Innovation and Emerging Trends in Computing and Information Technologies
First International Conference, IETCIT 2024, Mohali, Punjab, India, March 1-2, 2024, Proceedings, Part II
Herausgegeben:Malhotra, Manisha
Innovation and Emerging Trends in Computing and Information Technologies
First International Conference, IETCIT 2024, Mohali, Punjab, India, March 1-2, 2024, Proceedings, Part II
Herausgegeben:Malhotra, Manisha
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the proceedings of the First International Conference on Innovation and Emerging Trends in Computing and Information Technologies, IETCIT 2024, held in Mohali, India, in March 1-2, 2024.
The 44 full papers presented in these two volumes were carefully reviewed and selected from 417 submissions. The papers are organized in the following topical sections:
Part I: machine learning and deep learning; pattern and speech recognition; internet of things (IoT).
Part II: data science and data analytics; communication, network and security.
Andere Kunden interessierten sich auch für
- Innovation and Emerging Trends in Computing and Information Technologies54,99 €
- Emerging Technologies in Computer Engineering: Cognitive Computing and Intelligent IoT100,99 €
- Information, Communication and Computing Technology50,99 €
- Large-Scale Disk Failure Prediction39,99 €
- Emerging Technologies in Computer Engineering: Microservices in Big Data Analytics39,99 €
- Ensemble Machine Learning177,99 €
- New Trends in Database and Information Systems77,99 €
-
-
-
This book constitutes the proceedings of the First International Conference on Innovation and Emerging Trends in Computing and Information Technologies, IETCIT 2024, held in Mohali, India, in March 1-2, 2024.
The 44 full papers presented in these two volumes were carefully reviewed and selected from 417 submissions. The papers are organized in the following topical sections:
Part I: machine learning and deep learning; pattern and speech recognition; internet of things (IoT).
Part II: data science and data analytics; communication, network and security.
The 44 full papers presented in these two volumes were carefully reviewed and selected from 417 submissions. The papers are organized in the following topical sections:
Part I: machine learning and deep learning; pattern and speech recognition; internet of things (IoT).
Part II: data science and data analytics; communication, network and security.
Produktdetails
- Produktdetails
- Communications in Computer and Information Science 2126
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-80841-8
- Seitenzahl: 336
- Erscheinungstermin: 28. Januar 2025
- Englisch
- Abmessung: 235mm x 155mm x 19mm
- Gewicht: 511g
- ISBN-13: 9783031808418
- ISBN-10: 303180841X
- Artikelnr.: 72086789
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Communications in Computer and Information Science 2126
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-80841-8
- Seitenzahl: 336
- Erscheinungstermin: 28. Januar 2025
- Englisch
- Abmessung: 235mm x 155mm x 19mm
- Gewicht: 511g
- ISBN-13: 9783031808418
- ISBN-10: 303180841X
- Artikelnr.: 72086789
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
.- Data Science and Data Analytics.
.- Generalized Material Flow Model for hot deformation processing based on power law.
.- Smallest Path Planning for Robots using Simple ACO and Ant System Algorithms.
.- An asymmetric single channel encryption mechanism using unequal modulus and QZS algorithm in fractional Fourier transform.
.- Evaluation Criteria for Test Suites in Software Developed Through Test-Driven Development.
.- LCB-eGyan Model: A Dynamic Cloud Architecture for e-Content Recommendation.
.- Gender and Ethnicity Recognition System Based on Convolutional Neural Networks.
.- Radiographic Evaluation for KNEEXNET Using Ensemble Models.
.- Comparative Study of Quantum Computing Tools and Frameworks.
.- Security Evaluation and Oversight in Stock Trading Using Artificial Intelligence.
.- A Dual Approach with Grad-CAM and Layer-wise Relevance Propagation for CNN Models Explainability.
.- CLAM - CNN & LSTM with Attention Mechanism for DNS Data Exfiltration Detection.
.- Comparison of various data mining techniques for Fake Profile Detection on Twitter.
.- Strategies for Gen AI Enterprise Adoption.
.- Role of Deep Learning in Skin Cancer Diagnosis: A Deeper Insight.
.- Communication, Network and Security.
.- Smart Education-Filtering Real Time Stream.
.- RNA and Audio-Based Workflows Scheduling by Multi-Objective Optimization in Cloud Environment.
.- Group Authentication and Key Management Protocol with Chinese Remainder Theorem in Multicast Communication.
.- Network Traffic Analysis for Intrusion with Zero Trust.
.- Enhanced Image Deblurring with the Fusion of Generative Adversarial Networks and Transformer Models.
.- Analysis of Various Routing Protocols for Air Pollution Monitoring Systems in Wireless Sensor Networks.
.- Intelligent toll management using limited CNN-based Vehicle Classification.
.- Optimizing Software Demands using Fuzzy-based Evaluation Techniques.
.- Enhancing Workflow Efficiency: Innovative Workload Clustering in Cloud Environments.
.- Generalized Material Flow Model for hot deformation processing based on power law.
.- Smallest Path Planning for Robots using Simple ACO and Ant System Algorithms.
.- An asymmetric single channel encryption mechanism using unequal modulus and QZS algorithm in fractional Fourier transform.
.- Evaluation Criteria for Test Suites in Software Developed Through Test-Driven Development.
.- LCB-eGyan Model: A Dynamic Cloud Architecture for e-Content Recommendation.
.- Gender and Ethnicity Recognition System Based on Convolutional Neural Networks.
.- Radiographic Evaluation for KNEEXNET Using Ensemble Models.
