top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020) / / edited by Álvaro Herrero, Carlos Cambra, Daniel Urda, Javier Sedano, Héctor Quintián, Emilio Corchado
13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020) / / edited by Álvaro Herrero, Carlos Cambra, Daniel Urda, Javier Sedano, Héctor Quintián, Emilio Corchado
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (xvii, 472 pages) : illustrations
Disciplina 005.8
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computational intelligence
Engineering - Data processing
Data protection
Computational Intelligence
Data Engineering
Data and Information Security
ISBN 3-030-57805-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910863154003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
6G Cyber Security Resilience: Trends and Challenges / / edited by H. L. Gururaj, VinayaKumar Ravi, J. Shreyas, N. Pavithra, R. Sapna
6G Cyber Security Resilience: Trends and Challenges / / edited by H. L. Gururaj, VinayaKumar Ravi, J. Shreyas, N. Pavithra, R. Sapna
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (VIII, 262 p. 60 illus., 54 illus. in color.)
Disciplina 005.8
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Data protection
Artificial intelligence
Quantum computers
Security systems
Data and Information Security
Artificial Intelligence
Quantum Computing
Security Science and Technology
ISBN 3-031-85008-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Analysis and Comparison of Various Steganography Methods for secure 6G communication -- Image Encryption in the Compressed Domain using Autoencoders for 6G communication -- The Security Design and Challenges of 6G Architecture -- Cyber Security technologies for Privacy in 6G Networks -- Advancements in AI and ML for Enhanced Security and Performance in 6G Networks -- ML-Driven Secure Communication for Next-Generation 6G Networks -- Building a Better Network: The Promising Future of 6G Technology Applications and Challenges -- Building a Better Network: The Promising Future of 6G Technology Applications and Challenges -- Blockchain and Distributed Ledger Technology for 6G Security -- 6G Cyber Security Resilience: Trends and Challenges -- IoT and Edge Computing Security: Essential Aspects of 6G Networks -- Enhancing Cyber security in 6G Networks with Federated Learning for Collaborative Threat Mitigation -- Federated Learning for Enhancing Cybersecurity in IoT-Integrated 6G Networks: Challenges, Opportunities, and Future Directions.
Record Nr. UNINA-9911007469103321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
70 Tips and Tricks for Mastering the CISSP Exam / / by R. Sarma Danturthi
70 Tips and Tricks for Mastering the CISSP Exam / / by R. Sarma Danturthi
Autore Danturthi R. Sarma
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2020
Descrizione fisica 1 online resource (XXII, 357 p. 11 illus.)
Disciplina 005.8
Soggetto topico Data protection
Data and Information Security
ISBN 1-4842-6225-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Security and Risk Management -- Chapter 2. Asset Security -- Chapter 3. Security Engineering -- Chapter 4. Communications and Network Security -- Chapter 5. Identity and Access Management -- Chapter 6. Security Assessment and Testing -- Chapter 7. Security Operations -- Chapter 8. Software Development Security -- Chapter 9: Practice Test.
Record Nr. UNINA-9910427046803321
Danturthi R. Sarma  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced ASP.NET Core 3 Security : Understanding Hacks, Attacks, and Vulnerabilities to Secure Your Website / / by Scott Norberg
Advanced ASP.NET Core 3 Security : Understanding Hacks, Attacks, and Vulnerabilities to Secure Your Website / / by Scott Norberg
Autore Norberg Scott
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2020
Descrizione fisica 1 online resource (XX, 405 p. 30 illus.)
Disciplina 005.8
Soggetto topico Microsoft software
Microsoft .NET Framework
Data protection
Microsoft
Data and Information Security
ISBN 1-4842-6014-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Introducing ASP.NET Core -- Chapter 2: General Security Concepts -- Chapter 3: Cryptography -- Chapter 4: Web Security Concepts -- Chapter 5: Understanding Common Attacks -- Chapter 6: Processing User Input -- Chapter 7: Authentication and Authorization -- Chapter 8: Data Access and Storage. - Chapter 9: Logging and Error Handling -- Chapter 10: Setup and Configuration -- Chapter 11: Secure Application Life Cycle Management.
Record Nr. UNINA-9910427050303321
Norberg Scott  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced ASP.NET Core 8 Security : Move Beyond ASP.NET Documentation and Learn Real Security / / by Scott Norberg
Advanced ASP.NET Core 8 Security : Move Beyond ASP.NET Documentation and Learn Real Security / / by Scott Norberg
Autore Norberg Scott
Edizione [2nd ed. 2024.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2024
Descrizione fisica 1 online resource (470 pages)
Disciplina 005.268
Soggetto topico Microsoft software
Microsoft .NET Framework
Data protection
Microsoft
Data and Information Security
ISBN 979-88-6880-494-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Intro to Security -- Chapter 2: Software Security Overview -- Chapter 3: Web Security -- Chapter 4: Thinking Like a Hacker -- Chapter 5: Introduction to ASP.NET Core Security -- Chapter 6: Cryptography -- Chapter 7: Processing User Input -- Chapter 8: Data Access and Storage -- Chapter 9: Authentication and Authorization -- Chapter 10: Advanced Web Security -- Chapter 11: Logging and Error Handling. Chapter 12: Setup and Configuration. - Chapter 13: Secure Software Development Life Cycle. (SSDLC).
Record Nr. UNINA-9910896177903321
Norberg Scott  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Communication and Intelligent Systems [[electronic resource] ] : Second International Conference, ICACIS 2023, Warsaw, Poland, June 16–17, 2023, Revised Selected Papers, Part II / / edited by Rabindra Nath Shaw, Marcin Paprzycki, Ankush Ghosh
Advanced Communication and Intelligent Systems [[electronic resource] ] : Second International Conference, ICACIS 2023, Warsaw, Poland, June 16–17, 2023, Revised Selected Papers, Part II / / edited by Rabindra Nath Shaw, Marcin Paprzycki, Ankush Ghosh
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (XVIII, 283 p. 97 illus., 77 illus. in color.)
Disciplina 006
Collana Communications in Computer and Information Science
Soggetto topico Image processing - Digital techniques
Computer vision
Artificial intelligence
Computer engineering
Computer networks
Data protection
Application software
Computer Imaging, Vision, Pattern Recognition and Graphics
Artificial Intelligence
Computer Engineering and Networks
Data and Information Security
Computer and Information Systems Applications
ISBN 3-031-45124-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Enhanced Prediction of Heart Disease using Machine Learning and Deep Learning -- Machine Learning-Powered Tool for Automated Healthcare Diagnosis -- Development and Evaluation of an Artificial Intelligence-Based System for Pancreatic Cancer Detection and Diagnosis -- Comparative Analysis of Deep Learning Architectures for Garbage Classification -- Developing an Automated System for Pothole Detection and Management using Deep Learning -- Robust Neurodegenerative Disease Detection Using Machine Learning Algorithms -- Real-Time Drowsiness Detection System Using Machine Learning -- Hate Speech Detection in Multi-Social Media Using Deep Learning -- Collating Weather Data and Grocery Cost using Machine Learning Techniques -- Breast Cancer Detection by using Decision Tree -- Integrating Scene and Text Recognition for Improved Scene Caption to assist Visually Impaired -- Sugarcane Leaf Disease Classification using Deep Learning -- An Analysis of Current Advancements: Elderly Fall Detection Systems Using Machine Learning Techniques -- DLMEKL: Design of an efficient Deep Learning Model for analyzing the effect of ECG & EEG disturbances on Kidney, Lungs and Liver functions -- A Comprehensive Review of the Latest Advancements in Large Generative AI Models -- Integration of IoT and Industry 4.0: Revolutionizing Industrial Processes -- Artificial Intelligence based Optimized Traffic Diversion System in Smart Cities -- Cloud Computing Enabled Autonomous Forest Fire Surveillance System Using Internet-of-Things -- Understanding Career Trajectories of IT professionals -A Machine Learning Approach -- RECOGNITION OF VARITIES OF RICE USING DEEP LEARNING TECHNOLOGIES -- Optimizing Pneumonia Diagnosis through Local Binary Pattern and 2D-Wavelet Transform Based Feature Extraction and Classification -- Recognition of Infant Footprint: A Review of Advanced Techniques -- Method Comparison for Predicting Student Retention at a Private School in Indonesia -- Distribution and Semantics of Terms with the Component ‘White’ in the Bulgarian Language: a Statistical Approach -- Sanskrit OCR System -- Information Technology and Fintech Innovation and its effect on Indian Financial Services -- Application of Neural Networks and Genetic Algorithms in establishing Logical Rules for evaluating the edibility of Mushroom Data -- A Review on Machine Learning based Security in Edge Computing Environment -- Multiple linear regression based analysis of weather data : Assumptions and Limitations -- Ransomware Taxonomy and Detection Techniques Based on Machine Learning: A Review -- Analysis And Design of Document Similarity Using BiLSTM and BERT -- Customer Churn Analysis for Live Stream E-Commerce Platforms by Using Decision Tree Method -- Estimation of Reliability, BER, BLER and throughput during the coexistence of 4G LTE and 5G NR -- Sentiment Analysis of user-generated data using CNN-BiLSTM model -- Performance of Bayesian Networks Classification Models for Tuberculosis Patient Outcome Prediction with Imbalanced Dataset -- Exploring the Future of Edge Computing: Advantages, Limitations, and Opportunities -- Development of Facial Emotion Recognition System using Unimodal and Multimodal approach -- Fake Product Review Detection Using Machine Learning -- A survey on Designing Efficient WSN using Duty Cycle optimization -- A Novel Framework for Harnessing AI for Evidence-Based Policymaking in E-Governance Using Smart Contracts -- Vehicular Ad-hoc Networks: A Review on Applications & Security -- An Approach for Efficient Experts Selection in Team Formation Problems -- Cybersecurity Model for Mobile and Web Application Banking Sectors.
Record Nr. UNISA-996558569803316
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advanced Communication and Intelligent Systems [[electronic resource] ] : Second International Conference, ICACIS 2023, Warsaw, Poland, June 16–17, 2023, Revised Selected Papers, Part I / / edited by Rabindra Nath Shaw, Marcin Paprzycki, Ankush Ghosh
Advanced Communication and Intelligent Systems [[electronic resource] ] : Second International Conference, ICACIS 2023, Warsaw, Poland, June 16–17, 2023, Revised Selected Papers, Part I / / edited by Rabindra Nath Shaw, Marcin Paprzycki, Ankush Ghosh
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (287 pages)
Disciplina 006.3
Collana Communications in Computer and Information Science
Soggetto topico Image processing - Digital techniques
Computer vision
Artificial intelligence
Computer engineering
Computer networks
Data protection
Application software
Computer Imaging, Vision, Pattern Recognition and Graphics
Artificial Intelligence
Computer Engineering and Networks
Data and Information Security
Computer and Information Systems Applications
ISBN 3-031-45121-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Comparative Analysis of Deep Learning Architectures for Garbage Classification -- Developing an Automated System for Pothole Detection and Management using Deep Learning -- Collating Weather Data and Grocery Cost using Machine Learning Techniques -- Integrating Scene and Text Recognition for Improved Scene Caption to assist Visually Impaired -- An Analysis of Current Advancements: Elderly Fall Detection Systems Using Machine Learning Techniques -- DLMEKL: Design of an efficient Deep Learning Model for analyzing the effect of ECG & EEG disturbances on Kidney, Lungs and Liver functions -- Integration of IoT and Industry 4.0: Revolutionizing Industrial Processes -- Artificial Intelligence based Optimized Traffic Diversion System in Smart Cities -- Understanding Career Trajectories of IT professionals -A Machine Learning Approach -- A Review on Machine Learning based Security in Edge Computing Environment -- Ransomware Taxonomy and Detection Techniques Based on Machine Learning: A Review -- Analysis And Design of Document Similarity Using BiLSTM and BERT -- Customer Churn Analysis for Live Stream E-Commerce Platforms by Using Decision Tree Method -- Estimation of Reliability, BER, BLER and throughput during the coexistence of 4G LTE and 5G NR -- Exploring the Future of Edge Computing: Advantages, Limitations, and Opportunities -- Fake Product Review Detection Using Machine Learning -- A survey on Designing Efficient WSN using Duty Cycle optimization -- A Novel Framework for Harnessing AI for Evidence-Based Policymaking in E-Governance Using Smart Contracts -- Vehicular Ad-hoc Networks: A Review on Applications & Security -- An Approach for Efficient Experts Selection in Team Formation Problems -- Cybersecurity Model for Mobile and Web Application Banking Sectors.
Record Nr. UNISA-996558569703316
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advanced Communication and Intelligent Systems : Second International Conference, ICACIS 2023, Warsaw, Poland, June 16–17, 2023, Revised Selected Papers, Part I / / edited by Rabindra Nath Shaw, Marcin Paprzycki, Ankush Ghosh
Advanced Communication and Intelligent Systems : Second International Conference, ICACIS 2023, Warsaw, Poland, June 16–17, 2023, Revised Selected Papers, Part I / / edited by Rabindra Nath Shaw, Marcin Paprzycki, Ankush Ghosh
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (287 pages)
Disciplina 006.3
Collana Communications in Computer and Information Science
Soggetto topico Image processing - Digital techniques
Computer vision
Artificial intelligence
Computer engineering
Computer networks
Data protection
Application software
Computer Imaging, Vision, Pattern Recognition and Graphics
Artificial Intelligence
Computer Engineering and Networks
Data and Information Security
Computer and Information Systems Applications
ISBN 3-031-45121-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Comparative Analysis of Deep Learning Architectures for Garbage Classification -- Developing an Automated System for Pothole Detection and Management using Deep Learning -- Collating Weather Data and Grocery Cost using Machine Learning Techniques -- Integrating Scene and Text Recognition for Improved Scene Caption to assist Visually Impaired -- An Analysis of Current Advancements: Elderly Fall Detection Systems Using Machine Learning Techniques -- DLMEKL: Design of an efficient Deep Learning Model for analyzing the effect of ECG & EEG disturbances on Kidney, Lungs and Liver functions -- Integration of IoT and Industry 4.0: Revolutionizing Industrial Processes -- Artificial Intelligence based Optimized Traffic Diversion System in Smart Cities -- Understanding Career Trajectories of IT professionals -A Machine Learning Approach -- A Review on Machine Learning based Security in Edge Computing Environment -- Ransomware Taxonomy and Detection Techniques Based on Machine Learning: A Review -- Analysis And Design of Document Similarity Using BiLSTM and BERT -- Customer Churn Analysis for Live Stream E-Commerce Platforms by Using Decision Tree Method -- Estimation of Reliability, BER, BLER and throughput during the coexistence of 4G LTE and 5G NR -- Exploring the Future of Edge Computing: Advantages, Limitations, and Opportunities -- Fake Product Review Detection Using Machine Learning -- A survey on Designing Efficient WSN using Duty Cycle optimization -- A Novel Framework for Harnessing AI for Evidence-Based Policymaking in E-Governance Using Smart Contracts -- Vehicular Ad-hoc Networks: A Review on Applications & Security -- An Approach for Efficient Experts Selection in Team Formation Problems -- Cybersecurity Model for Mobile and Web Application Banking Sectors.
Record Nr. UNINA-9910747594103321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Communication and Intelligent Systems : Second International Conference, ICACIS 2023, Warsaw, Poland, June 16–17, 2023, Revised Selected Papers, Part II / / edited by Rabindra Nath Shaw, Marcin Paprzycki, Ankush Ghosh
Advanced Communication and Intelligent Systems : Second International Conference, ICACIS 2023, Warsaw, Poland, June 16–17, 2023, Revised Selected Papers, Part II / / edited by Rabindra Nath Shaw, Marcin Paprzycki, Ankush Ghosh
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (XVIII, 283 p. 97 illus., 77 illus. in color.)
Disciplina 006
Collana Communications in Computer and Information Science
Soggetto topico Image processing - Digital techniques
Computer vision
Artificial intelligence
Computer engineering
Computer networks
Data protection
Application software
Computer Imaging, Vision, Pattern Recognition and Graphics
Artificial Intelligence
Computer Engineering and Networks
Data and Information Security
Computer and Information Systems Applications
ISBN 9783031451249
3031451244
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Enhanced Prediction of Heart Disease using Machine Learning and Deep Learning -- Machine Learning-Powered Tool for Automated Healthcare Diagnosis -- Development and Evaluation of an Artificial Intelligence-Based System for Pancreatic Cancer Detection and Diagnosis -- Comparative Analysis of Deep Learning Architectures for Garbage Classification -- Developing an Automated System for Pothole Detection and Management using Deep Learning -- Robust Neurodegenerative Disease Detection Using Machine Learning Algorithms -- Real-Time Drowsiness Detection System Using Machine Learning -- Hate Speech Detection in Multi-Social Media Using Deep Learning -- Collating Weather Data and Grocery Cost using Machine Learning Techniques -- Breast Cancer Detection by using Decision Tree -- Integrating Scene and Text Recognition for Improved Scene Caption to assist Visually Impaired -- Sugarcane Leaf Disease Classification using Deep Learning -- An Analysis of Current Advancements: Elderly Fall Detection Systems Using Machine Learning Techniques -- DLMEKL: Design of an efficient Deep Learning Model for analyzing the effect of ECG & EEG disturbances on Kidney, Lungs and Liver functions -- A Comprehensive Review of the Latest Advancements in Large Generative AI Models -- Integration of IoT and Industry 4.0: Revolutionizing Industrial Processes -- Artificial Intelligence based Optimized Traffic Diversion System in Smart Cities -- Cloud Computing Enabled Autonomous Forest Fire Surveillance System Using Internet-of-Things -- Understanding Career Trajectories of IT professionals -A Machine Learning Approach -- RECOGNITION OF VARITIES OF RICE USING DEEP LEARNING TECHNOLOGIES -- Optimizing Pneumonia Diagnosis through Local Binary Pattern and 2D-Wavelet Transform Based Feature Extraction and Classification -- Recognition of Infant Footprint: A Review of Advanced Techniques -- Method Comparison for Predicting Student Retention at a Private School in Indonesia -- Distribution and Semantics of Terms with the Component ‘White’ in the Bulgarian Language: a Statistical Approach -- Sanskrit OCR System -- Information Technology and Fintech Innovation and its effect on Indian Financial Services -- Application of Neural Networks and Genetic Algorithms in establishing Logical Rules for evaluating the edibility of Mushroom Data -- A Review on Machine Learning based Security in Edge Computing Environment -- Multiple linear regression based analysis of weather data : Assumptions and Limitations -- Ransomware Taxonomy and Detection Techniques Based on Machine Learning: A Review -- Analysis And Design of Document Similarity Using BiLSTM and BERT -- Customer Churn Analysis for Live Stream E-Commerce Platforms by Using Decision Tree Method -- Estimation of Reliability, BER, BLER and throughput during the coexistence of 4G LTE and 5G NR -- Sentiment Analysis of user-generated data using CNN-BiLSTM model -- Performance of Bayesian Networks Classification Models for Tuberculosis Patient Outcome Prediction with Imbalanced Dataset -- Exploring the Future of Edge Computing: Advantages, Limitations, and Opportunities -- Development of Facial Emotion Recognition System using Unimodal and Multimodal approach -- Fake Product Review Detection Using Machine Learning -- A survey on Designing Efficient WSN using Duty Cycle optimization -- A Novel Framework for Harnessing AI for Evidence-Based Policymaking in E-Governance Using Smart Contracts -- Vehicular Ad-hoc Networks: A Review on Applications & Security -- An Approach for Efficient Experts Selection in Team Formation Problems -- Cybersecurity Model for Mobile and Web Application Banking Sectors.
Record Nr. UNINA-9910747592103321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Computational and Communication Paradigms : Proceedings of ICACCP 2023 / / edited by Samarjeet Borah, Tapan K. Gandhi, Vincenzo Piuri
Advanced Computational and Communication Paradigms : Proceedings of ICACCP 2023 / / edited by Samarjeet Borah, Tapan K. Gandhi, Vincenzo Piuri
Autore Borah Samarjeet
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (536 pages)
Disciplina 004
Altri autori (Persone) GandhiTapan K
PiuriVincenzo
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Telecommunication
Signal processing
Computer vision
Data protection
Computational Intelligence
Communications Engineering, Networks
Signal, Speech and Image Processing
Computer Vision
Data and Information Security
ISBN 9789819942848
9819942845
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part 1: Soft Computing and Machine Learning -- Chapter 1. Performance Analysis of Clustering Using Modified Grey Wolf Optimization -- Chapter 2. Designing of Advanced Machine Learning based Predictive Model for Maternal Mortality -- Chapter 3. Multi-Criteria based Page Ranking using Metaheuristic Swarm Optimization -- Chapter 4. k-NN-SSc: An Effective Similarity Score for k-NN Classifier -- Chapter 5. Password Management System using Blockchain -- Chapter 6. Deep Reinforcement Learning Algorithms for D2D Communications: A Comparative Analysis -- Chapter 7. AI-enabled IDS for Identifying Malicious Traffics in Cloud Systems -- Chapter 8. NITSDN: Development of SDN dataset for ML-based Intrusion Detection System -- Chapter 9. Association Rule Mining in Distributed Environment: A Survey -- Chapter 10. Performance Analysis of the AdaGrad Family of Algorithms -- Chapter 11. Time-Related Natural Language Query Handling to Extract Autism Spectrum Disorder Information from Temporal Database -- Chapter12. Emotion-Based Music Recommendation -- Chapter 13. A Comprehensive Study on Natural Language Processing, It's Techniques and Advancements in Nepali Language -- Chapter 14. Quality Evaluation of Enterprise Architecture Frameworks -- Chapter 15. Natural Language Query Processing System to Extract Autism Spectrum Disorder Information from Database. etc.
Record Nr. UNINA-9910746284903321
Borah Samarjeet  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui