top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
ACM journal of computer documentation
ACM journal of computer documentation
Pubbl/distr/stampa New York, NY, : Association for Computing Machinery, ©2000-
Disciplina 004.2
Soggetto topico Electronic data processing documentation
Informatique - Documentation
Hardware
Soggetto genere / forma Periodicals.
ISSN 1557-9441
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Record Nr. UNINA-9910375872803321
New York, NY, : Association for Computing Machinery, ©2000-
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
ACM journal of computer documentation
ACM journal of computer documentation
Pubbl/distr/stampa New York, NY, : Association for Computing Machinery, ©2000-
Disciplina 004.2
Soggetto topico Electronic data processing documentation
Informatique - Documentation
Hardware
Soggetto genere / forma Periodicals.
ISSN 1557-9441
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Record Nr. UNISA-996215883203316
New York, NY, : Association for Computing Machinery, ©2000-
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advancements in smart computing and information security : first international conference, ASCIS 2022, Rajkot, India, November 24-26, 2022, revised selected papers, part II / / edited by Sridaran Rajagopal, Parvez Faruki, Kalpesh Popat
Advancements in smart computing and information security : first international conference, ASCIS 2022, Rajkot, India, November 24-26, 2022, revised selected papers, part II / / edited by Sridaran Rajagopal, Parvez Faruki, Kalpesh Popat
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (315 pages)
Disciplina 330
Collana Communications in Computer and Information Science
Soggetto topico Hardware
ISBN 3-031-23095-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Abstracts of Keynotes -- Post-pandemic Applications of AI and Machine Learning -- Smart and Soft Computing Methods for Prioritizing Software Requirements in Large-Scale Software Projects -- Your Readiness for Industry 4.0 -- Securing NexGen Automotives - Threats and Trends -- Cyber Attacks Classification and Attack Handling Methods Using Machine Learning Methods -- The Internet of Things (IoT) Ecosystem Revolution in the World of Global Sports -- Orchestration of Containers: Role of Artificial Intelligence -- Enterprise Cybersecurity Strategies in the Cloud -- Contents - Part II -- Contents - Part I -- Cyber Security -- A Comprehensive Study on Cyber Legislation in G20 Countries -- 1 Introduction -- 2 Literature Review -- 2.1 Argentina -- 2.2 Australia -- 2.3 Brazil -- 2.4 Canada -- 2.5 China -- 2.6 France -- 2.7 Germany -- 2.8 India -- 2.9 Indonesia -- 2.10 Italy -- 2.11 Japan -- 2.12 South Korea -- 2.13 Mexico -- 2.14 Russia -- 2.15 Saudi Arabia -- 2.16 South Africa -- 2.17 Turkey -- 2.18 United Kingdom -- 2.19 United State of America -- 2.20 European Union -- 3 Conclusions -- References -- Image Encryption Algorithm Based on Timeout, Pixel Transposition and Modified Fisher-Yates Shuffling -- 1 Introduction -- 2 Proposed Work -- 2.1 Key Generation -- 2.2 Encryption Process -- 2.3 Decryption Process -- 3 Library and Packages -- 4 Performance Analysis and Results -- 4.1 NPCR & -- UACI Test -- 4.2 Mean Square Error (MSE) -- 4.3 Root Mean Square Error (RMSE) -- 4.4 Peak Signal to Noise Ratio (PSNR) -- 4.5 Key Space Analysis -- 4.6 Key Sensitivity Test -- 4.7 Encryption Time -- 4.8 Correlation Analysis -- 4.9 Mono-bit Test -- 4.10 Entropy Analysis -- 4.11 Average Difference (AD) and Maximum Difference (MD) -- 4.12 Structural Content (SC) -- 5 Conclusion -- References.
