000 | 05124nam a22006735i 4500 | ||
---|---|---|---|
001 | 978-3-031-35299-7 | ||
003 | DE-He213 | ||
005 | 20240423130316.0 | ||
007 | cr nn 008mamaa | ||
008 | 230613s2023 sz | s |||| 0|eng d | ||
020 |
_a9783031352997 _9978-3-031-35299-7 |
||
024 | 7 |
_a10.1007/978-3-031-35299-7 _2doi |
|
050 | 4 | _aTK7885-7895 | |
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUK _2bicssc |
|
072 | 7 |
_aCOM067000 _2bisacsh |
|
072 | 7 |
_aUK _2thema |
|
082 | 0 | 4 |
_a621.39 _223 |
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aComputer and Communication Engineering _h[electronic resource] : _bThird International Conference, CCCE 2023, Stockholm, Sweden, March 10–12, 2023, Revised Selected Papers / _cedited by Filippo Neri, Ke-Lin Du, Vijayakumar Varadarajan, Angel-Antonio San-Blas, Zhiyu Jiang. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2023. |
|
300 |
_aXI, 233 p. 109 illus., 81 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aCommunications in Computer and Information Science, _x1865-0937 ; _v1823 |
|
505 | 0 | _aImage analysis and method: Enhanced Acoustic Noise Reduction Techniques for Magnetic Resonance Imaging System -- Rough Rice Grading in the Philippines Using Infrared Thermography -- An Interpretable Hybrid Recommender Based on Graph Convolution to Address Serendipity -- Network Model and Function Analysis of Mobile Network: A Geometry-based Strategic Placement of RISs In millimeter Wave Device to Device Communication -- Obstacle Aware Link Selection for Stable Multicast D2D Communications -- Mobility Aware Path Selection for Millimeterwave 5G Networks in the Presence of Obstacles -- A Probabilistic Analysis of the Delay in RIS Assisted SISO D2D Communication using Chernoff's Bounds -- An Empirical Analysis on Lossless Compression Techniques: Enhancing IoT Security through Deep Learning-based Intrusion Detection -- A Security and Vulnerability Assessment on Android Gambling Applications -- A Compliance Based and Security Assessment of Bring Your Own Device (BYOD) in Organizations -- A Compliance Based and Security Assessment of Bring Your Own Device (BYOD) in Organizations -- AI -based system model and algorithm: Application of Machine Learning in Predicting Crime Links on Specialized Features -- An Empirical Analysis on Lossless Compression Techniques -- An Analysis of the Performance Changes of the Model by Reducing the Input Feature Dimension in Stock Price Forecasting -- A Hybrid Algorithm by Incorporating Neural Network and Metaheuristic Algorithms for Function Approximation and Demand Prediction Estimation -- Deep QA: An Open-Domain Dataset of Deep Questions and Comprehensive Answers -- Tropical Cyclone Analysis and Accumulated Precipitation Predictive Model Using Regression Machine Learning Algorithm -- Mapping Learning Algorithms on Data, A Promising Novel Methodology to Compare Learning Algorithms. | |
520 | _aThis book constitutes refereed proceedings of the Third International Conference on Computer and Communication Engineering, CCCE 2023, held in Stockholm, Sweden, in March 2023. The 18 full papers presented were carefully reviewed and selected from 36 submissions. The papers are organized in the following topical sections: image analysis and method; network model and function analysis of mobile network; system security estimation and analysis of data network; and AI-based system model and algorithm. | ||
650 | 0 | _aComputer engineering. | |
650 | 0 | _aComputer networks . | |
650 | 0 | _aArtificial intelligence. | |
650 | 0 |
_aImage processing _xDigital techniques. |
|
650 | 0 | _aComputer vision. | |
650 | 0 | _aSoftware engineering. | |
650 | 0 |
_aComputer science _xMathematics. |
|
650 | 1 | 4 | _aComputer Engineering and Networks. |
650 | 2 | 4 | _aArtificial Intelligence. |
650 | 2 | 4 | _aComputer Imaging, Vision, Pattern Recognition and Graphics. |
650 | 2 | 4 | _aSoftware Engineering. |
650 | 2 | 4 | _aMathematics of Computing. |
700 | 1 |
_aNeri, Filippo. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aDu, Ke-Lin. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aVaradarajan, Vijayakumar. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aSan-Blas, Angel-Antonio. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aJiang, Zhiyu. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031352980 |
776 | 0 | 8 |
_iPrinted edition: _z9783031353000 |
830 | 0 |
_aCommunications in Computer and Information Science, _x1865-0937 ; _v1823 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-35299-7 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c187216 _d187216 |