top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
The 11th International Conference on EUropean Transnational Educational (ICEUTE 2020) [[electronic resource] /] / edited by Álvaro Herrero, Carlos Cambra, Daniel Urda, Javier Sedano, Héctor Quintián, Emilio Corchado
The 11th International Conference on EUropean Transnational Educational (ICEUTE 2020) [[electronic resource] /] / edited by Álvaro Herrero, Carlos Cambra, Daniel Urda, Javier Sedano, Héctor Quintián, Emilio Corchado
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (450 pages)
Disciplina 371.33
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computational intelligence
Engineering—Data processing
Education
Computational Intelligence
Data Engineering
Education, general
ISBN 3-030-57799-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910733724103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The 12th Conference on Information Technology and Its Applications [[electronic resource] ] : Proceedings of the International Conference CITA 2023 / / edited by Ngoc Thanh Nguyen, Hoa Le-Minh, Cong-Phap Huynh, Quang-Vu Nguyen
The 12th Conference on Information Technology and Its Applications [[electronic resource] ] : Proceedings of the International Conference CITA 2023 / / edited by Ngoc Thanh Nguyen, Hoa Le-Minh, Cong-Phap Huynh, Quang-Vu Nguyen
Autore Nguyen Ngoc Thanh
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (414 pages)
Disciplina 004
Altri autori (Persone) Le-MinhHoa
HuynhCong Phap
NguyenQuang-Vu
Collana Lecture Notes in Networks and Systems
Soggetto topico Engineering—Data processing
Computational intelligence
Artificial intelligence
Data Engineering
Computational Intelligence
Artificial Intelligence
ISBN 3-031-36886-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Conference Organization -- Contents -- Data Science and Artificial Intelligence -- A New ConvMixer-Based Approach for Diagnosis of Fault Bearing Using Signal Spectrum -- 1 Introduction -- 2 Related Work -- 2.1 Conv-Mixer Neural Networks -- 2.2 Siamese Neural Networks -- 3 Methodology -- 3.1 General Architecture for Failure Diagnosis -- 3.2 The Proposed Siamese-Based Conv-Mixer Model -- 3.3 Diagnosis Network -- 4 Experiment -- 4.1 Datasets -- 4.2 Training -- 4.3 Results -- 4.4 Comparison -- 5 Conclusion -- References -- Differentially-Private Distributed Machine Learning with Partial Worker Attendance: A Flexible and Efficient Approach -- 1 Introduction -- 1.1 Background -- 1.2 Our Contributions -- 1.3 Paper Organization -- 2 Preliminaries -- 3 Our Proposed Algorithm -- 4 Experiments -- 5 Conclusion -- References -- Building Legal Knowledge Map Repository with NLP Toolkits -- 1 Introduction -- 2 Legal Knowledge Maps -- 2.1 Modeling -- 2.2 Hierarchy of Legislation -- 2.3 Legal Ontology Design -- 2.4 Legal Knowledge Map Construction -- 3 Implementation -- 3.1 Materials -- 3.2 Vietnamese NLP Toolkits -- 3.3 Building VLegalKMaps as Linked Data -- 4 Validations -- 4.1 Experiment Setup -- 4.2 Case Study -- 4.3 Statistics and Discussions -- 5 Conclusions and Future Works -- References -- Classification of Ransomware Families Based on Hashing Techniques -- 1 Introduction -- 2 Overview of Hashing Techniques in Malware Analysis -- 3 The Proposed Method -- 3.1 The Combined Analysis Method of Imphash, File Level Ssdeep Hashing, and Section Level Ssdeep Hashing -- 3.2 Preparing the Database -- 3.3 Predictive Model -- 3.4 Evaluation Criteria -- 4 Evaluations and Results -- 4.1 Experiment with Test Set Containing only Ransomware -- 4.2 Experiment with Test Set Containing both Malicious and Benign Samples.
4.3 Advantages and Limitations of the Proposed Method -- 5 Conclusions -- References -- Towards a New Multi-tasking Learning Approach for Human Fall Detection -- 1 Introduction -- 2 Related Work -- 2.1 Simulated Falls -- 2.2 Real Falls -- 2.3 Multi-task Learning -- 2.4 Summary -- 3 Multi-task Deep Neural Network for Fall Detection -- 3.1 Multiple Classifiers -- 3.2 Temporal Convolutional Network as a Feature Extractor -- 3.3 Re-sampling for Class and Task Balance -- 3.4 Data Augmentation -- 4 Experiments -- 4.1 Datasets -- 4.2 Experiment Settings -- 4.3 Evaluation and Discussion -- 5 Conclusion and Future Work -- References -- A Comparative Study of Wrapper Feature Selection Techniques in Software Fault Prediction -- 1 Introduction -- 2 Related Work -- 3 Feature Selection -- 3.1 Software Metrics -- 3.2 Genetic Algorithm -- 3.3 Particle Swarm Optimization -- 3.4 Whale Optimization Algorithm -- 3.5 Cuckoo Search -- 3.6 Mayfly Algorithm -- 3.7 Binary Bat Algorithm -- 3.8 Feature Selection Details -- 4 Methodology -- 4.1 Proposed Approach -- 4.2 VanillaGAN for Handling Imbalanced Data -- 4.3 Dataset -- 4.4 Evaluation Measurement -- 5 Experimental Result -- 6 Conclusion -- References -- Incorporating Natural Language-Based and Sequence-Based Features to Predict Protein Sumoylation Sites -- 1 Introduction -- 2 Methodology -- 2.1 Data Preparation and Pre-processing -- 2.2 Feature Extraction and Encoding -- 2.3 Model Construction, Learning and Evaluation -- 3 Results and Discussion -- 3.1 Impact of Amino Acid Composition and Single Features -- 3.2 Impact of Hybrid Features -- 3.3 RSXSUMO Model Construction -- 3.4 Comparison with Other Predictors -- 4 Conclusion -- References -- A Model for Alliance Partner Selection Based on GM (1, 1) and DEA Frameworks - Case of Vietnamese Coffee Industry -- 1 Introduction -- 2 Related Works -- 2.1 Strategic Alliance.
