Innovations of Intelligent Informatics, Networking, and Cybersecurity

Innovations of Intelligent Informatics, Networking, and Cybersecurity

Second International Conference, 3INC 2024, Babylon, Iraq, October 15-16, 2024, Proceedings

Bhaya, Wesam S.; Al-Mamory, Safaa O.; Al-Ajeli, Ahmed; Albahri, Ahmed S.; Alrashid, Sura Zaki; Alshamery, Eman S.; Abdullah, Alharith A.; Kanakis, Triantafyllos; Al-Sherbaz, Ali

Springer International Publishing AG

02/2025

229

Mole

9783031810640

Pré-lançamento - envio 15 a 20 dias após a sua edição

Descrição não disponível.
.- Information System.

.- Localization in WSNs Based On Machine Learning Approach.

.- Improved Clustering-Based Feature Selection Using Feature Extraction Based On Principal Component Analysis.

.- Computing Methodologies.

.- Real-Time Arabic Speech Recognition from Lips Movement Based On Deep Learning.

.- Parkinson's Disease Prediction and Progression Based On Voice Analysis: A Literature Survey.

.- BGWO-Based Classification of Parkinson's Disease Via MEG Signnals.

.- Enhancing Twitter Comment Classification Using Convolutional Neural Networks and Support Vector Machines.

.- High-Stakes Deception Detection Leveraging 3D Facial Landmarks.

.- Enhancement of Low Light Images Using Residual Deep Learning.

.- Hybrid Model for Hospital Services Quality Prediction Based On Patient Viewpoint.

.- Security and privacy.

.- Advanced Text Vectorization and Deep Learning Models for Enhanced Fake News Detection On Social Media.

.- Utilizing Graph Neural Networks for The Detection of Fake News Through Analysis of Relationships Among Various Social Media Entities.

.- Classification of Internet of Things Cybersecurity Attacks Using a Hybrid Deep Learning Approach.

.- Hybrid Multimodal Biometric Identification System: Integrating Face and Palmprint Traits Through Feature-Level Fusion.

.- Improving Machine Learning-Based Intrusion Detection Systems: A Comparative Study On NSL-KDD Dataset.

.- Enhancing Penetration Testing: Leveraging Machine Learning for Ethical Hacking.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Computing Methodologies;Security and Privacy;Information Systems;Intrusion Detection;Biometric;Feature Selection;Recognition;Classification;Social Media;Penetration Testing