Computational Technologies and Electronics (eBook, PDF)
First International Conference, ICCTE 2023, Siliguri, India, November 23-25, 2023, Proceedings, Part II
Redaktion: Majumder, Mukta; Chakraborty, Samarjit; Ghosh, Mili; Zaman, J. K. M Sadique Uz
57,95 €
57,95 €
inkl. MwSt.
Sofort per Download lieferbar
29 °P sammeln
57,95 €
Als Download kaufen
57,95 €
inkl. MwSt.
Sofort per Download lieferbar
29 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
57,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
29 °P sammeln
Computational Technologies and Electronics (eBook, PDF)
First International Conference, ICCTE 2023, Siliguri, India, November 23-25, 2023, Proceedings, Part II
Redaktion: Majumder, Mukta; Chakraborty, Samarjit; Ghosh, Mili; Zaman, J. K. M Sadique Uz
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This two-volume set, CCIS 2376 and CCIS 2377, constitutes proceedings from the First International Conference on Computational Technologies and Electronics, ICCTE 2023, held in Siliguri, India, during November 23-25, 2023.
The 46 full papers presented here were carefully selected and reviewed from 157 submissions. These papers have been organized in the following topical sections:
Pat I- Pattern recognition & AI
Part II- Data communication & security; Applied electronics.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 38.89MB
Andere Kunden interessierten sich auch für
- Computational Technologies and Electronics (eBook, PDF)61,95 €
- Christof PaarUnderstanding Cryptography (eBook, PDF)30,95 €
- Artificial Intelligence in China (eBook, PDF)169,95 €
- Tanmoy HazraApplications of Game Theory in Deep Learning (eBook, PDF)40,95 €
- Artificial Intelligence in China (eBook, PDF)113,95 €
- Artificial Intelligence of Things (eBook, PDF)65,95 €
- Deep Learning for Social Media Data Analytics (eBook, PDF)113,95 €
-
-
-
This two-volume set, CCIS 2376 and CCIS 2377, constitutes proceedings from the First International Conference on Computational Technologies and Electronics, ICCTE 2023, held in Siliguri, India, during November 23-25, 2023.
The 46 full papers presented here were carefully selected and reviewed from 157 submissions. These papers have been organized in the following topical sections:
Pat I- Pattern recognition & AI
Part II- Data communication & security; Applied electronics.
The 46 full papers presented here were carefully selected and reviewed from 157 submissions. These papers have been organized in the following topical sections:
Pat I- Pattern recognition & AI
Part II- Data communication & security; Applied electronics.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer International Publishing
- Seitenzahl: 242
- Erscheinungstermin: 3. März 2025
- Englisch
- ISBN-13: 9783031819810
- Artikelnr.: 73536971
- Verlag: Springer International Publishing
- Seitenzahl: 242
- Erscheinungstermin: 3. März 2025
- Englisch
- ISBN-13: 9783031819810
- Artikelnr.: 73536971
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
.- Data Communication & Security.
.- Performance Evaluation of PAM-Based Optical Communication Link Using Eye Diagram Analysis.
.- Simulative Analysis of Free Space Optical Link by Incorporating Modernization Technique.
.- Effect of Increasing Multiple-Interface Enabled Nodes in An Opportunistic Network: A Case Study.
.- Design of An Application Authentication Framework to Secure Controller Access via Northbound Interface in SDN.
.- A Dual-Image based Robust Reversible Data Hiding Scheme based on Weighted Matrix and LZW Algorithm.
.- Looking for Variant of S-box used in AES Algorithm.
.- Evaluating SMT Solvers on Schedulability Checking Instances.
.- An SMT toolbox for Adversarial Robustness Evaluation for Spiking Neural Networks.
.- Designing a Context-aware Virtual Machine (CWVM) to Enhance Data Integration in Pervasive Wireless Sensor Networks (PWSN).
.- Applied Electronics.
.- Energy Efficient Lossless Audio Encoder for IoT Enable devices.
.- Position finding of Airborne object with Dynamic Electro Optics using Triangulation.
.- Smart electronic voting: emergence, challenges, and strategies in India.
.- Security Challenges in Autonomous Systems Design.
.- Indrajit: A collection-task scheduling algorithm to mitigate sensor occlusions for small satellite constellations.
.- Denoising audio signal for restoring audible quality in Wireless Acoustic Sensor Network (WASN).
.- Discrete-Time Realization of Fractional-Order Proportional Integral Derivative Controller Using Modified Ziegler-Nichols Method.
.- Multiple faults detection technique by an efficient traversal approach using multiple droplets for digital microfluidic biochip.
.- Software Flow for Quantum Computing.
.- Quantum Measurement and Inherent Randomness: A Study on Modified Hadamard Based Xorshift Pseudorandom Number Generator Algorithm.
.- Performance Evaluation of PAM-Based Optical Communication Link Using Eye Diagram Analysis.
.- Simulative Analysis of Free Space Optical Link by Incorporating Modernization Technique.
.- Effect of Increasing Multiple-Interface Enabled Nodes in An Opportunistic Network: A Case Study.
.- Design of An Application Authentication Framework to Secure Controller Access via Northbound Interface in SDN.
.- A Dual-Image based Robust Reversible Data Hiding Scheme based on Weighted Matrix and LZW Algorithm.
.- Looking for Variant of S-box used in AES Algorithm.
.- Evaluating SMT Solvers on Schedulability Checking Instances.
.- An SMT toolbox for Adversarial Robustness Evaluation for Spiking Neural Networks.
.- Designing a Context-aware Virtual Machine (CWVM) to Enhance Data Integration in Pervasive Wireless Sensor Networks (PWSN).
.- Applied Electronics.
.- Energy Efficient Lossless Audio Encoder for IoT Enable devices.
.- Position finding of Airborne object with Dynamic Electro Optics using Triangulation.
.- Smart electronic voting: emergence, challenges, and strategies in India.
.- Security Challenges in Autonomous Systems Design.
.- Indrajit: A collection-task scheduling algorithm to mitigate sensor occlusions for small satellite constellations.
.- Denoising audio signal for restoring audible quality in Wireless Acoustic Sensor Network (WASN).
.- Discrete-Time Realization of Fractional-Order Proportional Integral Derivative Controller Using Modified Ziegler-Nichols Method.
.- Multiple faults detection technique by an efficient traversal approach using multiple droplets for digital microfluidic biochip.
.- Software Flow for Quantum Computing.
.- Quantum Measurement and Inherent Randomness: A Study on Modified Hadamard Based Xorshift Pseudorandom Number Generator Algorithm.
.- Data Communication & Security.
.- Performance Evaluation of PAM-Based Optical Communication Link Using Eye Diagram Analysis.
.- Simulative Analysis of Free Space Optical Link by Incorporating Modernization Technique.
.- Effect of Increasing Multiple-Interface Enabled Nodes in An Opportunistic Network: A Case Study.
.- Design of An Application Authentication Framework to Secure Controller Access via Northbound Interface in SDN.
.- A Dual-Image based Robust Reversible Data Hiding Scheme based on Weighted Matrix and LZW Algorithm.
.- Looking for Variant of S-box used in AES Algorithm.
.- Evaluating SMT Solvers on Schedulability Checking Instances.
.- An SMT toolbox for Adversarial Robustness Evaluation for Spiking Neural Networks.
.- Designing a Context-aware Virtual Machine (CWVM) to Enhance Data Integration in Pervasive Wireless Sensor Networks (PWSN).
.- Applied Electronics.
.- Energy Efficient Lossless Audio Encoder for IoT Enable devices.
.- Position finding of Airborne object with Dynamic Electro Optics using Triangulation.
.- Smart electronic voting: emergence, challenges, and strategies in India.
.- Security Challenges in Autonomous Systems Design.
.- Indrajit: A collection-task scheduling algorithm to mitigate sensor occlusions for small satellite constellations.
.- Denoising audio signal for restoring audible quality in Wireless Acoustic Sensor Network (WASN).
.- Discrete-Time Realization of Fractional-Order Proportional Integral Derivative Controller Using Modified Ziegler-Nichols Method.
.- Multiple faults detection technique by an efficient traversal approach using multiple droplets for digital microfluidic biochip.
.- Software Flow for Quantum Computing.
.- Quantum Measurement and Inherent Randomness: A Study on Modified Hadamard Based Xorshift Pseudorandom Number Generator Algorithm.
.- Performance Evaluation of PAM-Based Optical Communication Link Using Eye Diagram Analysis.
.- Simulative Analysis of Free Space Optical Link by Incorporating Modernization Technique.
.- Effect of Increasing Multiple-Interface Enabled Nodes in An Opportunistic Network: A Case Study.
.- Design of An Application Authentication Framework to Secure Controller Access via Northbound Interface in SDN.
.- A Dual-Image based Robust Reversible Data Hiding Scheme based on Weighted Matrix and LZW Algorithm.
.- Looking for Variant of S-box used in AES Algorithm.
.- Evaluating SMT Solvers on Schedulability Checking Instances.
.- An SMT toolbox for Adversarial Robustness Evaluation for Spiking Neural Networks.
.- Designing a Context-aware Virtual Machine (CWVM) to Enhance Data Integration in Pervasive Wireless Sensor Networks (PWSN).
.- Applied Electronics.
.- Energy Efficient Lossless Audio Encoder for IoT Enable devices.
.- Position finding of Airborne object with Dynamic Electro Optics using Triangulation.
.- Smart electronic voting: emergence, challenges, and strategies in India.
.- Security Challenges in Autonomous Systems Design.
.- Indrajit: A collection-task scheduling algorithm to mitigate sensor occlusions for small satellite constellations.
.- Denoising audio signal for restoring audible quality in Wireless Acoustic Sensor Network (WASN).
.- Discrete-Time Realization of Fractional-Order Proportional Integral Derivative Controller Using Modified Ziegler-Nichols Method.
.- Multiple faults detection technique by an efficient traversal approach using multiple droplets for digital microfluidic biochip.
.- Software Flow for Quantum Computing.
.- Quantum Measurement and Inherent Randomness: A Study on Modified Hadamard Based Xorshift Pseudorandom Number Generator Algorithm.