feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    b3kat_BV045860162
    Format: 1 Online-Ressource (XII, 303 Seiten, 118 illus., 63 illus. in color)
    ISBN: 9789811375613
    Series Statement: Communications in computer and information science 939
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-981-137-560-6
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-981-137-562-0
    Language: English
    Keywords: Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    b3kat_BV048687872
    Format: 1 Online-Ressource (XXX, 456 p. 222 illus., 173 illus. in color)
    Edition: 1st ed. 2022
    ISBN: 9783031230929
    Series Statement: Communications in Computer and Information Science 1759
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-23091-2
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-23093-6
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    b3kat_BV048687874
    Format: 1 Online-Ressource (XXX, 288 p. 188 illus., 114 illus. in color)
    Edition: 1st ed. 2022
    ISBN: 9783031230950
    Series Statement: Communications in Computer and Information Science 1760
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-23094-3
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-23096-7
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    b3kat_BV049408813
    Format: 1 Online-Ressource (317 Seiten)
    Edition: 1st ed
    ISBN: 9783031230950
    Series Statement: Communications in Computer and Information Science Series v.1760
    Note: Description based on publisher supplied metadata and other sources , Intro -- Preface -- Organization -- Abstracts of Keynotes -- Post-pandemic Applications of AI and Machine Learning -- Smart and Soft Computing Methods for Prioritizing Software Requirements in Large-Scale Software Projects -- Your Readiness for Industry 4.0 -- Securing NexGen Automotives - Threats and Trends -- Cyber Attacks Classification and Attack Handling Methods Using Machine Learning Methods -- The Internet of Things (IoT) Ecosystem Revolution in the World of Global Sports -- Orchestration of Containers: Role of Artificial Intelligence -- Enterprise Cybersecurity Strategies in the Cloud -- Contents - Part II -- Contents - Part I -- Cyber Security -- A Comprehensive Study on Cyber Legislation in G20 Countries -- 1 Introduction -- 2 Literature Review -- 2.1 Argentina -- 2.2 Australia -- 2.3 Brazil -- 2.4 Canada -- 2.5 China -- 2.6 France -- 2.7 Germany -- 2.8 India -- 2.9 Indonesia -- 2.10 Italy -- 2.11 Japan -- 2.12 South Korea -- 2.13 Mexico -- 2.14 Russia -- 2.15 Saudi Arabia -- 2.16 South Africa -- 2.17 Turkey -- 2.18 United Kingdom -- 2.19 United State of America -- 2.20 European Union -- 3 Conclusions -- References -- Image Encryption Algorithm Based on Timeout, Pixel Transposition and Modified Fisher-Yates Shuffling -- 1 Introduction -- 2 Proposed Work -- 2.1 Key Generation -- 2.2 Encryption Process -- 2.3 Decryption Process -- 3 Library and Packages -- 4 Performance Analysis and Results -- 4.1 NPCR & -- UACI Test -- 4.2 Mean Square Error (MSE) -- 4.3 Root Mean Square Error (RMSE) -- 4.4 Peak Signal to Noise Ratio (PSNR) -- 4.5 Key Space Analysis -- 4.6 Key Sensitivity Test -- 4.7 Encryption Time -- 4.8 Correlation Analysis -- 4.9 Mono-bit Test -- 4.10 Entropy Analysis -- 4.11 Average Difference (AD) and Maximum Difference (MD) -- 4.12 Structural Content (SC) -- 5 Conclusion -- References , EXAM: Explainable Models for Analyzing Malicious Android Applications -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Data Set Preparation -- 3.2 Feature Extraction -- 3.3 Pre-processing the Feature Set and FVT Creation -- 3.4 Model Preparation and Classification -- 3.5 Obfuscation of Samples -- 3.6 Interpretation of Results Using SHAP -- 4 