Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
This book features selected papers from the International Conference on Information Technology and Intelligence (ITI 2024), organized by Dr. B. R. Ambedkar Institute of Technology, Andaman and Nicobar, India, during October 2024. The book is a collection of the state-of-the art research work in the cutting-edge technologies. This would provide an opportunity to gather scientific research work related to the artificial intelligence, data science and applications, cybersecurity, internet of things (IOT), cloud computing, information retrieval and knowledge management.
Dr. Harish Sharma is an Associate professor at Rajasthan Technical University, Kota in the Department of Computer Science & Engineering since 2014. He has worked as an Assistant professor at Govt. Engg. College Jhalawar and Vardhman Mahaveer Open University Kota India. He is the secretary and one of the founder members of the Soft Computing Research Society of India. He is a lifetime member of the Cryptology Research Society of India, ISI, Kolkata. He has contributed to more than 125 papers published in various international journals and conferences. He has been listed among the world's 2% top scientists in 2020 and 2021. He has completed 8 DST-SERB and AICTE-TEQIP-funded projects and has published 02 patents. He is the series editor of springer book series "Studies in Smart Technologies". He is an Associate Editor of "The International Journal of Swarm Intelligence (IJSI)" published by Inderscience. He has also edited many special issues of the reputed journals. His primary area of interest is nature-inspired optimization techniques.
Dr. Antorweep Chakravorty is an Associate Professor at the University of Stavanger. His current research and development work is in the field of applied Blockchains, Big Data, Large Scale Machine Learning, and Data Privacy. He has an interest in real-world problems, especially development of privacy enabled data-driven services in smart energy, healthcare, and smart city domains. Antorweep completed his PhD. in 2015 with a thesis on Privacy Preserving Big Data Analytics at the University of Stavanger, Norway. Along with having a background in applied research in data-driven solutions, he is also involved in mentoring, teaching and supervision.
Chapter 1: A Hybrid Model of Deep Transfer Learning and Feature Fusion for Diabetic Retinopathy Classification and Grading.- Chapter 2: A Blockchain-Based Digital Asset Management System for Collaborative Transactions.- Chapter3 : Design and Implementation of Matrix Multiplication Unit for Tensor Processing Unit.- Chapter 4: Optimizing Sarcasm Detection in Assamese using State-of-the-Art Transformer Model.- Chapter 5: Cyberbullying Detection in Assamese Social Media: A Comparative Study of BiGRU and CNN Models.- Chapter 6: A Novel Federated Learning Approach to Memory-based Malware Detection Model using RMS Propagation and Sequential Classifier.- Chapter 7: DLA-HDD: A Novel Deep Learning Architecture for Early Heart Disease Detection.- Chapter 8: A Novel Revolutionizing Approach Sustainable Smart Education Practices for Autism Spectrum Disorder Kids using Virtual Reality.- Chapter 9: Energy Meter Monitoring using IOT.- Chapter 10: Deep Learning and Statistical Testing Approaches for Cyberattack Classification in Imbalanced Datasets.-
Dateiformat: PDFKopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.