New Trends in Information and Communications Technology Applications (eBook, PDF)
7th National Conference, NTICT 2023, Baghdad, Iraq, December 20-21, 2023, Proceedings
Redaktion: Al-Bakry, Abbas M.; Idrees, Ali K.; Hamid, Rula A.; Hasan, Haitham S.; Al-Shuwaili, Ali N.; Aldhaibani, Jaafar A.; Al-Mamory, Safaa O.; Sahib, Mouayad A.
Alle Infos zum eBook verschenken
New Trends in Information and Communications Technology Applications (eBook, PDF)
7th National Conference, NTICT 2023, Baghdad, Iraq, December 20-21, 2023, Proceedings
Redaktion: Al-Bakry, Abbas M.; Idrees, Ali K.; Hamid, Rula A.; Hasan, Haitham S.; Al-Shuwaili, Ali N.; Aldhaibani, Jaafar A.; Al-Mamory, Safaa O.; Sahib, Mouayad A.
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Hier können Sie sich einloggen
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the refereed proceedings of the 7th National Conference on New Trends in Information and Communications Technology Applications, NTICT 2023, held in Baghdad, Iraq, during December 20-21, 2023.
The 28 full papers included in this book were carefully reviewed and selected from 92 submissions. They were organized in topical sections as follows: artificial intelligence and machine learning; and computer networks.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 62.89MB
- Ubiquitous Networking (eBook, PDF)89,95 €
- Computational Science and Its Applications -- ICCSA 2015 (eBook, PDF)40,95 €
- Computational Science and Its Applications -- ICCSA 2015 (eBook, PDF)40,95 €
- Computational Science and Its Applications -- ICCSA 2015 (eBook, PDF)40,95 €
- Computational Science and Its Applications -- ICCSA 2015 (eBook, PDF)40,95 €
- Computational Science and Its Applications -- ICCSA 2015 (eBook, PDF)40,95 €
- Computer Networks (eBook, PDF)40,95 €
-
-
-
The 28 full papers included in this book were carefully reviewed and selected from 92 submissions. They were organized in topical sections as follows: artificial intelligence and machine learning; and computer networks.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Produktdetails
- Verlag: Springer International Publishing
- Seitenzahl: 412
- Erscheinungstermin: 25. Juni 2024
- Englisch
- ISBN-13: 9783031628146
- Artikelnr.: 72240723
- Verlag: Springer International Publishing
- Seitenzahl: 412
- Erscheinungstermin: 25. Juni 2024
- Englisch
- ISBN-13: 9783031628146
- Artikelnr.: 72240723
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
.- Nanoscale Communication Redefined: Exploring Bio-Inspired Molecular Systems.
.- Hybrid Edge Detection and SVD for Image Background Removal.
.- Multi-Objective Residential Load Scheduling Approach Based on Pelican Optimization Algorithm.
.- Incorporating Dilation Convolution into Mask Region Convolution Neural Network for Advanced Fruit Classification and Freshness Evaluation.
.- Adaptive Evolutionary Algorithm for Maximizing Social Influence.
.- Automatic Identification of Ear Patterns based on Convolutional Neural Network.
.- Enhancing Data Security with a Novel Color Encryption Algorithm Based on 5D Chaotic System and Delta Features for Dynamic Initialization.
.- Deepfake Detection Model Based on VGGFace with Head Pose Estimation Technique.
.- Multi-models based on Yolov8 for Identification of Vehicle Type and License Plate Recognition.
.- Face Identification System in Transform Domains over Secure Communication Channel.
.- Covid-19 Proteins Identification using Sequence Alignment for Protein-Protein Interaction Prediction.
.- Vehicle Logo Recognition Using Proposed Illumination Compensation and Six Local Moments.
.- Exploring Enhanced Recognition in Gesture Language Videos through Unsupervised Learning of Deep Autoencoder.
.- An Intelligent System for Monitoring Water Quality of Tigris River Using IOT and Machine Learning Techniques.
.- Crimes Tweet Detection based on CNN Hyperparameter Optimization Using Snake Optimizer.
.- Optimized Intelligent PID Controller for Propofol Dosing in General Anesthesia using Coati Optimization Algorithm.
