000 | 04142nam a22005895i 4500 | ||
---|---|---|---|
001 | 978-981-33-6385-4 | ||
003 | DE-He213 | ||
005 | 20240423130132.0 | ||
007 | cr nn 008mamaa | ||
008 | 210402s2021 si | s |||| 0|eng d | ||
020 |
_a9789813363854 _9978-981-33-6385-4 |
||
024 | 7 |
_a10.1007/978-981-33-6385-4 _2doi |
|
050 | 4 | _aQA76.76.A65 | |
072 | 7 |
_aUB _2bicssc |
|
072 | 7 |
_aCOM005000 _2bisacsh |
|
072 | 7 |
_aUX _2thema |
|
082 | 0 | 4 |
_a005.3 _223 |
245 | 1 | 0 |
_aInformation Science and Applications _h[electronic resource] : _bProceedings of ICISA 2020 / _cedited by Hyuncheol Kim, Kuinam J. Kim, Suhyun Park. |
250 | _a1st ed. 2021. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2021. |
|
300 |
_aXIV, 398 p. 133 illus., 103 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Electrical Engineering, _x1876-1119 ; _v739 |
|
505 | 0 | _aExperience and prospects of tele-health technologies -- Exploring the Effects of Network Topology Layers on Quality of Service Mechanisms in the Context of Software-Defined Networking -- Image Background Subtraction and Partial Stylization based on Style Representation of Convolutional Neural Networks -- Multi-source log clustering in distributed systems -- A Study on Classification and Integration of Research on both AI and Security in the IoT Era -- Safe Internet: An Edutainment Tool for Teenagers -- Predictive Analytics Service for Security of Blockchain and Peer-to-Peer Payment Solutions -- Deterring SLCAs by Establishment of ACSC based on IPP YoungYungShin 9.30 -- Research on life cycle model of data for handling Big Data-based security incident -- Feature Selection Based on a Shallow Convolutional Neural Network and Saliency Maps on Metagenomic Data. | |
520 | _aThis book presents select proceedings of 11th International Conference on Information Science and Applications 2020 (ICISA 2020) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. Also the proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this book, readers can gain an understanding of the current state-of-the-art information strategies and technologies of convergence security. | ||
650 | 0 | _aApplication software. | |
650 | 0 | _aTelecommunication. | |
650 | 0 | _aData protection. | |
650 | 0 | _aComputational intelligence. | |
650 | 1 | 4 | _aComputer and Information Systems Applications. |
650 | 2 | 4 | _aCommunications Engineering, Networks. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aComputational Intelligence. |
700 | 1 |
_aKim, Hyuncheol. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aKim, Kuinam J. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aPark, Suhyun. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789813363847 |
776 | 0 | 8 |
_iPrinted edition: _z9789813363861 |
776 | 0 | 8 |
_iPrinted edition: _z9789813363878 |
830 | 0 |
_aLecture Notes in Electrical Engineering, _x1876-1119 ; _v739 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-33-6385-4 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c185428 _d185428 |