logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation: Third International

Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation: Third International (Paperback, 2018)

Manuel Grana, Geetha Ganapathi, Arumugam Subramaniam, Suresh Balusamy, Rajamanickam Natarajan, Periakaruppan Ramanathan (엮은이)
Springer Verlag, Singapore
115,000원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
94,300원 -18% 0원
4,720원
89,580원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation: Third International
eBook 미리보기

책 정보

· 제목 : Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation: Third International (Paperback, 2018) 
· 분류 : 외국도서 > 컴퓨터 > 보안 > 일반
· ISBN : 9789811307157
· 쪽수 : 255쪽
· 출판일 : 2018-09-11

목차

A Short Review of Recent ELM Applications.- Critical Feature Selection and Critical Sampling for Data Mining.- From Recognition to Generation using Deep Learning: A Case Study with Video Generation.- Economic Dispatch Problem using Clustered Firefly.- Algorithm for Wind Thermal Power System.- A Novel and Efficient Multi-Hop Routing Algorithm for Manet.- Parameter Optimization of Adaptive Random Partition Testing by applying Artificial Bee Colony Algorithm.- A Novel Coherence Particle Swarm Optimization Algorithm with Specified Scrutiny of FCM(CPSO-SSFCM) in Detecting Leukemia for Microscopic Images.- Impact of Negative Correlations in Characterizing Cognitive Load States using EEG based Functional Brain Networks.- Frequent Sequence Mining Approach to Video Compression.- Deep Learning based Audio Scene Classification.- Cyber Security.- Certain Challenges in Biometrics System Development.- A Study on Various Cyber-Attacks and their Classification in UAV Assisted Vehicular Ad-Hoc Networks.- Computational Models.- Development of Buoy Information Monitoring System Based on 5G against the Abandoned, Lost and Discarded Fishing Gears.- Violation Resolution in Distributed Stream Networks.- Fluid Queue Driven by an M/M/1 Queue subject to Working Vacation and Impatience.- Hyers-Ulam Stability of Linear Differential Equations.- Cost analysis of an unreliable retrial queue subject to balking, Bernoulli vacation, two types of service and starting failure.- Mathematical Modelling and Optimization of Lung Cancer in Smokers and Non Smokers.- Transient Analysis of an M/M/1 queue with Bernoulli Vacation and Vacation Interruption.- Behavioral analysis of temperature distribution in a three fluid heat exchanger via fractional derivative.- Intensive Analysis of Sub Synchronous Resonance in a DFIG Based Wind Energy Conversion System (WECS) Connected with Smart Grid.

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책