語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Applied soft computing and communica...
~
(1998 :)
Applied soft computing and communication networksproceedings of ACN 2020 /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Applied soft computing and communication networksedited by Sabu M. Thampi ... [et al.].
其他題名:
proceedings of ACN 2020 /
其他題名:
ACN 2020
其他作者:
Thampi, Sabu M.
團體作者:
出版者:
Singapore :Springer Singapore :2021.
面頁冊數:
xxi, 340 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
標題:
Soft computingCongresses.
電子資源:
https://doi.org/10.1007/978-981-33-6173-7
ISBN:
9789813361737$q(electronic bk.)
Applied soft computing and communication networksproceedings of ACN 2020 /
Applied soft computing and communication networks
proceedings of ACN 2020 /[electronic resource] :ACN 2020edited by Sabu M. Thampi ... [et al.]. - Singapore :Springer Singapore :2021. - xxi, 340 p. :ill., digital ;24 cm. - Lecture notes in networks and systems,v.1872367-3370 ;. - Lecture notes in networks and systems ;v.1..
Algebraic Modelling of a Generic Fog Scenario for Moving IoT Devices -- A Novel Approach to Preserve DRM for Content Distribution over P2P Networks -- Secure Multimodal Biometric Recognition in Principal Component Subspace -- EEG Based Emotion Recognition and Its Interface with Augmented Reality -- Profile Verification Using Blockchain -- Distributed Denial of Service (DDoS) Attacks Detection: A Machine Learning Approach -- Intrusion Detection Using Deep Neural Network with AntiRectifier Layer -- CloudSim Exploration: A Knowledge Framework for Cloud Computing Researchers -- A Comprehensive Survey on Big Data Technology Based Cybersecurity Analytics Systems -- P2P Bot Detection Based on Host Behavior and Big Data Technology -- Serverless Deployment of a Voice-Bot for Visually Impaired -- Interference Management Technique for LTE, Wi-Fi Coexistence Based on CSI at the Transmitter.
This book constitutes thoroughly refereed post-conference proceedings of the International Applied Soft Computing and Communication Networks (ACN 2020) held in VIT, Chennai, India, during October 14-17, 2020. The research papers presented were carefully reviewed and selected from several initial submissions. The book is directed to the researchers and scientists engaged in various fields of intelligent systems.
ISBN: 9789813361737$q(electronic bk.)
Standard No.: 10.1007/978-981-33-6173-7doiSubjects--Topical Terms:
387156
Soft computing
--Congresses.
LC Class. No.: QA76.9.S63
Dewey Class. No.: 006.3
Applied soft computing and communication networksproceedings of ACN 2020 /
LDR
:02438nmm a2200349 a 4500
001
602422
003
DE-He213
005
20210702191453.0
006
m d
007
cr nn 008maaau
008
211112s2021 si s 0 eng d
020
$a
9789813361737$q(electronic bk.)
020
$a
9789813361720$q(paper)
024
7
$a
10.1007/978-981-33-6173-7
$2
doi
035
$a
978-981-33-6173-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.S63
072
7
$a
UYQ
$2
bicssc
072
7
$a
TEC009000
$2
bisacsh
072
7
$a
UYQ
$2
thema
082
0 4
$a
006.3
$2
23
090
$a
QA76.9.S63
$b
I61 2021
111
2
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
Applied soft computing and communication networks
$h
[electronic resource] :
$b
proceedings of ACN 2020 /
$c
edited by Sabu M. Thampi ... [et al.].
246
3
$a
ACN 2020
260
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2021.
300
$a
xxi, 340 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in networks and systems,
$x
2367-3370 ;
$v
v.187
505
0
$a
Algebraic Modelling of a Generic Fog Scenario for Moving IoT Devices -- A Novel Approach to Preserve DRM for Content Distribution over P2P Networks -- Secure Multimodal Biometric Recognition in Principal Component Subspace -- EEG Based Emotion Recognition and Its Interface with Augmented Reality -- Profile Verification Using Blockchain -- Distributed Denial of Service (DDoS) Attacks Detection: A Machine Learning Approach -- Intrusion Detection Using Deep Neural Network with AntiRectifier Layer -- CloudSim Exploration: A Knowledge Framework for Cloud Computing Researchers -- A Comprehensive Survey on Big Data Technology Based Cybersecurity Analytics Systems -- P2P Bot Detection Based on Host Behavior and Big Data Technology -- Serverless Deployment of a Voice-Bot for Visually Impaired -- Interference Management Technique for LTE, Wi-Fi Coexistence Based on CSI at the Transmitter.
520
$a
This book constitutes thoroughly refereed post-conference proceedings of the International Applied Soft Computing and Communication Networks (ACN 2020) held in VIT, Chennai, India, during October 14-17, 2020. The research papers presented were carefully reviewed and selected from several initial submissions. The book is directed to the researchers and scientists engaged in various fields of intelligent systems.
650
0
$a
Soft computing
$v
Congresses.
$3
387156
650
0
$a
Telecommunication systems
$v
Congresses.
$3
384599
650
1 4
$a
Computational Intelligence.
$3
338479
650
2 4
$a
Artificial Intelligence.
$3
212515
650
2 4
$a
Communications Engineering, Networks.
$3
273745
650
2 4
$a
Computer Communication Networks.
$3
218087
650
2 4
$a
Signal, Image and Speech Processing.
$3
273768
650
2 4
$a
Big Data.
$3
760530
700
1
$a
Thampi, Sabu M.
$3
576944
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in networks and systems ;
$v
v.1.
$3
744793
856
4 0
$u
https://doi.org/10.1007/978-981-33-6173-7
950
$a
Intelligent Technologies and Robotics (SpringerNature-42732)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000200072
電子館藏
1圖書
電子書
EB QA76.9.S63 I61 2021 2021
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-981-33-6173-7
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入