Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Proceedings of fifth International Conference on Computing, Communications, and Cyber-Security = IC4S'05.. Volume 2 /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Proceedings of fifth International Conference on Computing, Communications, and Cyber-Security/ edited by Paulo J. Sequeira Gonçalves ... [et al.].
Reminder of title:
IC4S'05.
remainder title:
IC4S'05
other author:
Gonçalves, Paulo J. Sequeira.
corporate name:
Workshop on the Preservation of Stability under Discretization
Published:
Singapore :Springer Nature Singapore : : 2025.,
Description:
xxiv, 593 p. :ill., digital ; : 24 cm.;
Contained By:
Springer Nature eBook
Subject:
Computer science -
Online resource:
https://doi.org/10.1007/978-981-97-7371-8
ISBN:
9789819773718
Proceedings of fifth International Conference on Computing, Communications, and Cyber-Security = IC4S'05.. Volume 2 /
Proceedings of fifth International Conference on Computing, Communications, and Cyber-Security
IC4S'05.Volume 2 /[electronic resource] :IC4S'05edited by Paulo J. Sequeira Gonçalves ... [et al.]. - Singapore :Springer Nature Singapore :2025. - xxiv, 593 p. :ill., digital ;24 cm. - Lecture notes in networks and systems,v. 11282367-3389 ;. - Lecture notes in networks and systems ;v.1..
Incorporation of the Self-Attention Mechanism into Convolutional Neural Networks for the Target Recognition -- Deep Residual Networks including Transfer Learning for Facial Emotion Identification -- Plant Leaves Disease Detection using Integrated Convolution Neural Networks:A case study on potato -- Electrocardiogram Classification Using Convolutional Neural Network -- From Pixels to Truth: Unveiling Deepfakes with a Meso-5 and XceptionNet Fusion Network -- 5G Technology: From Evolution to Current Time -- An efficient method to deal with missing values and class imbalance in healthcare data -- Improving Machine Learning Algorithm's Accuracy for Detecting Code Smell Using Data Balancing and Pa-rameter Optimization -- Enhanced Multimodal Conversational AI Using Speech and Image Integration -- A Visual Android Malware Detection Technique based on Process Memory Dump Files -- BookNest : An ensemble based Book Recommendation System -- Deep Transfer Learning in Parasites Imaging: A Systematic Review -- Electronic Healthcare Record Sharing System Using Blockchain -- Android Malware Detection Using Learning Techniques: A Review -- Survey on Classification of Disease Identification in Potato Leaves for Precision Agriculture Using Deep Learning and Machine Learning -- Enhancing Student Success: Predictive Modeling of Graduation and Dropout Rates in University Management Using Machine Learning -- A Deep Learning Framework for Automated Breast Cancer Detection through Histopathological Image Analysis -- Deep Pox: Leveraging Deep Learning Techniques for Monkeypox Recognition in 2022 -- Automated epileptic seizure detection of EEG signals using machine learning -- Credit Card Fraud Detection Using Random Forest and K-Nearest Neighbors (KNN) Algorithm -- Deep Learning Techniques in Sector of Agriculture -- Deep Learning Techniques in Sector of Agriculture -- Comparative Analysis of monopole and Dipole Antennas for CubeSats: A Review -- Blockchain-Driven Recommender Systems Redefining User Experiences -- Unlocking the Potential of Healthcare IoT: Architectural Insights and Future Trends -- Constructing a Hierarchical model based on the Blockchain in Healthcare -- Securing Digital Integrity: Proposed Comprehensive Framework for Deepfake Detection and BlockChain Validation.
This book features selected research papers presented at the Fifth International Conference on Computing, Communications, and Cyber-Security (IC4S'05) Volume 2, organized in India, during 8th-9th April, 2024. The conference was hosted at GEHU, Bhimtal Campus in India. It includes innovative work from researchers, leading innovators, and professionals in the areas of communication and network technologies, advanced computing technologies, data analytics and intelligent learning, the latest electrical and electronics trends, and security and privacy issues. The work is presented in two volumes.
ISBN: 9789819773718
Standard No.: 10.1007/978-981-97-7371-8doiSubjects--Topical Terms:
675907
Computer science
LC Class. No.: QA75.5 / .I583 2024
Dewey Class. No.: 004.6
Proceedings of fifth International Conference on Computing, Communications, and Cyber-Security = IC4S'05.. Volume 2 /
LDR
:04064nam a2200349 a 4500
001
1160433
003
DE-He213
005
20241205115238.0
006
m d
007
cr nn 008maaau
008
251029s2025 si s 0 eng d
020
$a
9789819773718
$q
(electronic bk.)
