Cantitate/Preț
Produs

New Trends in Information and Communications Technology Applications: 7th National Conference, NTICT 2023, Baghdad, Iraq, December 20–21, 2023, Proceedings: Communications in Computer and Information Science, cartea 2096

Editat de Abbas M. Al-Bakry, Mouayad A. Sahib, Safaa O. Al-Mamory, Jaafar A. Aldhaibani, Ali N. Al-Shuwaili, Haitham S. Hasan, Rula A. Hamid, Ali K. Idrees
en Limba Engleză Paperback – 26 iun 2024
This book constitutes the refereed proceedings of the 7th National Conference on New Trends in Information and Communications Technology Applications, NTICT 2023, held in Baghdad, Iraq, during December 20–21, 2023.
The 28 full papers included in this book were carefully reviewed and selected from 92 submissions. They were organized in topical sections as follows: artificial intelligence and machine learning; and computer networks.
Citește tot Restrânge

Din seria Communications in Computer and Information Science

Preț: 50306 lei

Preț vechi: 62881 lei
-20% Nou

Puncte Express: 755

Preț estimativ în valută:
9630 9904$ 7989£

Carte tipărită la comandă

Livrare economică 15-21 februarie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783031628139
ISBN-10: 3031628136
Ilustrații: XIII, 412 p. 193 illus., 139 illus. in color.
Dimensiuni: 155 x 235 mm
Ediția:2024
Editura: Springer Nature Switzerland
Colecția Springer
Seria Communications in Computer and Information Science

Locul publicării:Cham, Switzerland

Cuprins

.- Artificial Intelligence and Machine Learning.
.- Nanoscale Communication Redefined: Exploring Bio-Inspired Molecular Systems.
.- Hybrid Edge Detection and SVD for Image Background Removal.
.- Multi-Objective Residential Load Scheduling Approach Based on Pelican Optimization Algorithm.
.- Incorporating Dilation Convolution into Mask Region Convolution Neural Network for Advanced Fruit Classification and Freshness Evaluation.
.- Adaptive Evolutionary Algorithm for Maximizing Social Influence.
.- Automatic Identification of Ear Patterns based on Convolutional Neural Network.
.- Enhancing Data Security with a Novel Color Encryption Algorithm Based on 5D Chaotic System and Delta Features for Dynamic Initialization.
.- Deepfake Detection Model Based on VGGFace with Head Pose Estimation Technique.
.- Multi-models based on Yolov8 for Identification of Vehicle Type and License Plate Recognition.
.- Face Identification System in Transform Domains over Secure Communication Channel.
.- Covid-19 Proteins Identification using Sequence Alignment for Protein-Protein Interaction Prediction.
.- Vehicle Logo Recognition Using Proposed Illumination Compensation and Six Local Moments.
.- Exploring Enhanced Recognition in Gesture Language Videos through Unsupervised Learning of Deep Autoencoder.
.- An Intelligent System for Monitoring Water Quality of Tigris River Using IOT and Machine Learning Techniques.
.- Crimes Tweet Detection based on CNN Hyperparameter Optimization Using Snake Optimizer.
.- Optimized Intelligent PID Controller for Propofol Dosing in General Anesthesia using Coati Optimization Algorithm.
.- Eye Movement Recognition: Exploring Trade-offs in Deep Learning Approaches with Development.
.- Enhancing the Early Prediction of Learners' Performance in a Virtual Learning Environment (VLE).
.- YOLOv8-AS: Masked Face Detection and Tracking Based on YOLOv8 with Attention Mechanism Model.
.- Symptom Principal Component Analysis (SPCA) for Dimensionality Reduction in Categorical Data: A Case Study on Breast Cancer.
.- An improved method for retrieving fashion images based on parsing the image contents.
.- Computer Networks.
.- A Robust Image Cipher System Based on Cramer-Shoup Algorithm and 5-D Hyper Chaotic System.
.- Variable-Length Key Generation Block Cipher Algorithm Based on DNA Tile Self-Assembly.
.- Performance Evaluation Comparison Between Central SDN network and DSDN.
.- Enhancing the Performance of Wireless Body Area Network Routing Protocols Based on Collaboratively Evaluated Values.
.- The impact of mobility models on ad-hoc networks: A review.
.- Authentication System Based On Zero-Knowledge Proof Employing The Rabin Cryptosystem And A Secret Sharing Schema.
.- A New Approach to Design KM1 Encryption Algorithm for Alarm in IoT.