001472111 000__ 06592cam\\2200769\i\4500 001472111 001__ 1472111 001472111 003__ OCoLC 001472111 005__ 20230908003330.0 001472111 006__ m\\\\\o\\d\\\\\\\\ 001472111 007__ cr\un\nnnunnun 001472111 008__ 230730s2023\\\\si\a\\\\o\\\\\101\0\eng\d 001472111 019__ $$a1391442754 001472111 020__ $$a9789819933150$$q(electronic bk.) 001472111 020__ $$a9819933153$$q(electronic bk.) 001472111 020__ $$z9789819940707 001472111 020__ $$z9819940702 001472111 0247_ $$a10.1007/978-981-99-3315-0$$2doi 001472111 035__ $$aSP(OCoLC)1391434279 001472111 040__ $$aYDX$$beng$$erda$$epn$$cYDX$$dGW5XE$$dEBLCP$$dOCLCQ 001472111 049__ $$aISEA 001472111 050_4 $$aQA75.5 001472111 08204 $$a004$$223/eng/20230801 001472111 1112_ $$aInternational Conference on Innovative Computing and Communications$$n(6th :$$d2023 :$$cNew Delhi, India) 001472111 24510 $$aInternational Conference on Innovative Computing and Communications :$$bproceedings of ICICC 2023.$$nVolume 1 /$$cAboul Ella Hassanien, Oscar Castillo, Sameer Anand, Ajay Jaiswal, editors. 001472111 24630 $$aICICC 2023 001472111 264_1 $$aSingapore :$$bSpringer,$$c[2023] 001472111 264_4 $$c©2023 001472111 300__ $$a1 online resource (xxvii, 895 pages) :$$billustrations (chiefly color). 001472111 336__ $$atext$$btxt$$2rdacontent 001472111 337__ $$acomputer$$bc$$2rdamedia 001472111 338__ $$aonline resource$$bcr$$2rdacarrier 001472111 4901_ $$aLecture notes in networks and systems ;$$vvolume 703 001472111 500__ $$aInternational conference proceedings. 001472111 500__ $$aIncludes author index. 001472111 5050_ $$aIntro -- Preface -- Contents -- Editors and Contributors -- High-Level Deep Features and Convolutional Neural Network for Evaluating the Classification Performance of File Cluster Types -- 1 Introduction -- 2 Related Work -- 3 Methods and Materials -- 3.1 Features Extraction -- 3.2 Kernel Functions -- 3.3 Extreme Learning Machine (ELM) Method -- 3.4 SVM (Support Vector Machine) Method -- 3.5 Datasets Description -- 3.6 Evaluation Metrics -- 4 Testing and Results -- 5 Conclusion -- References -- Securing the Networks Against DDoS Attacks Using Blockchain Technology -- 1 Introduction 001472111 5058_ $$a2 Related Work -- 3 Proposed System -- 4 Implementation and Result -- 5 Evaluation -- 6 Conclusion -- References -- A Machine Vision-Based Approach for Tuberculosis Identification in Chest X-Rays Images of Patients -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Result and Discussion -- 5 Conclusion -- References -- Prediction of Patients' Incurable Diseases Utilizing Deep Learning Approach -- 1 Introduction -- 2 Literature Review -- 3 Description of the Dataset and the Model -- 4 Framework for the Suggested Work -- 5 The KNN -- 6 Decision Tree -- 7 Deep Learning 001472111 5058_ $$a8 Evaluation of the Method -- 9 The Discussion and Analysis of the Results -- 10 Conclusion -- References -- Real-Time Control of Humanoid Robotic Arm Motion Using IT2FLC Based on Kinect Sensor -- 1 Introduction -- 2 Components and Methodology -- 2.1 HRA Model -- 2.2 Kinect Camera -- 2.3 The Controller Design -- 3 Results -- 3.1 Calculation Results -- 3.2 Simulation and Implementation Results -- 4 Discussion and Conclusion -- References -- Blockchain-Based Access Control with Decentralized Architecture for Data Storage and Transfer -- 1 Introduction -- 1.1 Controlled Entry via Blockchain 001472111 5058_ $$a1.2 Model for Safeguarding Data -- 1.3 Internet-Hosted Blockchain with Built-In Security Access Controls -- 1.4 Significant Obstacles -- 2 Survey of the Related Research -- 3 Methodology -- 3.1 Methodology Typically Used When Exchanging Sensitive Information -- 4 Results and Analysis -- 5 Conclusion -- References -- Effective Strategies for Resource Allocation and Scheduling in Cloud Computing -- 1 Introduction -- 2 Literature Survey -- 2.1 Existing System -- 3 Methodology for the Study -- 3.1 Studying with CloudSim -- 3.2 Proposed Cloud Model -- 3.3 Indictor of Performance 001472111 5058_ $$a4 Result and Discussion -- 5 Conclusion -- References -- A Brief Review Particle Swarm Optimization on Intrusion Detection System -- 1 Introduction -- 2 Literature Review -- 3 Dataset for IDS -- 4 Results -- 5 Discussion and Conclusion -- 6 Future Scope and Benefit Towards Society -- References -- CryptoDataMR: Enhancing the Data Protection Using Cryptographic Hash and Encryption/Decryption Through MapReduce Programming Model -- 1 Introduction -- 2 Related Works -- 3 Overall Proposed Framework -- 4 Secured Map Layer with Chain Rolling Double Hash Algorithm 001472111 506__ $$aAccess limited to authorized users. 001472111 520__ $$aThis book includes high-quality research papers presented at the Sixth International Conference on Innovative Computing and Communication (ICICC 2023), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on February 1718, 2023. Introducing the innovative works of scientists, professors, research scholars, students and industrial experts in the field of computing and communication, the book promotes the transformation of fundamental research into institutional and industrialized research and the conversion of applied exploration into real-time applications. 001472111 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed August 1, 2023). 001472111 650_0 $$aComputer science$$vCongresses. 001472111 650_0 $$aComputer networks$$vCongresses. 001472111 655_7 $$aConference papers and proceedings.$$2lcgft 001472111 655_0 $$aElectronic books. 001472111 7001_ $$aHassanien, Aboul Ella,$$eeditor. 001472111 7001_ $$aCastillo, Oscar,$$d1959-$$eeditor.$$1https://isni.org/isni/0000000121284194 001472111 7001_ $$aAnand, Sameer,$$eeditor. 001472111 7001_ $$aJaiswal, Ajay,$$eeditor. 001472111 7102_ $$aShaheed Sukhdev College of Business Studies (New Delhi, India),$$ehost institution. 001472111 77608 $$iPrint version: $$z9819940702$$z9789819940707$$w(OCoLC)1375994100 001472111 830_0 $$aLecture notes in networks and systems ;$$vv. 703. 001472111 852__ $$bebk 001472111 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-981-99-3315-0$$zOnline Access$$91397441.1 001472111 909CO $$ooai:library.usi.edu:1472111$$pGLOBAL_SET 001472111 980__ $$aBIB 001472111 980__ $$aEBOOK 001472111 982__ $$aEbook 001472111 983__ $$aOnline 001472111 994__ $$a92$$bISE