Experiments and Results -- 4.1 Evaluation Measures -- 4.2 Research Questions -- 4.3 Comparison with State-of-the-Art Approaches -- 5 Conclusion -- References -- Data Encryption Approach Using Hybrid Cryptography and Steganography with Combination of Block Ciphers -- 1 Introduction -- 1.1 Research Contribution -- 1.2 Paper Organisation -- 2 Related Work in the Domain -- 3 Proposed Methodology -- 4 Results and Discussions -- 5 Conclusion -- References -- Mitigation and Prevention Methods for Distributed Denial-of-Service Attacks on Network Servers -- 1 Introduction -- 2 Proposed Survey -- 2.1 Motivation for DDoS Attacks -- 2.2 Attack Strategies and Phases -- 2.3 Attack Methods -- 3 Prevention Methods -- 3.1 Prevention Using Filters -- 3.2 Secure Overlay -- 3.3 Honeypots -- 3.4 Load Balancing -- 3.5 Additional Security Patches -- 4 DDoS Mitigation Methods -- 4.1 Detection of DDoS Attacks -- 5 Conclusion -- References -- A Machine Learning Framework for Automatic Detection of Malware -- 1 Introduction -- 2 Literature Review -- 3 Proposed Framework -- 4 Experimental Results -- 5 Conclusion and Future Work -- References -- DNNdroid: Android Malware Detection Framework Based on Federated Learning and Edge Computing -- 1 Introduction -- 2 Related Work -- 3 Datasets -- 4 Machine Learning Technique -- 5 Proposed Framework Architecture -- 6 Evaluation of Proposed Framework -- 7 Comparison of Proposed Framework -- 7.1 Comparison on the Basis of Framework Available in the Literature , 7.2 Comparison of the Proposed Framework with Different Anti-virus Scanners -- 8 Experimental Findings -- 9 Conclusion -- References -- An Improved Symmetric Key Encryption Method Using Randomized Matrix Generation -- 1 Introduction -- 2 Types of Encryption Technique -- 2.1 AES -- 2.2 DES -- 2.3 Blowfish -- 3 Proposed Technique -- 3.1 Random Key Generation Algorithm -- 3.2 Text Message Encryption Algorithm -- 3.3 Text Message Decryption Algorithm -- 4 Matrix Operations -- 4.1 Matrix Determinant -- 4.2 Matrix Multiplication -- 4.3 Matrix Transpose Operation -- 5 Performance Analysis -- 5.1 Implementation of System -- 5.2 Text Encryption Algorithms Performance Analysis -- 5.3 Analysis of Complexity for Random Key Generation -- 5.4 Analysis of Execution Time -- 5.5 Analysis of Throughput -- 6 Conclusion -- References -- Performance Analyses of Black Hole Attack in AODV Routing Protocol in Vanet Using NS3 -- 1 Introduction -- 1.1 AODV Routing Protocol -- 1.2 Black Hole Attack -- 1.3 Literature Survey -- 1.4 Simulation Set-Up -- 1.5 Result Analyses -- 1.6 Conclusion -- References -- Comparative Analysis of Several Approaches of Encoding Audio Files -- 1 Introduction -- 2 Overview of Cryptography -- 3 Aims of Cryptography -- 3.1 The Many Forms that Cryptography Can Take -- 4 Cryptographic Algorithms at a Glance -- 4.1 DES -- 4.2 3DES -- 4.3 AES -- 4.4 Blowfish -- 4.5 RC4 -- 4.6 Twofish -- 4.7 ThreeFish -- 5 Background and Related Works -- 5.1 Related Research and Development on Audio Encryption -- 6 Recent Works on Audio Encryption -- 7 Limitations -- 8 Conclusion -- References -- A Secure Mechanism for Safeguarding Cloud Infrastructure -- 1 Introduction -- 2 Literature Review -- 3 Types of Security in Cloud Computing -- 3.1 Information Security -- 3.2 Identity Security -- 3.3 Network Security -- 3.4 Software Security -- 3.5 Infrastructure Security , 4 Security Concerns in Cloud -- 4.1 Virtualization -- 4.2 Public-Cloud Storage -- 4.3 Multitenancy -- 4.4 Identity and Access Management (IAM) -- 5 Security of Data in Cloud-Computing -- 6 Major Security Challenges -- 6.1 Internal Attacks -- 6.2 Partial/Incomplete Data Deletion -- 6.3 Interception of Data -- 6.4 Failure of Isolation -- 7 Using Encryption for Data Protection -- 7.1 Block-Cipher -- 7.2 Stream Ciphers -- 7.3 Hash Functions -- 8 Case Study on Cloud Based Cyber Security Model for Identification of Safe and Malicious Request -- 9 Conclusion -- References -- Phishing URLs Detection Using Machine Learning -- 1 Introduction -- 2 Related Work -- 2.1 Literature Review -- 2.2 URLs Descriptions -- 3 Research Methodology -- 4 Result and Analysis -- 4.1 Result -- 4.2 Analysis -- 5 Conclusion -- References -- Android Malware Detection with Classification Based on Hybrid Analysis and N-gram Feature Extraction -- 1 Introduction -- 1.1 Average Cost of a Data Breach -- 1.2 Growth Rate of Malware Infections -- 1.3 India and Asia Statistics on Malware Attacks -- 1.4 Trends in the Number of Attacks -- 1.5 Users Attacked by Malware -- 2 Research Objective/Problem Statement -- 3 Challenges in Malware Detection -- 4 Theoretical Framework -- 5 Hypothesis Declaration -- 6 Methodology -- 7 Approach -- 8 Outline of the Work Proposed -- 8.1 Process for the Proposed Scheme of Work -- 9 Conclusion -- 10 Further Research -- References -- Industry -- Image Processing and Deep Neural Networks for Face Mask Detection -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 3.1 Machine Learning Approach -- 3.2 Supervised Learning -- 3.3 Unsupervised Learning -- 3.4 Viola Jones algorithm -- 4 Mathematical Formulation -- 5 Results and Discussion -- 6 Conclusion -- References -- An Analysis of Lightweight Cryptographic Algorithms for IoT-Applications , 1 Introduction -- 2 Introduction of IoT -- 3 Software and Hardware Performance Metrics -- 4 Research Directions and Open Research Challenges -- 5 Conclusion -- Appendix 1 -- Hardware and Software Performances of LWC Algorithm -- References -- Permissioned Blockchain-Based Solution to Document Processing in the Real Estate Industry -- 1 Introduction -- 1.1 Blockchain Technology -- 1.2 Indian Real Estate Sector -- 1.3 Impact of Blockchain Technology on the Indian Real Estate Sector -- 2 Related Research Work and Limitations -- 2.1 Summarization of Recent Research Work -- 2.2 Research Gap -- 3 Proposed Research Work -- 3.1 Designed Framework and Components -- 3.2 Core Transaction Process Flow -- 3.3 Proposed Algorithms -- 3.4 Deployment -- 4 Conclusion and Future Scope -- References -- Automatic Evaluation of Free Text Answers: A Review -- 1 Introduction -- 2 Related Work -- 3 A Systematic Review -- 4 Discussion -- 5 Conclusions and Future Work -- References -- Blockchain Federated Learning Framework for Privacy-Preservation -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 4 Performance Evaluation -- 4.1 Datasets -- 4.2 Simulation Setup -- 4.3 Evaluation Metrics -- 4.4 Results and Discussion -- 5 Conclusion -- References -- Path Planning and Static Obstacle Avoidance for Unmanned Aerial Systems -- 1 Introduction -- 2 Methodology -- 2.1 A* Search -- 2.2 Rapidly-Exploring Random Tree -- 2.3 Ant Colony Optimization -- 2.4 Imitation Learning -- 3 Results and Discussion -- 4 Conclusion and Future Work -- References -- Comparative Study of Various Algorithms for Vehicle Detection and Counting in Traffic -- 1 Introduction -- 2 Literature Review -- 2.1 YOLO Real-Time Object Tracking -- 3 Methodology -- 3.1 YOLOv3 Architecture -- 3.2 YOLOv4 Architecture -- 3.3 YOLOv5 Architecture -- 3.4 YOLOv6 Architecture -- 3.5 YOLOv7 Architecture , 4 Results and Discussion
    Additional Edition: Erscheint auch als Druck-Ausgabe Rajagopal, Sridaran Advancements in Smart Computing and Information Security Cham : Springer,c2023 ISBN 9783031230943
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    b3kat_BV049408814
    Format: 1 Online-Ressource (482 Seiten)
    Edition: 1st ed
    ISBN: 9783031230929
    Series Statement: Communications in Computer and Information Science Series v.1759
    Note: Description based on publisher supplied metadata and other sources , Intro -- Preface -- Organization -- Abstracts of Keynotes -- Post-pandemic Applications of AI and Machine Learning -- Smart and Soft Computing Methods for Prioritizing Software Requirements in Large-Scale Software Projects -- Your Readiness for Industry 4.0 -- Securing NexGen Automotives - Threats and Trends -- Cyber Attacks Classification and Attack Handling Methods Using Machine Learning Methods -- The Internet of Things (IoT) Ecosystem Revolution in the World of Global Sports -- Orchestration of Containers: Role of Artificial Intelligence -- Enterprise Cybersecurity Strategies in the Cloud -- Contents - Part I -- Contents - Part II -- Artificial Intelligence -- Galaxy Classification Using Deep Learning -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Dataset Collection -- 3.2 Proposed Deep Galaxies CNN Model -- 3.3 Overview of Algorithms -- 4 Comparative Results -- 4.1 Model Accuracy -- 5 Conclusion and Future Scope -- References -- Word Sense Disambiguation for Hindi Language Using Neural Network -- 1 Introduction -- 2 Related Work -- 2.1 Background -- 2.2 Variants of Word Sense Disambiguation Work -- 2.3 Existing Approaches for Disambiguation -- 3 Proposed Approach for WSD -- 3.1 Architecture of the Proposed WSD Model -- 3.2 Implementation Details -- 4 Result Discussion -- 5 Conclusion and Future Directions -- References -- Social Media Addiction: Analysis on Impact of Self-esteem and Recommending Methods to Reduce Addiction -- 1 Introduction -- 2 Related Work -- 3 Measures -- 3.1 Bergen Social Media Addiction Scale (BSMAS) [5] -- 3.2 Rosenberg Self-esteem Scale (RSES) [5] -- 3.3 Recommendation Methods [14, 15] -- 3.4 Dataset Collection 1 -- 3.5 Dataset Collection 2 -- 4 Proposed Methodology -- 4.1 Statistical Analysis -- 4.2 Recommendation System -- 5 Results and Discussion -- 5.1 Statistical Analysis , 5.2 Recommendation System -- 6 Conclusion -- References -- A Combined Method for Document Image Enhancement Using Image Smoothing, Gray-Level Reduction and Thresholding -- 1 Introduction -- 2 Types of Noises -- 2.1 Speckle Noise -- 2.2 Gaussian Noise -- 2.3 Salt and Pepper Noise -- 3 Proposed Work for Document Image Enhancement -- 3.1 Edge Preserving Image Smoothing -- 3.2 Gray Level Reduction -- 3.3 Image Thresholding Using Otsu's Method -- 4 Experimentation and Results -- 5 Conclusions and Future Work -- References -- A Comparative Assessment of Deep Learning Approaches for Opinion Mining -- 1 Introduction -- 2 Literature Review -- 3 Tools for Opinion Mining -- 4 Deep Learning Techniques -- 4.1 Convolutional Neural Network (CNN) -- 4.2 Recurrent Neural Network (RNN) -- 4.3 Long Short Term Memory (LSTM) -- 4.4 Deep Neural Networks (DNN) -- 4.5 Deep Belief Networks (DBN) -- 4.6 Recursive Neural Network (RECNN) -- 4.7 Hybrid Neural Network -- 5 System Architecture -- 6 Advantages of Deep Learning -- 7 When to Use Deep Learning -- 8 Disadvantages of Deep Learning -- 9 Conclusion -- References -- Performance Enhancement in WSN Through Fuzzy C-Means Based Hybrid Clustering (FCMHC) -- 1 Introduction -- 2 Related Work -- 3 Network Model -- 3.1 Radio Model -- 3.2 Assumptions -- 4 Proposed Algorithm -- 4.1 Cluster Formation Phase -- 4.2 Cluster Head Selection Phase -- 4.3 Communication Phase -- 5 Analytical Evaluation of Performance -- 5.1 Performance Metrics -- 5.2 Simulation Parameters -- 5.3 Results and Discussion -- 6 Conclusion -- References -- A Review of Gait Analysis Based on Age and Gender Prediction -- 1 Introduction -- 2 Gait Analysis and Feature Extraction -- 2.1 Gait and Gait Cycle -- 2.2 Gait and Gait Cycle -- 2.3 Gait and Gait Cycle -- 2.4 Motivation and Application of GEI Motivation -- 3 Evolution Metric -- 4 Related Work , 5 Comparison and Summary of Related Research Work -- 6 Future Work -- 7 Limitations and Challenges -- 8 Conclusion -- References -- Handwritten Signature Verification Using Convolution Neural Network (CNN) -- 1 Introduction -- 1.1 About the Domain -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Converting Image to Binary -- 3.2 Noise Removal -- 3.3 Image Enlargement -- 4 Feature Extraction -- 5 Feature Selection -- 6 Classification -- 7 Conclusion and Future Work -- References -- Comparative Analysis of Energy Consumption in Text Processing Models -- 1 Introduction -- 2 Existing Approaches -- 3 Exploration of the Data-Set -- 3.1 Average Word Length -- 3.2 Average Character Length -- 3.3 Number of Comments -- 4 Modelling -- 4.1 Simple Machine Learning Model -- 4.2 DistilBERT Model -- 4.3 Conv1D Model -- 4.4 Gated Recurrence Unit - GRU Model -- 5 Results -- 6 Conclusion -- References -- Evolution Towards 6G Wireless Networks: A Resource Allocation Perspective with Deep Learning Approach - A Review -- 1 Introduction -- 1.1 6G Vision -- 1.2 Technical Objectives of 6G -- 2 Resource Allocation for 6G Wireless Networks -- 3 Summary of Deep Learning Algorithms Used for 6G Wireless Networks Resource Allocation -- 4 Conclusion and Future Scope -- Appendix -- References -- Automation of Rice Leaf Diseases Prediction Using Deep Learning Hybrid Model VVIR -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 4 Results -- 5 Discussion -- References -- A Review Based on Machine Learning for Feature Selection and Feature Extraction -- 1 Introduction -- 2 Preliminaries -- 2.1 Feature Selection -- 2.2 Reducing the Dimensionality -- 3 Related Works -- 3.1 Feature Selection Approaches -- 3.2 Feature Extraction Approaches -- 4 Discussion -- 5 Conclusion -- References -- Automating Scorecard and Commentary Based on Umpire Gesture Recognition -- 1 Introduction , 2 Literature Survey -- 3 Methodology -- 3.1 Umpire Gestures -- 3.2 Dataset -- 3.3 Feature Extraction -- 3.4 Classification of Umpire Gestures -- 3.5 Scorecard Updating Feature -- 4 Results and Discussion -- 5 Conclusion -- References -- Rating YouTube Videos: An Improvised and Effective Approach -- 1 Introduction -- 2 Previous Work -- 3 Implementation -- 3.1 Comment Collection and Preprocessing -- 3.2 Sentiment Measure -- 3.3 Word Cloud -- 3.4 Video Rating -- 4 Performance Review of Proposed Approach -- 4.1 Major Application: Detection of Clickbait Videos -- 5 Limitations and Loopholes -- 6 Result -- 7 Conclusion -- 8 Future Work -- References -- Classification of Tweet on Disaster Management Using Random Forest -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Preprocessing -- 3.2 Training, Validation and Testing -- 3.3 Feature Extraction -- 3.4 Random Forest Classification -- 3.5 Location Extraction -- 4 Results and Discussions -- 5 Datasets -- 6 Experiment -- 7 Validation -- 8 Conclusions -- References -- Numerical Investigation of Dynamic Stress Distribution in a Railway Embankment Reinforced by Geogrid Based Weak Soil Formation Using Hybrid RNN-EHO -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Model Clay Barrier's Compositional Characteristics -- 2.2 Geogrid -- 2.3 Measuring Subgrade Stiffness -- 2.4 Multi Objective Function -- 2.5 Improving Settlement-Based Geogrid using Hybrid RNN-EHO Technique -- 2.6 The Procedure of the EHO in Realizing the Learning of RNN -- 3 Results and Discussion -- 3.1 Uncertainty Analysis -- 4 Conclusion -- References -- Efficient Intrusion Detection and Classification Using Enhanced MLP Deep Learning Model -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 4 Results and Discussion -- 5 Conclusion -- References , Classification of Medical Datasets Using Optimal Feature Selection Method with Multi-support Vector Machine -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 4 Results and Discussions -- 5 Conclusions -- References -- Predicting Students' Outcomes with Respect to Trust, Perception, and Usefulness of Their Instructors in Academic Help Seeking Using Fuzzy Logic Approach -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 4 Results and Discussions -- 5 Conclusion -- References -- Smart Computing -- Automatic Cotton Leaf Disease Classification and Detection by Convolutional Neural Network -- 1 Introduction -- 2 Literature Review -- 3 List of Cotton Diseases -- 4 Materials and Methods -- 4.1 Dataset and Data Augmentation -- 4.2 CNN Pre-trained Architectures -- 4.3 Classification by Proposed CNN -- 5 Results and Discussions of Research -- 5.1 Pre-trained Model -- 6 Conclusion -- References -- Analytical Review and Study on Emotion Recognition Strategies Using Multimodal Signals -- 1 Introduction -- 2 Literature Survey -- 2.1 Classification of Emotion Recognition Strategies -- 3 Research Gaps and Issues -- 4 Analysis and Discussion -- 4.1 Analysis with Respect to Publication years -- 4.2 Analysis on the Basis of Strategies -- 4.3 Analysis on the Basis of Implementation Tool -- 4.4 Analysis in Terms of Employed Datasets -- 4.5 Analysis on the Basis of Evaluation Measures -- 4.6 Analysis Using Evaluation Measures Values -- 5 Conclusion -- References -- An Image Performance Against Normal, Grayscale and Color Spaced Images -- 1 Introduction -- 2 Overview of Image Matching Techniques -- 2.1 SIFT -- 2.2 SURF -- 2.3 ORB -- 3 Experimental Results -- 3.1 L*A*B* Color Space -- 4 Conclusion -- References -- Study of X Ray Detection Using CNN in Machine Learning -- 1 Introduction -- 2 Literature Review -- 2.1 Methods , 3 Algorithm CNN Model Algorithm Model = Sequential()
    Additional Edition: Erscheint auch als Druck-Ausgabe Rajagopal, Sridaran Advancements in Smart Computing and Information Security Cham : Springer,c2023 ISBN 9783031230912
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    edocfu_BV048687872
    Format: 1 Online-Ressource (XXX, 456 p. 222 illus., 173 illus. in color).
    Edition: 1st ed. 2022
    ISBN: 978-3-031-23092-9
    Series Statement: Communications in Computer and Information Science 1759
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-23091-2
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-23093-6
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    edocfu_BV048687874
    Format: 1 Online-Ressource (XXX, 288 p. 188 illus., 114 illus. in color).
    Edition: 1st ed. 2022
    ISBN: 978-3-031-23095-0
    Series Statement: Communications in Computer and Information Science 1760
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-23094-3
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-23096-7
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    edoccha_BV048687872
    Format: 1 Online-Ressource (XXX, 456 p. 222 illus., 173 illus. in color).
    Edition: 1st ed. 2022
    ISBN: 978-3-031-23092-9
    Series Statement: Communications in Computer and Information Science 1759
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-23091-2
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-23093-6
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    edoccha_BV048687874
    Format: 1 Online-Ressource (XXX, 288 p. 188 illus., 114 illus. in color).
    Edition: 1st ed. 2022
    ISBN: 978-3-031-23095-0
    Series Statement: Communications in Computer and Information Science 1760
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-23094-3
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-23096-7
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages