New Trends in Information and Communications Technology Applications : 7th National Conference, NTICT 2023, Baghdad, Iraq, December 20-21, 2023, Proceedings (Communications in Computer and Information Science)

個数:

New Trends in Information and Communications Technology Applications : 7th National Conference, NTICT 2023, Baghdad, Iraq, December 20-21, 2023, Proceedings (Communications in Computer and Information Science)

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 412 p.
  • 言語 ENG
  • 商品コード 9783031628139
  • DDC分類 004.6

Full Description

This book constitutes the refereed proceedings of the 7th National Conference on New Trends in Information and Communications Technology Applications, NTICT 2023, held in Baghdad, Iraq, during December 20-21, 2023.

The 28 full papers included in this book were carefully reviewed and selected from 92 submissions. They were organized in topical sections as follows: artificial intelligence and machine learning; and computer networks.

Contents

.- Artificial Intelligence and Machine Learning.

.- Nanoscale Communication Redefined: Exploring Bio-Inspired Molecular Systems.

.- Hybrid Edge Detection and SVD for Image Background Removal.

.- Multi-Objective Residential Load Scheduling Approach Based on Pelican Optimization Algorithm.

.- Incorporating Dilation Convolution into Mask Region Convolution Neural Network for Advanced Fruit Classification and Freshness Evaluation.

.- Adaptive Evolutionary Algorithm for Maximizing Social Influence.

.- Automatic Identification of Ear Patterns based on Convolutional Neural Network.

.- Enhancing Data Security with a Novel Color Encryption Algorithm Based on 5D Chaotic System and Delta Features for Dynamic Initialization.

.- Deepfake Detection Model Based on VGGFace with Head Pose Estimation Technique.

.- Multi-models based on Yolov8 for Identification of Vehicle Type and License Plate Recognition.

.- Face Identification System in Transform Domains over Secure Communication Channel.

.- Covid-19 Proteins Identification using Sequence Alignment for Protein-Protein Interaction Prediction.

.- Vehicle Logo Recognition Using Proposed Illumination Compensation and Six Local Moments.

.- Exploring Enhanced Recognition in Gesture Language Videos through Unsupervised Learning of Deep Autoencoder.

.- An Intelligent System for Monitoring Water Quality of Tigris River Using IOT and Machine Learning Techniques.

.- Crimes Tweet Detection based on CNN Hyperparameter Optimization Using Snake Optimizer.

.- Optimized Intelligent PID Controller for Propofol Dosing in General Anesthesia using Coati Optimization Algorithm.

.- Eye Movement Recognition: Exploring Trade-offs in Deep Learning Approaches with Development.

.- Enhancing the Early Prediction of Learners' Performance in a Virtual Learning Environment (VLE).

.- YOLOv8-AS: Masked Face Detection and Tracking Based on YOLOv8 with Attention Mechanism Model.

.- Symptom Principal Component Analysis (SPCA) for Dimensionality Reduction in Categorical Data: A Case Study on Breast Cancer.

.- An improved method for retrieving fashion images based on parsing the image contents.

.- Computer Networks.

.- A Robust Image Cipher System Based on Cramer-Shoup Algorithm and 5-D Hyper Chaotic System.

.- Variable-Length Key Generation Block Cipher Algorithm Based on DNA Tile Self-Assembly.

.- Performance Evaluation Comparison Between Central SDN network and DSDN.

.- Enhancing the Performance of Wireless Body Area Network Routing Protocols Based on Collaboratively Evaluated Values.

.- The impact of mobility models on ad-hoc networks: A review.

.- Authentication System Based On Zero-Knowledge Proof Employing The Rabin Cryptosystem And A Secret Sharing Schema.

.- A New Approach to Design KM1 Encryption Algorithm for Alarm in IoT.

最近チェックした商品