logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Next-Gen Technologies in Computational Intelligence : Proceeding of the International Conference on Next-Gen Technologies in Computational Intelligenc

Next-Gen Technologies in Computational Intelligence : Proceeding of the International Conference on Next-Gen Technologies in Computational Intelligenc (Paperback)

Vicente Garcia Diaz, M. Senthil Kumar, Souvik Pal, R. Anandan, Biji C. L. (엮은이)
CRC Press
112,470원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
92,220원 -18% 0원
4,620원
87,600원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Next-Gen Technologies in Computational Intelligence : Proceeding of the International Conference on Next-Gen Technologies in Computational Intelligenc
eBook 미리보기

책 정보

· 제목 : Next-Gen Technologies in Computational Intelligence : Proceeding of the International Conference on Next-Gen Technologies in Computational Intelligenc (Paperback) 
· 분류 : 외국도서 > 기술공학 > 기술공학 > 공학일반
· ISBN : 9781032553900
· 쪽수 : 564쪽
· 출판일 : 2024-06-07

목차

1. Blockchain-Based Identity Management System in the Digital Industry

2. An Improved Neural Network Classifier for Melanoma Skin Lesion Detection

3. Trust Aware Energy Efficient Model Using Evolutionary Computing in WSN

4. Introspection of CNN Primitive Features for Indian Sign Language Based Hand Gesture
Recognition of Daily Used Words Using Machine Learning

5. Implementation of Quantum Image Processing Techniques Using the Chan-Vese
Segmentation Algorithm to Convert Bits to Qubits to Enhance The Storage Capacity
of the Pixels to Achieve Optimal Output to Identify the Paddy Leaf Diseases

6. Prediction of Bitcoin-Heist Ransomware Attack Using Machine Learning

7. A Review of Classification, Detection, and Prognosis of Coronary Artery Disease

8. Optimization of Packet Length using Exclusive SCCO Algorithm In WSN And IoT Based
Networks

9. Novel Triphasic Architecture to Ascertain Malicious Exam-Takers

10. SDKL Hybrid ML Model to Predict Heart Disease Detection

11. Optimization of Energy Aware Clustering For Wireless Sensor Network

12. Next-Gen Technologies in Computational Intelligence [NGTC-2023] PID 62

13. Efficient PHOA Based Routing Network Protocol
for IoT-Sem System

14. Enhancement of Security and Performance
of Multimedia Data Transmission Over Fog

15. Improving the Energy Efficiency Based on Cooperative Routing Using Genetic
Algorithm (GA) for Dynamic Clusters in Underwater Wireless Sensor Networks

16. Chest X?Ray Based Classification of Lungs Pathology Using VGG-16 Features
and Double Ensemble Classifier

17. Machine Learning Algorithms To Predict The Brain Stroke

18. An Efficient Student Relationship Automation Using Multimodal Temporal
Convolution Networks and Ranked Resolving Computations

19. Data Privacy Preservation with Optimization Technique for Effective Multi-Cloud
Storage and Security

20. A Framework for Real-Time Prediction of Inappropriate Content

21. Statistical and Algorithmic Color Normalization and Stain Separation Methods:
A Brief Study

22. Classification of Malware Infected API Call Sequences With Ensemble Learning

23. DDoS Identification and Defense Procedure Using Deep Learning Approaches For SDN

24. Comprehensive Autonomous Vehicle Optimal Routing With Dynamic Heuristics

25. Fake Review Detection in Movie Recommendation System Using Hybrid Method

26. Leprosy Screening Through Image Processing Methods

27. Real-Time V2V Communication for Collision Detection in VANETs Using
ESP Mesh Protocol: An IoT-Based Implementation for the Internet of Vehicles

28. Cyber Security Holes of JSON Web Token

29. Blockchain for Philanthropy

30. Predictive Analysis Using Big Data in the Treatment of Pulmonary Diseases

31.An Improved and Secured Elliptic Curve Cryptography Using Matrix Bitwise
Complement for Data Security in Cloud

31.An Improved and Secured Elliptic Curve Cryptography Using Matrix Bitwise
Complement for Data Security in Cloud

32.Real-Time Over-The-Air-Programming (OTAP) for Wireless Sensor Network:
Implementation and Analysis Using SENSEnuts IoT Platform

33.Mobile-Based Cloud Detection Model for Skin Cancer Using Machine Learning

34.Using the Greedy Algorithm to Minimize Bandwidth in P2P Networks Over Video
Live Streaming

35.Human Brain Tumors and the Role of the Neural Network

36.Best Fit Topic Model Coherence Improvement for Subectivity Analysis of Gestational
Diabetes Mellitus

37. A Decentralized Application-DAPP for Remote Voting System Based on Blockchain
Technology

38.Diagnosis of Mild Cognitive Impairment Using Multimodal Imaging With Machine
Learning Techniques

39.Surface Defect Detection for Wet Blue Leather Using Deep Learning Approach

40.Attack Detection for Stock Trading Application Using Unsupervised Machine Learning

41.Manipulation of 3D Objects in Handheld Augmented Reality for Campus Virtual Visit

42.Locality Recommendation System Using Exploratory Data Analysis and Affinity
Propagation

43.Real-Time Pothole Detection Using Deep Learning

44. Contact Less Virtually Controlling System Using Computer Vision Techniques

45.Underwater Benthos Detection in Marine Benthic Zone Using Single Shot MultiBox
Detector

46.Digital Human Creator Using Facial Expression and Voice

47.Enhancing the Security of Electronic Health Records Using Consortium Blockchai

48. Deep Learning Model for Segmentation of Brain Tumor in MRI Images

49. Embedding Intelligence on Edge Computing for the Classification of IoT Data
Using Machine Learning with Deep Autoencoder

50. Teens, Screens, and Mental Health- A Study on Digital Wellbeing

51. AI-Enabled Human and Machine Activity Monitoring in IIOT Systems

52. Application Development for Solving the Farmer Yield Problem Using Cloud
Computing

53. AI Enabled E-Commerce Studio Website

54. Correlational and Sentimental Analysis Using LSTM to Forecast Stock Price

55. A Novel Authentication System Based on CNN and IoT

56. Cryptocurrency Price Prediction Using LSTM and RNN Techniques

57. A Study on Cybernated Watermarking Approach on Image With Cryptographic Encryption

58. A Survey on Implementation and Development of AES Cryptography Algorithm
In Various Fields

59. A Survey on Alerting Using Honeyword System

60. A Study on IoT Based Road Safety and Traffic Management

61. Image-Based Steganography for Android: Concealing Secrets in Pixels

62. Various Methods of Injection Attacks

63. Password Protection and Recovery

64. Securing Wireless Communication in Cyber-Physical Systems and IoT

65. Prevention and Detection of Arp Spoofing ? A Survey

66. A Survey on Enhancing Password Guessing and Dictionary List Creation
Techniques Using OSINT

67.Survey on Multi-Factor Authentication in Cloud Computing

68.Survey on Improvement in Efficiency of Steganography

69.A Hybrid Model for Guided Filtering-Based Edge Preservation of Fused
Multi-modal Medical Images

70.State of Art Survey on Memory Forensic Acquisition & Techniques

71.Product Review System using CNN & MERN Stack

72.Invading Into Android Using Metasploit

73.A Review of Privacy Protection Data Utility Mining Using Perturbation

74.Plant Disease Detection Using Stochastic Gradient Classifier With RBNN

75.Autonomous Assistance for Alzheimer’s Patients

76.Developing an Internet of Things based soil moisture prediction

77.Mitigation of Threats in Cloud Using Ensemble Hybrid Machine Learning

78.Detection of Insects, Birds, and Wild Animals in Farming Land Using Regional
Convolutional Neural Network

79.A Trifold Authentication Using Elliptical Cryptography in Cloud Computing
K. Komathi and D. Kavitha

80.Binary Classification of Medical Chest X-Ray Using Gaussian Naive Bayes
in Machine Learning

저자소개

M. Senthil Kumar (엮은이)    정보 더보기
펼치기
Biji C. L. (엮은이)    정보 더보기
펼치기
이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책