EXAM: Explainable Models for Analyzing Malicious Android Applications -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Data Set Preparation -- 3.2 Feature Extraction -- 3.3 Pre-processing the Feature Set and FVT Creation -- 3.4 Model Preparation and Classification -- 3.5 Obfuscation of Samples -- 3.6 Interpretation of Results Using SHAP -- 4 Experiments and Results -- 4.1 Evaluation Measures -- 4.2 Research Questions -- 4.3 Comparison with State-of-the-Art Approaches -- 5 Conclusion -- References -- Data Encryption Approach Using Hybrid Cryptography and Steganography with Combination of Block Ciphers -- 1 Introduction -- 1.1 Research Contribution -- 1.2 Paper Organisation -- 2 Related Work in the Domain -- 3 Proposed Methodology -- 4 Results and Discussions -- 5 Conclusion -- References -- Mitigation and Prevention Methods for Distributed Denial-of-Service Attacks on Network Servers -- 1 Introduction -- 2 Proposed Survey -- 2.1 Motivation for DDoS Attacks -- 2.2 Attack Strategies and Phases -- 2.3 Attack Methods -- 3 Prevention Methods -- 3.1 Prevention Using Filters -- 3.2 Secure Overlay -- 3.3 Honeypots -- 3.4 Load Balancing -- 3.5 Additional Security Patches -- 4 DDoS Mitigation Methods -- 4.1 Detection of DDoS Attacks -- 5 Conclusion -- References -- A Machine Learning Framework for Automatic Detection of Malware -- 1 Introduction -- 2 Literature Review -- 3 Proposed Framework -- 4 Experimental Results -- 5 Conclusion and Future Work -- References -- DNNdroid: Android Malware Detection Framework Based on Federated Learning and Edge Computing -- 1 Introduction -- 2 Related Work -- 3 Datasets -- 4 Machine Learning Technique -- 5 Proposed Framework Architecture -- 6 Evaluation of Proposed Framework -- 7 Comparison of Proposed Framework -- 7.1 Comparison on the Basis of Framework Available in the Literature.
7.2 Comparison of the Proposed Framework with Different Anti-virus Scanners -- 8 Experimental Findings -- 9 Conclusion -- References -- An Improved Symmetric Key Encryption Method Using Randomized Matrix Generation -- 1 Introduction -- 2 Types of Encryption Technique -- 2.1 AES -- 2.2 DES -- 2.3 Blowfish -- 3 Proposed Technique -- 3.1 Random Key Generation Algorithm -- 3.2 Text Message Encryption Algorithm -- 3.3 Text Message Decryption Algorithm -- 4 Matrix Operations -- 4.1 Matrix Determinant -- 4.2 Matrix Multiplication -- 4.3 Matrix Transpose Operation -- 5 Performance Analysis -- 5.1 Implementation of System -- 5.2 Text Encryption Algorithms Performance Analysis -- 5.3 Analysis of Complexity for Random Key Generation -- 5.4 Analysis of Execution Time -- 5.5 Analysis of Throughput -- 6 Conclusion -- References -- Performance Analyses of Black Hole Attack in AODV Routing Protocol in Vanet Using NS3 -- 1 Introduction -- 1.1 AODV Routing Protocol -- 1.2 Black Hole Attack -- 1.3 Literature Survey -- 1.4 Simulation Set-Up -- 1.5 Result Analyses -- 1.6 Conclusion -- References -- Comparative Analysis of Several Approaches of Encoding Audio Files -- 1 Introduction -- 2 Overview of Cryptography -- 3 Aims of Cryptography -- 3.1 The Many Forms that Cryptography Can Take -- 4 Cryptographic Algorithms at a Glance -- 4.1 DES -- 4.2 3DES -- 4.3 AES -- 4.4 Blowfish -- 4.5 RC4 -- 4.6 Twofish -- 4.7 ThreeFish -- 5 Background and Related Works -- 5.1 Related Research and Development on Audio Encryption -- 6 Recent Works on Audio Encryption -- 7 Limitations -- 8 Conclusion -- References -- A Secure Mechanism for Safeguarding Cloud Infrastructure -- 1 Introduction -- 2 Literature Review -- 3 Types of Security in Cloud Computing -- 3.1 Information Security -- 3.2 Identity Security -- 3.3 Network Security -- 3.4 Software Security -- 3.5 Infrastructure Security.
4 Security Concerns in Cloud -- 4.1 Virtualization -- 4.2 Public-Cloud Storage -- 4.3 Multitenancy -- 4.4 Identity and Access Management (IAM) -- 5 Security of Data in Cloud-Computing -- 6 Major Security Challenges -- 6.1 Internal Attacks -- 6.2 Partial/Incomplete Data Deletion -- 6.3 Interception of Data -- 6.4 Failure of Isolation -- 7 Using Encryption for Data Protection -- 7.1 Block-Cipher -- 7.2 Stream Ciphers -- 7.3 Hash Functions -- 8 Case Study on Cloud Based Cyber Security Model for Identification of Safe and Malicious Request -- 9 Conclusion -- References -- Phishing URLs Detection Using Machine Learning -- 1 Introduction -- 2 Related Work -- 2.1 Literature Review -- 2.2 URLs Descriptions -- 3 Research Methodology -- 4 Result and Analysis -- 4.1 Result -- 4.2 Analysis -- 5 Conclusion -- References -- Android Malware Detection with Classification Based on Hybrid Analysis and N-gram Feature Extraction -- 1 Introduction -- 1.1 Average Cost of a Data Breach -- 1.2 Growth Rate of Malware Infections -- 1.3 India and Asia Statistics on Malware Attacks -- 1.4 Trends in the Number of Attacks -- 1.5 Users Attacked by Malware -- 2 Research Objective/Problem Statement -- 3 Challenges in Malware Detection -- 4 Theoretical Framework -- 5 Hypothesis Declaration -- 6 Methodology -- 7 Approach -- 8 Outline of the Work Proposed -- 8.1 Process for the Proposed Scheme of Work -- 9 Conclusion -- 10 Further Research -- References -- Industry -- Image Processing and Deep Neural Networks for Face Mask Detection -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 3.1 Machine Learning Approach -- 3.2 Supervised Learning -- 3.3 Unsupervised Learning -- 3.4 Viola Jones algorithm -- 4 Mathematical Formulation -- 5 Results and Discussion -- 6 Conclusion -- References -- An Analysis of Lightweight Cryptographic Algorithms for IoT-Applications.
1 Introduction -- 2 Introduction of IoT -- 3 Software and Hardware Performance Metrics -- 4 Research Directions and Open Research Challenges -- 5 Conclusion -- Appendix 1 -- Hardware and Software Performances of LWC Algorithm -- References -- Permissioned Blockchain-Based Solution to Document Processing in the Real Estate Industry -- 1 Introduction -- 1.1 Blockchain Technology -- 1.2 Indian Real Estate Sector -- 1.3 Impact of Blockchain Technology on the Indian Real Estate Sector -- 2 Related Research Work and Limitations -- 2.1 Summarization of Recent Research Work -- 2.2 Research Gap -- 3 Proposed Research Work -- 3.1 Designed Framework and Components -- 3.2 Core Transaction Process Flow -- 3.3 Proposed Algorithms -- 3.4 Deployment -- 4 Conclusion and Future Scope -- References -- Automatic Evaluation of Free Text Answers: A Review -- 1 Introduction -- 2 Related Work -- 3 A Systematic Review -- 4 Discussion -- 5 Conclusions and Future Work -- References -- Blockchain Federated Learning Framework for Privacy-Preservation -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 4 Performance Evaluation -- 4.1 Datasets -- 4.2 Simulation Setup -- 4.3 Evaluation Metrics -- 4.4 Results and Discussion -- 5 Conclusion -- References -- Path Planning and Static Obstacle Avoidance for Unmanned Aerial Systems -- 1 Introduction -- 2 Methodology -- 2.1 A* Search -- 2.2 Rapidly-Exploring Random Tree -- 2.3 Ant Colony Optimization -- 2.4 Imitation Learning -- 3 Results and Discussion -- 4 Conclusion and Future Work -- References -- Comparative Study of Various Algorithms for Vehicle Detection and Counting in Traffic -- 1 Introduction -- 2 Literature Review -- 2.1 YOLO Real-Time Object Tracking -- 3 Methodology -- 3.1 YOLOv3 Architecture -- 3.2 YOLOv4 Architecture -- 3.3 YOLOv5 Architecture -- 3.4 YOLOv6 Architecture -- 3.5 YOLOv7 Architecture.
