Atjaunināt sīkdatņu piekrišanu

E-grāmata: Computational Intelligence in Communications and Business Analytics: 6th International Conference, CICBA 2024, Patna, India, January 23-25, 2024, Revised Selected Papers, Part III

  • Formāts - EPUB+DRM
  • Cena: 71,37 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This three-volume set CCIS 2366-2368 constitutes the refereed proceedings of the 6th International Conference on Computational Intelligence in Communications and Business Analytics, CICBA 2024, held in Patna, India, during January 2325, 2024.





The 82 full papers presented in this volume were carefully reviewed and selected from 249 submissions. Together, these papers showcase cutting-edge research in the fields of computational intelligence and business analytics, covering a broad range of topics.
Theories and Applications to Data Communications and Analytics.- Optuna
and Decision Tree Based Network Intrusion Detection System for Internet of
Things.- Restful Architecture for Achieving Syntactic Interoperability in IoT
Systems.- Energy Optimized Clustering and Cluster Head Selection in WSNs an
MDB-KMC and Cuttlefish Approach.- D2Stege Using Decteron2 to Segment Medical
Image with Security Through Steganography and Encryption.- A Novel Chaos and
DNA Computing for Medical Image Encryption.- Session Based Symmetric Key
Cryptography Using Digital Circuit Based on Two Left Shift.- Digital Images
Encryption Using PWLCM and Sine Map.- Hybrid Humor Classification and
Detection Based on Machine Learning.- Data Anomaly Detection in Wireless
Sensor Network Using Principal Component Analysis and Decision Tree.-
Industry Monitoring with Data Logger in Google Sheet Using Respberry
Pi.- ECCNN A Novel Efficient Compressed Convolutional Neural Network.- A
Modified Low Energy Consuming Mac Protocol for Wireless Sensor Networks.-
Text Data Security Through Hybrid Method Using Visual Cryptography and Image
Steganography Algorithms.- CASCAIN Cascaded Attention Infused Networks for
Named Entity Recognition in Code Mixed Setting.- Secure Non Fungible Token
Marketplaces Using ERC 721.- A Detailed Comparative Study of Regression
Models for Stock Price Prediction.- An Optimal Cluster Head Selection in UAV
Networks Using Grey Wolf Optimization.- Multi Modal Probabilistic Conditional
Generative Adversarial Networks for Electric Vehicles Range Prediction.-
Entry Point Adaptive Keystroke Dynamics Based User Authentication for
Evolving Passwords.- Malicious node detection in Industrial internet of
things using swarm based optimization algorithm A cyber security
perspective.- Is software defined smart grid secure An analysis of security
issues and solutions.- Energy Efficiency Optimization in IoT Based Machine
Learning for Smart Environmental Monitoring.- Smart Tech Cane Navigator
(STCN) for Physically Challenged.- A Real Time Machine Learning based
Statistical Approach for Power Generation Prediction for Solar PV Plant.-
CipherCraft An Integrated Approach to Cryptographic Data Security in Modern
Computing Environments.- Unveiling Dynamics of Structural Breaks in Global
Stock Markets and Implications for Forecasting Accuracy.