation -- 6 Results -- 7 Conclusions -- References -- Optimal Reconfiguration of Electric Power Distribution Networks -- 1 Introduction -- 2 Methodology -- 2.1 Distribution Network Reconfiguration Model -- 2.2 Methodology for Optimal Distribution Network Reconfiguration -- 2.3 Final Model -- 3 Results -- 3.1 Discussion Analysis -- 4 Conclusions -- References -- QFANet: A New Communication Model Base on Tree Architecture for Flying Ad Hoc Networks -- 1 Introduction -- 2 Related Work -- 2.1 Centralized Architecture -- 2.2 Satellite Architecture -- 2.3 Cellular Architecture -- 2.4 Single Group Ad Hoc Architecture -- 2.5 Multi-group UAVs Ad Hoc Architecture -- 2.6 Multi Layers UAVs Ad Hoc Architecture -- 3 The Proposed Communication Model QFANet -- 4 Simulation -- 5 Conclusion -- References -- VAAD: A VAE Based Anomaly Detection Approach for Smart Grids -- 1 Introduction -- 2 Literature Review -- 2.1 Traditional Approaches -- 2.2 Machine Learning in Anomaly Detection. 2.3 Variational Autoencoders (VAEs) -- 2.4 Context-Aware Anomaly Detection -- 3 Proposed VAAD Approach -- 3.1 Data Preprocessing -- 3.2 Variational Autoencoder Architecture -- 3.3 Contextual and Temporal Integration -- 3.4 Noise-Tolerant Concept Drift Detection -- 3.5 Anomaly Identification -- 4 Case Study -- 4.1 Dataset Description -- 4.2 Results -- 4.3 Discussion -- 5 Conclusion -- References -- DNA Data Encoding and Compression Using Image Compression Algorithms -- 1 Introduction -- 2 Literature Review -- 2.1 DNA Compression -- 2.2 Applications of DNA Compression -- 2.3 DNA Sequencing -- 3 Image-Based DNA Encoding -- 4 Conclusion -- References -- Generalized Multistage Feature for Deep Age Estimation from a Human Face Image -- 1 Introduction -- 2 State of the Art -- 3 Proposed System -- 3.1 Preprocessing -- 3.2 Face Features Extraction -- 3.3 Dimensionality Reduction -- 3.4 Robust Regression Step -- 4 Experimental Framework -- 4.1 Databases -- 4.2 Evaluation Protocol -- 4.3 Experımental Results -- 5 Conclusion -- References -- Enhancing Intrusion Detection Systems Through Simultaneous Feature Selection and Hyperparameter Tuning -- 1 Introduction -- 2 Related Works -- 3 Proposed Approach -- 3.1 Representation of Individuals/population -- 3.2 Fitness Evaluation -- 4 Experiments and Results -- 4.1 Dataset -- 4.2 Experiments -- 4.3 Evaluation Metrics -- 4.4 Experimental Results -- 5 Conclusion -- References -- A Hybrid Genetic Algorithm for Hierarchical Routing in Wireless Sensor Networks -- 1 Introduction -- 2 Literature Review -- 3 Proposed Approach -- 3.1 General Description and Objectives of the GF Scheme -- 4 Experimental Analysis -- 4.1 Simulation Step -- 4.2 Results and Discussion -- 5 Conclusion -- References -- Energy-Aware LEACH: A Weighted Metric Approach for Dynamic Cluster Head Selection in WSN -- 1 Introduction. 1.1 LEACH Protocol Overview -- 1.2 Contributions to This Paper -- 1.3 Energy Model -- 1.4 Assumptions -- 2 Related Works -- 3 Proposed Work -- 3.1 Cluster Head Selection Approach -- 4 Implementation and Experimental Results -- 4.1 Performance Metrics -- 5 Conclusion -- References -- Author Index. |
Record Nr. | UNINA-9910878055903321 |
Laouar Mohamed Ridda
![]() |
||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021) / / edited by Juan José Gude Prego, José Gaviria de la Puerta, Pablo García Bringas, Héctor Quintián, Emilio Corchado |
Edizione | [1st ed. 2022.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
Descrizione fisica | 1 online resource (430 pages) |
Disciplina | 006.3 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Computational intelligence
Engineering—Data processing Computational Intelligence Data Engineering |
ISBN | 3-030-87872-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | BIECO Runtime Auditing Framework -- Basic aspects in redundancy-based intrusion tolerance -- A Survey on the State of the Art of Vulnerability Assessment Techniques -- Comparison of Safety and Security analysis techniques -- Longitudinal study of grades for the Industrial Electronics and Automation Engineering degree programme -- Analysis of students' online interactions in the Covid era from the perspective of anomaly detection -- Evaluation of e-learning criteria to improve the academic and functional results of PhD studies -- Development of competencies applying the project method. Application in environmental engineering -- Bioengineering as a strategy for the consolidation of innovation and technological development processes in the central zone of Colombia -- Challenges and competences in Master Degrees from a Comprehensive Security perspective. |
Record Nr. | UNINA-9910733725203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
2020 International Conference on Applications and Techniques in Cyber Intelligence : Applications and Techniques in Cyber Intelligence (ATCI 2020) / / edited by Jemal H. Abawajy, Kim-Kwang Raymond Choo, Zheng Xu, Mohammed Atiquzzaman |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
Descrizione fisica | 1 online resource (1,162 pages) : illustrations |
Disciplina | 005.8 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Engineering - Data processing
Computational intelligence Data Engineering Computational Intelligence |