.- Eye Movement Recognition: Exploring Trade-offs in Deep Learning Approaches with Development.
.- Enhancing the Early Prediction of Learners' Performance in a Virtual Learning Environment (VLE).
.- YOLOv8-AS: Masked Face Detection and Tracking Based on YOLOv8 with Attention Mechanism Model.
.- Symptom Principal Component Analysis (SPCA) for Dimensionality Reduction in Categorical Data: A Case Study on Breast Cancer.
.- An improved method for retrieving fashion images based on parsing the image contents.
.- Computer Networks.
.- A Robust Image Cipher System Based on Cramer-Shoup Algorithm and 5-D Hyper Chaotic System.
.- Variable-Length Key Generation Block Cipher Algorithm Based on DNA Tile Self-Assembly.
.- Performance Evaluation Comparison Between Central SDN network and DSDN.
.- Enhancing the Performance of Wireless Body Area Network Routing Protocols Based on Collaboratively Evaluated Values.
.- The impact of mobility models on ad-hoc networks: A review.
.- Authentication System Based On Zero-Knowledge Proof Employing The Rabin Cryptosystem And A Secret Sharing Schema.
.- A New Approach to Design KM1 Encryption Algorithm for Alarm in IoT.
.- Nanoscale Communication Redefined: Exploring Bio-Inspired Molecular Systems.
.- Hybrid Edge Detection and SVD for Image Background Removal.
.- Multi-Objective Residential Load Scheduling Approach Based on Pelican Optimization Algorithm.
.- Incorporating Dilation Convolution into Mask Region Convolution Neural Network for Advanced Fruit Classification and Freshness Evaluation.
.- Adaptive Evolutionary Algorithm for Maximizing Social Influence.
.- Automatic Identification of Ear Patterns based on Convolutional Neural Network.
.- Enhancing Data Security with a Novel Color Encryption Algorithm Based on 5D Chaotic System and Delta Features for Dynamic Initialization.
.- Deepfake Detection Model Based on VGGFace with Head Pose Estimation Technique.
.- Multi-models based on Yolov8 for Identification of Vehicle Type and License Plate Recognition.
.- Face Identification System in Transform Domains over Secure Communication Channel.
.- Covid-19 Proteins Identification using Sequence Alignment for Protein-Protein Interaction Prediction.
.- Vehicle Logo Recognition Using Proposed Illumination Compensation and Six Local Moments.
.- Exploring Enhanced Recognition in Gesture Language Videos through Unsupervised Learning of Deep Autoencoder.
.- An Intelligent System for Monitoring Water Quality of Tigris River Using IOT and Machine Learning Techniques.
.- Crimes Tweet Detection based on CNN Hyperparameter Optimization Using Snake Optimizer.
.- Optimized Intelligent PID Controller for Propofol Dosing in General Anesthesia using Coati Optimization Algorithm.
.- Eye Movement Recognition: Exploring Trade-offs in Deep Learning Approaches with Development.
.- Enhancing the Early Prediction of Learners' Performance in a Virtual Learning Environment (VLE).
.- YOLOv8-AS: Masked Face Detection and Tracking Based on YOLOv8 with Attention Mechanism Model.
.- Symptom Principal Component Analysis (SPCA) for Dimensionality Reduction in Categorical Data: A Case Study on Breast Cancer.
.- An improved method for retrieving fashion images based on parsing the image contents.
.- Computer Networks.
.- A Robust Image Cipher System Based on Cramer-Shoup Algorithm and 5-D Hyper Chaotic System.
.- Variable-Length Key Generation Block Cipher Algorithm Based on DNA Tile Self-Assembly.
.- Performance Evaluation Comparison Between Central SDN network and DSDN.
.- Enhancing the Performance of Wireless Body Area Network Routing Protocols Based on Collaboratively Evaluated Values.
.- The impact of mobility models on ad-hoc networks: A review.
.- Authentication System Based On Zero-Knowledge Proof Employing The Rabin Cryptosystem And A Secret Sharing Schema.
.- A New Approach to Design KM1 Encryption Algorithm for Alarm in IoT.