2.2 Grey Forecasting Model -- 2.3 Data Envelopment Analysis -- 3 Proposal Research -- 4 Case Study -- 4.1 DMU Collection -- 4.2 Inputs and Outputs Selection -- 4.3 Forecast the Performance of All DMU by GM (1, 1) Model. -- 4.4 Analysis Performance Before Alliance -- 4.5 Analysis the Performance After Alliance -- 5 Conclusions -- References -- Car Detector Based on YOLOv5 for Parking Management -- 1 Introduction -- 2 Related Works -- 2.1 Traditional Machine Learning-Based Methods -- 2.2 CNN-Based Methods -- 3 Methodology -- 3.1 Proposed Network Architecture -- 3.2 Loss Function -- 4 Experiments -- 4.1 Datasets -- 4.2 Experimental Setup -- 4.3 Experimental Results -- 4.4 Ablation Study -- 5 Conclusion -- References -- Deep Learning-Based Approach for Automatic Detection of Malaria in Peripheral Blood Smear Images -- 1 Introduction -- 2 Related Works -- 3 Experiments -- 3.1 Data Collection -- 3.2 Exploratory Data Analysis -- 3.3 Two-Stage Approach -- 4 Results and Discussions -- 4.1 Evaluation Metrics -- 4.2 Results -- 5 Conclusion -- References -- An Improved Transfer Learning-Based Approach for Detecting Abnormal Cervical Cells from Pap Smear Microscopic Images -- 1 Introduction -- 2 Abnormal Cervical Cells and Preprocessing Data -- 2.1 Abnormal Cervical Cells -- 2.2 Exploratory Data Analysis and Preprocessing -- 3 Transfer Learning and Proposed Approach -- 3.1 ResNet50v2 -- 3.2 EfficientNetv2L -- 3.3 Proposed Approach Based on Transfer Learning -- 4 Experimental Results -- 5 Conclusion -- References -- Digital Economy -- Emotional Intelligence and Social Media Site Experiences' Effects on College Choice Behavior: The Mediating Role of Brand Attitude -- 1 Introduction -- 2 Theoretical Background and Hypotheses -- 2.1 Website Experiences and Emotional intelligence -- 2.2 The Attitude Toward Website Model - AWS Model.
2.3 The Research Model and Hypotheses -- 3 Research Method -- 4 Research Result -- 4.1 Descriptive Data Statistics -- 4.2 Reliability Test Results -- 4.3 Exploratory Factor Analysis (EFA) Results -- 4.4 Research Model Testing -- 5 Discussion -- 6 Conclusion -- References -- Image and Natural Language Processing -- A Multi Context Decoder-based Network with Applications for Polyp Segmentation in Colonoscopy Images -- 1 Introduction -- 2 Related Work -- 2.1 Vision Transformer -- 2.2 Fusion On Multi Resolution Feature Map -- 3 Methodology -- 3.1 Overview -- 3.2 Generate Context Feature Map (GCF) -- 3.3 Decoder Block -- 4 Experiments -- 4.1 Dataset -- 4.2 Evaluation Metrics -- 4.3 Implementation Details -- 4.4 Representative Results -- 4.5 Comparative Results -- 5 Conclusion -- References -- AMG-Mixer: A Multi-Axis Attention MLP-Mixer Architecture for Biomedical Image Segmentation -- 1 Introduction -- 2 Related Work -- 3 Proposed Network Architecture -- 3.1 AxialMBConv Token Mix and Mixer Building Block -- 3.2 Multi-scale Multi-axis MLP Gated (MS-MAMG) -- 3.3 Decoder Unit -- 4 Experiments -- 4.1 Datasets -- 4.2 Training Strategy -- 4.3 Evaluation Metrics -- 4.4 Representative Results -- 4.5 Comparative Results -- 5 Conclusion -- References -- Investigating YOLO Models for Rice Seed Classification -- 1 Introduction -- 2 Methodology -- 2.1 YOLOv5 -- 2.2 YOLOv6 -- 2.3 YOLOv7 -- 3 Experiments and Results -- 3.1 Data Description -- 3.2 Performance Indicator -- 3.3 Result and Discussion -- 4 Conclusion -- References -- Extending OCR Model for Font and Style Classification -- 1 Introduction -- 2 Related Works -- 3 Methods -- 3.1 Problem Formulation -- 3.2 Overview -- 3.3 Encoder -- 3.4 Decoder -- 3.5 Image-wise Font Clsasification -- 3.6 Style Classification -- 3.7 Loss Function -- 4 Experiments -- 4.1 Experiment Setting -- 4.2 Benchmarks.
4.3 Experiment Result and Discussion -- 5 Conclusion -- References -- STG-SimVP: Spatiotemporal GAN-Based SimVP for Video Prediction -- 1 Introduction -- 2 Related Work -- 2.1 Video Frame Synthesis -- 2.2 Generative Adversarial Networks - GAN -- 2.3 SimVP -- 3 Proposed Methods -- 3.1 STG-SimVP -- 3.2 Dual Discriminators -- 3.3 Objective Function -- 4 Experiments -- 4.1 Datasets -- 4.2 Training Details -- 4.3 Comparisons With State-of-the-Art Methods -- 5 Ablation Study -- 6 Limitations -- 7 Conclusion -- References -- Tritention U-Net: A Modified U-Net Architecture for Lung Tumor Segmentation -- 1 Introduction -- 2 Tritention U-Net Architechture (TU-Net) -- 2.1 Architechture Overview -- 2.2 Backbone U-Net Architecture -- 2.3 Tritention Gate -- 3 Experimental and Results -- 3.1 Dataset -- 3.2 Experimental Setup -- 3.3 Results -- 4 Conclusion -- References -- Multi-modal with Multiple Image Filters for Facial Emotion Recognition -- 1 Introduction -- 2 Multiple Filter Levels for FER -- 2.1 Multiple Model -- 2.2 Dropping Pixels - Processor -- 2.3 Blurring Image - Processor -- 3 Experimental and Results -- 3.1 Dataset -- 3.2 Experimental Setup -- 3.3 Results -- 4 Conclusion -- References -- Few-Shots Novel Space-Time View Synthesis from Consecutive Photos -- 1 Introduction -- 2 Related Work -- 3 Proposed Methods -- 3.1 Background: Neural Scene Flow Fields (NSFF) -- 3.2 NSFF with Encoder -- 4 Experiments -- 4.1 Implement Details -- 4.2 Evaluations -- 5 Limitations -- 6 Conclusion -- References -- Information Technology Skills Extractor for Job Descriptions in vku-ITSkills Dataset Using Natural Language Processing -- 1 Introduction -- 2 Preliminary -- 3 Construct IT Skills Dictionary and vku-ITSkills Dataset -- 4 The Proposed NLP Pipeline for IT Skills Extractor -- 4.1 Tokenizer -- 4.2 Transformers Based Token Embedding.
4.3 Part of Speech (POS) Tagging, Noun Phrases and Combination Rules.
Record Nr. UNINA-9910736019003321
Nguyen Ngoc Thanh  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
2020 International Conference on Applications and Techniques in Cyber Intelligence [[electronic resource] ] : Applications and Techniques in Cyber Intelligence (ATCI 2020) / / edited by Jemal H. Abawajy, Kim-Kwang Raymond Choo, Zheng Xu, Mohammed Atiquzzaman
2020 International Conference on Applications and Techniques in Cyber Intelligence [[electronic resource] ] : Applications and Techniques in Cyber Intelligence (ATCI 2020) / / edited by Jemal H. Abawajy, Kim-Kwang Raymond Choo, Zheng Xu, Mohammed Atiquzzaman
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (1,162 pages) : illustrations
Disciplina 005.8
Collana Advances in Intelligent Systems and Computing
Soggetto topico Engineering - Data processing
Computational intelligence
Data Engineering
Computational Intelligence
ISBN 3-030-53980-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Combination of Information Technology and College English in the Age of Media -- The Application of Computer Internet of Things in Modern Agricultural Planting Management -- The Influencing Factors Analysis of Network Interactive Teaching Mode Validity -- The Application Analysis of Computer Network Security Data Encryption Technology -- The Application of Computer Technology in Sports Training and Competition -- The Application of BIM Technology in Landscape Garden Engineering Projects -- College Physical Education Based on Multimedia Network Teaching Platform -- Development and Implementation of Health Information Management Platform in Medical Institutions -- Teaching Methods of University Economic Management Course Based on Python -- Innovative Application Paths of Big Data of Automobile Based on Internet of Vehicles.
Record Nr. UNINA-9910483970303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy [[electronic resource] ] : SPIoT-2020, Volume 1 / / edited by John MacIntyre, Jinghua Zhao, Xiaomeng Ma
The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy [[electronic resource] ] : SPIoT-2020, Volume 1 / / edited by John MacIntyre, Jinghua Zhao, Xiaomeng Ma
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (XXXI, 884 p. 221 illus., 150 illus. in color.)
Disciplina 620.00285
Collana Advances in Intelligent Systems and Computing
Soggetto topico Engineering—Data processing
Cooperating objects (Computer systems)
Computational intelligence
Machine learning
Big data
Data Engineering
Cyber-Physical Systems
Computational Intelligence
Machine Learning
Big Data
ISBN 3-030-62743-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910483068103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy [[electronic resource] ] : SPIoT-2020, Volume 2 / / edited by John MacIntyre, Jinghua Zhao, Xiaomeng Ma
The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy [[electronic resource] ] : SPIoT-2020, Volume 2 / / edited by John MacIntyre, Jinghua Zhao, Xiaomeng Ma
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (XXXII, 863 p. 222 illus., 128 illus. in color.)
Disciplina 004.678
Collana Advances in Intelligent Systems and Computing
Soggetto topico Engineering—Data processing
Cooperating objects (Computer systems)
Computational intelligence
Machine learning
Big data
Data Engineering
Cyber-Physical Systems
Computational Intelligence
Machine Learning
Big Data
ISBN 3-030-62746-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910483082303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
4th International Conference on Artificial Intelligence and Applied Mathematics in Engineering [[electronic resource] ] : ICAIAME 2022 / / edited by D. Jude Hemanth, Tuncay Yigit, Utku Kose, Ugur Guvenc
4th International Conference on Artificial Intelligence and Applied Mathematics in Engineering [[electronic resource] ] : ICAIAME 2022 / / edited by D. Jude Hemanth, Tuncay Yigit, Utku Kose, Ugur Guvenc
Autore Hemanth D. Jude
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (779 pages)
Disciplina 006.3
Altri autori (Persone) YigitTuncay
KoseUtku
GuvencUgur
Collana Engineering Cyber-Physical Systems and Critical Infrastructures
Soggetto topico Computational intelligence
Artificial intelligence
Engineering - Data processing
Computational Intelligence
Artificial Intelligence
Data Engineering
Soggetto non controllato Engineering
Technology & Engineering
ISBN 3-031-31956-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Sentiment Analysis in Turkish using Transformer-based Deep Learning Models -- Mathematical Modeling of an Antenna Device Based on a T-shaped Waveguide of the Microwave Range -- Higher-order and stable numerical scheme for nonlinear diffusion system via compact finite difference and adaptive step-size Runge-Kutta methods -- Explainable Artificial Intelligence (XAI) for Deep Learning Based Intrusion Detection Systems -- A Color Channel Based Analysis on Image Tessellation -- Modeling of Shear Strength of Basalt Fiber Reinforced Clay (BFRC) Soil Using Artificial Neural Network (ANN) -- Change of the Internet with Blockchain and Metaverse Technologies -- A Language-Free Hate Speech Identification on Code-Mixed Conversational Tweets -- Decision Trees in Causal Inference -- The Resilience of Unmanned Aerial Vehicles to Cyberattacks and Assessment of Potential Threats.
Record Nr. UNINA-9910728392403321
Hemanth D. Jude  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The 4th Joint International Conference on Deep Learning, Big Data and Blockchain (DBB 2023) [[electronic resource] /] / edited by Muhammad Younas, Irfan Awan, Salima Benbernou, Dana Petcu
The 4th Joint International Conference on Deep Learning, Big Data and Blockchain (DBB 2023) [[electronic resource] /] / edited by Muhammad Younas, Irfan Awan, Salima Benbernou, Dana Petcu
Autore Younas Muhammad
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (148 pages)
Disciplina 006.3
Altri autori (Persone) AwanIrfan
BenbernouSalima
PetcuDana
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Engineering - Data processing
Computational Intelligence
Data Engineering
ISBN 3-031-42317-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Block Chain Systems -- Distributed Ledger Technology for Collective Environmental Action -- 1 Introduction -- 2 Literature Background -- 3 Design Science Research Methodology -- 4 DLT Prototype Construction and Evaluation -- 4.1 Prototype Design Components -- 4.2 Prototype Functional Logic Components -- 4.3 Prototype Evaluation -- 5 Discussion of Empirical Findings -- 6 Conclusions -- References -- Moving Towards Blockchain-Based Methods for Revitalizing Healthcare Domain -- 1 Introduction -- 2 Blockchain Technology Fundamentals -- 2.1 Key Concepts -- 2.2 Blockchain Taxonomy -- 3 Blockchain Technology in Service of Healthcare -- 4 Related Works -- 4.1 Research Methodology -- 4.2 Our Research Foresight Regarding Healthcare Challenges -- 4.3 Blockchain Adoption in Healthcare Domain -- 5 Discussion -- 6 Our Forthcoming Proposition -- 7 Conclusion -- References -- Design of a Tokenized Blockchain Architecture for Tracking Trade in the Global Defense Market -- 1 Introduction -- 2 Related Work -- 3 Value of Blockchain for Trades in Defense Market -- 4 Design and Implementation of a NFT Based Decentralized Architecture -- 4.1 System Design -- 4.2 Implementation and Testing -- 5 Conclusion -- References -- Requirements for Interoperable Blockchain Systems: A Systematic Literature Review -- 1 Introduction -- 1.1 Research Problem -- 1.2 Key Contributions -- 2 Blockchain Interoperability Overview -- 2.1 Related Studies -- 3 Methodology -- 4 Results and Discussion -- 4.1 Technical and semantic interoperability requirements. -- 4.2 Organizational Interoperability Requirements -- 4.3 Legal Interoperability Requirements -- 5 Conclusion -- References -- Deep Learning and Healthcare Applications -- PENN: Phase Estimation Neural Network on Gene Expression Data -- 1 Introduction -- 2 Related Work -- 3 Method.
3.1 Objective Function of PENN -- 4 Results -- 4.1 Dataset -- 4.2 Experiments -- 4.3 Implementation -- 5 Conclusion -- References -- MRIAD: A Pre-clinical Prevalence Study on Alzheimer's Disease Prediction Through Machine Learning Classifiers -- 1 Introduction -- 2 Related Work -- 3 Research Methodology -- 3.1 Development and Testing Approach -- 3.2 Data Source -- 3.3 Data Preprocessing -- 3.4 Feature Selection -- 4 Results and Discussion -- 5 Conclusions -- References -- Exploring the Link Between Brain Waves and Sleep Patterns with Deep Learning Manifold Alignment -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset -- 3.2 Deep Learning Manifold Alignment Method -- 4 Experimental Results -- 5 Conclusion and Future Work -- References -- Machine Learning and Commercial Systems -- YOLOv5 for Automatic License Plate Recognition in Smart Cities -- 1 Introduction -- 2 Applications of ALPR -- 2.1 Use Cases of ALPR -- 2.2 Object Detection with Deep Learning Techniques -- 3 Related Work -- 4 Experimentation and Results -- 4.1 Methodology -- 4.2 Results -- 5 Conclusion -- References -- An Investigation into Predicting Flight Fares in India Using Machine Learning Models -- 1 Introduction -- 2 Literature Review -- 2.1 Empirical Approach to Determine Changes of Airfares and Customer Behavior When Purchasing Flight Tickets -- 2.2 Statistical Approaches for Determining Changes in the Airfare -- 2.3 Supervised Machine Learning for Determining the Changes in the Airfares -- 3 Research Methodology -- 4 Design Specifications -- 5 Evaluation Results and Discussion -- 5.1 Ensemble Model Analysis -- 5.2 Basic Machine Learning Model Results -- 6 Conclusion and Future Work -- References -- Securing Internet of Things (IoT) Devices Through Distributed Ledger Technologies (DLTs) and World Wide Web Consortium (W3C) Standards -- 1 Introduction.
2 Overview of IoT and DLTs -- 2.1 Overview of IoT -- 2.2 Overview of DLTs -- 3 DLT-Based Applications and Services for IoT -- 4 Proposed Architecture -- 5 Conclusion and Future Work -- References -- Analysis and Forecast of Energy Demand in Senegal with a SARIMA Model and an LSTM Neural Network -- 1 Introduction -- 2 Analysis of Woyofal Customers Database -- 3 Building a Forecasting Model of Electricity Demand -- 3.1 Forecasting Electricity Demand with a SARIMA Model -- 3.2 Forecasting Electricity Demand with an LSTM Neural Network -- 4 Deploying the Forecasting Model in a Web Application -- 5 Conclusion -- References -- Author Index.
Record Nr. UNINA-9910743692703321
Younas Muhammad  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The 8th International Conference on Advanced Machine Learning and Technologies and Applications (AMLTA2022) [[electronic resource] /] / edited by Aboul Ella Hassanien, Rawya Y. Rizk, Václav Snášel, Rehab F. Abdel-Kader
The 8th International Conference on Advanced Machine Learning and Technologies and Applications (AMLTA2022) [[electronic resource] /] / edited by Aboul Ella Hassanien, Rawya Y. Rizk, Václav Snášel, Rehab F. Abdel-Kader
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (708 pages)
Disciplina 006.3
Collana Lecture Notes on Data Engineering and Communications Technologies
Soggetto topico Computational intelligence
Artificial intelligence
Big data
Engineering - Data processing
Computational Intelligence
Artificial Intelligence
Big Data
Data Engineering
ISBN 3-031-03918-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Honorary Chair -- General Chairs -- Co-chairs -- International Advisory Board -- Publication Chair -- Program Chairs -- Publicity Chairs -- Technical Program Committee -- Local Arrangement Chairs -- Contents -- Deep Learning and Applications -- Plant Leaf Diseases Detection and Identification Using Deep Learning Model -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 4 Experimental Results -- 5 Conclusions -- References -- Reinforcement Learning for Developing an Intelligent Warehouse Environment -- 1 Introduction -- 2 Machine Learning Techniques -- 3 Results and Discussion -- 4 Conclusion and Future Research -- References -- A Low-Cost Multi-sensor Deep Learning System for Pavement Distress Detection and Severity Classification -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Overall System Architecture -- 3.2 Deep Learning Distress Detection -- 3.3 Dataset and Training Information -- 3.4 Projection onto the Depth 3D Point Cloud and ROI Filtering -- 4 Case Study: Pothole Severity Classification -- 5 Experimental Results -- 5.1 Results for the Distress Detection -- 5.2 Results for Pothole Severity Classification -- 6 Conclusion -- References -- An Intrusion Detection Model Based on Deep Learning and Multi-layer Perceptron in the Internet of Things (IoT) Network -- 1 Introduction -- 2 Related Work -- 2.1 Multi Agent Systems for IDS -- 2.2 Fuzzy Systems for IDS -- 2.3 Game Theory Models for IDS -- 3 Architecture of the Proposed Intrusion Detection System -- 3.1 Pre-processing and Feature Engineering -- 3.2 Deep Learning Layer -- 3.3 Evaluation Layer -- 4 The Experimental Results -- 5 Comparison Between Proposed Models and the Others -- 6 Conclusion -- References -- Transfer Learning and Recurrent Neural Networks for Automatic Arabic Sign Language Recognition -- 1 Introduction.
2 Related Work -- 3 Arabic Sign Language Dataset -- 4 Methodology -- 4.1 Prepare the Dataset -- 4.2 Extract the Spatial Features -- 4.3 Extract the Temporal Features -- 4.4 Video Augmentation -- 5 Experimental and Results -- 5.1 Experiment Settings -- 5.2 Models Results -- 6 Conclusion and Future Works -- References -- Robust Face Mask Detection Using Local Binary Pattern and Deep Learning -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 4 Experimental Results -- 5 Conclusion -- References -- Steganography Adaptation Model for Data Security Enhancement in Ad-Hoc Cloud Based V-BOINC Through Deep Learning -- 1 Introduction -- 1.1 Ad-Hoc Cloud Computing -- 1.2 Deep Steganography -- 1.3 Contribution -- 1.4 Paper Organization -- 2 Literature Review -- 3 Proposed Solution -- 4 Experiment -- 5 Discussion and Analysis -- 6 Conclusion -- References -- Performance of Different Deep Learning Models for COVID-19 Detection -- 1 Introduction -- 2 Deep Learning (DL) -- 2.1 The DL-Algorithms Steps in COVID-19 Diagnosis -- 2.2 DL-Models for COVID-19 Detection -- 3 Discussion -- 4 Conclusion -- References -- Deep Learning-Based Apple Leaves Disease Identification Approach with Imbalanced Data -- 1 Introduction -- 2 Basics and Background -- 2.1 Data Imbalance -- 2.2 Convolutional Neural Networks -- 2.3 Transfer Learning -- 3 The Proposed Approach -- 3.1 Dataset Description -- 3.2 Data Preprocessing Phase -- 3.3 Training Phase -- 3.4 Evaluation Phase -- 4 Experimental Results and Analysis -- 4.1 Data Imbalance Problem -- 4.2 Data Augmentation -- 4.3 Setup of the Experiment -- 4.4 Evaluation of the Model -- 5 Conclusion and Future Work -- References -- Commodity Image Retrieval Based on Image and Text Data -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Image and Text Feature Fusion -- 3.2 Target Function -- 4 Experiment -- 4.1 Evaluation Metrics.
4.2 Datasets -- 4.3 Experimental Details -- 4.4 Experimental Results and Analysis -- 5 Conclusion -- References -- Machine Learning Technologies -- Artificial Intelligence Based Solutions to Smart Warehouse Development: A Conceptual Framework -- 1 Introduction -- 2 SWOT Analysis -- 2.1 Strengths -- 2.2 Weaknesses -- 2.3 Opportunities -- 2.4 Threats -- 3 Proposed Solutions and Current Approaches -- 3.1 WO Strategy (Improve): Testbed as a Trial for Investment Decision -- 3.2 WO Strategy (Improve): AI-Powered Solutions -- 3.3 SO Strategy (Attack): AI Resource Development -- 4 Conclusions and Future Research -- References -- Long-Short Term Memory Model with Univariate Input for Forecasting Individual Household Electricity Consumption -- 1 Introduction -- 2 Related Works -- 3 Deep Learning Models for Load Forecasting -- 3.1 LSTM and LSTM-ED Neural Networks -- 3.2 CNN-LSTM Neural Networks -- 3.3 GRU Neural Networks -- 3.4 BiLSTM Neural Networks -- 3.5 ConvLSTM Neural Networks -- 4 Results and Discussion -- 4.1 Dataset Description -- 4.2 Evaluation Metrics -- 4.3 Prediction Results of ConvLSTM -- 4.4 Discussion of the Forecasting Models -- 5 Conclusion and Future Work -- References -- DNA-Binding-Proteins Identification Based on Hybrid Features Extraction from Hidden Markov Model -- 1 Introduction -- 2 Materials and Methods -- 2.1 Datasets -- 2.2 Encoding -- 2.3 Framing -- 2.4 Hybrid Visual HMM Structure -- 2.5 Features Extraction -- 2.6 Classifier -- 3 Results and Discussions -- 4 Conclusions -- References -- Machine Learning Based Mobile Applications for Cardiovascular Diseases (CVDs) -- 1 Introduction -- 2 ML Based m-Health for CVDs -- 3 Characteristics of the Commercially Available CVDs Mobile Applications -- 4 Future Requirements -- 5 Conclusion -- References -- Regression Analysis for Remaining Useful Life Prediction of Aircraft Engines.
1 Introduction -- 2 Related Work -- 3 Aircraft Engine System -- 4 Proposed Model for Predicting the RUL -- 5 Experimental Results and Discussion -- 6 Conclusion and Future Work -- References -- Applying Machine Learning Technology to Perform Automatic Provisioning of the Optical Transport Network -- 1 Introduction -- 2 The Challenges in the Current Model of the Supervision of the OTN -- 3 Proposed Model for the Automatic Provision of the OTN -- 4 Results and Discussion -- 5 Conclusion and Future Work -- References -- Robo-Nurse Healthcare Complete System Using Artificial Intelligence -- 1 Introduction -- 1.1 Related Work -- 2 Research Method -- 2.1 Software Implementation -- 2.2 Hardware Implementation -- 2.3 External Design Implementation -- 3 Results and Discussions -- 4 Conclusion -- References -- Resolving Context Inconsistency Approach Based on Random Forest Tree -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 3.1 IoT Data Collection Phase -- 3.2 Context Inconsistency Validator -- 3.3 Best Resolution Selection -- 3.4 Random Forest Tree -- 4 Experimental Results and Evaluations -- 5 Conclusion and Future Directions -- References -- Arduino Line Follower Using Fuzzy Logic Control -- 1 Introduction -- 2 Methodology -- 2.1 Lab Simulation -- 2.2 The ATmega328p Microcontroller -- 2.3 Voltage Regulator -- 2.4 Circuit Diagram Explanation -- 2.5 Microcontroller-Motor Driver IC Interface -- 2.6 Microcontroller-IR Sensor Module Interface -- 2.7 Microcontroller-Variable Resistor Interface -- 2.8 Arduino IDE Interface with Microcontroller -- 3 Summary of Methodology -- 4 Physical Modeling -- 4.1 Block Diagram -- 4.2 Flow Chart -- 4.3 Working Principle -- 5 Result and Analysis -- 6 Conclusion -- References -- Evaluating Adaptive Facade Performance in Early Building Design Stage: An Integrated Daylighting Simulation and Machine Learning.
1 Introduction -- 2 Related Works -- 3 Building as a Machine and Machine Learning in Architecture -- 4 Adaptive Facade -- 5 Methodology -- 5.1 Data Collection: Available Forms of Kinetic Façade Systems -- 5.2 Data Preparation: Applying System Possibility Scores -- 5.3 Data Exploration and Case Study Setup -- 5.4 Prediction Stage: Applying the KNN Algorithm as a Selective Filter -- 6 Systems Modeling and Simulation -- 7 Results and Discussion -- 8 Conclusion -- References -- LTE Downlink Scheduling with Soft Policy Gradient Learning -- 1 Introduction -- 2 Downlink Resource Allocation in LTE -- 3 Related Work -- 4 DSPG Scheduler: The Proposed Scheduling Algorithm -- 4.1 Problem Statement -- 4.2 Model Design -- 5 Simulation Implementation and Results -- 6 Conclusions -- References -- Predicting the Road Accidents Severity Using Artificial Neural Network -- 1 Introduction -- 2 Literature Review -- 3 Dataset -- 4 The Proposed Methodology -- 5 Results and Discussions -- 5.1 Attributes vs Accident Severity -- 5.2 Accident Severity Prediction Results -- 6 Conclusion -- References -- Predicting the Intention to Use Audi and Video Teaching Styles: An Empirical Study with PLS-SEM and Machine Learning Models -- 1 Introduction -- 2 Theoretical Framework -- 2.1 Technology Acceptance Model (TAM) -- 2.2 Flow Theory -- 2.3 Virtual Reality Attributes -- 3 Research Methodology -- 3.1 Data Collection -- 3.2 Personal/Demographic Information -- 3.3 Study Instrument -- 3.4 Survey Structure -- 4 Findings and Discussion -- 4.1 Data Analysis -- 4.2 Convergent Validity -- 4.3 Discriminant Validity -- 4.4 Hypotheses Testing Using PLS-SEM -- 4.5 Hypothesis Testing Using Machine Learning Algorithms -- 5 Discussion of Results -- References -- Intellgenet Systems and Applications.
Immunity of Signals Transmission Using Secured Unequal Error Protection Scheme with Various Packet Format.
Record Nr. UNINA-9910561300503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Information Networking and Applications [[electronic resource] ] : Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023), Volume 1 / / edited by Leonard Barolli
Advanced Information Networking and Applications [[electronic resource] ] : Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023), Volume 1 / / edited by Leonard Barolli
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (XXIX, 577 p. 249 illus., 188 illus. in color.)
Disciplina 620.00285
Collana Lecture Notes in Networks and Systems
Soggetto topico Engineering—Data processing
Computational intelligence
Artificial intelligence
Data Engineering
Computational Intelligence
Artificial Intelligence
ISBN 3-031-29056-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910682552103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Information Networking and Applications [[electronic resource] ] : Proceedings of the 35th International Conference on Advanced Information Networking and Applications (AINA-2021), Volume 3 / / edited by Leonard Barolli, Isaac Woungang, Tomoya Enokido
Advanced Information Networking and Applications [[electronic resource] ] : Proceedings of the 35th International Conference on Advanced Information Networking and Applications (AINA-2021), Volume 3 / / edited by Leonard Barolli, Isaac Woungang, Tomoya Enokido
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (753 pages)
Disciplina 004.6
Collana Lecture Notes in Networks and Systems
Soggetto topico Engineering - Data processing
Computational intelligence
Artificial intelligence
Data Engineering
Computational Intelligence
Artificial Intelligence
Xarxes d'ordinadors
Computació distribuïda
Sistemes d'informació
Intel·ligència artificial
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-030-75078-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Welcome Message from AINA-2021 Organizers -- AINA-2021 Organizing Committee -- General Co-chairs -- Program Committee Co-chairs -- Workshops Co-chairs -- International Journals Special Issues Co-chairs -- Award Co-chairs -- Publicity Co-chairs -- International Liaison Co-chairs -- Local Arrangement Co-chairs -- Finance Chair -- Web Co-chairs -- Steering Committee Chairs -- Tracks and Program Committee Members -- 1. Network Protocols and Applications -- Sec300 -- Sec301 -- 2. Next Generation Wireless Networks -- Sec303 -- Sec304 -- 3. Multimedia Systems and Applications -- Sec305 -- Sec306 -- 4. Pervasive and Ubiquitous Computing -- Sec105 -- Sec106 -- 5. Web-Based and E-Learning Systems -- Sec331 -- Sec312 -- 6. Distributed and Parallel Computing -- Sec256 -- Sec251 -- 7. Data Mining, Big Data Analytics and Social Networks -- Sec261 -- Sec389 -- 8. Internet of Things and Cyber-Physical Systems -- Sec265 -- Sec266 -- 9. Intelligent Computing and Machine Learning -- Sec291 -- Sec298 -- 10. Cloud and Services Computing -- Sec351 -- Sec352 -- 11. Security, Privacy and Trust Computing -- Sec365 -- Sec366 -- 12. Software-Defined Networking and Network Virtualization -- Sec382 -- Sec399 -- AINA-2021 Reviewers -- AINA-2021 Keynote Talks -- The Role of Artificial Intelligence in the Industry 4.0 -- Localization in 6G -- Contents -- An Improved DOA Estimation Algorithm of Neural Network Based on Interval Division -- 1 Introduction -- 2 Signal Model of DOA Estimation -- 3 Improved DOA Estimation Algorithm of Neural Networks Based on Interval Division -- 3.1 DOA Estimation Algorithm of Neural Networks Based on Interval Division -- 3.2 Improved Interval Division Method -- 3.3 Performance Analysis -- 4 Conclusion -- References -- The Application in Handwritten Digit Recognition of Deep Belief Network Based on Improved Genetic Algorithm.
1 Introduction -- 2 The DBN Optimized by Adaptive Genetic Algorithm (IAGA-DBN) -- 2.1 DBN -- 2.2 IAGA -- 2.3 The Algorithm Fow of IAGA-DBN -- 3 Realization of Handwritten Digit Recognition Based on IAGA-DBN -- 3.1 Experimental Data -- 3.2 Test Comparison and Analysis of Each Model -- 4 Conclusion -- References -- A Fuzzy-Based Scheme for Admission Control in 5G Wireless Networks: Improvement of Slice QoS Considering Slice Reliability as a New Parameter -- 1 Introduction -- 2 Software-Defined Networks (SDNs) -- 3 Outline of Fuzzy Logic -- 3.1 Linguistic Variables -- 3.2 Fuzzy Control Rules -- 3.3 Defuzzificaion Method -- 4 Proposed Fuzzy-Based System -- 5 Simulation Results -- 6 Conclusions and Future Work -- References -- Evaluation of a User Finger Movement Capturing Device for Control of Self-standing Omnidirectional Robot -- 1 Introduction -- 2 Related Work -- 3 Proposed Self-standing Omnidirectional Robot -- 3.1 Kinematics -- 3.2 Control System of the Proposed Self-standing Omnidirectional Robot -- 4 Implementation of User Finger Capturing Device -- 5 Experimental Results -- 6 Conclusions and Future Work -- References -- Adaptive Architecture for Fault Diagnosis of Rotating Machinery -- 1 Introduction -- 2 Related Work -- 3 Motivating Example -- 4 Fault Diagnosis of Rotating Machinery -- 4.1 RTRL Training -- 4.2 Online Monitoring -- 5 Experimental Results -- 5.1 Visualization of Variability Markers -- 6 Conclusions -- References -- Unsupervised Classification of Medical Documents Through Hybrid MWEs Discovery -- 1 Introduction -- 2 State of Art -- 3 Classification Methodology -- 3.1 Hybrid MWEs Discovery -- 3.2 Document Classification -- 4 Experiment -- 5 Conclusion and Future Work -- References -- Building a Pos Tagger and Lemmatizer for the Italian Language -- 1 Introduction -- 2 Related Works -- 3 Proposed Approach.