020
$a
9789819773701
$q
(paper)
024
7
$a
10.1007/978-981-97-7371-8
$2
doi
035
$a
978-981-97-7371-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA75.5
$b
.I583 2024
072
7
$a
TJK
$2
bicssc
072
7
$a
TEC041000
$2
bisacsh
072
7
$a
TJK
$2
thema
082
0 4
$a
004.6
$2
23
090
$a
QA75.5
$b
.I61 2024
111
2
$a
Workshop on the Preservation of Stability under Discretization
$d
(2001 :
$c
Fort Collins, Colo.)
$3
527686
245
1 0
$a
Proceedings of fifth International Conference on Computing, Communications, and Cyber-Security
$h
[electronic resource] :
$b
IC4S'05.
$n
Volume 2 /
$c
edited by Paulo J. Sequeira Gonçalves ... [et al.].
246
3
$a
IC4S'05
260
$a
Singapore :
$c
2025.
$b
Springer Nature Singapore :
$b
Imprint: Springer,
300
$a
xxiv, 593 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in networks and systems,
$x
2367-3389 ;
$v
v. 1128
505
0
$a
Incorporation of the Self-Attention Mechanism into Convolutional Neural Networks for the Target Recognition -- Deep Residual Networks including Transfer Learning for Facial Emotion Identification -- Plant Leaves Disease Detection using Integrated Convolution Neural Networks:A case study on potato -- Electrocardiogram Classification Using Convolutional Neural Network -- From Pixels to Truth: Unveiling Deepfakes with a Meso-5 and XceptionNet Fusion Network -- 5G Technology: From Evolution to Current Time -- An efficient method to deal with missing values and class imbalance in healthcare data -- Improving Machine Learning Algorithm's Accuracy for Detecting Code Smell Using Data Balancing and Pa-rameter Optimization -- Enhanced Multimodal Conversational AI Using Speech and Image Integration -- A Visual Android Malware Detection Technique based on Process Memory Dump Files -- BookNest : An ensemble based Book Recommendation System -- Deep Transfer Learning in Parasites Imaging: A Systematic Review -- Electronic Healthcare Record Sharing System Using Blockchain -- Android Malware Detection Using Learning Techniques: A Review -- Survey on Classification of Disease Identification in Potato Leaves for Precision Agriculture Using Deep Learning and Machine Learning -- Enhancing Student Success: Predictive Modeling of Graduation and Dropout Rates in University Management Using Machine Learning -- A Deep Learning Framework for Automated Breast Cancer Detection through Histopathological Image Analysis -- Deep Pox: Leveraging Deep Learning Techniques for Monkeypox Recognition in 2022 -- Automated epileptic seizure detection of EEG signals using machine learning -- Credit Card Fraud Detection Using Random Forest and K-Nearest Neighbors (KNN) Algorithm -- Deep Learning Techniques in Sector of Agriculture -- Deep Learning Techniques in Sector of Agriculture -- Comparative Analysis of monopole and Dipole Antennas for CubeSats: A Review -- Blockchain-Driven Recommender Systems Redefining User Experiences -- Unlocking the Potential of Healthcare IoT: Architectural Insights and Future Trends -- Constructing a Hierarchical model based on the Blockchain in Healthcare -- Securing Digital Integrity: Proposed Comprehensive Framework for Deepfake Detection and BlockChain Validation.
520
$a
This book features selected research papers presented at the Fifth International Conference on Computing, Communications, and Cyber-Security (IC4S'05) Volume 2, organized in India, during 8th-9th April, 2024. The conference was hosted at GEHU, Bhimtal Campus in India. It includes innovative work from researchers, leading innovators, and professionals in the areas of communication and network technologies, advanced computing technologies, data analytics and intelligent learning, the latest electrical and electronics trends, and security and privacy issues. The work is presented in two volumes.
650
0
$a
Computer science
$3
675907
650
0
$a
Computer networks
$v
Congresses.
$3
574651
$3
727795
650
0
$a
Artificial intelligence
$3
671585
650
0
$a
Computer networks
$x
Security measures
$v
Congresses.
$3
574534
$3
727814
650
1 4
$a
Communications Engineering, Networks.
$3
669809
650
2 4
$a
Signal, Speech and Image Processing.
$3
1414819
650
2 4
$a
Mobile and Network Security.
$3
1211619
650
2 4
$a
Artificial Intelligence.
$3
646849
700
1
$a
Gonçalves, Paulo J. Sequeira.
$3
1487474
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in networks and systems ;
$v
v.1.
$3
1107910
856
4 0
$u
https://doi.org/10.1007/978-981-97-7371-8
950
$a
Engineering (SpringerNature-11647)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login