top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Applied soft computing and communication networks : proceedings of ACN 2020 / / Sabu M. Thampi [and five others], editors
Applied soft computing and communication networks : proceedings of ACN 2020 / / Sabu M. Thampi [and five others], editors
Pubbl/distr/stampa Gateway East, Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (347 pages)
Disciplina 006.3
Collana Lecture notes in networks and systems
Soggetto topico Soft computing
Informàtica tova
Xarxes de comunicacions
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 981-336-173-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organized By -- Contents -- Editors and Contributors -- Algebraic Modelling of a Generic Fog Scenario for Moving IoT Devices -- 1 Introduction -- 2 Algebra of Communicating Processes -- 3 Topology Framework -- 4 Actions to be Modelled -- 4.1 Action Cloud IN -- 4.2 Action Migrate IN -- 4.3 Action Init VM -- 4.4 Action Cloud OUT -- 4.5 Action Migration OUT -- 4.6 Action Kill VM -- 5 Verification of the Models -- 6 Conclusions -- References -- A Novel Approach to Preserve DRM for Content Distribution over P2P Networks -- 1 Introduction -- 1.1 Literature Review -- 2 Challenges and Contributions -- 3 Proposed System -- 3.1 System Approach -- 3.2 Physical Architecture/Layout -- 3.3 The P2P Network -- 3.4 The Secured DRM -- 4 Discussion -- 5 Conclusion -- References -- Secure Multimodal Biometric Recognition in Principal Component Subspace -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Similarity Measure Based on Principal Components -- 3.2 Protection Scheme for Multimodal Templates -- 4 Experiments and Results -- 4.1 Face -- 4.2 Fingerprint -- 4.3 Finger Vein -- 4.4 Fusing Face, Fingerprint and Finger Vein Features -- 5 Security Analysis -- 6 Conclusion -- References -- EEG-Based Emotion Recognition and Its Interface with Augmented Reality -- 1 Introduction -- 2 Basic Principles -- 2.1 Electroencephalography (EEG) -- 2.2 EEG Data Analysis -- 2.3 10-20 EEG Positioning System -- 2.4 Augmented Reality -- 2.5 Socket Programming and Application Development -- 2.6 Valence-Arousal Model -- 3 Hardware Used -- 4 Detailed Circuit Design -- 5 Implementation -- 6 Results -- 7 Conclusions and Future Scope -- References -- Profile Verification Using Blockchain -- 1 Introduction -- 1.1 Blockchain -- 1.2 Ethereum -- 1.3 Existing Systems -- 1.4 Decentralization of Certification -- 2 Related Work -- 3 System Architecture.
3.1 Data and Process Flow -- 3.2 Smart Contract -- 3.3 Verification Protocol -- 3.4 Image Hashing -- 4 Implementation -- 4.1 Teachers and Mentors -- 4.2 Web Interface -- 4.3 Events and Transactions -- 5 Results -- 6 Conclusion -- References -- Distributed Denial of Service (DDoS) Attacks Detection: A Machine Learning Approach -- 1 Introduction -- 2 Background and Related Work -- 2.1 DDoS Attacks and Its Detection Type -- 2.2 Machine Learning Solutions -- 3 Experimental Database and Setup -- 4 Classification Algorithms and Performance Measurements -- 4.1 Classification Algorithms -- 4.2 Performance Measurements -- 5 Results and Discussion -- 6 Conclusion -- References -- Intrusion Detection Using Deep Neural Network with AntiRectifier Layer -- 1 Introduction -- 1.1 Motivation -- 1.2 Contribution -- 2 Related Work -- 3 Deep Neural Network -- 3.1 Rectified Linear Unit -- 3.2 AntiRectifier Layer -- 3.3 Dropout and Noise Layers -- 3.4 Gaussian Dropout and Gaussian Noise -- 4 Experimental Methodology -- 4.1 Datasets for Experimentation -- 5 Results Analysis and Observations -- 6 Conclusion -- References -- CloudSim Exploration: A Knowledge Framework for Cloud Computing Researchers -- 1 Introduction -- 2 Related Work -- 2.1 Procure Knowledge -- 2.2 Family of Simulators -- 2.3 Art: Architecture -- 2.4 Techniques: Tools -- 2.5 Techniques: Language -- 2.6 Setup -- 2.7 Integrated Development Environment (IDE) -- 3 Proposed Work and Methodology -- 3.1 Framework -- 3.2 Algorithms -- 4 Results and Discussions -- 4.1 Experimental Setup -- 5 Conclusion and Future Direction -- References -- A Comprehensive Survey on Big Data Technology Based Cybersecurity Analytics Systems -- 1 Introduction -- 1.1 Survey Methodology -- 1.2 Paper Organization -- 2 Related Work -- 3 Big Data Technologies Used in the Existing BDTCA Systems.
4 Datasets Used in the Existing BDTCA Systems -- 5 Feature Selection Algorithms Used in the Existing BDTCA Systems -- 6 Various Methods Used to Read Packet Trace Files from HDFS -- 7 Observations, Recommendations and Directions -- 7.1 Migration from Batch Processing to Stream Processing -- 7.2 Lack of Modern Datasets for Evaluation -- 7.3 Feature Selection -- 7.4 Overhead of Converting PCAP Files to Text Files -- 8 Conclusion -- References -- An Asynchronous Leader-Based Neighbor Discovery Protocol in Static Wireless Ad Hoc Networks -- 1 Introduction -- 2 Related Work -- 3 Reference Protocols -- 4 Asynchronous Leader-Based Neighbor Discovery Protocol -- 4.1 Assumptions -- 4.2 Model -- 5 Simulation Results -- 5.1 Simulation Scenario -- 5.2 Results -- 6 Conclusion -- References -- P2P Bot Detection Based on Host Behavior and Big Data Technology -- 1 Introduction -- 1.1 Botnet -- 1.2 Peer-to-Peer Botnet -- 1.3 Big Data -- 1.4 Role of Big Data Technologies in Detecting P2P Botnets -- 1.5 Role of Machine Learning in Detecting P2P Botnets -- 2 Related Works -- 3 System Architecture -- 3.1 Data Collection -- 3.2 Parsing PCAP Files -- 3.3 Classification -- 4 Implementation -- 4.1 Dataset Used -- 4.2 Parsing PCAP Files -- 4.3 Classification -- 5 Results -- 6 Conclusion -- References -- Localization in Wireless Sensor Networks Using a Mobile Anchor and Subordinate Nodes -- 1 Introduction -- 2 Related Works -- 3 Localization in WSNs Using a Mobile Anchor and Subordinate Nodes (LWMS): A Proposed Algorithm -- 4 Simulations and Results -- 4.1 Percentage of Error at Various Stages of the Algorithm -- 4.2 Localization Error Versus Communication Range -- 4.3 Localization Error Versus Total Number of Nodes -- 5 Conclusion -- References -- Serverless Deployment of a Voice-Bot for Visually Impaired -- 1 Introduction -- 2 Related Work -- 3 Background.
3.1 Economics and Architectural Impact of Serverless Applications -- 3.2 General Bot Architecture -- 4 Blueprints for a Serverless Voice Bot for Visually Impaired -- 4.1 Overview of Technology Stack for Voice Bot -- 4.2 Overall Design Architecture of Feed-O-Back Voice Bot -- 5 Experimental Results -- 6 Conclusion -- References -- Smart Cities and Spectrum Vulnerabilities in Long-Range Unlicensed Communication Bands: A Review -- 1 Introduction -- 2 Related Works -- 3 Spectrum Management Techniques -- 4 Security Vulnerabilities of LPWANS and Proposed Solutions -- 5 Challenges of Proper Spectrum Utilization in Unlicensed Bands -- 6 Competing Incompatible Long-Range Technologies in Unlicensed Bands -- 7 Comparison and Discussion -- 8 Key Findings of the Review -- 9 Recommendations and Future Direction -- 10 Conclusion -- References -- Stability Certification of Dynamical Systems: Lyapunov Logic Learning Machine -- 1 Introduction -- 1.1 Context -- 1.2 Contribution -- 1.3 Related Works -- 2 Preliminaries -- 2.1 Lyapunov Stability -- 2.2 SOS Lyapunov Functions -- 2.3 Classical ROA Estimation -- 3 Method -- 3.1 Intelligible Analytics -- 3.2 Value Ranking -- 3.3 LLM with Zero Error -- 3.4 ROA Explanation -- 3.5 ROA Candidates for Certification -- 4 Results -- 5 Conclusion and Future Work -- References -- Two-Dimensional Angle of Arrival Estimation Using L-Shaped Array -- 1 Introduction -- 2 System Model -- 3 Proposed Method -- 3.1 Method Without Noise -- 3.2 Method with Noise -- 4 Simulation Results -- 5 Conclusion -- References -- Interference Management Technique for LTE, Wi-Fi Coexistence Based on CSI at the Transmitter -- 1 Introduction -- 2 Related Works -- 3 Interference Modeling -- 3.1 Channel Estimation -- 4 LTE and Wi-Fi Simulation Modeling -- 4.1 Channel Model -- 4.2 LTE/LTE-A Transceiver -- 4.3 WLAN 802.11ac Transceiver.
4.4 Generation of Clean LTE and Wi-Fi Signal -- 4.5 LTE and Wi-Fi Coexistence Deployment Scenario -- 5 Performance Evaluation and Results -- 6 Conclusion and Future Work -- References -- VHF OSTBC MIMO System Used to Overcome the Effects of Irregular Terrain on Radio Signals -- 1 Introduction -- 2 Methods to Mitigate Propagation Challenges in Irregular Terrain -- 3 Proposed Model -- 4 Simulation Results -- 4.1 The Receive Signal Strength Results of the VHF OSTBC MIMO System Using Two Different VHF Frequencies -- 4.2 The Bit Error Rate Results of the OSTBC MIMO System Using Two Different MIMO Antenna Arrays -- 5 Conclusion and Discussion -- References -- Modelling Video Frames for Object Extraction Using Spatial Correlation -- 1 Introduction -- 2 Global Threshold: Otsu's Method -- 3 2D-Continuous Wavelet Analysis -- 3.1 Analysing Wavelets -- 3.2 Reproducing Kernel -- 4 Detection Theory -- 4.1 Binary Hypothesis Testing -- 5 Object Extraction -- 5.1 Implementation of Algorithm -- 5.2 Results -- 6 Conclusion and Future Work -- References -- Speech-Based Selective Labeling of Objects in an Inventory Setting -- 1 Introduction -- 2 Experimental Methodology -- 2.1 Data Preprocessing -- 2.2 Voice-Based Object Detection -- 2.3 Faster RCNN -- 3 Results and Discussion -- 4 Conclusion -- References -- Classification and Evaluation of Goal-Oriented Requirements Analysis Methods -- 1 Introduction -- 2 Classification of GORA Methods -- 2.1 GORA Methods for the Analysis of FRs and NFRs -- 2.2 GORA Method(s) for the Analysis of NFRs -- 2.3 GORA Method(s) for Social Modeling -- 3 Evaluation of GORA Methods -- 4 Conclusion -- References -- iCREST: International Cross-Reference to Exchange-Based Stock Trend Prediction Using Long Short-Term Memory -- 1 Introduction -- 1.1 Motivation -- 2 Proposed Approach -- 2.1 Time-Series Data Collection -- 2.2 Mapping and Cleaning.
2.3 Currency Conversion.
Record Nr. UNINA-9910488690403321
Gateway East, Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
IET cyber-systems and robotics
IET cyber-systems and robotics
Pubbl/distr/stampa Stevenage, Herts, U.K. : , : Institution of Engineering and Technology, , 2019-
Descrizione fisica 1 online resource
Disciplina 629
620
621.3
Soggetto topico Robotics
Cybernetics
Robòtica
Comunicacions
Xarxes de comunicacions
Processament de dades
Soggetto genere / forma Periodicals.
Zeitschrift
Revistes electròniques
ISSN 2631-6315
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Altri titoli varianti Institution of Engineering and Technology cyber-systems and robotics
Record Nr. UNISA-996359649603316
Stevenage, Herts, U.K. : , : Institution of Engineering and Technology, , 2019-
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
IET cyber-systems and robotics
IET cyber-systems and robotics
Pubbl/distr/stampa Stevenage, Herts, U.K. : , : Institution of Engineering and Technology, , 2019-
Descrizione fisica 1 online resource
Disciplina 629
620
621.3
Soggetto topico Robotics
Cybernetics
Robòtica
Comunicacions
Xarxes de comunicacions
Processament de dades
Soggetto genere / forma Periodicals.
Zeitschrift
Revistes electròniques.
ISSN 2631-6315
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Altri titoli varianti Institution of Engineering and Technology cyber-systems and robotics
Record Nr. UNINA-9910330353303321
Stevenage, Herts, U.K. : , : Institution of Engineering and Technology, , 2019-
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui