Advances in Cryptology - EUROCRYPT '85 : Proceedings of a Workshop on the Theory and Application of Cryptographic Techniques. Linz, Austria, April 9-11 1985 |
Autore | Pichler Franz |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin / Heidelberg, , 1986 |
Descrizione fisica | 1 online resource (280 pages) |
Collana | Lecture Notes in Computer Science |
Soggetto non controllato |
Computer Security
Cryptography Computers Language Arts & Disciplines |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465821503316 |
Pichler Franz | ||
Berlin, Heidelberg : , : Springer Berlin / Heidelberg, , 1986 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in Cryptology - EUROCRYPT '87 : Workshop on the Theory and Application of Cryptographic Techniques, Amsterdam, the Netherlands, April 13-15, 1987 Proceedings |
Autore | Chaum David |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin / Heidelberg, , 1988 |
Descrizione fisica | 1 online resource (290 pages) |
Altri autori (Persone) | PriceWyn L |
Collana | Lecture Notes in Computer Science |
Soggetto non controllato |
Computer Security
Cryptography Computers Language Arts & Disciplines |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465823903316 |
Chaum David | ||
Berlin, Heidelberg : , : Springer Berlin / Heidelberg, , 1988 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in Intelligent Information Hiding and Multimedia Signal Processing : Proceeding of the 18th IIH-MSP 2022 Kitakyushu, Japan, Volume 2 / / edited by Kazuhiro Kondo, Mong-Fong Horng, Jeng-Shyang Pan, Pei Hu |
Autore | Kondo Kazuhiro |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (425 pages) |
Disciplina | 006.3 |
Altri autori (Persone) |
HorngMong-Fong
PanJeng-Shyang HuPei |
Collana | Smart Innovation, Systems and Technologies |
Soggetto topico |
Computational intelligence
Artificial intelligence Multimedia systems Data protection Computational Intelligence Artificial Intelligence Multimedia Information Systems Data and Information Security |
Soggetto non controllato |
Artificial Intelligence
Interactive Multimedia Computer Security Engineering Computers Technology & Engineering |
ISBN | 981-9901-05-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1. An Efficient Multilevel Threshold Image Segmentation Approach Based on Rafflesia Optimization Algorithm -- Chapter 2. Distributed Face Biometric with Blockchain Federated Learning -- Chapter 3. Region Guide Point for Depth Estimation -- Chapter 4. Research on PLC Communication Technology in Intelligent Loading Control System -- Chapter 5. Combined Synchronization for Fractional-order Chaotic Systems with Time Delay -- Chapter 6. A New Four-dimensional Discrete Chaotic System Is Used for S-box Masking -- Chapter 7. A Parallel Gannet Optimization Algorithm with Communication Strategies (PGOA) -- Chapter 8. Adaptive Target Tracking Algorithm Based on Template Updating and Graph-regularized Saliency -- Chapter 9. Fault Detection Method of Insulator Image based on Gabor Texture and Convolutional Neural Network -- Chapter 10. RGB-T Target Tracking based on Saliency with Graylevel Co-occurrence Matrix and KCF -- Chapter 11. An Optimal Power System Multi-objective Environmental Economic Planning Based on Moth-FLame Optimization -- Chapter 12. A Power-System Economic Dispatching Based on Enhanced Group Search Optimizer -- Chapter 13. Research Review on Security Protection Scheme of Distributed Photovoltaic Grid Connected Network -- Chapter 14. A Method of Constructing Fine-grained Pose Evaluation Model -- Chapter 15. Research on Meteorological Public Opinion Combining Domain Keywords and LinearSVC. etc. |
Record Nr. | UNINA-9910726277203321 |
Kondo Kazuhiro | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Applications and Techniques in Information Security [[electronic resource] ] : 13th International Conference, ATIS 2022, Manipal, India, December 30–31, 2022, Revised Selected Papers / / edited by Srikanth Prabhu, Shiva Raj Pokhrel, Gang Li |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (311 pages) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Data protection