ISBN | 3-030-53980-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Combination of Information Technology and College English in the Age of Media -- The Application of Computer Internet of Things in Modern Agricultural Planting Management -- The Influencing Factors Analysis of Network Interactive Teaching Mode Validity -- The Application Analysis of Computer Network Security Data Encryption Technology -- The Application of Computer Technology in Sports Training and Competition -- The Application of BIM Technology in Landscape Garden Engineering Projects -- College Physical Education Based on Multimedia Network Teaching Platform -- Development and Implementation of Health Information Management Platform in Medical Institutions -- Teaching Methods of University Economic Management Course Based on Python -- Innovative Application Paths of Big Data of Automobile Based on Internet of Vehicles. |
Record Nr. | UNINA-9910483970303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy [[electronic resource] ] : SPIoT-2020, Volume 1 / / edited by John MacIntyre, Jinghua Zhao, Xiaomeng Ma |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
Descrizione fisica | 1 online resource (XXXI, 884 p. 221 illus., 150 illus. in color.) |
Disciplina | 620.00285 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Engineering—Data processing
Cooperating objects (Computer systems) Computational intelligence Machine learning Big data Data Engineering Cyber-Physical Systems Computational Intelligence Machine Learning Big Data |
ISBN | 3-030-62743-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910483068103321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy [[electronic resource] ] : SPIoT-2020, Volume 2 / / edited by John MacIntyre, Jinghua Zhao, Xiaomeng Ma |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
Descrizione fisica | 1 online resource (XXXII, 863 p. 222 illus., 128 illus. in color.) |
Disciplina | 004.678 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Engineering—Data processing
Cooperating objects (Computer systems) Computational intelligence Machine learning Big data Data Engineering Cyber-Physical Systems Computational Intelligence Machine Learning Big Data |
ISBN | 3-030-62746-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910483082303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy : SPIoT-2020, Volume 2 / / edited by John MacIntyre, Jinghua Zhao, Xiaomeng Ma |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Springer International Publishing, 2021 |
Descrizione fisica | 1 online resource (XXXII, 863 p. 222 illus., 128 illus. in color.) |
Disciplina | 004.678 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Engineering—Data processing
Cooperating objects (Computer systems) Computational intelligence Machine learning Big data Data Engineering Cyber-Physical Systems Computational Intelligence Machine Learning Big Data |
ISBN | 3-030-62746-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910863143603321 |
Springer International Publishing, 2021 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy : SPIoT-2020, Volume 1 / / edited by John MacIntyre, Jinghua Zhao, Xiaomeng Ma |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Springer International Publishing, 2021 |
Descrizione fisica | 1 online resource (XXXI, 884 p. 221 illus., 150 illus. in color.) |
Disciplina | 620.00285 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Engineering—Data processing
Cooperating objects (Computer systems) Computational intelligence Machine learning Big data Data Engineering Cyber-Physical Systems Computational Intelligence Machine Learning Big Data |
ISBN | 3-030-62743-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910863143703321 |
Springer International Publishing, 2021 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The 2021 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy : SPIoT-2021 Volume 2 / / edited by John Macintyre, Jinghua Zhao, Xiaomeng Ma |
Edizione | [1st ed. 2022.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
Descrizione fisica | 1 online resource (999 pages) |
Disciplina | 006.3 |
Collana | Lecture Notes on Data Engineering and Communications Technologies |
Soggetto topico |
Engineering - Data processing
Cooperating objects (Computer systems) Computational intelligence Big data Artificial intelligence Data Engineering Cyber-Physical Systems Computational Intelligence Big Data Artificial Intelligence |
ISBN | 3-030-89511-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Analysis of Sentiment Tendency of Tourists' Comments Based on Text Mining -- Analysis of Smart City Construction Based on 5G Data Technology -- Prediction of Stock Price Based on Artificial Intelligence Algorithm -- Variation Translation Strategy System of Intangible Cultural Heritage Based on Data Mining -- A Computer-aided Comparative Study on Grammatical Cohesion in Abstracts of Sci-tech Journal Papers by Chinese and American Scholars -- Computer Graphics and Image Software in Advertising Design -- Design and Research of Production Information Management System for Project Based Mechanical Manufacturing Enterprises -- Impact of Computer Network Technology on Regional Economic Development -- Chaos Algorithm of Electrical Control System Based on Neural Network Technology -- Pulse Signal Acquisition System Based on Match Pursuit Algorithm -- Data Analysis of Power System Engineering Construction Based on PPSO Algorithm -- Reactive Optimization of Power System Based on K-means Algorithm -- Design and Structure Analysis of Manipulator based on Acceleration Sensor -- Discussion on Decision Tree Algorithm in University Teaching Management System. . |
Record Nr. | UNINA-9910523725703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|