|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Manisha MalhotraPublisher: Springer International Publishing AG Imprint: Springer International Publishing AG Volume: 2126 ISBN: 9783031808418ISBN 10: 303180841 Pages: 310 Publication Date: 28 January 2025 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of Contents.- Data Science and Data Analytics. .- Generalized Material Flow Model for hot deformation processing based on power law. .- Smallest Path Planning for Robots using Simple ACO and Ant System Algorithms. .- An asymmetric single channel encryption mechanism using unequal modulus and QZS algorithm in fractional Fourier transform. .- Evaluation Criteria for Test Suites in Software Developed Through Test-Driven Development. .- LCB-eGyan Model: A Dynamic Cloud Architecture for e-Content Recommendation. .- Gender and Ethnicity Recognition System Based on Convolutional Neural Networks. .- Radiographic Evaluation for KNEEXNET Using Ensemble Models. .- Comparative Study of Quantum Computing Tools and Frameworks. .- Security Evaluation and Oversight in Stock Trading Using Artificial Intelligence. .- A Dual Approach with Grad-CAM and Layer-wise Relevance Propagation for CNN Models Explainability. .- CLAM – CNN & LSTM with Attention Mechanism for DNS Data Exfiltration Detection. .- Comparison of various data mining techniques for Fake Profile Detection on Twitter. .- Strategies for Gen AI Enterprise Adoption. .- Role of Deep Learning in Skin Cancer Diagnosis: A Deeper Insight. .- Communication, Network and Security. .- Smart Education-Filtering Real Time Stream. .- RNA and Audio-Based Workflows Scheduling by Multi-Objective Optimization in Cloud Environment. .- Group Authentication and Key Management Protocol with Chinese Remainder Theorem in Multicast Communication. .- Network Traffic Analysis for Intrusion with Zero Trust. .- Enhanced Image Deblurring with the Fusion of Generative Adversarial Networks and Transformer Models. .- Analysis of Various Routing Protocols for Air Pollution Monitoring Systems in Wireless Sensor Networks. .- Intelligent toll management using limited CNN-based Vehicle Classification. .- Optimizing Software Demands using Fuzzy-based Evaluation Techniques. .- Enhancing Workflow Efficiency: Innovative Workload Clustering in Cloud Environments.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |