Advances in computational intelligen...
International Conference on Computational intelligence and Communication Technology ((2019 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Advances in computational intelligence and communication technology = proceedings of CICT 2019 /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Advances in computational intelligence and communication technology/ edited by Xiao-Zhi Gao ... [et al.].
    Reminder of title: proceedings of CICT 2019 /
    remainder title: CICT 2019
    other author: Gao, Xiao-Zhi.
    corporate name: International Conference on Computational intelligence and Communication Technology
    Published: Singapore :Springer Singapore : : 2021.,
    Description: xiv, 574 p. :ill., digital ;24 cm.
    [NT 15003449]: Part 1: Intelligent Computational Science -- Chapter 1. Influence of Wind Speed on Solar PV Plant Power Production - Prediction Model Using Decision Based Artificial Neural Network -- Chapter 2. Prediction of Compressive Strength of Ultra-High Performance Concrete using SFS and ANN -- Chapter 3. Classification of Plant Based on Leaf Images -- Chapter 4. Controller Optimization for Boiler Turbine Using Simulated Annealing and Genetic Algorithm -- Chapter 5. Indian Language Identification for Short Text -- Chapter 6. Improved Whale Optimization Algorithm for Numerical Optimization -- Chapter 7. A Matrix Based Approach for Evaluation of Vocal Renditions in Hindustani Classical Music -- Chapter 8. Performance Analysis of ML Algorithms on Speech Emotion Recognition -- Chapter 9. EEPMS: Energy Efficient Path Planning for Mobile Sink in Wireless Sensor Networks: A Genetic Algorithm based Approach -- Chapter 10. Mining Public Opinion on Plastic Ban in India. Chapter 11. Whale Neuro-Fuzzy System for Intrusion Detection in Wireless Sensor Network -- Part 2: Advanced Security Techniques -- Chapter 12. The Threat Detection Framework for Securing Semantic Web Services based on XACML -- Chapter 13. Real-Time Detection of Fake Account in Twitter using Machine Learning Approach -- Chapter 14. DPLOOP: Detection & Prevention of Loopholes in Web Application Security -- Chapter 15. Security Enhancement using Modified AES and Diffie-Hellman Key Exchange -- Chapter 16. Detection of Advanced Linux Malware using Machine Learning -- Chapter 17. Host-Server based Malware Detection System for Android Platforms Using Machine Learning -- Chapter 18. Identification of Windows based Malware by Dynamic Analysis using Machine Learning Algorithm -- Chapter 19. Secure E-mail Communications through Cryptographic Techniques - A Study -- Chapter 20. Current trends in Cryptography, Steganography and Metamorphic Cryptography: A survey.
    Contained By: Springer eBooks
    Subject: Computational intelligence - Congresses. -
    Online resource: https://doi.org/10.1007/978-981-15-1275-9
    ISBN: 9789811512759
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login