4 Results and Discussion.
Record Nr. UNINA-9910644266803321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advancements in smart computing and information security : first international conference, ASCIS 2022, Rajkot, India, November 24-26, 2022, revised selected papers, part II / / edited by Sridaran Rajagopal, Parvez Faruki, Kalpesh Popat
Advancements in smart computing and information security : first international conference, ASCIS 2022, Rajkot, India, November 24-26, 2022, revised selected papers, part II / / edited by Sridaran Rajagopal, Parvez Faruki, Kalpesh Popat
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (315 pages)
Disciplina 330
Collana Communications in Computer and Information Science
Soggetto topico Hardware
ISBN 3-031-23095-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Abstracts of Keynotes -- Post-pandemic Applications of AI and Machine Learning -- Smart and Soft Computing Methods for Prioritizing Software Requirements in Large-Scale Software Projects -- Your Readiness for Industry 4.0 -- Securing NexGen Automotives - Threats and Trends -- Cyber Attacks Classification and Attack Handling Methods Using Machine Learning Methods -- The Internet of Things (IoT) Ecosystem Revolution in the World of Global Sports -- Orchestration of Containers: Role of Artificial Intelligence -- Enterprise Cybersecurity Strategies in the Cloud -- Contents - Part II -- Contents - Part I -- Cyber Security -- A Comprehensive Study on Cyber Legislation in G20 Countries -- 1 Introduction -- 2 Literature Review -- 2.1 Argentina -- 2.2 Australia -- 2.3 Brazil -- 2.4 Canada -- 2.5 China -- 2.6 France -- 2.7 Germany -- 2.8 India -- 2.9 Indonesia -- 2.10 Italy -- 2.11 Japan -- 2.12 South Korea -- 2.13 Mexico -- 2.14 Russia -- 2.15 Saudi Arabia -- 2.16 South Africa -- 2.17 Turkey -- 2.18 United Kingdom -- 2.19 United State of America -- 2.20 European Union -- 3 Conclusions -- References -- Image Encryption Algorithm Based on Timeout, Pixel Transposition and Modified Fisher-Yates Shuffling -- 1 Introduction -- 2 Proposed Work -- 2.1 Key Generation -- 2.2 Encryption Process -- 2.3 Decryption Process -- 3 Library and Packages -- 4 Performance Analysis and Results -- 4.1 NPCR & -- UACI Test -- 4.2 Mean Square Error (MSE) -- 4.3 Root Mean Square Error (RMSE) -- 4.4 Peak Signal to Noise Ratio (PSNR) -- 4.5 Key Space Analysis -- 4.6 Key Sensitivity Test -- 4.7 Encryption Time -- 4.8 Correlation Analysis -- 4.9 Mono-bit Test -- 4.10 Entropy Analysis -- 4.11 Average Difference (AD) and Maximum Difference (MD) -- 4.12 Structural Content (SC) -- 5 Conclusion -- References.
EXAM: Explainable Models for Analyzing Malicious Android Applications -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Data Set Preparation -- 3.2 Feature Extraction -- 3.3 Pre-processing the Feature Set and FVT Creation -- 3.4 Model Preparation and Classification -- 3.5 Obfuscation of Samples -- 3.6 Interpretation of Results Using SHAP -- 4 Experiments and Results -- 4.1 Evaluation Measures -- 4.2 Research Questions -- 4.3 Comparison with State-of-the-Art Approaches -- 5 Conclusion -- References -- Data Encryption Approach Using Hybrid Cryptography and Steganography with Combination of Block Ciphers -- 1 Introduction -- 1.1 Research Contribution -- 1.2 Paper Organisation -- 2 Related Work in the Domain -- 3 Proposed Methodology -- 4 Results and Discussions -- 5 Conclusion -- References -- Mitigation and Prevention Methods for Distributed Denial-of-Service Attacks on Network Servers -- 1 Introduction -- 2 Proposed Survey -- 2.1 Motivation for DDoS Attacks -- 2.2 Attack Strategies and Phases -- 2.3 Attack Methods -- 3 Prevention Methods -- 3.1 Prevention Using Filters -- 3.2 Secure Overlay -- 3.3 Honeypots -- 3.4 Load Balancing -- 3.5 Additional Security Patches -- 4 DDoS Mitigation Methods -- 4.1 Detection of DDoS Attacks -- 5 Conclusion -- References -- A Machine Learning Framework for Automatic Detection of Malware -- 1 Introduction -- 2 Literature Review -- 3 Proposed Framework -- 4 Experimental Results -- 5 Conclusion and Future Work -- References -- DNNdroid: Android Malware Detection Framework Based on Federated Learning and Edge Computing -- 1 Introduction -- 2 Related Work -- 3 Datasets -- 4 Machine Learning Technique -- 5 Proposed Framework Architecture -- 6 Evaluation of Proposed Framework -- 7 Comparison of Proposed Framework -- 7.1 Comparison on the Basis of Framework Available in the Literature.
7.2 Comparison of the Proposed Framework with Different Anti-virus Scanners -- 8 Experimental Findings -- 9 Conclusion -- References -- An Improved Symmetric Key Encryption Method Using Randomized Matrix Generation -- 1 Introduction -- 2 Types of Encryption Technique -- 2.1 AES -- 2.2 DES -- 2.3 Blowfish -- 3 Proposed Technique -- 3.1 Random Key Generation Algorithm -- 3.2 Text Message Encryption Algorithm -- 3.3 Text Message Decryption Algorithm -- 4 Matrix Operations -- 4.1 Matrix Determinant -- 4.2 Matrix Multiplication -- 4.3 Matrix Transpose Operation -- 5 Performance Analysis -- 5.1 Implementation of System -- 5.2 Text Encryption Algorithms Performance Analysis -- 5.3 Analysis of Complexity for Random Key Generation -- 5.4 Analysis of Execution Time -- 5.5 Analysis of Throughput -- 6 Conclusion -- References -- Performance Analyses of Black Hole Attack in AODV Routing Protocol in Vanet Using NS3 -- 1 Introduction -- 1.1 AODV Routing Protocol -- 1.2 Black Hole Attack -- 1.3 Literature Survey -- 1.4 Simulation Set-Up -- 1.5 Result Analyses -- 1.6 Conclusion -- References -- Comparative Analysis of Several Approaches of Encoding Audio Files -- 1 Introduction -- 2 Overview of Cryptography -- 3 Aims of Cryptography -- 3.1 The Many Forms that Cryptography Can Take -- 4 Cryptographic Algorithms at a Glance -- 4.1 DES -- 4.2 3DES -- 4.3 AES -- 4.4 Blowfish -- 4.5 RC4 -- 4.6 Twofish -- 4.7 ThreeFish -- 5 Background and Related Works -- 5.1 Related Research and Development on Audio Encryption -- 6 Recent Works on Audio Encryption -- 7 Limitations -- 8 Conclusion -- References -- A Secure Mechanism for Safeguarding Cloud Infrastructure -- 1 Introduction -- 2 Literature Review -- 3 Types of Security in Cloud Computing -- 3.1 Information Security -- 3.2 Identity Security -- 3.3 Network Security -- 3.4 Software Security -- 3.5 Infrastructure Security.
4 Security Concerns in Cloud -- 4.1 Virtualization -- 4.2 Public-Cloud Storage -- 4.3 Multitenancy -- 4.4 Identity and Access Management (IAM) -- 5 Security of Data in Cloud-Computing -- 6 Major Security Challenges -- 6.1 Internal Attacks -- 6.2 Partial/Incomplete Data Deletion -- 6.3 Interception of Data -- 6.4 Failure of Isolation -- 7 Using Encryption for Data Protection -- 7.1 Block-Cipher -- 7.2 Stream Ciphers -- 7.3 Hash Functions -- 8 Case Study on Cloud Based Cyber Security Model for Identification of Safe and Malicious Request -- 9 Conclusion -- References -- Phishing URLs Detection Using Machine Learning -- 1 Introduction -- 2 Related Work -- 2.1 Literature Review -- 2.2 URLs Descriptions -- 3 Research Methodology -- 4 Result and Analysis -- 4.1 Result -- 4.2 Analysis -- 5 Conclusion -- References -- Android Malware Detection with Classification Based on Hybrid Analysis and N-gram Feature Extraction -- 1 Introduction -- 1.1 Average Cost of a Data Breach -- 1.2 Growth Rate of Malware Infections -- 1.3 India and Asia Statistics on Malware Attacks -- 1.4 Trends in the Number of Attacks -- 1.5 Users Attacked by Malware -- 2 Research Objective/Problem Statement -- 3 Challenges in Malware Detection -- 4 Theoretical Framework -- 5 Hypothesis Declaration -- 6 Methodology -- 7 Approach -- 8 Outline of the Work Proposed -- 8.1 Process for the Proposed Scheme of Work -- 9 Conclusion -- 10 Further Research -- References -- Industry -- Image Processing and Deep Neural Networks for Face Mask Detection -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 3.1 Machine Learning Approach -- 3.2 Supervised Learning -- 3.3 Unsupervised Learning -- 3.4 Viola Jones algorithm -- 4 Mathematical Formulation -- 5 Results and Discussion -- 6 Conclusion -- References -- An Analysis of Lightweight Cryptographic Algorithms for IoT-Applications.
1 Introduction -- 2 Introduction of IoT -- 3 Software and Hardware Performance Metrics -- 4 Research Directions and Open Research Challenges -- 5 Conclusion -- Appendix 1 -- Hardware and Software Performances of LWC Algorithm -- References -- Permissioned Blockchain-Based Solution to Document Processing in the Real Estate Industry -- 1 Introduction -- 1.1 Blockchain Technology -- 1.2 Indian Real Estate Sector -- 1.3 Impact of Blockchain Technology on the Indian Real Estate Sector -- 2 Related Research Work and Limitations -- 2.1 Summarization of Recent Research Work -- 2.2 Research Gap -- 3 Proposed Research Work -- 3.1 Designed Framework and Components -- 3.2 Core Transaction Process Flow -- 3.3 Proposed Algorithms -- 3.4 Deployment -- 4 Conclusion and Future Scope -- References -- Automatic Evaluation of Free Text Answers: A Review -- 1 Introduction -- 2 Related Work -- 3 A Systematic Review -- 4 Discussion -- 5 Conclusions and Future Work -- References -- Blockchain Federated Learning Framework for Privacy-Preservation -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 4 Performance Evaluation -- 4.1 Datasets -- 4.2 Simulation Setup -- 4.3 Evaluation Metrics -- 4.4 Results and Discussion -- 5 Conclusion -- References -- Path Planning and Static Obstacle Avoidance for Unmanned Aerial Systems -- 1 Introduction -- 2 Methodology -- 2.1 A* Search -- 2.2 Rapidly-Exploring Random Tree -- 2.3 Ant Colony Optimization -- 2.4 Imitation Learning -- 3 Results and Discussion -- 4 Conclusion and Future Work -- References -- Comparative Study of Various Algorithms for Vehicle Detection and Counting in Traffic -- 1 Introduction -- 2 Literature Review -- 2.1 YOLO Real-Time Object Tracking -- 3 Methodology -- 3.1 YOLOv3 Architecture -- 3.2 YOLOv4 Architecture -- 3.3 YOLOv5 Architecture -- 3.4 YOLOv6 Architecture -- 3.5 YOLOv7 Architecture.
4 Results and Discussion.
Record Nr. UNISA-996508667503316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Automated support requirement system : user's guide for nondata entry personnel / / John E. Maryland
Automated support requirement system : user's guide for nondata entry personnel / / John E. Maryland
Autore Maryland John E., Jr.
Pubbl/distr/stampa John F. Kennedy Space Center, [FL] : , : National Aeronautics and Space Administration, John F. Kennedy Space Center, , March 1985
Descrizione fisica 1 online resource (66 unnumbered pages)
Collana NASA/TM
Soggetto topico Computers
Hardware
Computer systems programs
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Automated support requirement system
Record Nr. UNINA-9910715230503321
Maryland John E., Jr.  
John F. Kennedy Space Center, [FL] : , : National Aeronautics and Space Administration, John F. Kennedy Space Center, , March 1985
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
A bitvectors library for PVS / / Ricky W. Butler [and four others]
A bitvectors library for PVS / / Ricky W. Butler [and four others]
Autore Butler Ricky W.
Pubbl/distr/stampa Washington, D.C., : National Aeronautics and Space Administration, 1996
Descrizione fisica 1 online resource (17 pages) : illustrations
Collana NASA technical memorandum
Soggetto topico Hardware
Proving
Bit synchronization
Integers
Libraries
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910707834703321
Butler Ricky W.  
Washington, D.C., : National Aeronautics and Space Administration, 1996
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Building supply business
Building supply business
Pubbl/distr/stampa Des Plaines, IL, : Cahners Pub. Co., c1995-c1996
Descrizione fisica 1 online resource
Disciplina 381/.45683
Soggetto topico Hardware
Building
Building materials
Soggetto genere / forma Periodicals.
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Altri titoli varianti Building supply
Record Nr. UNISA-996335773703316
Des Plaines, IL, : Cahners Pub. Co., c1995-c1996
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Child, Farr & Co. (To accompany Bill H.R. No. 286.) May 16, 1850
Child, Farr & Co. (To accompany Bill H.R. No. 286.) May 16, 1850
Pubbl/distr/stampa [Washington, D.C.] : , : [publisher not identified], , 1850
Descrizione fisica 1 online resource (1 page)
Altri autori (Persone) PhoenixJonas Phillips <1788-1859> (Whig (NY))
Collana House report / 31st Congress, 1st session. House
[United States congressional serial set ]
Soggetto topico Claims
Malicious mischief
Vandalism
Drawbacks
Fires
Hardware
Steamboats
Tariff
Merchants
Soggetto genere / forma Legislative materials.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Child, Farr & Co.
Record Nr. UNINA-9910715775003321
[Washington, D.C.] : , : [publisher not identified], , 1850
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Development of space telescope non-ORU hardware [[electronic resource] ] : final report / / prepared by Kem B. Robertson, David E. Henderson
Development of space telescope non-ORU hardware [[electronic resource] ] : final report / / prepared by Kem B. Robertson, David E. Henderson
Autore Robertson Kem B
Pubbl/distr/stampa Huntsville, Ala. : , : Essex Corporation, Space Systems Group : , : National Aeronautics and Space Administration, George C. Marshall Space Flight Center, , [1985]
Descrizione fisica 1 online resource (iii, 5 pages, 25 unnumbered pages) : illustrations
Altri autori (Persone) HendersonDavid E
Collana [NASA contractor report]
Soggetto topico Hardware
Hubble Space Telescope
Orbital servicing
Replacing
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Development of space telescope non-ORU hardware
Record Nr. UNINA-9910701848603321
Robertson Kem B  
Huntsville, Ala. : , : Essex Corporation, Space Systems Group : , : National Aeronautics and Space Administration, George C. Marshall Space Flight Center, , [1985]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Engineering evaluations and studies : final report : volume I, exhibit A / / Unjeng Cheng [and ten others]
Engineering evaluations and studies : final report : volume I, exhibit A / / Unjeng Cheng [and ten others]
Autore Unjeng Cheng
Pubbl/distr/stampa Houston, Texas : , : NASA Lyndon B. Johnson Space Center, , October 1983
Descrizione fisica 1 online resource (various pagings) : illustrations
Collana NASA/CR
Soggetto topico Centaur launch vehicle
Inertial Upper Stage
Superhigh frequencies
Space Shuttle orbiters
Hardware
Soggetto genere / forma Online resources.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Engineering evaluations and studies
Record Nr. UNINA-9910709861103321
Unjeng Cheng  
Houston, Texas : , : NASA Lyndon B. Johnson Space Center, , October 1983
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui