000 04811nam a22005895i 4500
001 978-981-99-9704-6
003 DE-He213
005 20250516160055.0
007 cr nn 008mamaa
008 240213s2024 si | s |||| 0|eng d
020 _a9789819997046
_9978-981-99-9704-6
050 4 _aQ342
072 7 _aUYQ
_2bicssc
072 7 _aCOM004000
_2bisacsh
072 7 _aUYQ
_2thema
082 0 4 _a006.3
_223
245 1 0 _aProceedings of Fifth International Conference on Computer and Communication Technologies
_h[electronic resource] :
_bIC3T 2023, Volume 1 /
_cedited by B. Rama Devi, Kishore Kumar, M. Raju, K. Srujan Raju, Mathini Sellathurai.
250 _a1st ed. 2024.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2024.
300 _aXXVIII, 425 p. 208 illus., 160 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Networks and Systems,
_x2367-3389 ;
_v897
505 0 _aSquare shaped SIW based slotted MIMO antenna -- Food Recognition and Calorie Measurement Using Machine Learning -- Breast Cancer Prediction with Gradient Boost and XG Boost -- Data Cube Technology for Accessing of Large Database -- Handwritten Character Recognition for South Indian Languages using Deep Learning -- CavFind: A Novel Algorithm to Detect Cavities on Protein Structure -- Tire Imprint identification and classification using VGG19 -- Uncovering insights in Agroforestry: A Text Mining Analysis Using Web Scraping and Topic Modeling -- Generative Adversarial Networks- A comprehensive Review -- System Modification Process to reduce calculation complexity in Backward Forward sweep Algorithm -- Exploit Reversible Gates to Implement Fast Quantum Sorting Algorithm -- Analyzing the Performance Variations of Naive Bayes, Linear SVM, and Random Forest for Spam Detection: A Comprehensive Study on the "Spam or Ham" Dataset -- A Novel Encryption Framework to Improve the Security of Medical Images -- Enhancing DDoS Attack Detection in SDN: A Novel Approach with IG-RFFI Feature Selection -- A novel fusion study on disease detection in cotton plants using embedded approaches of neural networks -- A security framework for the Detection of targeted attacks using honeypot -- SNMP Watcher: A Model to Detect DoS and DDoS Attacks using SNMP Management Information Base Analysis -- Comparative Analysis for Loan Approval Prediction System using Machine Learning Algorithms -- Classification of credit card delinquent customers using random forest algorithm -- Evaluating E-learning Engagement through EEG Signal Analysis with Convolutional Neural Networks -- Food Item Recognition and Calories Estimation Using YOLO-V5 -- Fuzzy Cognitive Security Techniques for Data Aggregation in Capillary Networks.
520 _aThis book is a compilation of high-quality scientific papers presented at the 5th International Conference on Computer & Communication Technologies (IC3T 2023). The book covers cutting-edge technologies and applications of soft computing, artificial intelligence and communication. In addition, a variety of further topics are discussed, which include data mining, machine intelligence, fuzzy computing, sensor networks, signal and image processing, human-computer interaction, and web intelligence.
541 _fUABC ;
_cPerpetuidad
650 0 _aComputational intelligence.
650 0 _aData protection.
650 0 _aTelecommunication.
650 1 4 _aComputational Intelligence.
650 2 4 _aData and Information Security.
650 2 4 _aCommunications Engineering, Networks.
700 1 _aDevi, B. Rama.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aKumar, Kishore.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aRaju, M.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aRaju, K. Srujan.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aSellathurai, Mathini.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789819997039
776 0 8 _iPrinted edition:
_z9789819997053
830 0 _aLecture Notes in Networks and Systems,
_x2367-3389 ;
_v897
856 4 0 _zLibro electrónico
_uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-981-99-9704-6
912 _aZDB-2-INR
912 _aZDB-2-SXIT
942 _cLIBRO_ELEC
999 _c275482
_d275481