menu
{ "item_title" : "Computer Networks and Inventive Communication Technologies", "item_author" : [" S. Smys", "Robert Bestak", "Ram Palanisamy "], "item_description" : "Chapter 1. Energy Efficient Clustering in Wireless Sensor Networks by Opposition-based Initialization Bat Algorithm.- Chapter 2. Efficient Data Collection in Wireless Sensor Network.- Chapter 3. Job Scheduling in Cloud Computing based on DGPSO.- Chapter 4. Read-Write Decoupled Single-Ended 9T SRAM Cell for Low Power Embedded Applications.- Chapter 5. Spam Detection using Genetic Algorithm Optimized LSTM Model.- Chapter 6. Affine Recurrence based Key Scheduling Algorithm for the Advanced Encryption Standard.- Chapter 7. Simplify Your Neural Networks: An Empirical Study on Cross Project Defect Prediction.- Chapter 8. Emotion Recognition During Social Interactions using Peripheral Physiological Signals.- Chapter 9. Phishing Detection using Computer Vision.- Chapter 10. A Comprehensive Attention-based Model for Image Captioning.- Chapter 11. Multimedia Text Summary Generator for Visually Impaired.- Chapter 12. Key-logger threat to the Android Mobile Banking Applications.- Chapter 13. Machine Learning-based Networ Intrusion Detection System.- Chapter 14. BGCNN: A Computer Vision Approach to Recognize of Yellow Mosaic Disease for Black Gram.- Chapter 15. Irrelevant Racist Tweets Identification using Data Mining Techniques.", "item_img_path" : "https://covers3.booksamillion.com/covers/bam/9/81/163/727/981163727X_b.jpg", "price_data" : { "retail_price" : "379.99", "online_price" : "379.99", "our_price" : "379.99", "club_price" : "379.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Computer Networks and Inventive Communication Technologies|S. Smys

Computer Networks and Inventive Communication Technologies : Proceedings of Fourth Iccnct 2021

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Chapter 1. Energy Efficient Clustering in Wireless Sensor Networks by Opposition-based Initialization Bat Algorithm.- Chapter 2. Efficient Data Collection in Wireless Sensor Network.- Chapter 3. Job Scheduling in Cloud Computing based on DGPSO.- Chapter 4. Read-Write Decoupled Single-Ended 9T SRAM Cell for Low Power Embedded Applications.- Chapter 5. Spam Detection using Genetic Algorithm Optimized LSTM Model.- Chapter 6. Affine Recurrence based Key Scheduling Algorithm for the Advanced Encryption Standard.- Chapter 7. Simplify Your Neural Networks: An Empirical Study on Cross Project Defect Prediction.- Chapter 8. Emotion Recognition During Social Interactions using Peripheral Physiological Signals.- Chapter 9. Phishing Detection using Computer Vision.- Chapter 10. A Comprehensive Attention-based Model for Image Captioning.- Chapter 11. Multimedia Text Summary Generator for Visually Impaired.- Chapter 12. Key-logger threat to the Android Mobile Banking Applications.- Chapter 13. Machine Learning-based Networ Intrusion Detection System.- Chapter 14. BGCNN: A Computer Vision Approach to Recognize of Yellow Mosaic Disease for Black Gram.- Chapter 15. Irrelevant Racist Tweets Identification using Data Mining Techniques.

This item is Non-Returnable

Details

  • ISBN-13: 9789811637278
  • ISBN-10: 981163727X
  • Publisher: Springer
  • Publish Date: September 2021
  • Dimensions: 9.21 x 6.14 x 1.82 inches
  • Shipping Weight: 2.79 pounds
  • Page Count: 903

Related Categories

You May Also Like...

    1

BAM Customer Reviews