Computational Intelligence in Communications and Business Analytics (eBook, PDF)
6th International Conference, CICBA 2024, Patna, India, January 23-25, 2024, Revised Selected Papers, Part III
Redaktion: Singh, Jyoti Prakash; Dutta, Paramartha; Mandal, Jyotsna K.; Mukhopadhyay, Somnath; Singh, Amit Kumar; Singh, Maheshwari Prasad
57,95 €
57,95 €
inkl. MwSt.
Sofort per Download lieferbar
29 °P sammeln
57,95 €
Als Download kaufen
57,95 €
inkl. MwSt.
Sofort per Download lieferbar
29 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
57,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
29 °P sammeln
Computational Intelligence in Communications and Business Analytics (eBook, PDF)
6th International Conference, CICBA 2024, Patna, India, January 23-25, 2024, Revised Selected Papers, Part III
Redaktion: Singh, Jyoti Prakash; Dutta, Paramartha; Mandal, Jyotsna K.; Mukhopadhyay, Somnath; Singh, Amit Kumar; Singh, Maheshwari Prasad
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This three-volume set CCIS 2366-2368 constitutes the refereed proceedings of the 6th International Conference on Computational Intelligence in Communications and Business Analytics, CICBA 2024, held in Patna, India, during January 23-25, 2024.
The 82 full papers presented in this volume were carefully reviewed and selected from 249 submissions. Together, these papers showcase cutting-edge research in the fields of computational intelligence and business analytics, covering a broad range of topics.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 32.27MB
Andere Kunden interessierten sich auch für
- Computational Intelligence in Communications and Business Analytics (eBook, PDF)57,95 €
- Computational Intelligence in Communications and Business Analytics (eBook, PDF)57,95 €
- Intelligent Systems (eBook, PDF)60,95 €
- Intelligent Systems (eBook, PDF)47,95 €
- Computational Intelligence in Communications and Business Analytics (eBook, PDF)61,95 €
- Computational Intelligence in Communications and Business Analytics (eBook, PDF)61,95 €
- Computational Intelligence in Communications and Business Analytics (eBook, PDF)73,95 €
-
-
-
This three-volume set CCIS 2366-2368 constitutes the refereed proceedings of the 6th International Conference on Computational Intelligence in Communications and Business Analytics, CICBA 2024, held in Patna, India, during January 23-25, 2024.
The 82 full papers presented in this volume were carefully reviewed and selected from 249 submissions. Together, these papers showcase cutting-edge research in the fields of computational intelligence and business analytics, covering a broad range of topics.
The 82 full papers presented in this volume were carefully reviewed and selected from 249 submissions. Together, these papers showcase cutting-edge research in the fields of computational intelligence and business analytics, covering a broad range of topics.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer Nature Switzerland
- Seitenzahl: 352
- Erscheinungstermin: 11. Februar 2025
- Englisch
- ISBN-13: 9783031813368
- Artikelnr.: 73336072
- Verlag: Springer Nature Switzerland
- Seitenzahl: 352
- Erscheinungstermin: 11. Februar 2025
- Englisch
- ISBN-13: 9783031813368
- Artikelnr.: 73336072
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Theories and Applications to Data Communications and Analytics.- Optuna and Decision Tree Based Network Intrusion Detection System for Internet of Things.- Restful Architecture for Achieving Syntactic Interoperability in IoT Systems.- Energy Optimized Clustering and Cluster Head Selection in WSNs an MDB-KMC and Cuttlefish Approach.- D2Stege Using Decteron2 to Segment Medical Image with Security Through Steganography and Encryption.- A Novel Chaos and DNA Computing for Medical Image Encryption.- Session Based Symmetric Key Cryptography Using Digital Circuit Based on Two Left Shift.- Digital Images Encryption Using PWLCM and Sine Map.- Hybrid Humor Classification and Detection Based on Machine Learning.