• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611
Advances in Computational Intelligence and Communication Technology: Proceedings of Cict 2019

Advances in Computational Intelligence and Communication Technology: Proceedings of Cict 2019

Paperback

Series: Advances in Intelligent Systems and Computing, Book 1086

Technology & EngineeringGeneral Computers

ISBN10: 9811512744
ISBN13: 9789811512742
Publisher: Springer Nature
Published: Jun 19 2020
Pages: 574
Weight: 1.80
Height: 1.19 Width: 6.14 Depth: 9.21
Language: English

Part 1: Intelligent Computational Science.- Chapter 1. Influence of Wind Speed on Solar PV Plant Power Production - Prediction Model Using Decision Based Artificial Neural Network.- Chapter 2. Prediction of Compressive Strength of Ultra-High Performance Concrete using SFS and ANN.- Chapter 3. Classification of Plant Based on Leaf Images.- Chapter 4. Controller Optimization for Boiler Turbine Using Simulated Annealing and Genetic Algorithm.- Chapter 5. Indian Language Identification for Short Text.- Chapter 6. Improved Whale Optimization Algorithm for Numerical Optimization.- Chapter 7. A Matrix Based Approach for Evaluation of Vocal Renditions in Hindustani Classical Music.- Chapter 8. Performance Analysis of ML Algorithms on Speech Emotion Recognition.- Chapter 9. EEPMS: Energy Efficient Path Planning for Mobile Sink in Wireless Sensor Networks: A Genetic Algorithm based Approach.- Chapter 10. Mining Public Opinion on Plastic Ban in India. Chapter 11. Whale Neuro-Fuzzy System for Intrusion Detection in Wireless Sensor Network.- Part 2: Advanced Security Techniques.- Chapter 12. The Threat Detection Framework for Securing Semantic Web Services based on XACML.- Chapter 13. Real-Time Detection of Fake Account in Twitter using Machine Learning Approach.- Chapter 14. DPLOOP: Detection & Prevention of Loopholes in Web Application Security.- Chapter 15. Security Enhancement using Modified AES and Diffie-Hellman Key Exchange.- Chapter 16. Detection of Advanced Linux Malware using Machine Learning.- Chapter 17. Host-Server based Malware Detection System for Android Platforms Using Machine Learning.-Chapter 18. Identification of Windows based Malware by Dynamic Analysis using Machine Learning Algorithm.- Chapter 19. Secure E-mail Communications through Cryptographic Techniques - A Study.- Chapter 20. Current trends in Cryptography, Steganography and Metamorphic Cryptography: A survey.

Also in

General Computers