menu
{ "item_title" : "Applied Soft Computing and Communication Networks", "item_author" : [" Sabu M. Thampi", "Jaime Lloret Mauri", "Xavier Fernando "], "item_description" : "Algebraic Modelling of a Generic Fog Scenario for Moving IoT Devices.- A Novel Approach to Preserve DRM for Content Distribution over P2P Networks.- Secure Multimodal Biometric Recognition in Principal Component Subspace.- EEG Based Emotion Recognition and Its Interface with Augmented Reality.- Profile Verification Using Blockchain.- Distributed Denial of Service (DDoS) Attacks Detection: A Machine Learning Approach.- Intrusion Detection Using Deep Neural Network with AntiRectifier Layer.- CloudSim Exploration: A Knowledge Framework for Cloud Computing Researchers.- A Comprehensive Survey on Big Data Technology Based Cybersecurity Analytics Systems.- P2P Bot Detection Based on Host Behavior and Big Data Technology.- Serverless Deployment of a Voice-Bot for Visually Impaired.- Interference Management Technique for LTE, Wi-Fi Coexistence Based on CSI at the Transmitter.", "item_img_path" : "https://covers1.booksamillion.com/covers/bam/9/81/336/172/9813361727_b.jpg", "price_data" : { "retail_price" : "169.99", "online_price" : "169.99", "our_price" : "169.99", "club_price" : "169.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Applied Soft Computing and Communication Networks|Sabu M. Thampi

Applied Soft Computing and Communication Networks : Proceedings of Acn 2020

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Algebraic Modelling of a Generic Fog Scenario for Moving IoT Devices.- A Novel Approach to Preserve DRM for Content Distribution over P2P Networks.- Secure Multimodal Biometric Recognition in Principal Component Subspace.- EEG Based Emotion Recognition and Its Interface with Augmented Reality.- Profile Verification Using Blockchain.- Distributed Denial of Service (DDoS) Attacks Detection: A Machine Learning Approach.- Intrusion Detection Using Deep Neural Network with AntiRectifier Layer.- CloudSim Exploration: A Knowledge Framework for Cloud Computing Researchers.- A Comprehensive Survey on Big Data Technology Based Cybersecurity Analytics Systems.- P2P Bot Detection Based on Host Behavior and Big Data Technology.- Serverless Deployment of a Voice-Bot for Visually Impaired.- Interference Management Technique for LTE, Wi-Fi Coexistence Based on CSI at the Transmitter.

This item is Non-Returnable

Details

  • ISBN-13: 9789813361720
  • ISBN-10: 9813361727
  • Publisher: Springer
  • Publish Date: July 2021
  • Dimensions: 9.21 x 6.14 x 0.75 inches
  • Shipping Weight: 1.12 pounds
  • Page Count: 340

Related Categories

You May Also Like...

    1

BAM Customer Reviews