Artificial intelligence Computer networks Education—Data processing Computer engineering Data and Information Security Artificial Intelligence Computer Communication Networks Computers and Education Computer Engineering and Networks |
Soggetto non controllato |
Computer Security
Computers |
ISBN | 981-9922-64-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Privacy and Security -- Reinforcement Technique for Classifying Quasi and Non-Quasi Attributes for Privacy Preservation and Data Protection -- Non-malleable Codes from Authenticated Encryption in Split-State Model -- Continuously Non-Malleable Codes from Authenticated Encryptions in 2-Split-State Model -- Deep Learning based Differential Classifier of PRIDE and RC5 -- A Better MixColumns Matrix to AES Against Differential Fault Analysis Attack -- Variants of Crypto-Jacking Attacks and their detection techniques -- Comparative Study of Sentiment Analysis on Cyber Security Related Multi-Sourced Data in Social Media Platforms -- Modified Blowfish Encryption Algorithm for Wireless Body Area Network -- EyeEncrypt: A Cyber-Secured Framework for Retinal Image Segmentation -- Cosine Similarity based Group Movie Recommendation Scheme considering Privacy of Users -- Enhancing Face Recognition Accuracy using the ED-FFP Extraction Method and Ensemble Learning for Forensics and Cyber Security -- Intrusion Detection Using Federated Learning -- Advances in Machine Learning -- A Comparative Analysis of Classification Algorithms used for predicting Parkinson’s Disease -- Optimization of Cluster based Charging dynamics and routing of EV using Deep RNN -- Analysis and Prognosis of Water Quality for River Ganga using Water Quality Index -- Detection of Android Ransomware using Machine Learning Approach -- Cyber Security and Layering of Medical Data Using Machine Learning Algorithms -- Analysis on Classification of Handwritten Devanagari Characters using Deep Learning Models -- Cloud, IoT and Computing Technologies -- Analysis and Comparison of Different Frontend Frameworks -- Lightweight Capability-Based Access control for Internet of Things (IoT) -- Securing IoT using blockchain -- Vikas: A Multimodal framework to Aid in Effective Disaster Management -- Discovery of Rare Itemsets using Hyper-Linked Data Structure: A Parallel Approach. |
Record Nr. | UNISA-996546832503316 |
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Applications and Techniques in Information Security : 13th International Conference, ATIS 2022, Manipal, India, December 30–31, 2022, Revised Selected Papers / / edited by Srikanth Prabhu, Shiva Raj Pokhrel, Gang Li |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (311 pages) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Data protection
Artificial intelligence Computer networks Education—Data processing Computer engineering Data and Information Security Artificial Intelligence Computer Communication Networks Computers and Education Computer Engineering and Networks |
Soggetto non controllato |
Computer Security
Computers |
ISBN | 981-9922-64-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Privacy and Security -- Reinforcement Technique for Classifying Quasi and Non-Quasi Attributes for Privacy Preservation and Data Protection -- Non-malleable Codes from Authenticated Encryption in Split-State Model -- Continuously Non-Malleable Codes from Authenticated Encryptions in 2-Split-State Model -- Deep Learning based Differential Classifier of PRIDE and RC5 -- A Better MixColumns Matrix to AES Against Differential Fault Analysis Attack -- Variants of Crypto-Jacking Attacks and their detection techniques -- Comparative Study of Sentiment Analysis on Cyber Security Related Multi-Sourced Data in Social Media Platforms -- Modified Blowfish Encryption Algorithm for Wireless Body Area Network -- EyeEncrypt: A Cyber-Secured Framework for Retinal Image Segmentation -- Cosine Similarity based Group Movie Recommendation Scheme considering Privacy of Users -- Enhancing Face Recognition Accuracy using the ED-FFP Extraction Method and Ensemble Learning for Forensics and Cyber Security -- Intrusion Detection Using Federated Learning -- Advances in Machine Learning -- A Comparative Analysis of Classification Algorithms used for predicting Parkinson’s Disease -- Optimization of Cluster based Charging dynamics and routing of EV using Deep RNN -- Analysis and Prognosis of Water Quality for River Ganga using Water Quality Index -- Detection of Android Ransomware using Machine Learning Approach -- Cyber Security and Layering of Medical Data Using Machine Learning Algorithms -- Analysis on Classification of Handwritten Devanagari Characters using Deep Learning Models -- Cloud, IoT and Computing Technologies -- Analysis and Comparison of Different Frontend Frameworks -- Lightweight Capability-Based Access control for Internet of Things (IoT) -- Securing IoT using blockchain -- Vikas: A Multimodal framework to Aid in Effective Disaster Management -- Discovery of Rare Itemsets using Hyper-Linked Data Structure: A Parallel Approach. |
Record Nr. | UNINA-9910726296103321 |
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The Definitive Guide to PCI DSS Version 4 : Documentation, Compliance, and Management / / by Arthur B. Cooper Jr., Jeff Hall, David Mundhenk, Ben Rothke |
Autore | Cooper Jr Arthur B |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2023 |
Descrizione fisica | 1 online resource (264 pages) |
Disciplina | 005.8 |
Altri autori (Persone) |
HallJeff
MundhenkDavid RothkeBen |
Soggetto topico |
Credit cards - Security measures
Credit cards - Security measures - Standards |
Soggetto non controllato |
Computer Security
Computers |
ISBN | 1-4842-9288-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1. A Brief History of PCI -- Chapter 2. Install and Maintain Network Controls -- Chapter 3. Apply Secure Configurations to all System Components- Chapter 4. Protect Stored Account Data -- Chapter 5. Protect Cardholder Data with Strong Cryptography During Transmission Over Open, Public Networks -- Chapter 6. Protect All Systems and Networks from Malicious Software -- Chapter 7. Develop and Maintain Secure Systems and Software -- Chapter 8. Restrict Access to System Components and Cardholder Data by Business Need to Know -- Chapter 9. Identify Users and Authenticate Access to System Components -- Chapter 10. Restrict Physical Access to Cardholder Data -- Chapter 11. Log and Monitor All Access to System Components and Cardholder Data -- Chapter 12. Test Security of Systems and Networks Regularly -- Chapter 13. Support Information Security with Organizational Policies and Programs -- Chapter 14. How To Read a Service Provider Attestation of Compliance -- Chapter 15. Segmentation and tokenization -- Chapter 16. The Customized Approach, Compensating Controls, and the Targeted Risk Analysis. |
Record Nr. | UNINA-9910728382503321 |
Cooper Jr Arthur B | ||
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information and Communication Technology for Competitive Strategies (ICTCS 2022) : ICT: Applications and Social Interfaces / / edited by Amit Joshi, Mufti Mahmud, Roshan G. Ragel |
Autore | Joshi Amit |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (866 pages) |
Disciplina | 621.382 |
Altri autori (Persone) |
MahmudMufti
RagelRoshan G |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Telecommunication
Technology—Sociological aspects Information technology Data protection Artificial intelligence Computational intelligence Communications Engineering, Networks Information and Communication Technologies (ICT) Data and Information Security Artificial Intelligence Computational Intelligence |
Soggetto non controllato |
Sociology
Computer Security Artificial Intelligence Engineering Telecommunication Social Science Computers Technology & Engineering |
ISBN | 981-19-9638-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Optimization Accuracy of Tweets for Coronavirus Pandemic using BERT Based CNN Model -- Deep Learning Neural Networks for Forecasting the Abrasive Wear in machining tools for Cryogenic treatment by process parameter optimization -- Real Time Indian Sign Language Detection -- Measuring Impact of Text Features and Image Features on Classifier’s performance for Heterogeneous data formats -- Time delay approximation effect on open loop performance of a delayed industrial process model -- Enhancement Of The Effective Bandwidth Available To A Client Host In A Network By Using Multiple Network Devices Concurrently -- Enhanced dynamic source