Computational Intelligence in Communications and Business Analytics
6th International Conference, CICBA 2024, Patna, India, January 23-25, 2024, Revised Selected Papers, Part III
Herausgegeben:Singh, Jyoti Prakash; Singh, Maheshwari Prasad; Singh, Amit Kumar; Mukhopadhyay, Somnath; Mandal, Jyotsna K.; Dutta, Paramartha
Computational Intelligence in Communications and Business Analytics
6th International Conference, CICBA 2024, Patna, India, January 23-25, 2024, Revised Selected Papers, Part III
Herausgegeben:Singh, Jyoti Prakash; Singh, Maheshwari Prasad; Singh, Amit Kumar; Mukhopadhyay, Somnath; Mandal, Jyotsna K.; Dutta, Paramartha
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This three-volume set CCIS 2366-2368 constitutes the refereed proceedings of the 6th International Conference on Computational Intelligence in Communications and Business Analytics, CICBA 2024, held in Patna, India, during January 23-25, 2024.
The 82 full papers presented in this volume were carefully reviewed and selected from 249 submissions. Together, these papers showcase cutting-edge research in the fields of computational intelligence and business analytics, covering a broad range of topics.
Andere Kunden interessierten sich auch für
- Computational Intelligence in Communications and Business Analytics54,99 €
- Computational Intelligence in Communications and Business Analytics54,99 €
- Computational Intelligence in Communications and Business Analytics60,99 €
- Computational Intelligence in Communications and Business Analytics60,99 €
- Generative Machine Learning Models in Medical Image Computing115,99 €
- Machine Learning, Image Processing, Network Security and Data Sciences60,99 €
- Computational Intelligence in Communications and Business Analytics75,99 €
-
-
-
This three-volume set CCIS 2366-2368 constitutes the refereed proceedings of the 6th International Conference on Computational Intelligence in Communications and Business Analytics, CICBA 2024, held in Patna, India, during January 23-25, 2024.
The 82 full papers presented in this volume were carefully reviewed and selected from 249 submissions. Together, these papers showcase cutting-edge research in the fields of computational intelligence and business analytics, covering a broad range of topics.
The 82 full papers presented in this volume were carefully reviewed and selected from 249 submissions. Together, these papers showcase cutting-edge research in the fields of computational intelligence and business analytics, covering a broad range of topics.
Produktdetails
- Produktdetails
- Communications in Computer and Information Science 2368
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-81335-1
- Seitenzahl: 368
- Erscheinungstermin: 12. Februar 2025
- Englisch
- Abmessung: 235mm x 155mm x 20mm
- Gewicht: 557g
- ISBN-13: 9783031813351
- ISBN-10: 3031813359
- Artikelnr.: 72137176
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Communications in Computer and Information Science 2368
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-81335-1
- Seitenzahl: 368
- Erscheinungstermin: 12. Februar 2025
- Englisch
- Abmessung: 235mm x 155mm x 20mm
- Gewicht: 557g
- ISBN-13: 9783031813351
- ISBN-10: 3031813359
- Artikelnr.: 72137176
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Theories and Applications to Data Communications and Analytics.- Optuna and Decision Tree Based Network Intrusion Detection System for Internet of Things.- Restful Architecture for Achieving Syntactic Interoperability in IoT Systems.- Energy Optimized Clustering and Cluster Head Selection in WSNs an MDB-KMC and Cuttlefish Approach.- D2Stege Using Decteron2 to Segment Medical Image with Security Through Steganography and Encryption.- A Novel Chaos and DNA Computing for Medical Image Encryption.- Session Based Symmetric Key Cryptography Using Digital Circuit Based on Two Left Shift.- Digital Images Encryption Using PWLCM and Sine Map.- Hybrid Humor Classification and Detection Based on Machine Learning.- Data Anomaly Detection in Wireless Sensor Network Using Principal Component Analysis and Decision Tree.- Industry Monitoring with Data Logger in Google Sheet Using Respberry Pi.- ECCNN A Novel Efficient Compressed Convolutional Neural Network.- A Modified Low Energy Consuming Mac Protocol for Wireless Sensor Networks.- Text Data Security Through Hybrid Method Using Visual Cryptography and Image Steganography Algorithms.- CASCAIN Cascaded Attention Infused Networks for Named Entity Recognition in Code Mixed Setting.- Secure Non Fungible Token Marketplaces Using ERC 721.- A Detailed Comparative Study of Regression Models for Stock Price Prediction.- An Optimal Cluster Head Selection in UAV Networks Using Grey Wolf Optimization.- Multi Modal Probabilistic Conditional Generative Adversarial Networks for Electric Vehicles Range Prediction.- Entry Point Adaptive Keystroke Dynamics Based User Authentication for Evolving Passwords.- Malicious node detection in Industrial internet of things using swarm based optimization algorithm A cyber security perspective.- Is software defined smart grid secure An analysis of security issues and solutions.- Energy Efficiency Optimization in IoT Based Machine Learning for Smart Environmental Monitoring.- Smart Tech Cane Navigator (STCN) for Physically Challenged.- A Real Time Machine Learning based Statistical Approach for Power Generation Prediction for Solar PV Plant.- CipherCraft An Integrated Approach to Cryptographic Data Security in Modern Computing Environments.- Unveiling Dynamics of Structural Breaks in Global Stock Markets and Implications for Forecasting Accuracy.
Theories and Applications to Data Communications and Analytics.- Optuna and Decision Tree Based Network Intrusion Detection System for Internet of Things.- Restful Architecture for Achieving Syntactic Interoperability in IoT Systems.- Energy Optimized Clustering and Cluster Head Selection in WSNs an MDB-KMC and Cuttlefish Approach.- D2Stege Using Decteron2 to Segment Medical Image with Security Through Steganography and Encryption.- A Novel Chaos and DNA Computing for Medical Image Encryption.- Session Based Symmetric Key Cryptography Using Digital Circuit Based on Two Left Shift.- Digital Images Encryption Using PWLCM and Sine Map.- Hybrid Humor Classification and Detection Based on Machine Learning.- Data Anomaly Detection in Wireless Sensor Network Using Principal Component Analysis and Decision Tree.- Industry Monitoring with Data Logger in Google Sheet Using Respberry Pi.- ECCNN A Novel Efficient Compressed Convolutional Neural Network.- A Modified Low Energy Consuming Mac Protocol for Wireless Sensor Networks.- Text Data Security Through Hybrid Method Using Visual Cryptography and Image Steganography Algorithms.- CASCAIN Cascaded Attention Infused Networks for Named Entity Recognition in Code Mixed Setting.- Secure Non Fungible Token Marketplaces Using ERC 721.- A Detailed Comparative Study of Regression Models for Stock Price Prediction.- An Optimal Cluster Head Selection in UAV Networks Using Grey Wolf Optimization.- Multi Modal Probabilistic Conditional Generative Adversarial Networks for Electric Vehicles Range Prediction.- Entry Point Adaptive Keystroke Dynamics Based User Authentication for Evolving Passwords.- Malicious node detection in Industrial internet of things using swarm based optimization algorithm A cyber security perspective.- Is software defined smart grid secure An analysis of security issues and solutions.- Energy Efficiency Optimization in IoT Based Machine Learning for Smart Environmental Monitoring.- Smart Tech Cane Navigator (STCN) for Physically Challenged.- A Real Time Machine Learning based Statistical Approach for Power Generation Prediction for Solar PV Plant.- CipherCraft An Integrated Approach to Cryptographic Data Security in Modern Computing Environments.- Unveiling Dynamics of Structural Breaks in Global Stock Markets and Implications for Forecasting Accuracy.