- Data Anomaly Detection in Wireless Sensor Network Using Principal Component Analysis and Decision Tree.- Industry Monitoring with Data Logger in Google Sheet Using Respberry Pi.- ECCNN A Novel Efficient Compressed Convolutional Neural Network.- A Modified Low Energy Consuming Mac Protocol for Wireless Sensor Networks.- Text Data Security Through Hybrid Method Using Visual Cryptography and Image Steganography Algorithms.- CASCAIN Cascaded Attention Infused Networks for Named Entity Recognition in Code Mixed Setting.- Secure Non Fungible Token Marketplaces Using ERC 721.- A Detailed Comparative Study of Regression Models for Stock Price Prediction.- An Optimal Cluster Head Selection in UAV Networks Using Grey Wolf Optimization.- Multi Modal Probabilistic Conditional Generative Adversarial Networks for Electric Vehicles Range Prediction.- Entry Point Adaptive Keystroke Dynamics Based User Authentication for Evolving Passwords.- Malicious node detection in Industrial internet of things using swarm based optimization algorithm A cyber security perspective.- Is software defined smart grid secure An analysis of security issues and solutions.- Energy Efficiency Optimization in IoT Based Machine Learning for Smart Environmental Monitoring.- Smart Tech Cane Navigator (STCN) for Physically Challenged.- A Real Time Machine Learning based Statistical Approach for Power Generation Prediction for Solar PV Plant.- CipherCraft An Integrated Approach to Cryptographic Data Security in Modern Computing Environments.- Unveiling Dynamics of Structural Breaks in Global Stock Markets and Implications for Forecasting Accuracy.
Theories and Applications to Data Communications and Analytics.- Optuna and Decision Tree Based Network Intrusion Detection System for Internet of Things.- Restful Architecture for Achieving Syntactic Interoperability in IoT Systems.- Energy Optimized Clustering and Cluster Head Selection in WSNs an MDB-KMC and Cuttlefish Approach.- D2Stege Using Decteron2 to Segment Medical Image with Security Through Steganography and Encryption.- A Novel Chaos and DNA Computing for Medical Image Encryption.- Session Based Symmetric Key Cryptography Using Digital Circuit Based on Two Left Shift.- Digital Images Encryption Using PWLCM and Sine Map.- Hybrid Humor Classification and Detection Based on Machine Learning.- Data Anomaly Detection in Wireless Sensor Network Using Principal Component Analysis and Decision Tree.- Industry Monitoring with Data Logger in Google Sheet Using Respberry Pi.- ECCNN A Novel Efficient Compressed Convolutional Neural Network.- A Modified Low Energy Consuming Mac Protocol for Wireless Sensor Networks.- Text Data Security Through Hybrid Method Using Visual Cryptography and Image Steganography Algorithms.- CASCAIN Cascaded Attention Infused Networks for Named Entity Recognition in Code Mixed Setting.- Secure Non Fungible Token Marketplaces Using ERC 721.- A Detailed Comparative Study of Regression Models for Stock Price Prediction.- An Optimal Cluster Head Selection in UAV Networks Using Grey Wolf Optimization.- Multi Modal Probabilistic Conditional Generative Adversarial Networks for Electric Vehicles Range Prediction.- Entry Point Adaptive Keystroke Dynamics Based User Authentication for Evolving Passwords.- Malicious node detection in Industrial internet of things using swarm based optimization algorithm A cyber security perspective.- Is software defined smart grid secure An analysis of security issues and solutions.- Energy Efficiency Optimization in IoT Based Machine Learning for Smart Environmental Monitoring.- Smart Tech Cane Navigator (STCN) for Physically Challenged.- A Real Time Machine Learning based Statistical Approach for Power Generation Prediction for Solar PV Plant.- CipherCraft An Integrated Approach to Cryptographic Data Security in Modern Computing Environments.- Unveiling Dynamics of Structural Breaks in Global Stock Markets and Implications for Forecasting Accuracy.