Emerging Trends in Expert Applications and Security [electronic resource] : Proceedings of 2nd ICETEAS 2023, Volume 1 / edited by Vijay Singh Rathore, João Manuel R. S. Tavares, Vincenzo Piuri, B. Surendiran.

Colaborador(es): Rathore, Vijay Singh [editor.] | Tavares, João Manuel R. S [editor.] | Piuri, Vincenzo [editor.] | Surendiran, B [editor.] | SpringerLink (Online service)Tipo de material: TextoTextoSeries Lecture Notes in Networks and Systems ; 681Editor: Singapore : Springer Nature Singapore : Imprint: Springer, 2023Edición: 1st ed. 2023Descripción: XX, 565 p. 294 illus., 231 illus. in color. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9789819919093Tema(s): Computational intelligence | Data protection | Artificial intelligence | Computational Intelligence | Data and Information Security | Artificial IntelligenceFormatos físicos adicionales: Printed edition:: Sin título; Printed edition:: Sin títuloClasificación CDD: 006.3 Clasificación LoC:Q342Recursos en línea: Libro electrónicoTexto
Contenidos:
Chapter 1. The study of Cluster Based Energy Efficient Algorithms of Flying Ad-Hoc Networks -- Chapter 2. Current web development technologies: A Comparative Review -- Chapter 3. R-peak based Arrhythmia Detection as an impact of ovid-19 -- Chapter 4. IOT-Based Water Quality Monitoring and Detection System -- Chapter 5. A Comparative Analysis of Different Diagnostic Imaging Modalities -- Chapter 6. Uncovering the Usability Test Methods for Human-Computer Interaction -- Chapter 7. Study of Lipid concentration effects on Blood flow through stenosed tube with permeable walls using Homotopy Perturbation Method -- Chapter 8. Actual Facial Mask Recognition Utilizing YOLOv3 _ R-CNN -- Chapter 9. Real-Time Smart System For Marking Attendance That Uses Image Processing In a Saas Cloud Environment -- Chapter 10. Design of automatic clearance system for emergency transport and abused vehicle recognition -- Chapter 1. Securing Account Hijacking Security Threats in Cloud Environment using Artificial Neural Networks -- Chapter 12. Smart Pillbox And Voice Alert System -- Chapter 13. Early Identification of Plant Diseases by Image Processing using Integrated Development Environment -- Chapter 14. Usability Attributes and their Mapping in various phases of Software Development Life Cycle -- Chapter 15. Controlling Devices From Anywhere Using IOT including Voice Commands. etc.
En: Springer Nature eBookResumen: The book covers current developments in the field of computer system security using cryptographic algorithms and other security schemes for system as well as cloud. The proceedings compiles the selected research papers presented at ICE-TEAS 2023 Conference held at Jaipur Engineering College and Research Centre, Jaipur, India, during February 17-19, 2023. The book focuses on expert applications and artificial intelligence; information and application security; advanced computing; multimedia applications in forensics, security, and intelligence; and advances in web technologies: implementation and security issues.
Star ratings
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Colección Signatura Copia número Estado Fecha de vencimiento Código de barras
Libro Electrónico Biblioteca Electrónica
Colección de Libros Electrónicos 1 No para préstamo

Acceso multiusuario

Chapter 1. The study of Cluster Based Energy Efficient Algorithms of Flying Ad-Hoc Networks -- Chapter 2. Current web development technologies: A Comparative Review -- Chapter 3. R-peak based Arrhythmia Detection as an impact of ovid-19 -- Chapter 4. IOT-Based Water Quality Monitoring and Detection System -- Chapter 5. A Comparative Analysis of Different Diagnostic Imaging Modalities -- Chapter 6. Uncovering the Usability Test Methods for Human-Computer Interaction -- Chapter 7. Study of Lipid concentration effects on Blood flow through stenosed tube with permeable walls using Homotopy Perturbation Method -- Chapter 8. Actual Facial Mask Recognition Utilizing YOLOv3 _ R-CNN -- Chapter 9. Real-Time Smart System For Marking Attendance That Uses Image Processing In a Saas Cloud Environment -- Chapter 10. Design of automatic clearance system for emergency transport and abused vehicle recognition -- Chapter 1. Securing Account Hijacking Security Threats in Cloud Environment using Artificial Neural Networks -- Chapter 12. Smart Pillbox And Voice Alert System -- Chapter 13. Early Identification of Plant Diseases by Image Processing using Integrated Development Environment -- Chapter 14. Usability Attributes and their Mapping in various phases of Software Development Life Cycle -- Chapter 15. Controlling Devices From Anywhere Using IOT including Voice Commands. etc.

The book covers current developments in the field of computer system security using cryptographic algorithms and other security schemes for system as well as cloud. The proceedings compiles the selected research papers presented at ICE-TEAS 2023 Conference held at Jaipur Engineering College and Research Centre, Jaipur, India, during February 17-19, 2023. The book focuses on expert applications and artificial intelligence; information and application security; advanced computing; multimedia applications in forensics, security, and intelligence; and advances in web technologies: implementation and security issues.

UABC ; Perpetuidad

Con tecnología Koha