routing based on link capacity and queue optimization in MANET (DSR-LQ) -- Statistical Analysis of Feature Selection and Clustering for Building the Optimised Drug Toxicity Prediction Model -- Towards GPU Accelerated Computation for Stock Prediction Based on News Headlines -- A Novel Approach for the Enterprise Hospital Management Application with Full Stack Development -- IoT-Based Platform for Smart Automobile System -- Improving Attitudes of Underrepresented High School Students towards STEM: A Virtual Summer Program -- Diabetic Eye Diseases Detection and Classification Using Deep Learning Techniques - A Survey -- A Review to Analyze Insider Threats Using Machine Learning Techniques -- Machine Learning Model for the Email Spam Detection with Data Mining Techniques -- Statistical Investigation of Smoking Patterns and Smoking Cessation Enthusiasm in Rural Areas of Jaipur -- A Smart Assistive Device for the Blind People -- Implementing Fog Computing Architecture using AWS IoT Greengrass -- Detection of Log4j attack in SDN Environment -- Green marketing and its effects on consumer behavior -- Complementing Malware Epidemic Agent Based Models with Routing Protocols of Communication Networks using NetLogo -- Machine Learning and Deep Learning Methods for the Detection of Schizophrenia using Magnetic Resonance Images and EEG Signals: An Overview of the Recent Advancements. |
Record Nr. | UNINA-9910728952803321 |
Joshi Amit | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Innovations in Data Analytics : Selected Papers of ICIDA 2022 / / edited by Abhishek Bhattacharya, Soumi Dutta, Paramartha Dutta, Vincenzo Piuri |
Autore | Bhattacharya Abhishek |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (633 pages) |
Disciplina | 006.3 |
Altri autori (Persone) |
DuttaSoumi
DuttaParamartha PiuriVincenzo |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Computational intelligence
Quantitative research Image processing—Digital techniques Computer vision Data protection Telecommunication Computational Intelligence Data Analysis and Big Data Computer Imaging, Vision, Pattern Recognition and Graphics Data and Information Security Communications Engineering, Networks |
Soggetto non controllato |
Computer Security
Telecommunication Engineering Computers Technology & Engineering |
ISBN | 981-9905-50-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Foreword -- Preface -- Contents -- About the Editors -- Computational Intelligence -- Transience in COVID Patients with Comorbidity Issues-A Systematic Review and Meta-Analysis Based on Indian and Southeast Asian Context -- 1 Introduction -- 1.1 Risk of COVID Patients with Comorbidity Issues -- 2 COVID Patient Statistics with Comorbidity Issues -- 3 Research Methodology -- 3.1 Search Strategy -- 4 Related Literature Survey in This Area -- 5 Discussion -- 6 Conclusion and Future Scope -- References -- NFT HUB-The Decentralized Non-Fungible Token Market Place -- 1 Introduction -- 1.1 Non-Fungible Token -- 1.2 Blockchain -- 2 Literature Survey -- 3 Proposed System -- 3.1 Blockchain -- 3.2 Ethereum Blockchain -- 3.3 Properties of Blockchain -- 3.4 Generic Elements of the Blockchain -- 3.5 Secure Hash Algorithm -- 4 Results and Discussion -- 4.1 Deployment Confirmation -- 4.2 Metamask Wallet -- 4.3 Minting Page -- 4.4 Transaction Address -- 4.5 Dashboard -- 5 Conclusion -- 5.1 Future Scope of the Project -- References -- Hashgraph: A Decentralized Security Approach Based on Blockchain with NFT Transactions -- 1 Introduction -- 1.1 Optimized Blockchain Server -- 2 Literature Survey -- 2.1 Survey Report: On Token Service -- 2.2 Survey Report: On Main-Net Access -- 2.3 Survey Report: Remove Centralized Control: Hala Systems -- 3 Proposed System -- 3.1 Non-Fungible Transaction -- 3.2 Blockchain Methodology -- 3.3 Gossip Protocol -- 3.4 Hashgraph -- 3.5 Consensus Algorithm [In Gossip Protocol] -- 3.6 HCS Implementation -- 4 Performance Evaluation -- 4.1 Transaction Cost Denomination of Our Network -- 4.2 Transaction Cost of Network on Blockchain NFT -- 5 Result and Discussion -- 6 Conclusion -- References -- Med Card: An Innovative Way to Keep Your Medical Records Handy and Safe -- 1 Introduction -- 1.1 What is Blockchain?.
1.2 What is Machine Learning? -- 2 Literature Review -- 3 Technologies Used -- 3.1 Blockchain in Health Care -- 3.2 Machine Learning in Health Care -- 4 Proposed Idea -- 4.1 What is a Med Card? -- 4.2 Workflow -- 5 Conclusion and Future Scope -- References -- Delta Operator-Based Modelling and Control of High Power Induction Motor Using Novel Chaotic Gorilla Troop Optimizer -- 1 Introduction -- 2 Formulation of the Problem -- 3 New Chaotic Gorilla Troop Optimizer -- 4 Simulation Ouput and Their Analysis -- 5 Conclusions -- References -- An Enhanced Optimize Outlier Detection Using Different Machine Learning Classifier -- 1 Introduction -- 2 Outlier Detection -- 3 Literature Review -- 4 Proposed Methodology -- 5 Simulation Result -- 6 Conclusion -- References -- Prediction of Disease Diagnosis for Smart Healthcare Systems Using Machine Learning Algorithm -- 1 Introduction -- 2 Heart Disease -- 3 Diabetes Mellitus -- 4 Proposed Methodology -- 5 Simulation Results -- 6 Conclusion -- References -- Optimization Accuracy on an Intelligent Approach to Detect Fake News on Twitter Using LSTM Neural Network -- 1 Introduction -- 2 Road Map of Methodology -- 2.1 Data Collection and Filtration -- 2.2 Pre-processing -- 2.3 Feature Extraction -- 2.4 Feature Selection -- 2.5 Classification -- 3 Proposed Methodology -- 4 Simulation Results -- 5 Conclusion -- References -- Advance Computing -- Mining User Interest Using Bayesian-PMF and Markov Chain Monte Carlo for Personalised Recommendation Systems -- 1 Introduction -- 2 Related Work and Background -- 3 Experimental Methodology -- 3.1 Probabilistic Matrix Factorization (PMF) -- 3.2 Bayesian-PMF with MCMC -- 3.3 Sparsity Reduction -- 3.4 Performance Measure -- 4 Proposed Architecture -- 5 Experimental Outcomes and Investigation -- 5.1 Dataset Description -- 6 Conclusion and Future Work -- References. Big Data and Its Role in Cybersecurity -- 1 Introduction -- 2 Security Using Big Data -- 2.1 Use of Big Data Analytic (BDA) as Defense Tool -- 2.2 Cybersecurity and Machine Learning -- 3 Cybersecurity Approaches in Big Data -- 4 Research Trends and Challenges -- 4.1 Use of Big Data in Defense -- 4.2 Laws Regulating to Big Data -- 4.3 Distribution of Data for Storage -- 4.4 Security Technique Scalability in the Big Data -- 5 Conclusions -- References -- QR Code-Based Digital Payment System Using Visual Cryptography -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Implementation -- 4.1 Encryption -- 4.2 AES Algorithm -- 4.3 Decryption -- 5 Result -- 6 Conclusion -- References -- A Study of Different Approaches of Offloading for Mobile Cloud Computing -- 1 Introduction -- 2 Research Method -- 3 Offloading for Mobile Cloud Computing -- 4 Applications Suitable for Offloading in MCC -- 5 Different Offloading Approaches -- 6 Conclusion -- References -- Use of Machine Learning Models for Analyzing the Accuracy of Predicting the Cancerous Diseases -- 1 Introduction -- 2 Related Work -- 3 Machine Learning Models -- 3.1 Logistic Regression -- 3.2 Decision Tree -- 3.3 Random Forest Classifier -- 4 Experiment -- 4.1 Experiment Environment -- 4.2 Breast Cancer Dataset -- 5 Experimental Results -- 6 Conclusion -- References -- Predict Employee Promotion Using Supervised Classification Approaches -- 1 Introduction -- 2 Related Works -- 3 Implementation -- 3.1 Proposed Model -- 3.2 Data Collection -- 3.3 Data Analysis -- 3.4 Engineered Functions -- 3.5 Train-Test-Split -- 3.6 Model Building -- 4 Performance Evaluation -- 5 Conclusion -- References -- Smart Grid Analytics-Analyzing and Identifying Power Distribution Losses with the Help of Efficient Data Regression Algorithms -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Results. 5 Conclusion -- References -- Load Balancing on Cloud Using Genetic Algorithms -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 4 Results -- 5 Conclusions and Future Work -- References -- Network Security and Telecommunication -- Hybrid Feature Selection Approach to Classify IoT Network Traffic for Intrusion Detection System -- 1 Introduction -- 2 Literature Survey -- 3 Research Gaps -- 4 Proposed Work -- 4.1 Proposed Methodology -- 5 Experimental Results -- 5.1 Dataset Description -- 5.2 System Configuration -- 5.3 Model Parameters -- 5.4 Performance Parameters -- 6 Conclusion -- References -- A Deep Learning-Based Framework for Analyzing Stress Factors Among Working Women -- 1 Introduction -- 2 Literature Survey -- 3 Stress Factors (Stressors) -- 3.1 Deep Learning: Background -- 3.2 Deep Learning-Based Framework for Early Stress Detection -- 4 Results and Discussion -- 5 Conclusion -- References -- Automatic Question Generation -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Methodology -- 5 Conclusion and Future Scope -- References -- Automatic Construction of Named Entity Corpus for Adverse Drug Reaction Prediction -- 1 Introduction -- 2 Related Work -- 2.1 Biomedical Named Entity Recognition -- 2.2 Datasets for Biomedical Entity Recognition -- 3 Proposed Work -- 3.1 ADR Corpus Overview -- 3.2 Corpus Construction Steps -- 4 Results -- 4.1 Contributions -- 4.2 Statistics -- 5 Discussion -- References -- A Space Efficient Metadata Structure for Ranking Subset Sums -- 1 Introduction -- 1.1 Problem Formulation -- 1.2 Past Work -- 1.3 Our Contribution -- 2 Outline of Our Technique -- 3 Generation of Top-kk Subsets -- 3.1 The Metadata Structure upper GG -- 3.2 Construction of Metadata Structure upper GG -- 3.3 Query Answering with Heap -- 3.4 Modified Metadata Structure upper GG -- 3.5 The Final Structure of upper GG. 3.6 Generation of Top-kk Subsets by upper GG on Demand -- 3.7 Getting Rid of the Bit String -- 4 Experimental Results -- 4.1 Analysis of the Results -- 5 Conclusion -- References -- Brain Tumour Detection Using Machine Learning -- 1 Introduction -- 2 Literature Survey -- 3 Methodology and Materials -- 4 Results and Discussion -- 5 Conclusion and Future Scope -- References -- Implementation of a Smart Patient Health Tracking and Monitoring System Based on IoT and Wireless Technology -- 1 Overview -- 2 Block Diagram -- 3 Methodology and Results -- 3.1 Database Tracking and Maintenance -- 4 Conclusion and Future Scope -- References -- Diabetes Disease Prediction Using KNN -- 1 Introduction -- 2 Literature Survey -- 2.1 How is Data Science Revolutionizing the Healthcare Industry? -- 2.2 Role of Data Science in Health Care -- 2.3 Diabetes Detection Using Data Science -- 2.4 Flow of the Methodology Used for Diabetes Detection -- 3 Proposed System -- 4 Results -- 4.1 Experimental Results -- 4.2 Visualization of Obtained Results -- 5 Conclusion -- 6 Future Scope -- References -- Review: Application of Internet of Things (IoT) for Vehicle Simulation System -- 1 Introduction -- 2 Application -- 3 Basic Concepts of IoT -- 4 Simulation Concept -- 5 Simulation-Based Internet of Things -- 6 Application of Simulated IoT for System Used in Vehicle -- 7 Car Simulation Structure and Principle -- 8 Embedding Security Features in a Vehicle Using IoT -- 9 Conclusion and Future Scope -- References -- Data Science and Data Analytics -- Time Series Analysis and Forecast Accuracy Comparison of Models Using RMSE-Artificial Neural Networks -- 1 Introduction -- 2 Related Research -- 3 Neural Networks Models in Time Series -- 3.1 Feed-Forward Neural Network Model -- 3.2 Time-Lagged Neural Networks -- 3.3 Seasonal Artificial Neural Networks -- 3.4 Long Short-Term Memory (LSTM). 4 Time Series Analysis. |
Record Nr. | UNINA-9910728933703321 |
Bhattacharya Abhishek | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Recoverability as a first-class security objective : proceedings of a workshop |
Pubbl/distr/stampa | Washington, D. C. : , : The National Academies Press, , [2018] |
Descrizione fisica | 1 online resource (61 pages) |
Disciplina | 005.8 |
Soggetto topico | Computer security |
Soggetto non controllato |
Data Recovery (Computer Science)
Computer Security Computers |
ISBN |
0-309-48373-5
0-309-48371-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910793008803321 |
Washington, D. C. : , : The National Academies Press, , [2018] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Recoverability as a first-class security objective : proceedings of a workshop |
Pubbl/distr/stampa | Washington, D. C. : , : The National Academies Press, , [2018] |
Descrizione fisica | 1 online resource (61 pages) |
Disciplina | 005.8 |
Soggetto topico | Computer security |
Soggetto non controllato |
Data Recovery (Computer Science)
Computer Security Computers |
ISBN |
0-309-48373-5
0-309-48371-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910810990803321 |
Washington, D. C. : , : The National Academies Press, , [2018] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|