top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Cryptology - EUROCRYPT '85 : Proceedings of a Workshop on the Theory and Application of Cryptographic Techniques. Linz, Austria, April 9-11 1985
Advances in Cryptology - EUROCRYPT '85 : Proceedings of a Workshop on the Theory and Application of Cryptographic Techniques. Linz, Austria, April 9-11 1985
Autore Pichler Franz
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin / Heidelberg, , 1986
Descrizione fisica 1 online resource (280 pages)
Collana Lecture Notes in Computer Science
Soggetto non controllato Computer Security
Cryptography
Computers
Language Arts & Disciplines
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465821503316
Pichler Franz  
Berlin, Heidelberg : , : Springer Berlin / Heidelberg, , 1986
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Cryptology - EUROCRYPT '87 : Workshop on the Theory and Application of Cryptographic Techniques, Amsterdam, the Netherlands, April 13-15, 1987 Proceedings
Advances in Cryptology - EUROCRYPT '87 : Workshop on the Theory and Application of Cryptographic Techniques, Amsterdam, the Netherlands, April 13-15, 1987 Proceedings
Autore Chaum David
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin / Heidelberg, , 1988
Descrizione fisica 1 online resource (290 pages)
Altri autori (Persone) PriceWyn L
Collana Lecture Notes in Computer Science
Soggetto non controllato Computer Security
Cryptography
Computers
Language Arts & Disciplines
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465823903316
Chaum David  
Berlin, Heidelberg : , : Springer Berlin / Heidelberg, , 1988
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Intelligent Information Hiding and Multimedia Signal Processing : Proceeding of the 18th IIH-MSP 2022 Kitakyushu, Japan, Volume 2 / / edited by Kazuhiro Kondo, Mong-Fong Horng, Jeng-Shyang Pan, Pei Hu
Advances in Intelligent Information Hiding and Multimedia Signal Processing : Proceeding of the 18th IIH-MSP 2022 Kitakyushu, Japan, Volume 2 / / edited by Kazuhiro Kondo, Mong-Fong Horng, Jeng-Shyang Pan, Pei Hu
Autore Kondo Kazuhiro
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (425 pages)
Disciplina 006.3
Altri autori (Persone) HorngMong-Fong
PanJeng-Shyang
HuPei
Collana Smart Innovation, Systems and Technologies
Soggetto topico Computational intelligence
Artificial intelligence
Multimedia systems
Data protection
Computational Intelligence
Artificial Intelligence
Multimedia Information Systems
Data and Information Security
Soggetto non controllato Artificial Intelligence
Interactive Multimedia
Computer Security
Engineering
Computers
Technology & Engineering
ISBN 981-9901-05-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. An Efficient Multilevel Threshold Image Segmentation Approach Based on Rafflesia Optimization Algorithm -- Chapter 2. Distributed Face Biometric with Blockchain Federated Learning -- Chapter 3. Region Guide Point for Depth Estimation -- Chapter 4. Research on PLC Communication Technology in Intelligent Loading Control System -- Chapter 5. Combined Synchronization for Fractional-order Chaotic Systems with Time Delay -- Chapter 6. A New Four-dimensional Discrete Chaotic System Is Used for S-box Masking -- Chapter 7. A Parallel Gannet Optimization Algorithm with Communication Strategies (PGOA) -- Chapter 8. Adaptive Target Tracking Algorithm Based on Template Updating and Graph-regularized Saliency -- Chapter 9. Fault Detection Method of Insulator Image based on Gabor Texture and Convolutional Neural Network -- Chapter 10. RGB-T Target Tracking based on Saliency with Graylevel Co-occurrence Matrix and KCF -- Chapter 11. An Optimal Power System Multi-objective Environmental Economic Planning Based on Moth-FLame Optimization -- Chapter 12. A Power-System Economic Dispatching Based on Enhanced Group Search Optimizer -- Chapter 13. Research Review on Security Protection Scheme of Distributed Photovoltaic Grid Connected Network -- Chapter 14. A Method of Constructing Fine-grained Pose Evaluation Model -- Chapter 15. Research on Meteorological Public Opinion Combining Domain Keywords and LinearSVC. etc.
Record Nr. UNINA-9910726277203321
Kondo Kazuhiro  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applications and Techniques in Information Security [[electronic resource] ] : 13th International Conference, ATIS 2022, Manipal, India, December 30–31, 2022, Revised Selected Papers / / edited by Srikanth Prabhu, Shiva Raj Pokhrel, Gang Li
Applications and Techniques in Information Security [[electronic resource] ] : 13th International Conference, ATIS 2022, Manipal, India, December 30–31, 2022, Revised Selected Papers / / edited by Srikanth Prabhu, Shiva Raj Pokhrel, Gang Li
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (311 pages)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Data protection
Artificial intelligence
Computer networks
Education—Data processing
Computer engineering
Data and Information Security
Artificial Intelligence
Computer Communication Networks
Computers and Education
Computer Engineering and Networks
Soggetto non controllato Computer Security
Computers
ISBN 981-9922-64-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy and Security -- Reinforcement Technique for Classifying Quasi and Non-Quasi Attributes for Privacy Preservation and Data Protection -- Non-malleable Codes from Authenticated Encryption in Split-State Model -- Continuously Non-Malleable Codes from Authenticated Encryptions in 2-Split-State Model -- Deep Learning based Differential Classifier of PRIDE and RC5 -- A Better MixColumns Matrix to AES Against Differential Fault Analysis Attack -- Variants of Crypto-Jacking Attacks and their detection techniques -- Comparative Study of Sentiment Analysis on Cyber Security Related Multi-Sourced Data in Social Media Platforms -- Modified Blowfish Encryption Algorithm for Wireless Body Area Network -- EyeEncrypt: A Cyber-Secured Framework for Retinal Image Segmentation -- Cosine Similarity based Group Movie Recommendation Scheme considering Privacy of Users -- Enhancing Face Recognition Accuracy using the ED-FFP Extraction Method and Ensemble Learning for Forensics and Cyber Security -- Intrusion Detection Using Federated Learning -- Advances in Machine Learning -- A Comparative Analysis of Classification Algorithms used for predicting Parkinson’s Disease -- Optimization of Cluster based Charging dynamics and routing of EV using Deep RNN -- Analysis and Prognosis of Water Quality for River Ganga using Water Quality Index -- Detection of Android Ransomware using Machine Learning Approach -- Cyber Security and Layering of Medical Data Using Machine Learning Algorithms -- Analysis on Classification of Handwritten Devanagari Characters using Deep Learning Models -- Cloud, IoT and Computing Technologies -- Analysis and Comparison of Different Frontend Frameworks -- Lightweight Capability-Based Access control for Internet of Things (IoT) -- Securing IoT using blockchain -- Vikas: A Multimodal framework to Aid in Effective Disaster Management -- Discovery of Rare Itemsets using Hyper-Linked Data Structure: A Parallel Approach.
Record Nr. UNISA-996546832503316
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applications and Techniques in Information Security : 13th International Conference, ATIS 2022, Manipal, India, December 30–31, 2022, Revised Selected Papers / / edited by Srikanth Prabhu, Shiva Raj Pokhrel, Gang Li
Applications and Techniques in Information Security : 13th International Conference, ATIS 2022, Manipal, India, December 30–31, 2022, Revised Selected Papers / / edited by Srikanth Prabhu, Shiva Raj Pokhrel, Gang Li
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (311 pages)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Data protection
Artificial intelligence
Computer networks
Education—Data processing
Computer engineering
Data and Information Security
Artificial Intelligence
Computer Communication Networks
Computers and Education
Computer Engineering and Networks
Soggetto non controllato Computer Security
Computers
ISBN 981-9922-64-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy and Security -- Reinforcement Technique for Classifying Quasi and Non-Quasi Attributes for Privacy Preservation and Data Protection -- Non-malleable Codes from Authenticated Encryption in Split-State Model -- Continuously Non-Malleable Codes from Authenticated Encryptions in 2-Split-State Model -- Deep Learning based Differential Classifier of PRIDE and RC5 -- A Better MixColumns Matrix to AES Against Differential Fault Analysis Attack -- Variants of Crypto-Jacking Attacks and their detection techniques -- Comparative Study of Sentiment Analysis on Cyber Security Related Multi-Sourced Data in Social Media Platforms -- Modified Blowfish Encryption Algorithm for Wireless Body Area Network -- EyeEncrypt: A Cyber-Secured Framework for Retinal Image Segmentation -- Cosine Similarity based Group Movie Recommendation Scheme considering Privacy of Users -- Enhancing Face Recognition Accuracy using the ED-FFP Extraction Method and Ensemble Learning for Forensics and Cyber Security -- Intrusion Detection Using Federated Learning -- Advances in Machine Learning -- A Comparative Analysis of Classification Algorithms used for predicting Parkinson’s Disease -- Optimization of Cluster based Charging dynamics and routing of EV using Deep RNN -- Analysis and Prognosis of Water Quality for River Ganga using Water Quality Index -- Detection of Android Ransomware using Machine Learning Approach -- Cyber Security and Layering of Medical Data Using Machine Learning Algorithms -- Analysis on Classification of Handwritten Devanagari Characters using Deep Learning Models -- Cloud, IoT and Computing Technologies -- Analysis and Comparison of Different Frontend Frameworks -- Lightweight Capability-Based Access control for Internet of Things (IoT) -- Securing IoT using blockchain -- Vikas: A Multimodal framework to Aid in Effective Disaster Management -- Discovery of Rare Itemsets using Hyper-Linked Data Structure: A Parallel Approach.
Record Nr. UNINA-9910726296103321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The Definitive Guide to PCI DSS Version 4 : Documentation, Compliance, and Management / / by Arthur B. Cooper Jr., Jeff Hall, David Mundhenk, Ben Rothke
The Definitive Guide to PCI DSS Version 4 : Documentation, Compliance, and Management / / by Arthur B. Cooper Jr., Jeff Hall, David Mundhenk, Ben Rothke
Autore Cooper Jr Arthur B
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2023
Descrizione fisica 1 online resource (264 pages)
Disciplina 005.8
Altri autori (Persone) HallJeff
MundhenkDavid
RothkeBen
Soggetto topico Credit cards - Security measures
Credit cards - Security measures - Standards
Soggetto non controllato Computer Security
Computers
ISBN 1-4842-9288-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. A Brief History of PCI -- Chapter 2. Install and Maintain Network Controls -- Chapter 3. Apply Secure Configurations to all System Components- Chapter 4. Protect Stored Account Data -- Chapter 5. Protect Cardholder Data with Strong Cryptography During Transmission Over Open, Public Networks -- Chapter 6. Protect All Systems and Networks from Malicious Software -- Chapter 7. Develop and Maintain Secure Systems and Software -- Chapter 8. Restrict Access to System Components and Cardholder Data by Business Need to Know -- Chapter 9. Identify Users and Authenticate Access to System Components -- Chapter 10. Restrict Physical Access to Cardholder Data -- Chapter 11. Log and Monitor All Access to System Components and Cardholder Data -- Chapter 12. Test Security of Systems and Networks Regularly -- Chapter 13. Support Information Security with Organizational Policies and Programs -- Chapter 14. How To Read a Service Provider Attestation of Compliance -- Chapter 15. Segmentation and tokenization -- Chapter 16. The Customized Approach, Compensating Controls, and the Targeted Risk Analysis.
Record Nr. UNINA-9910728382503321
Cooper Jr Arthur B  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information and Communication Technology for Competitive Strategies (ICTCS 2022) : ICT: Applications and Social Interfaces / / edited by Amit Joshi, Mufti Mahmud, Roshan G. Ragel
Information and Communication Technology for Competitive Strategies (ICTCS 2022) : ICT: Applications and Social Interfaces / / edited by Amit Joshi, Mufti Mahmud, Roshan G. Ragel
Autore Joshi Amit
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (866 pages)
Disciplina 621.382
Altri autori (Persone) MahmudMufti
RagelRoshan G
Collana Lecture Notes in Networks and Systems
Soggetto topico Telecommunication
Technology—Sociological aspects
Information technology
Data protection
Artificial intelligence
Computational intelligence
Communications Engineering, Networks
Information and Communication Technologies (ICT)
Data and Information Security
Artificial Intelligence
Computational Intelligence
Soggetto non controllato Sociology
Computer Security
Artificial Intelligence
Engineering
Telecommunication
Social Science
Computers
Technology & Engineering
ISBN 981-19-9638-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Optimization Accuracy of Tweets for Coronavirus Pandemic using BERT Based CNN Model -- Deep Learning Neural Networks for Forecasting the Abrasive Wear in machining tools for Cryogenic treatment by process parameter optimization -- Real Time Indian Sign Language Detection -- Measuring Impact of Text Features and Image Features on Classifier’s performance for Heterogeneous data formats -- Time delay approximation effect on open loop performance of a delayed industrial process model -- Enhancement Of The Effective Bandwidth Available To A Client Host In A Network By Using Multiple Network Devices Concurrently -- Enhanced dynamic source routing based on link capacity and queue optimization in MANET (DSR-LQ) -- Statistical Analysis of Feature Selection and Clustering for Building the Optimised Drug Toxicity Prediction Model -- Towards GPU Accelerated Computation for Stock Prediction Based on News Headlines -- A Novel Approach for the Enterprise Hospital Management Application with Full Stack Development -- IoT-Based Platform for Smart Automobile System -- Improving Attitudes of Underrepresented High School Students towards STEM: A Virtual Summer Program -- Diabetic Eye Diseases Detection and Classification Using Deep Learning Techniques - A Survey -- A Review to Analyze Insider Threats Using Machine Learning Techniques -- Machine Learning Model for the Email Spam Detection with Data Mining Techniques -- Statistical Investigation of Smoking Patterns and Smoking Cessation Enthusiasm in Rural Areas of Jaipur -- A Smart Assistive Device for the Blind People -- Implementing Fog Computing Architecture using AWS IoT Greengrass -- Detection of Log4j attack in SDN Environment -- Green marketing and its effects on consumer behavior -- Complementing Malware Epidemic Agent Based Models with Routing Protocols of Communication Networks using NetLogo -- Machine Learning and Deep Learning Methods for the Detection of Schizophrenia using Magnetic Resonance Images and EEG Signals: An Overview of the Recent Advancements.
Record Nr. UNINA-9910728952803321
Joshi Amit  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Innovations in Data Analytics : Selected Papers of ICIDA 2022 / / edited by Abhishek Bhattacharya, Soumi Dutta, Paramartha Dutta, Vincenzo Piuri
Innovations in Data Analytics : Selected Papers of ICIDA 2022 / / edited by Abhishek Bhattacharya, Soumi Dutta, Paramartha Dutta, Vincenzo Piuri
Autore Bhattacharya Abhishek
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (633 pages)
Disciplina 006.3
Altri autori (Persone) DuttaSoumi
DuttaParamartha
PiuriVincenzo
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computational intelligence
Quantitative research
Image processing—Digital techniques
Computer vision
Data protection
Telecommunication
Computational Intelligence
Data Analysis and Big Data
Computer Imaging, Vision, Pattern Recognition and Graphics
Data and Information Security
Communications Engineering, Networks
Soggetto non controllato Computer Security
Telecommunication
Engineering
Computers
Technology & Engineering
ISBN 981-9905-50-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Foreword -- Preface -- Contents -- About the Editors -- Computational Intelligence -- Transience in COVID Patients with Comorbidity Issues-A Systematic Review and Meta-Analysis Based on Indian and Southeast Asian Context -- 1 Introduction -- 1.1 Risk of COVID Patients with Comorbidity Issues -- 2 COVID Patient Statistics with Comorbidity Issues -- 3 Research Methodology -- 3.1 Search Strategy -- 4 Related Literature Survey in This Area -- 5 Discussion -- 6 Conclusion and Future Scope -- References -- NFT HUB-The Decentralized Non-Fungible Token Market Place -- 1 Introduction -- 1.1 Non-Fungible Token -- 1.2 Blockchain -- 2 Literature Survey -- 3 Proposed System -- 3.1 Blockchain -- 3.2 Ethereum Blockchain -- 3.3 Properties of Blockchain -- 3.4 Generic Elements of the Blockchain -- 3.5 Secure Hash Algorithm -- 4 Results and Discussion -- 4.1 Deployment Confirmation -- 4.2 Metamask Wallet -- 4.3 Minting Page -- 4.4 Transaction Address -- 4.5 Dashboard -- 5 Conclusion -- 5.1 Future Scope of the Project -- References -- Hashgraph: A Decentralized Security Approach Based on Blockchain with NFT Transactions -- 1 Introduction -- 1.1 Optimized Blockchain Server -- 2 Literature Survey -- 2.1 Survey Report: On Token Service -- 2.2 Survey Report: On Main-Net Access -- 2.3 Survey Report: Remove Centralized Control: Hala Systems -- 3 Proposed System -- 3.1 Non-Fungible Transaction -- 3.2 Blockchain Methodology -- 3.3 Gossip Protocol -- 3.4 Hashgraph -- 3.5 Consensus Algorithm [In Gossip Protocol] -- 3.6 HCS Implementation -- 4 Performance Evaluation -- 4.1 Transaction Cost Denomination of Our Network -- 4.2 Transaction Cost of Network on Blockchain NFT -- 5 Result and Discussion -- 6 Conclusion -- References -- Med Card: An Innovative Way to Keep Your Medical Records Handy and Safe -- 1 Introduction -- 1.1 What is Blockchain?.
1.2 What is Machine Learning? -- 2 Literature Review -- 3 Technologies Used -- 3.1 Blockchain in Health Care -- 3.2 Machine Learning in Health Care -- 4 Proposed Idea -- 4.1 What is a Med Card? -- 4.2 Workflow -- 5 Conclusion and Future Scope -- References -- Delta Operator-Based Modelling and Control of High Power Induction Motor Using Novel Chaotic Gorilla Troop Optimizer -- 1 Introduction -- 2 Formulation of the Problem -- 3 New Chaotic Gorilla Troop Optimizer -- 4 Simulation Ouput and Their Analysis -- 5 Conclusions -- References -- An Enhanced Optimize Outlier Detection Using Different Machine Learning Classifier -- 1 Introduction -- 2 Outlier Detection -- 3 Literature Review -- 4 Proposed Methodology -- 5 Simulation Result -- 6 Conclusion -- References -- Prediction of Disease Diagnosis for Smart Healthcare Systems Using Machine Learning Algorithm -- 1 Introduction -- 2 Heart Disease -- 3 Diabetes Mellitus -- 4 Proposed Methodology -- 5 Simulation Results -- 6 Conclusion -- References -- Optimization Accuracy on an Intelligent Approach to Detect Fake News on Twitter Using LSTM Neural Network -- 1 Introduction -- 2 Road Map of Methodology -- 2.1 Data Collection and Filtration -- 2.2 Pre-processing -- 2.3 Feature Extraction -- 2.4 Feature Selection -- 2.5 Classification -- 3 Proposed Methodology -- 4 Simulation Results -- 5 Conclusion -- References -- Advance Computing -- Mining User Interest Using Bayesian-PMF and Markov Chain Monte Carlo for Personalised Recommendation Systems -- 1 Introduction -- 2 Related Work and Background -- 3 Experimental Methodology -- 3.1 Probabilistic Matrix Factorization (PMF) -- 3.2 Bayesian-PMF with MCMC -- 3.3 Sparsity Reduction -- 3.4 Performance Measure -- 4 Proposed Architecture -- 5 Experimental Outcomes and Investigation -- 5.1 Dataset Description -- 6 Conclusion and Future Work -- References.
Big Data and Its Role in Cybersecurity -- 1 Introduction -- 2 Security Using Big Data -- 2.1 Use of Big Data Analytic (BDA) as Defense Tool -- 2.2 Cybersecurity and Machine Learning -- 3 Cybersecurity Approaches in Big Data -- 4 Research Trends and Challenges -- 4.1 Use of Big Data in Defense -- 4.2 Laws Regulating to Big Data -- 4.3 Distribution of Data for Storage -- 4.4 Security Technique Scalability in the Big Data -- 5 Conclusions -- References -- QR Code-Based Digital Payment System Using Visual Cryptography -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Implementation -- 4.1 Encryption -- 4.2 AES Algorithm -- 4.3 Decryption -- 5 Result -- 6 Conclusion -- References -- A Study of Different Approaches of Offloading for Mobile Cloud Computing -- 1 Introduction -- 2 Research Method -- 3 Offloading for Mobile Cloud Computing -- 4 Applications Suitable for Offloading in MCC -- 5 Different Offloading Approaches -- 6 Conclusion -- References -- Use of Machine Learning Models for Analyzing the Accuracy of Predicting the Cancerous Diseases -- 1 Introduction -- 2 Related Work -- 3 Machine Learning Models -- 3.1 Logistic Regression -- 3.2 Decision Tree -- 3.3 Random Forest Classifier -- 4 Experiment -- 4.1 Experiment Environment -- 4.2 Breast Cancer Dataset -- 5 Experimental Results -- 6 Conclusion -- References -- Predict Employee Promotion Using Supervised Classification Approaches -- 1 Introduction -- 2 Related Works -- 3 Implementation -- 3.1 Proposed Model -- 3.2 Data Collection -- 3.3 Data Analysis -- 3.4 Engineered Functions -- 3.5 Train-Test-Split -- 3.6 Model Building -- 4 Performance Evaluation -- 5 Conclusion -- References -- Smart Grid Analytics-Analyzing and Identifying Power Distribution Losses with the Help of Efficient Data Regression Algorithms -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Results.
5 Conclusion -- References -- Load Balancing on Cloud Using Genetic Algorithms -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 4 Results -- 5 Conclusions and Future Work -- References -- Network Security and Telecommunication -- Hybrid Feature Selection Approach to Classify IoT Network Traffic for Intrusion Detection System -- 1 Introduction -- 2 Literature Survey -- 3 Research Gaps -- 4 Proposed Work -- 4.1 Proposed Methodology -- 5 Experimental Results -- 5.1 Dataset Description -- 5.2 System Configuration -- 5.3 Model Parameters -- 5.4 Performance Parameters -- 6 Conclusion -- References -- A Deep Learning-Based Framework for Analyzing Stress Factors Among Working Women -- 1 Introduction -- 2 Literature Survey -- 3 Stress Factors (Stressors) -- 3.1 Deep Learning: Background -- 3.2 Deep Learning-Based Framework for Early Stress Detection -- 4 Results and Discussion -- 5 Conclusion -- References -- Automatic Question Generation -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Methodology -- 5 Conclusion and Future Scope -- References -- Automatic Construction of Named Entity Corpus for Adverse Drug Reaction Prediction -- 1 Introduction -- 2 Related Work -- 2.1 Biomedical Named Entity Recognition -- 2.2 Datasets for Biomedical Entity Recognition -- 3 Proposed Work -- 3.1 ADR Corpus Overview -- 3.2 Corpus Construction Steps -- 4 Results -- 4.1 Contributions -- 4.2 Statistics -- 5 Discussion -- References -- A Space Efficient Metadata Structure for Ranking Subset Sums -- 1 Introduction -- 1.1 Problem Formulation -- 1.2 Past Work -- 1.3 Our Contribution -- 2 Outline of Our Technique -- 3 Generation of Top-kk Subsets -- 3.1 The Metadata Structure upper GG -- 3.2 Construction of Metadata Structure upper GG -- 3.3 Query Answering with Heap -- 3.4 Modified Metadata Structure upper GG -- 3.5 The Final Structure of upper GG.
3.6 Generation of Top-kk Subsets by upper GG on Demand -- 3.7 Getting Rid of the Bit String -- 4 Experimental Results -- 4.1 Analysis of the Results -- 5 Conclusion -- References -- Brain Tumour Detection Using Machine Learning -- 1 Introduction -- 2 Literature Survey -- 3 Methodology and Materials -- 4 Results and Discussion -- 5 Conclusion and Future Scope -- References -- Implementation of a Smart Patient Health Tracking and Monitoring System Based on IoT and Wireless Technology -- 1 Overview -- 2 Block Diagram -- 3 Methodology and Results -- 3.1 Database Tracking and Maintenance -- 4 Conclusion and Future Scope -- References -- Diabetes Disease Prediction Using KNN -- 1 Introduction -- 2 Literature Survey -- 2.1 How is Data Science Revolutionizing the Healthcare Industry? -- 2.2 Role of Data Science in Health Care -- 2.3 Diabetes Detection Using Data Science -- 2.4 Flow of the Methodology Used for Diabetes Detection -- 3 Proposed System -- 4 Results -- 4.1 Experimental Results -- 4.2 Visualization of Obtained Results -- 5 Conclusion -- 6 Future Scope -- References -- Review: Application of Internet of Things (IoT) for Vehicle Simulation System -- 1 Introduction -- 2 Application -- 3 Basic Concepts of IoT -- 4 Simulation Concept -- 5 Simulation-Based Internet of Things -- 6 Application of Simulated IoT for System Used in Vehicle -- 7 Car Simulation Structure and Principle -- 8 Embedding Security Features in a Vehicle Using IoT -- 9 Conclusion and Future Scope -- References -- Data Science and Data Analytics -- Time Series Analysis and Forecast Accuracy Comparison of Models Using RMSE-Artificial Neural Networks -- 1 Introduction -- 2 Related Research -- 3 Neural Networks Models in Time Series -- 3.1 Feed-Forward Neural Network Model -- 3.2 Time-Lagged Neural Networks -- 3.3 Seasonal Artificial Neural Networks -- 3.4 Long Short-Term Memory (LSTM).
4 Time Series Analysis.
Record Nr. UNINA-9910728933703321
Bhattacharya Abhishek  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Recoverability as a first-class security objective : proceedings of a workshop
Recoverability as a first-class security objective : proceedings of a workshop
Pubbl/distr/stampa Washington, D. C. : , : The National Academies Press, , [2018]
Descrizione fisica 1 online resource (61 pages)
Disciplina 005.8
Soggetto topico Computer security
Soggetto non controllato Data Recovery (Computer Science)
Computer Security
Computers
ISBN 0-309-48373-5
0-309-48371-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910793008803321
Washington, D. C. : , : The National Academies Press, , [2018]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Recoverability as a first-class security objective : proceedings of a workshop
Recoverability as a first-class security objective : proceedings of a workshop
Pubbl/distr/stampa Washington, D. C. : , : The National Academies Press, , [2018]
Descrizione fisica 1 online resource (61 pages)
Disciplina 005.8
Soggetto topico Computer security
Soggetto non controllato Data Recovery (Computer Science)
Computer Security
Computers
ISBN 0-309-48373-5
0-309-48371-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910810990803321
Washington, D. C. : , : The National Academies Press, , [2018]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui