語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Proceedings of fifth International Conference on Computing, Communications, and Cyber-Security = IC4S'05.. Volume 2 /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Proceedings of fifth International Conference on Computing, Communications, and Cyber-Security/ edited by Paulo J. Sequeira Gonçalves ... [et al.].
其他題名:
IC4S'05.
其他題名:
IC4S'05
其他作者:
Gonçalves, Paulo J. Sequeira.
團體作者:
Workshop on the Preservation of Stability under Discretization
出版者:
Singapore :Springer Nature Singapore : : 2025.,
面頁冊數:
xxiv, 593 p. :ill., digital ; : 24 cm.;
Contained By:
Springer Nature eBook
標題:
Artificial Intelligence. -
電子資源:
https://doi.org/10.1007/978-981-97-7371-8
ISBN:
9789819773718
Proceedings of fifth International Conference on Computing, Communications, and Cyber-Security = IC4S'05.. Volume 2 /
Proceedings of fifth International Conference on Computing, Communications, and Cyber-Security
IC4S'05.Volume 2 /[electronic resource] :IC4S'05edited by Paulo J. Sequeira Gonçalves ... [et al.]. - Singapore :Springer Nature Singapore :2025. - xxiv, 593 p. :ill., digital ;24 cm. - Lecture notes in networks and systems,v. 11282367-3389 ;. - Lecture notes in networks and systems ;v.1..
Incorporation of the Self-Attention Mechanism into Convolutional Neural Networks for the Target Recognition -- Deep Residual Networks including Transfer Learning for Facial Emotion Identification -- Plant Leaves Disease Detection using Integrated Convolution Neural Networks:A case study on potato -- Electrocardiogram Classification Using Convolutional Neural Network -- From Pixels to Truth: Unveiling Deepfakes with a Meso-5 and XceptionNet Fusion Network -- 5G Technology: From Evolution to Current Time -- An efficient method to deal with missing values and class imbalance in healthcare data -- Improving Machine Learning Algorithm's Accuracy for Detecting Code Smell Using Data Balancing and Pa-rameter Optimization -- Enhanced Multimodal Conversational AI Using Speech and Image Integration -- A Visual Android Malware Detection Technique based on Process Memory Dump Files -- BookNest : An ensemble based Book Recommendation System -- Deep Transfer Learning in Parasites Imaging: A Systematic Review -- Electronic Healthcare Record Sharing System Using Blockchain -- Android Malware Detection Using Learning Techniques: A Review -- Survey on Classification of Disease Identification in Potato Leaves for Precision Agriculture Using Deep Learning and Machine Learning -- Enhancing Student Success: Predictive Modeling of Graduation and Dropout Rates in University Management Using Machine Learning -- A Deep Learning Framework for Automated Breast Cancer Detection through Histopathological Image Analysis -- Deep Pox: Leveraging Deep Learning Techniques for Monkeypox Recognition in 2022 -- Automated epileptic seizure detection of EEG signals using machine learning -- Credit Card Fraud Detection Using Random Forest and K-Nearest Neighbors (KNN) Algorithm -- Deep Learning Techniques in Sector of Agriculture -- Deep Learning Techniques in Sector of Agriculture -- Comparative Analysis of monopole and Dipole Antennas for CubeSats: A Review -- Blockchain-Driven Recommender Systems Redefining User Experiences -- Unlocking the Potential of Healthcare IoT: Architectural Insights and Future Trends -- Constructing a Hierarchical model based on the Blockchain in Healthcare -- Securing Digital Integrity: Proposed Comprehensive Framework for Deepfake Detection and BlockChain Validation.
This book features selected research papers presented at the Fifth International Conference on Computing, Communications, and Cyber-Security (IC4S'05) Volume 2, organized in India, during 8th-9th April, 2024. The conference was hosted at GEHU, Bhimtal Campus in India. It includes innovative work from researchers, leading innovators, and professionals in the areas of communication and network technologies, advanced computing technologies, data analytics and intelligent learning, the latest electrical and electronics trends, and security and privacy issues. The work is presented in two volumes.
ISBN: 9789819773718
Standard No.: 10.1007/978-981-97-7371-8doiSubjects--Topical Terms:
646849
Artificial Intelligence.
LC Class. No.: QA75.5 / .I583 2024
Dewey Class. No.: 004.6
Proceedings of fifth International Conference on Computing, Communications, and Cyber-Security = IC4S'05.. Volume 2 /
LDR
:04064nam a2200349 a 4500
001
1160433
003
DE-He213
005
20241205115238.0
006
m d
007
cr nn 008maaau
008
251029s2025 si s 0 eng d
020
$a
9789819773718
$q
(electronic bk.)
020
$a
9789819773701
$q
(paper)
024
7
$a
10.1007/978-981-97-7371-8
$2
doi
035
$a
978-981-97-7371-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA75.5
$b
.I583 2024
072
7
$a
TJK
$2
bicssc
072
7
$a
TEC041000
$2
bisacsh
072
7
$a
TJK
$2
thema
082
0 4
$a
004.6
$2
23
090
$a
QA75.5
$b
.I61 2024
111
2
$a
Workshop on the Preservation of Stability under Discretization
$d
(2001 :
$c
Fort Collins, Colo.)
$3
527686
245
1 0
$a
Proceedings of fifth International Conference on Computing, Communications, and Cyber-Security
$h
[electronic resource] :
$b
IC4S'05.
$n
Volume 2 /
$c
edited by Paulo J. Sequeira Gonçalves ... [et al.].
246
3
$a
IC4S'05
260
$a
Singapore :
$c
2025.
$b
Springer Nature Singapore :
$b
Imprint: Springer,
300
$a
xxiv, 593 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in networks and systems,
$x
2367-3389 ;
$v
v. 1128
505
0
$a
Incorporation of the Self-Attention Mechanism into Convolutional Neural Networks for the Target Recognition -- Deep Residual Networks including Transfer Learning for Facial Emotion Identification -- Plant Leaves Disease Detection using Integrated Convolution Neural Networks:A case study on potato -- Electrocardiogram Classification Using Convolutional Neural Network -- From Pixels to Truth: Unveiling Deepfakes with a Meso-5 and XceptionNet Fusion Network -- 5G Technology: From Evolution to Current Time -- An efficient method to deal with missing values and class imbalance in healthcare data -- Improving Machine Learning Algorithm's Accuracy for Detecting Code Smell Using Data Balancing and Pa-rameter Optimization -- Enhanced Multimodal Conversational AI Using Speech and Image Integration -- A Visual Android Malware Detection Technique based on Process Memory Dump Files -- BookNest : An ensemble based Book Recommendation System -- Deep Transfer Learning in Parasites Imaging: A Systematic Review -- Electronic Healthcare Record Sharing System Using Blockchain -- Android Malware Detection Using Learning Techniques: A Review -- Survey on Classification of Disease Identification in Potato Leaves for Precision Agriculture Using Deep Learning and Machine Learning -- Enhancing Student Success: Predictive Modeling of Graduation and Dropout Rates in University Management Using Machine Learning -- A Deep Learning Framework for Automated Breast Cancer Detection through Histopathological Image Analysis -- Deep Pox: Leveraging Deep Learning Techniques for Monkeypox Recognition in 2022 -- Automated epileptic seizure detection of EEG signals using machine learning -- Credit Card Fraud Detection Using Random Forest and K-Nearest Neighbors (KNN) Algorithm -- Deep Learning Techniques in Sector of Agriculture -- Deep Learning Techniques in Sector of Agriculture -- Comparative Analysis of monopole and Dipole Antennas for CubeSats: A Review -- Blockchain-Driven Recommender Systems Redefining User Experiences -- Unlocking the Potential of Healthcare IoT: Architectural Insights and Future Trends -- Constructing a Hierarchical model based on the Blockchain in Healthcare -- Securing Digital Integrity: Proposed Comprehensive Framework for Deepfake Detection and BlockChain Validation.
520
$a
This book features selected research papers presented at the Fifth International Conference on Computing, Communications, and Cyber-Security (IC4S'05) Volume 2, organized in India, during 8th-9th April, 2024. The conference was hosted at GEHU, Bhimtal Campus in India. It includes innovative work from researchers, leading innovators, and professionals in the areas of communication and network technologies, advanced computing technologies, data analytics and intelligent learning, the latest electrical and electronics trends, and security and privacy issues. The work is presented in two volumes.
650
2 4
$a
Artificial Intelligence.
$3
646849
650
2 4
$a
Mobile and Network Security.
$3
1211619
650
2 4
$a
Signal, Speech and Image Processing.
$3
1414819
650
1 4
$a
Communications Engineering, Networks.
$3
669809
650
0
$a
Computer networks
$x
Security measures
$v
Congresses.
$3
574534
$3
727814
650
0
$a
Artificial intelligence
$3
671585
650
0
$a
Computer networks
$v
Congresses.
$3
574651
$3
727795
650
0
$a
Computer science
$3
675907
700
1
$a
Gonçalves, Paulo J. Sequeira.
$3
1487474
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in networks and systems ;
$v
v.1.
$3
1107910
856
4 0
$u
https://doi.org/10.1007/978-981-97-7371-8
950
$a
Engineering (SpringerNature-11647)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入