語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Computer Networks and Inventive Communication Technologies = Proceedings of Fourth ICCNCT 2021 /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Computer Networks and Inventive Communication Technologies / edited by S. Smys, Robert Bestak, Ram Palanisamy, Ivan Kotuliak.
其他題名:
Proceedings of Fourth ICCNCT 2021 /
其他作者:
Kotuliak, Ivan.
面頁冊數:
XVIII, 903 p. 532 illus., 374 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Input/Output and Data Communications. -
電子資源:
https://doi.org/10.1007/978-981-16-3728-5
ISBN:
9789811637285
Computer Networks and Inventive Communication Technologies = Proceedings of Fourth ICCNCT 2021 /
Computer Networks and Inventive Communication Technologies
Proceedings of Fourth ICCNCT 2021 /[electronic resource] :edited by S. Smys, Robert Bestak, Ram Palanisamy, Ivan Kotuliak. - 1st ed. 2022. - XVIII, 903 p. 532 illus., 374 illus. in color.online resource. - Lecture Notes on Data Engineering and Communications Technologies,752367-4520 ;. - Lecture Notes on Data Engineering and Communications Technologies,3.
Chapter 1. Energy Efficient Clustering in Wireless Sensor Networks by Opposition-based Initialization Bat Algorithm -- Chapter 2. Efficient Data Collection in Wireless Sensor Network -- Chapter 3. Job Scheduling in Cloud Computing based on DGPSO -- Chapter 4. Read-Write Decoupled Single-Ended 9T SRAM Cell for Low Power Embedded Applications -- Chapter 5. Spam Detection using Genetic Algorithm Optimized LSTM Model -- Chapter 6. Affine Recurrence based Key Scheduling Algorithm for the Advanced Encryption Standard -- Chapter 7. Simplify Your Neural Networks: An Empirical Study on Cross Project Defect Prediction -- Chapter 8. Emotion Recognition During Social Interactions using Peripheral Physiological Signals -- Chapter 9. Phishing Detection using Computer Vision -- Chapter 10. A Comprehensive Attention-based Model for Image Captioning -- Chapter 11. Multimedia Text Summary Generator for Visually Impaired -- Chapter 12. Key-logger threat to the Android Mobile Banking Applications -- Chapter 13. Machine Learning-based Networ Intrusion Detection System -- Chapter 14. BGCNN: A Computer Vision Approach to Recognize of Yellow Mosaic Disease for Black Gram -- Chapter 15. Irrelevant Racist Tweets Identification using Data Mining Techniques.
This book is a collection of peer-reviewed best-selected research papers presented at 4th International Conference on Computer Networks and Inventive Communication Technologies (ICCNCT 2021). The book covers new results in theory, methodology, and applications of computer networks and data communications. It includes original papers on computer networks, network protocols and wireless networks, data communication technologies, and network security. The proceedings of this conference are a valuable resource, dealing with both the important core and the specialized issues in the areas of next-generation wireless network design, control, and management, as well as in the areas of protection, assurance, and trust in information security practice. It is a reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners for advanced work in the area. .
ISBN: 9789811637285
Standard No.: 10.1007/978-981-16-3728-5doiSubjects--Topical Terms:
669873
Input/Output and Data Communications.
LC Class. No.: TK5101-5105.9
Dewey Class. No.: 621.382
Computer Networks and Inventive Communication Technologies = Proceedings of Fourth ICCNCT 2021 /
LDR
:03631nam a22003975i 4500
001
1087726
003
DE-He213
005
20220502140345.0
007
cr nn 008mamaa
008
221228s2022 si | s |||| 0|eng d
020
$a
9789811637285
$9
978-981-16-3728-5
024
7
$a
10.1007/978-981-16-3728-5
$2
doi
035
$a
978-981-16-3728-5
050
4
$a
TK5101-5105.9
072
7
$a
TJK
$2
bicssc
072
7
$a
TEC041000
$2
bisacsh
072
7
$a
TJK
$2
thema
082
0 4
$a
621.382
$2
23
245
1 0
$a
Computer Networks and Inventive Communication Technologies
$h
[electronic resource] :
$b
Proceedings of Fourth ICCNCT 2021 /
$c
edited by S. Smys, Robert Bestak, Ram Palanisamy, Ivan Kotuliak.
250
$a
1st ed. 2022.
264
1
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2022.
300
$a
XVIII, 903 p. 532 illus., 374 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Lecture Notes on Data Engineering and Communications Technologies,
$x
2367-4520 ;
$v
75
505
0
$a
Chapter 1. Energy Efficient Clustering in Wireless Sensor Networks by Opposition-based Initialization Bat Algorithm -- Chapter 2. Efficient Data Collection in Wireless Sensor Network -- Chapter 3. Job Scheduling in Cloud Computing based on DGPSO -- Chapter 4. Read-Write Decoupled Single-Ended 9T SRAM Cell for Low Power Embedded Applications -- Chapter 5. Spam Detection using Genetic Algorithm Optimized LSTM Model -- Chapter 6. Affine Recurrence based Key Scheduling Algorithm for the Advanced Encryption Standard -- Chapter 7. Simplify Your Neural Networks: An Empirical Study on Cross Project Defect Prediction -- Chapter 8. Emotion Recognition During Social Interactions using Peripheral Physiological Signals -- Chapter 9. Phishing Detection using Computer Vision -- Chapter 10. A Comprehensive Attention-based Model for Image Captioning -- Chapter 11. Multimedia Text Summary Generator for Visually Impaired -- Chapter 12. Key-logger threat to the Android Mobile Banking Applications -- Chapter 13. Machine Learning-based Networ Intrusion Detection System -- Chapter 14. BGCNN: A Computer Vision Approach to Recognize of Yellow Mosaic Disease for Black Gram -- Chapter 15. Irrelevant Racist Tweets Identification using Data Mining Techniques.
520
$a
This book is a collection of peer-reviewed best-selected research papers presented at 4th International Conference on Computer Networks and Inventive Communication Technologies (ICCNCT 2021). The book covers new results in theory, methodology, and applications of computer networks and data communications. It includes original papers on computer networks, network protocols and wireless networks, data communication technologies, and network security. The proceedings of this conference are a valuable resource, dealing with both the important core and the specialized issues in the areas of next-generation wireless network design, control, and management, as well as in the areas of protection, assurance, and trust in information security practice. It is a reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners for advanced work in the area. .
650
2 4
$a
Input/Output and Data Communications.
$3
669873
650
2 4
$a
Artificial Intelligence.
$3
646849
650
2 4
$a
Control, Robotics, Automation.
$3
1365878
650
1 4
$a
Communications Engineering, Networks.
$3
669809
650
0
$a
Computer input-output equipment.
$3
559611
650
0
$a
Artificial intelligence.
$3
559380
650
0
$a
Automation.
$3
596698
650
0
$a
Robotics.
$3
561941
650
0
$a
Control engineering.
$3
1249728
650
0
$a
Telecommunication.
$3
568341
700
1
$a
Kotuliak, Ivan.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1309915
700
1
$a
Palanisamy, Ram.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1314882
700
1
$a
Bestak, Robert.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
885409
700
1
$a
Smys, S.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1287407
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811637278
776
0 8
$i
Printed edition:
$z
9789811637292
830
0
$a
Lecture Notes on Data Engineering and Communications Technologies,
$x
2367-4512 ;
$v
3
$3
1279482
856
4 0
$u
https://doi.org/10.1007/978-981-16-3728-5
912
$a
ZDB-2-ENG
912
$a
ZDB-2-SXE
950
$a
Engineering (SpringerNature-11647)
950
$a
Engineering (R0) (SpringerNature-43712)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入