Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book aims to attract researchers and practitioners who are working in information technology and computer science. This edited book is about basics and high-level concepts regarding blockchain technology and application, multimedia security, information processing, security of network, cloud and IoT, cryptography and information hiding, cyber-security and evidence investigations, and learning and intelligent computing. It is becoming increasingly important to develop adaptive, intelligent computing-centric, energy-aware, secure, and privacy-aware mechanisms in high-performance computing…mehr
This book aims to attract researchers and practitioners who are working in information technology and computer science. This edited book is about basics and high-level concepts regarding blockchain technology and application, multimedia security, information processing, security of network, cloud and IoT, cryptography and information hiding, cyber-security and evidence investigations, and learning and intelligent computing. It is becoming increasingly important to develop adaptive, intelligent computing-centric, energy-aware, secure, and privacy-aware mechanisms in high-performance computing and IoT applications. The book serves as a useful guide for industry persons and also helps beginners to learn things from basic to advance in the area of better computing paradigm. Our aim is intended to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results in security-related areas. We believe that this book not only presents novel and interesting ideas but also will stimulate interesting discussions from the participants and inspire new ideas.
Reversible Data Hiding in Encrypted Image Based on MSB Inversion.- Comments on the Visual Binary QR Code.- NLP-based Hardware Solution for Censoring Audio on Over-the-top (OTT) Media Services.- Efficient Steganographic Method Based on Modulo Cube.- Reversible Data Hiding Based on Bidirectional Generalized Integer Transform.- An RFID Ownership Transfer based on Multiple Owners with Different Weights.- Fuzzy C-Means based Feature Selection Mechanism for Wireless Intrusion Detection.- Real Time Drowsiness Detection Based on Facial Dynamic Features.- Collision Avoidance in Crowded Zone using Adversarial Reinforcement Learning.- Reconfigurable PM2.5 Sensor Green Deployment Mechanism Based on Blockchain Technology.
Reversible Data Hiding in Encrypted Image Based on MSB Inversion.- Comments on the Visual Binary QR Code.- NLP-based Hardware Solution for Censoring Audio on Over-the-top (OTT) Media Services.- Efficient Steganographic Method Based on Modulo Cube.- Reversible Data Hiding Based on Bidirectional Generalized Integer Transform.- An RFID Ownership Transfer based on Multiple Owners with Different Weights.- Fuzzy C-Means based Feature Selection Mechanism for Wireless Intrusion Detection.- Real Time Drowsiness Detection Based on Facial Dynamic Features.- Collision Avoidance in Crowded Zone using Adversarial Reinforcement Learning.- Reconfigurable PM2.5 Sensor Green Deployment Mechanism Based on Blockchain Technology.
Reversible Data Hiding in Encrypted Image Based on MSB Inversion.- Comments on the Visual Binary QR Code.- NLP-based Hardware Solution for Censoring Audio on Over-the-top (OTT) Media Services.- Efficient Steganographic Method Based on Modulo Cube.- Reversible Data Hiding Based on Bidirectional Generalized Integer Transform.- An RFID Ownership Transfer based on Multiple Owners with Different Weights.- Fuzzy C-Means based Feature Selection Mechanism for Wireless Intrusion Detection.- Real Time Drowsiness Detection Based on Facial Dynamic Features.- Collision Avoidance in Crowded Zone using Adversarial Reinforcement Learning.- Reconfigurable PM2.5 Sensor Green Deployment Mechanism Based on Blockchain Technology.
Reversible Data Hiding in Encrypted Image Based on MSB Inversion.- Comments on the Visual Binary QR Code.- NLP-based Hardware Solution for Censoring Audio on Over-the-top (OTT) Media Services.- Efficient Steganographic Method Based on Modulo Cube.- Reversible Data Hiding Based on Bidirectional Generalized Integer Transform.- An RFID Ownership Transfer based on Multiple Owners with Different Weights.- Fuzzy C-Means based Feature Selection Mechanism for Wireless Intrusion Detection.- Real Time Drowsiness Detection Based on Facial Dynamic Features.- Collision Avoidance in Crowded Zone using Adversarial Reinforcement Learning.- Reconfigurable PM2.5 Sensor Green Deployment Mechanism Based on Blockchain Technology.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497