Computer Networks and Inventive Communication Technologies 1st Edition by S Smys, Robert Bestak, Ram Palanisamy, Ivan Kotuliak – Ebook PDF Instant Download/Delivery: 9789811637278 ,981163727X
Full download Computer Networks and Inventive Communication Technologies 1st Edition after payment
Product details:
ISBN 10: 981163727X
ISBN 13: 9789811637278
Author: S Smys, Robert Bestak, Ram Palanisamy, Ivan Kotuliak
Computer Networks and Inventive Communication Technologies 1st Edition Table of contents:
- Energy Efficient Clustering in Wireless Sensor Networks by Opposition-Based Initialization Bat Algorithm
- Efficient Data Collection in Wireless Sensor Network
- Job Scheduling in Cloud Computing Based on DGPSO
- Read–Write Decoupled Single-Ended 9T SRAM Cell for Low Power Embedded Applications
- Spam Detection Using Genetic Algorithm Optimized LSTM Model
- Affine Recurrence Based Key Scheduling Algorithm for the Advanced Encryption Standard
- Simplify Your Neural Networks: An Empirical Study on Cross-Project Defect Prediction
- Emotion Recognition During Social Interactions Using Peripheral Physiological Signals
- Phishing Detection Using Computer Vision
- A Comprehensive Attention-Based Model for Image Captioning
- Multimedia Text Summary Generator for Visually Impaired
- Keylogger Threat to the Android Mobile Banking Applications
- Machine Learning-Based Network Intrusion Detection System
- BGCNN: A Computer Vision Approach to Recognize of Yellow Mosaic Disease for Black Gram
- Irrelevant Racist Tweets Identification Using Data Mining Techniques
- Smart Farming System Using IoT and Cloud
- Multipartite Verifiable Secret Sharing Based on CRT
- Implementation of Smart Parking Application Using IoT and Machine Learning Algorithms
- Deep Face-Iris Recognition Using Robust Image Segmentation and Hyperparameter Tuning
- Text-Based Sentiment Analysis with Classification Techniques—A State-of-Art Study
- Face Mask Detection Using MobileNetV2 and Implementation Using Different Face Detectors
- Image Encryption Using Diffusion and Confusion Properties of Chaotic Algorithm
- A Sentiment Analysis of a Boycott Movement on Twitter
- Implementing the Comparative Analysis of AES and DES Crypt Algorithm in Cloud Computing
- A Model for Predictive and Prescriptive Analysis for Internet of Things Edge Devices with Artificial Intelligence
- Comparative Analysis of SIM-Based Hybrid Modulation Schemes Over Log-Normal Channel Model
- Lesion Preprocessing Techniques in Automatic Melanoma Detection System—A Comparative Study
- A Comparatıve Analysis on Three Consensus Algorithms
- Issues and Challenges in the Implementation of 5G Technology
- IoT-Based Autonomous Energy-Efficient WSN Platform for Home/Office Automation Using Raspberry Pi
- Detection of Early Depression Signals Using Social Media Sentiment Analysis on Big Data
- Raspberry Pi-Based Heart Attack and Alcohol Alert System Over Internet of Things for Secure Transportation
- Automatic Classification of Music Genre Using SVM
- Crime Rate Prediction Based on K-means Clustering and Decision Tree Algorithm
- Comparative Study of Optimization Algorithm in Deep CNN-Based Model for Sign Language Recognition
- Cardinal Correlated Oversampling for Detection of Malicious Web Links Using Machine Learning
- Simulation of Speckle Noise Using Image Processing Techniques
- Wi-Fi-Based Indoor Patient Location Identifier for COVID-19
- Enabling Identity-Based Data Security with Cloud
- A Study and Review on Image Steganography
- Fault Detection in SPS Using Image Encoding and Deep Learning
- A Comparative Study of Information Retrieval Models for Short Document Summaries
- Network Attack Detection with QNNBADT in Minimal Response Times Using Minimized Features
- Deep Learning-Based Approach for Satellite Image Reconstruction Using Handcrafted Prior
- CLOP Ransomware Analysis Using Machine Learning Approach
- Integration of Wireless Sensors to Detect Fluid Leaks in Industries
- Performance Analysis of Abstract-Based Classification of Medical Journals Using Machine Learning Techniques
- Development of Improved SoC PTS Algorithm for PAPR Reduction in OFDM Underwater Communication
- Analysis of Twitter Data for Identifying Trending Domains in Blockchain Technology
- Enhancing the Security for Smart Card-Based Embedded Systems
- Implementation Mobile App for Foreign Language Acquisition Based on Structural Visual Method
- RETRACTED CHAPTER: Assessing Deep Neural Network and Shallow for Network Intrusion Detection Systems in Cyber Security
- Leveraging Association Rules in Feature Selection to Classify Text
- Protected Admittance E-Health Record System Using Blockchain Technology
- Using Hierarchical Transformers for Document Classification in Tamil Language
- Analysis of Hybrid MAC Protocols in Vehicular Ad Hoc Networks (VANET) for QoS Sensitive IoT Applications
- Programming with Natural Languages: A Survey
- An Exhaustive Exploration of Electromagnetism for Underwater Wireless Sensor Networks
- Two-Stage Feature Selection Pipeline for Text Classification
- A Systematic Approach of Analysing Network Traffic Using Packet Sniffing with Scapy Framework
- Detecting Ransomware Attacks Distribution Through Phishing URLs Using Machine Learning
- A Framework for APT Detection Based on Host Destination and Packet—Analysis
- A Trust-Based Handover Authentication in an SDN 5G Heterogeneous Network
- Intrusion Detection for Vehicular Ad Hoc Network Based on Deep Belief Network
- Highly Secured Steganography Method for Image Communication using Random Byte Hiding and Confused & Diffused Encryption
- An Enhanced Energy Constraint Secure Routing Protocol for Clustered Randomly Distributed MANETs Using ADAM’s Algorithm
- Retraction Note to: Assessing Deep Neural Network and Shallow for Network Intrusion Detection System
People also search for Computer Networks and Inventive Communication Technologies 1st Edition:
define communication in computer network
communication devices in computer network
computer & communications innovations
computer-based communications
computer networks and internets