• Genere: Libro
  • Lingua: Inglese
  • Editore: Springer
  • Pubblicazione: 03/2020
  • Edizione: 1st ed. 2020

Web, Artificial Intelligence and Network Applications

; ; ; ;

302,98 €
287,83 €
AGGIUNGI AL CARRELLO
TRAMA
This proceedings book presents the latest research findings, and theoretical and practical perspectives on innovative methods and development techniques related to the emerging areas of Web computing, intelligent systems and Internet computing. The Web has become an important source of information, and techniques and methodologies that extract quality information are of paramount importance for many Web and Internet applications. Data mining and knowledge discovery play a key role in many of today's major Web applications, such as e-commerce and computer security. Moreover, Web services provide a new platform for enabling service-oriented systems. The emergence of large-scale distributed computing paradigms, such as cloud computing and mobile computing systems, has opened many opportunities for collaboration services, which are at the core of any information system. Artificial intelligence (AI) is an area of computer science that builds intelligent systems and algorithms that work and react like humans. AI techniques and computational intelligence are powerful tools for learning, adaptation, reasoning and planning, and they have the potential to become enabling technologies for future intelligent networks. Research in the field of intelligent systems, robotics, neuroscience, artificial intelligence and cognitive sciences is vital for the future development and innovation of Web and Internet applications. Chapter "An Event-Driven Multi Agent System for Scalable Traffic Optimization" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

SOMMARIO
The th International Symposium on Frontiers of Information Systems and Network Applications (FINA-0)Infrared Image Fault Identi?cation of Power Equipment Based on Residual NetworkConcept of the Cloud Type Virtual Policy Based Network Management Scheme for the Whole InternetEducational Microclimate Mesonet System DesignA Machine to Machine Framework for the Charging of Electric Autonomous VehiclesAtomicity in the Internet of Transactional Things (Io2T)Intrusion Detection Based on Cluster Analysis and Nonsymmetric AutoencoderA Taxonomy of Trust Models for Attribute Assurance in Identity ManagementDesign and Development of a New Tea-Making Ecosystem SDN-Based Replication Management Framework for CCN NetworksConForm: In-Band Control Flows Self-establishment with Integrated Topology Discovery to SDN-Based NetworksLinear Approximation Based Compression Algorithms Ef?ciency to Compress Environmental Data SetsCommunity Detection Based on Social In?uence in Large Scale NetworksSecure Public Storage Auditing Protocol for Privacy-Preserving Fog-to-Cloud ComputingToward Enforcing Security in Smart Homes Using a Trust-Based SchemeA Survey on Vehicular Fog Computing: Motivation, Architectures, Taxonomy, and IssuesDesign of an Ontology-Oriented Hand Rehabilitation Service Platform for Rheumatoid Arthritis PatientsBitcoin Data Analytics: Exploring Research Avenues and Implementing a Hadoop-Based Analytics FrameworkAnalysis and Performance Evaluation of Different Methods to Achieve Way-Point Enforcement in Hybrid SDNDeployment of NRF in the Docker and Kubernetes – Based NFV PlatformTextual Statistics and Named Entity Recognition Applied to Game of Thrones NovelsA Review Towards the Development of Ontology Based Identity and Access Management MetamodelToward Scalable Blockchain for Data Management in VANETsA New SDN Architecture Based on Trust Managementand Access Control for IoTEf?cient Method for Link Protection Under Multiple Constraints Using ZDDThe th International Workshop on Heterogeneous Wireless Networks (HWISE-0)Blockchain in WSNs, VANets, IoTs and Healthcare: A SurveyA Constructive Review Regarding the Signi?cance of 5G Networks for the Internet of ThingsRouting Protocol LEACH-K Using K-Means Algorithm in Wireless Sensor NetworkEf?cient Mechanism of eNB Bandwidth in D2D Communication in 5GA Blockchain Based Distributed Vehicular Network Architecture for Smart CitiesPerformance Evaluation of a Message Relaying Method with Enhanced Dynamic Timer in Vehicular DTNIndoor Mobile Localization Using Wireless Sensor Networks (WSNs)Performance Evaluation of Routing Protocols for Vehicular AD-HOC Networks Using NS2/SUMOSDNHybridMesh: A Hybrid Routing Architecture for SDN Based Wireless Mesh NetworksDSSS Transmission Technique to Joint Radar Sensing and Wireless Communications in V2V SystemThe th International Symposium on Mining and Web (MAW-0) Classi?cation of Web Applications Using AiFlow FeaturesProximity-Based Context Information Retrieval for Bluetooth Enabled DevicesCybersecurity Text Data Classi?cation and Optimization for CTI SystemsLG-Starship: A Framework for Text AnalysisShilling Attacks Detection in Collaborative Recommender System: Challenges and PromiseA Face and Posture Recognition Model Using CNN for Adapting Different Resolution ImagesFactors for Academic Performance PredictionThe th International Workshop on Bio and Intelligent Computing (BICom-0)Infrared Image Fault Identi?cation Method Based on YOLO Target Detection AlgorithmElectricity Load and Price Forecasting Using Machine Learning Algorithms in Smart Grid: A SurveyRecurrent Neural Networks Analysis Application Effect of Economy Sentiment on Car ManufacturingPerson Re-identi?cation Based on Camera Style AdaptationA Comparison Study of Constriction and Random Inertia Weight Router Replacement Methods for WMNs Using WMN-PSODGA Hybrid Intelligent SystemThe th International Workshop on Telecommunication Networking, Applications and Systems (TeNAS-0)An Automatic Software Quality and Function Assurance Case Study for AgileYour Neighbor Knows What You’re Doing: Defending Smart Home IoT Device Traf?c from Privacy LAN AttacksTile Quality Selection Method in -Degree Tile-Based Video StreamingDDoS Attacks in Experimental LTE NetworksHash Flow: An Access Control Mechanism for Software De?ned NetworkMethod by Protection to Reduce Probability of Cascade FailureThe th International Workshop on Disaster and Emergency Information Network Systems (IWDENS-0)Proposal of a Self-help Support System in a Mega DisasterRoad State Information Platform for Automotive EVin Snow CountrySocial Experimental Evaluation of Road State InformationSystem in Snow CountryStatic Body Detecting Methods by Locational and Rotational Sensorson Smartphone for DTN Based Disaster Information SystemThe 8th International Workshop on Collaborative Emerging Systems (COLLABES-0)Research on EVM-Based Smart Contract Runtime Self-protection Technology FrameworkDocument Business Process Model Extension for Modeling Secure Ubiquitous DocumentsA Semantic Model Toward Smart IoT Device ManagementA Comparison Study of Control Devices for an Omnidirectional WheelchairImplementation and Evaluation on Automated E-Learning Contents Creation Based on Natural Language Processing TechniquesIoT Enabled E-Business via Blockchain Technology UsingEthereum PlatformThe 8th International Workshop on Cloud Computing Project and Initiatives (CCPI-0)2L-ZED-IDS: A Two-Level Anomaly Detector for Multiple Attack ClassesDigital Divide vs e-Government: Analyzing Italian Public ServiceAn Ontology for OASIS TOSCAUnconventional Usage of a Web-Based Survey: Gathering Quality Data for Green Awareness in LawmakingA Security-Oriented Architecture for Federated Learning in Cloud EnvironmentsThe 7th International Workshop on Privacy and Security Intricacies on the Web (INTRICATE-SEC-0)Examination of Defense Method for Tor User Speci?c Purpose Attacks by Dummy User Attached CommunicationOn Security Information Interaction Model of Smart Grid Emergency SystemAn Enhanced Blockchain-Based Data Management Scheme for MicrogridsColluding Android Apps Detection via Model CheckingA Survey of Blockchain-Based Solutions for Energy IndustryA2ISDIoT: Arti?cial Intelligent Intrusion Detection System for Software De?ned IoT NetworksA Searchable Encryption Scheme Based on Elliptic CurvesControl of DoS Attacks During Merging Process Over the Internet of ThingsEvaluation of Yubimoji Based Gestures for Realizing User Authentication Method Using s-EMGThe 7th International Workshop on Energy-Aware Systems, Communications and Security (EASyCoSe-0)Comparing API Call Sequence Algorithms for Malware DetectionTowards a SIP-based DDoS Attack to the 4G NetworkAppIoTTE: An Architecture for the Security Assessment of Mobile-IoT EcosystemsÂB: An Energy Aware Communications Protocol (EACP) for the Internet of Things (IoT)Towards the Use of Generative Adversarial Neural Networks to Attack Online ResourcesThe 6th International Wor

ALTRE INFORMAZIONI
  • Condizione: Nuovo
  • ISBN: 9783030440374
  • Collana: Advances in Intelligent Systems and Computing
  • Dimensioni: 235 x 155 mm Ø 2469 gr
  • Formato: Brossura
  • Illustration Notes: LXXX, 1433 p. 623 illus., 471 illus. in color. In 2 volumes, not available separately.
  • Pagine Arabe: 1433
  • Pagine Romane: lxxx