.- Comparative Study of Quantum Computing Tools and Frameworks.
.- Security Evaluation and Oversight in Stock Trading Using Artificial Intelligence.
.- A Dual Approach with Grad-CAM and Layer-wise Relevance Propagation for CNN Models Explainability.
.- CLAM - CNN & LSTM with Attention Mechanism for DNS Data Exfiltration Detection.
.- Comparison of various data mining techniques for Fake Profile Detection on Twitter.
.- Strategies for Gen AI Enterprise Adoption.
.- Role of Deep Learning in Skin Cancer Diagnosis: A Deeper Insight.
.- Communication, Network and Security.
.- Smart Education-Filtering Real Time Stream.
.- RNA and Audio-Based Workflows Scheduling by Multi-Objective Optimization in Cloud Environment.
.- Group Authentication and Key Management Protocol with Chinese Remainder Theorem in Multicast Communication.
.- Network Traffic Analysis for Intrusion with Zero Trust.
.- Enhanced Image Deblurring with the Fusion of Generative Adversarial Networks and Transformer Models.
.- Analysis of Various Routing Protocols for Air Pollution Monitoring Systems in Wireless Sensor Networks.
.- Intelligent toll management using limited CNN-based Vehicle Classification.
.- Optimizing Software Demands using Fuzzy-based Evaluation Techniques.
.- Enhancing Workflow Efficiency: Innovative Workload Clustering in Cloud Environments.
.- Data Science and Data Analytics.
.- Generalized Material Flow Model for hot deformation processing based on power law.
.- Smallest Path Planning for Robots using Simple ACO and Ant System Algorithms.
.- An asymmetric single channel encryption mechanism using unequal modulus and QZS algorithm in fractional Fourier transform.
.- Evaluation Criteria for Test Suites in Software Developed Through Test-Driven Development.
.- LCB-eGyan Model: A Dynamic Cloud Architecture for e-Content Recommendation.
.- Gender and Ethnicity Recognition System Based on Convolutional Neural Networks.
.- Radiographic Evaluation for KNEEXNET Using Ensemble Models.
.- Comparative Study of Quantum Computing Tools and Frameworks.
.- Security Evaluation and Oversight in Stock Trading Using Artificial Intelligence.
.- A Dual Approach with Grad-CAM and Layer-wise Relevance Propagation for CNN Models Explainability.
.- CLAM - CNN & LSTM with Attention Mechanism for DNS Data Exfiltration Detection.
.- Comparison of various data mining techniques for Fake Profile Detection on Twitter.
.- Strategies for Gen AI Enterprise Adoption.
.- Role of Deep Learning in Skin Cancer Diagnosis: A Deeper Insight.
.- Communication, Network and Security.
.- Smart Education-Filtering Real Time Stream.
.- RNA and Audio-Based Workflows Scheduling by Multi-Objective Optimization in Cloud Environment.
.- Group Authentication and Key Management Protocol with Chinese Remainder Theorem in Multicast Communication.
.- Network Traffic Analysis for Intrusion with Zero Trust.
.- Enhanced Image Deblurring with the Fusion of Generative Adversarial Networks and Transformer Models.
.- Analysis of Various Routing Protocols for Air Pollution Monitoring Systems in Wireless Sensor Networks.
.- Intelligent toll management using limited CNN-based Vehicle Classification.
.- Optimizing Software Demands using Fuzzy-based Evaluation Techniques.
.- Enhancing Workflow Efficiency: Innovative Workload Clustering in Cloud Environments.
.- Generalized Material Flow Model for hot deformation processing based on power law.
.- Smallest Path Planning for Robots using Simple ACO and Ant System Algorithms.
.- An asymmetric single channel encryption mechanism using unequal modulus and QZS algorithm in fractional Fourier transform.
.- Evaluation Criteria for Test Suites in Software Developed Through Test-Driven Development.
.- LCB-eGyan Model: A Dynamic Cloud Architecture for e-Content Recommendation.
.- Gender and Ethnicity Recognition System Based on Convolutional Neural Networks.
.- Radiographic Evaluation for KNEEXNET Using Ensemble Models.
.- Comparative Study of Quantum Computing Tools and Frameworks.
.- Security Evaluation and Oversight in Stock Trading Using Artificial Intelligence.
.- A Dual Approach with Grad-CAM and Layer-wise Relevance Propagation for CNN Models Explainability.
.- CLAM - CNN & LSTM with Attention Mechanism for DNS Data Exfiltration Detection.
.- Comparison of various data mining techniques for Fake Profile Detection on Twitter.
.- Strategies for Gen AI Enterprise Adoption.
.- Role of Deep Learning in Skin Cancer Diagnosis: A Deeper Insight.
.- Communication, Network and Security.
.- Smart Education-Filtering Real Time Stream.
.- RNA and Audio-Based Workflows Scheduling by Multi-Objective Optimization in Cloud Environment.
.- Group Authentication and Key Management Protocol with Chinese Remainder Theorem in Multicast Communication.
.- Network Traffic Analysis for Intrusion with Zero Trust.
.- Enhanced Image Deblurring with the Fusion of Generative Adversarial Networks and Transformer Models.
.- Analysis of Various Routing Protocols for Air Pollution Monitoring Systems in Wireless Sensor Networks.
.- Intelligent toll management using limited CNN-based Vehicle Classification.
.- Optimizing Software Demands using Fuzzy-based Evaluation Techniques.
.- Enhancing Workflow Efficiency: Innovative Workload Clustering in Cloud Environments.