Proceedings of the Future Technologies Conference (FTC) 2021. Volume 3 / Kohei Arai, editor.
2022
QA75.5 .F8823 2021eb
Linked e-resources
Linked Resource
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Proceedings of the Future Technologies Conference (FTC) 2021. Volume 3 / Kohei Arai, editor.
Meeting Name
ISBN
9783030899127 (electronic bk.)
3030899128 (electronic bk.)
9783030899110 (print)
3030899128 (electronic bk.)
9783030899110 (print)
Published
Cham, Switzerland : Springer, [2022]
Language
English
Description
1 online resource (xii, 871 pages) : illustrations (some color)
Item Number
10.1007/978-3-030-89912-7 doi
Call Number
QA75.5 .F8823 2021eb
Dewey Decimal Classification
004
Summary
This book provides the state-of-the-art intelligent methods and techniques for solving real world problems along with a vision of the future research. The sixth Future Technologies Conference 2021 was organized virtually and received a total of 531 submissions from academic pioneering researchers, scientists, industrial engineers, and students from all over the world. The submitted papers covered a wide range of important topics including but not limited to technology trends, computing, artificial intelligence, machine vision, communication, security, e-learning and ambient intelligence and their applications to the real world. After a double-blind peer-reviewed process, 191 submissions have been selected to be included in these proceedings. One of the meaningful and valuable dimensions of this conference is the way it brings together a large group of technology geniuses in one venue to not only present breakthrough research in future technologies but also to promote discussions and debate of relevant issues, challenges, opportunities, and research findings. We hope that readers find the volume interesting, exciting, and inspiring.
Note
Includes author index.
Access Note
Access limited to authorized users.
Digital File Characteristics
text file
PDF
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed October 28, 2021).
Added Author
Series
Lecture notes in networks and systems ; v. 360. 2367-3389
Available in Other Form
Print version: 9783030899110
Print version: 9783030899134
Print version: 9783030899134
Linked Resources
Record Appears in
Table of Contents
The Effectiveness of Outsourcing Cybersecurity Practices: A Study of the Italian Context
Evaluation of System Features Used for Malware Detection
Security Analysis of Zhang et al. Authenticated Encryption Scheme
Efficient Secret Sharing-based Partial Matching Search using Error Correction Code
Double-extortion Ransomware: A Technical Analysis of Maze Ransomware
Best Practices for Cloud Data Protection and Key Management
Hybrid Firefly and Swarm Algorithms for Breast Cancer Mammograms Classification based on Rough Set Theory Features Selection.
Evaluation of System Features Used for Malware Detection
Security Analysis of Zhang et al. Authenticated Encryption Scheme
Efficient Secret Sharing-based Partial Matching Search using Error Correction Code
Double-extortion Ransomware: A Technical Analysis of Maze Ransomware
Best Practices for Cloud Data Protection and Key Management
Hybrid Firefly and Swarm Algorithms for Breast Cancer Mammograms Classification based on Rough Set Theory Features Selection.