000 04517nam a22006015i 4500
999 _c200457369
_d75581
003 TR-AnTOB
005 20231115142210.0
007 cr nn 008mamaa
008 210913s2022 si | s |||| 0|eng d
020 _a9789811637285
024 7 _a10.1007/978-981-16-3728-5
_2doi
040 _aTR-AnTOB
_beng
_erda
_cTR-AnTOB
041 _aeng
050 4 _aTK5105.5
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
072 7 _aTJK
_2thema
090 _aTK5105.5EBK
245 1 0 _aComputer Networks and Inventive Communication Technologies
_h[electronic resource] :
_bProceedings of Fourth ICCNCT 2021 /
_cedited by S. Smys, Robert Bestak, Ram Palanisamy, Ivan Kotuliak.
250 _a1st ed. 2022.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2022.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes on Data Engineering and Communications Technologies,
_x2367-4520 ;
_v75
505 0 _aChapter 1. Energy Efficient Clustering in Wireless Sensor Networks by Opposition-based Initialization Bat Algorithm -- Chapter 2. Efficient Data Collection in Wireless Sensor Network -- Chapter 3. Job Scheduling in Cloud Computing based on DGPSO -- Chapter 4. Read-Write Decoupled Single-Ended 9T SRAM Cell for Low Power Embedded Applications -- Chapter 5. Spam Detection using Genetic Algorithm Optimized LSTM Model -- Chapter 6. Affine Recurrence based Key Scheduling Algorithm for the Advanced Encryption Standard -- Chapter 7. Simplify Your Neural Networks: An Empirical Study on Cross Project Defect Prediction -- Chapter 8. Emotion Recognition During Social Interactions using Peripheral Physiological Signals -- Chapter 9. Phishing Detection using Computer Vision -- Chapter 10. A Comprehensive Attention-based Model for Image Captioning -- Chapter 11. Multimedia Text Summary Generator for Visually Impaired -- Chapter 12. Key-logger threat to the Android Mobile Banking Applications -- Chapter 13. Machine Learning-based Networ Intrusion Detection System -- Chapter 14. BGCNN: A Computer Vision Approach to Recognize of Yellow Mosaic Disease for Black Gram -- Chapter 15. Irrelevant Racist Tweets Identification using Data Mining Techniques.
520 _aThis book is a collection of peer-reviewed best-selected research papers presented at 4th International Conference on Computer Networks and Inventive Communication Technologies (ICCNCT 2021). The book covers new results in theory, methodology, and applications of computer networks and data communications. It includes original papers on computer networks, network protocols and wireless networks, data communication technologies, and network security. The proceedings of this conference are a valuable resource, dealing with both the important core and the specialized issues in the areas of next-generation wireless network design, control, and management, as well as in the areas of protection, assurance, and trust in information security practice. It is a reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners for advanced work in the area. .
650 0 _aTelecommunication.
650 0 _aControl engineering.
650 0 _aRobotics.
650 0 _aAutomation.
650 0 _aArtificial intelligence.
650 0 _aComputer input-output equipment.
650 1 4 _aCommunications Engineering, Networks.
650 2 4 _aControl, Robotics, Automation.
650 2 4 _aArtificial Intelligence.
650 2 4 _aInput/Output and Data Communications.
653 0 _aComputer networks -- Congresses
700 1 _aSmys, S.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aBestak, Robert.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aPalanisamy, Ram.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aKotuliak, Ivan.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
830 0 _aLecture Notes on Data Engineering and Communications Technologies,
_x2367-4520 ;
_v75
856 4 0 _uhttps://doi.org/10.1007/978-981-16-3728-5
_3Springer eBooks
_zOnline access link to the resource
942 _2lcc
_cEBK