Inventive computation and information technologies : proceedings of ICICIT 2021 / S. Smys, Valentina Emilia Balas, Ram Palanisamy, editors.
2022
T58.5 .I58 2021
Linked e-resources
Linked Resource
Online Access
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Inventive computation and information technologies : proceedings of ICICIT 2021 / S. Smys, Valentina Emilia Balas, Ram Palanisamy, editors.
ISBN
9789811667237 (electronic bk.)
9811667233 (electronic bk.)
9789811667220
9811667225
9811667233 (electronic bk.)
9789811667220
9811667225
Published
Singapore : Springer, [2022]
Copyright
©2022
Language
English
Description
1 online resource : illustrations (chiefly color).
Item Number
10.1007/978-981-16-6723-7 doi
Call Number
T58.5 .I58 2021
Dewey Decimal Classification
004
Summary
This book is a collection of best selected papers presented at the International Conference on Inventive Computation and Information Technologies (ICICIT 2021), organized during 12-13 August 2021. The book includes papers in the research area of information sciences and communication engineering. The book presents novel and innovative research results in theory, methodology and applications of communication engineering and information technologies.
Note
International conference proceedings.
Includes author index.
Includes author index.
Access Note
Access limited to authorized users.
Digital File Characteristics
text file PDF
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed February 3, 2022).
Series
Lecture notes in networks and systems ; v. 336. 2367-3389
Available in Other Form
Print version: 9789811667220
Linked Resources
Online Access
Record Appears in
Online Resources > Ebooks
All Resources
All Resources
Table of Contents
Sign Language Recognition: A Comparative Analysis of Deep Learning Models
A Tool to Extract Onion Links from Tor Hidden Services and Identify Illegal Activities
Image based Authentication Security Improvement by Randomized Selection Approach
Personalized Abstract Review Summarization using Personalized Key Information Guided Network.
A Tool to Extract Onion Links from Tor Hidden Services and Identify Illegal Activities
Image based Authentication Security Improvement by Randomized Selection Approach
Personalized Abstract Review Summarization using Personalized Key Information Guided Network.