4 Experiment and Evaluation -- 5 Conclusions and Future Work -- References -- Extracting Information from Food-Related Textual Sources -- 1 Introduction -- 2 Motivation -- 3 WEB Scraping -- 3.1 Extracting Meta-data -- 4 Extracting Images -- 5 Ontology Building -- 6 Conclusions -- References -- PaSy - Management of a Smart-Parking System Based on Priority Queues -- 1 Introduction -- 2 Related Work -- 3 Integration Model -- 3.1 Profiling -- 3.2 Mathematical Model -- 3.3 Priority Queues -- 3.4 Queues Categories -- 4 Conclusions -- References -- An Ontological Model to Represent Food Consumption Risks -- 1 Introduction -- 2 Case Study -- 3 The Represented Information -- 4 Conclusions -- References -- Intelligent Cloud Agents in Multi-participant Conversations for Cyber-Physical Exploitation of Cultural Heritage -- 1 Introduction -- 2 Related Work -- 3 The Cleopatra Project -- 4 Architecture Design -- 5 Bridging Multi Users Conversation with Dyadic Agents -- 5.1 Parallel Conversations versus Multiple Threads -- 5.2 Own Messages versus Multiple Receivers -- 5.3 Replies versus Posts -- 6 Prototype Development -- 7 Conclusion -- References -- E-government and Italian Local Government: Managerial Approach in Two Macro Areas to Improve Manager's Culture and Services -- 1 Introduction -- 2 Literature Review -- 2.1 Italian Public Administration -- 2.2 Case Study Context -- 2.3 Northern vs Southern IPA -- 3 Methodology -- 4 Empirical Results -- 5 Discussion -- 6 Conclusions -- References -- Container Based Simulation of Electric Vehicles Charge Optimization -- 1 Introduction -- 2 The Greencharge Simulator -- 3 Formulating the Energy Management Problem -- 4 Optimization Algorithm -- 4.1 GA Based Load Shifting -- 4.2 Linear EV Charge Optimization -- 5 Experimental Results -- 6 Conclusion -- References -- Cloud Computing Projects: A Bibliometric Overview.
1 Introduction -- 2 Background Information -- 2.1 Bibliometric Investigations -- 2.2 The Projects Under Analysis -- 3 Data Collection and Methodology -- 3.1 Data Sources -- 3.2 Data Preparation -- 4 Results -- 4.1 Impact Overview -- 4.2 Distribution of Papers and Collaboration -- 4.3 Co-occurrences of Keywords Analysis for Research Areas -- 5 Conclusions -- References -- Applying Patterns to Support Deployment in Cloud-Edge Environments: A Case Study -- 1 Introduction -- 2 State of the Art -- 3 The Methodology -- 3.1 Selection of the Computational Pattern -- 3.2 Mapping to an Agnostic Architectural Pattern -- 3.3 Mapping to an Agnostic Deployment Pattern -- 4 Conclusion and Future Work -- References -- Obserbot: A Totally Automated Watcher to Monitor Essential Services -- 1 Introduction -- 2 The Obserbot Framework -- 3 Platform Description -- 4 The Semantic Analysis -- 5 Results -- 6 Conclusions and Further Developments -- References -- Saving Electronic Health Record (EHR) in private and secure mHealth system with blockchain Smart contracts -- 1 Introduction -- 2 Previous Work -- 3 Blockchain -- 3.1 Consortium Blockchain -- 4 System Implementation -- 5 Discussion -- 6 Conclusion and Future Work -- References -- iNote: A Low Cost Banknote Recognition System for Visually Impaired Persons -- 1 Introduction -- 2 Literature Review -- 3 System Overview and Problem Formulation -- 3.1 System Overview -- 3.2 Problem Formulation -- 4 Methodology -- 4.1 Algorithm -- 5 Results -- 5.1 Hardware -- 5.2 Experimental Results -- 6 Conclusions and Future Work -- References -- Design of a Diagnostic Support Method Utilizing Interrogation Information in Traditional Chinese Medicine -- 1 Introduction -- 2 Related Research and Issues -- 2.1 Traditional Chinese Medicine (TCM) -- 2.2 Related Research -- 2.3 Technical Issues and Proposals -- 3 Diagnostic Support Method.
3.1 Outline of the Diagnostic Support Method -- 3.2 Pattern Candidate Extraction Method -- 3.3 Interpattern Relational Model Creation Method -- 4 Conclusion -- References -- Software-Defined Networking: Open-Source Alternatives for Small to Medium Sized Enterprises -- 1 Introduction -- 2 Literature Review -- 2.1 SDN Architecture in Smaller Networks -- 3 Methodology -- 3.1 Cisco DNA Centre -- 3.2 Key Technologies in Cisco DNA Centre -- 3.3 Open Source SDN Controller for SME-Based Network -- 3.4 OpenDaylight SDN Controller -- 4 Deploying LISP, VxLAN Within OpenDaylight SDN Controller -- 4.1 Location Identifier Separation Protocol (LISP) Within OpenDaylight -- 4.2 Virtual Extensible Local Area Networks and OpenDaylight -- 5 Conclusion -- References -- A Survey of Description Methods for Fieldbus Systems -- 1 Introduction -- 2 Description Methods -- 2.1 EDDL -- 2.2 ESI and ENI -- 2.3 EDS -- 2.4 CiA 311 -- 2.5 FIBEX -- 2.6 AutomationML -- 3 Evaluation -- 4 Summary -- References -- A Hybrid Message Delivery Method for Vehicular DTN Considering Impact of Shuttle Buses and Roadside Units -- 1 Introduction -- 2 Overview of DTN Protocols -- 3 Proposed Hybrid Message Delivery Method -- 4 Evaluation of Proposed Method -- 4.1 Evaluation Setting -- 4.2 Simulation Results -- 5 Conclusions -- References -- Optimum Path Finding Framework for Drone Assisted Boat Rescue Missions -- 1 Introduction -- 2 Related Work -- 3 Proposed Framework -- 4 Conclusions and Future Works -- References -- Algorithmic Aspects of the Maximum 2-edge-colorable Subgraph Problem -- 1 Introduction -- 2 Problem Statement -- 3 Related Work -- 4 Graphs with Bounded Carving-Width -- 5 Graphs with Bounded Pathwidth -- 6 Conclusion and Future Work -- References -- Effective Use of Low Power Heterogeneous Wireless Multimedia Sensor Networks for Surveillance Applications Using IEEE 802.15.4 Protocol.
1 Introduction.
Record Nr. UNINA-9910484687603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui