Intelligent Computing and Applications: Proceedings of ICDIC 2020
Gespeichert in:
Weitere Verfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Singapore
Springer Nature Singapore
2023
Singapore Springer |
Ausgabe: | 1st ed. 2023 |
Schriftenreihe: | Smart Innovation, Systems and Technologies
315 |
Schlagworte: | |
Online-Zugang: | BFB01 BTU01 FAW01 FFW01 FHA01 FHD01 FHI01 FHM01 FHN01 FHR01 FKE01 FWS01 FWS02 HTW01 TUM01 UBY01 UER01 UPA01 Volltext |
Beschreibung: | 1 Online-Ressource (XVIII, 505 p. 279 illus., 222 illus. in color) |
ISBN: | 9789811941627 |
ISSN: | 2190-3026 |
DOI: | 10.1007/978-981-19-4162-7 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV048603504 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 221212s2023 |||| o||u| ||||||eng d | ||
020 | |a 9789811941627 |c Online |9 978-981-1941-62-7 | ||
024 | 7 | |a 10.1007/978-981-19-4162-7 |2 doi | |
035 | |a (ZDB-2-INR)9789811941627 | ||
035 | |a (OCoLC)1355300828 | ||
035 | |a (DE-599)BVBBV048603504 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-1028 |a DE-1046 |a DE-Aug4 |a DE-898 |a DE-523 |a DE-859 |a DE-29 |a DE-863 |a DE-1050 |a DE-862 |a DE-92 |a DE-522 |a DE-573 |a DE-M347 |a DE-706 |a DE-739 |a DE-634 | ||
082 | 0 | |a 006.3 |2 23 | |
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Intelligent Computing and Applications |b Proceedings of ICDIC 2020 |c edited by B. Narendra Kumar Rao, R. Balasubramanian, Shiuh-Jeng Wang, Richi Nayak |
250 | |a 1st ed. 2023 | ||
264 | 1 | |a Singapore |b Springer Nature Singapore |c 2023 | |
264 | 1 | |a Singapore |b Springer | |
300 | |a 1 Online-Ressource (XVIII, 505 p. 279 illus., 222 illus. in color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Smart Innovation, Systems and Technologies |v 315 |x 2190-3026 | |
650 | 4 | |a Computational Intelligence | |
650 | 4 | |a Data Mining and Knowledge Discovery | |
650 | 4 | |a Data and Information Security | |
650 | 4 | |a Mobile and Network Security | |
650 | 4 | |a Computer and Information Systems Applications | |
650 | 4 | |a Computational intelligence | |
650 | 4 | |a Data mining | |
650 | 4 | |a Data protection | |
650 | 4 | |a Computer networks—Security measures | |
650 | 4 | |a Application software | |
700 | 1 | |a Rao, B. Narendra Kumar |4 edt | |
700 | 1 | |a Balasubramanian, R. |4 edt | |
700 | 1 | |a Wang, Shiuh-Jeng |4 edt | |
700 | 1 | |a Nayak, Richi |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-981-1941-61-0 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-981-1941-63-4 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-981-1941-64-1 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-981-19-4162-7 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-INR | ||
940 | 1 | |q ZDB-2-INR_2023 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-033978979 | ||
966 | e | |u https://doi.org/10.1007/978-981-19-4162-7 |l BFB01 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-4162-7 |l BTU01 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-4162-7 |l FAW01 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-4162-7 |l FFW01 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-4162-7 |l FHA01 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-4162-7 |l FHD01 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-4162-7 |l FHI01 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-4162-7 |l FHM01 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-4162-7 |l FHN01 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-4162-7 |l FHR01 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-4162-7 |l FKE01 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-4162-7 |l FWS01 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-4162-7 |l FWS02 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-4162-7 |l HTW01 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-4162-7 |l TUM01 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-4162-7 |l UBY01 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-4162-7 |l UER01 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-4162-7 |l UPA01 |p ZDB-2-INR |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 1020986 |
---|---|
_version_ | 1806174858307960832 |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Rao, B. Narendra Kumar Balasubramanian, R. Wang, Shiuh-Jeng Nayak, Richi |
author2_role | edt edt edt edt |
author2_variant | b n k r bnk bnkr r b rb s j w sjw r n rn |
author_facet | Rao, B. Narendra Kumar Balasubramanian, R. Wang, Shiuh-Jeng Nayak, Richi |
building | Verbundindex |
bvnumber | BV048603504 |
classification_tum | DAT 000 |
collection | ZDB-2-INR |
ctrlnum | (ZDB-2-INR)9789811941627 (OCoLC)1355300828 (DE-599)BVBBV048603504 |
dewey-full | 006.3 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.3 |
dewey-search | 006.3 |
dewey-sort | 16.3 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-981-19-4162-7 |
edition | 1st ed. 2023 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03918nmm a2200781zcb4500</leader><controlfield tag="001">BV048603504</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">221212s2023 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789811941627</subfield><subfield code="c">Online</subfield><subfield code="9">978-981-1941-62-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-981-19-4162-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-INR)9789811941627</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1355300828</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048603504</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-1028</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.3</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Intelligent Computing and Applications</subfield><subfield code="b">Proceedings of ICDIC 2020</subfield><subfield code="c">edited by B. Narendra Kumar Rao, R. Balasubramanian, Shiuh-Jeng Wang, Richi Nayak</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2023</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">Springer Nature Singapore</subfield><subfield code="c">2023</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVIII, 505 p. 279 illus., 222 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Smart Innovation, Systems and Technologies</subfield><subfield code="v">315</subfield><subfield code="x">2190-3026</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Mining and Knowledge Discovery</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data and Information Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile and Network Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer and Information Systems Applications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data mining</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks—Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rao, B. Narendra Kumar</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Balasubramanian, R.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Shiuh-Jeng</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nayak, Richi</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-1941-61-0</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-1941-63-4</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-1941-64-1</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-981-19-4162-7</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-INR</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-INR_2023</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033978979</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-4162-7</subfield><subfield code="l">BFB01</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-4162-7</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-4162-7</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-4162-7</subfield><subfield code="l">FFW01</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-4162-7</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-4162-7</subfield><subfield code="l">FHD01</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-4162-7</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-4162-7</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-4162-7</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-4162-7</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-4162-7</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-4162-7</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-4162-7</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-4162-7</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-4162-7</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-4162-7</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-4162-7</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-4162-7</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV048603504 |
illustrated | Not Illustrated |
index_date | 2024-07-03T21:10:43Z |
indexdate | 2024-08-01T10:56:12Z |
institution | BVB |
isbn | 9789811941627 |
issn | 2190-3026 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033978979 |
oclc_num | 1355300828 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-1028 DE-1046 DE-Aug4 DE-898 DE-BY-UBR DE-523 DE-859 DE-29 DE-863 DE-BY-FWS DE-1050 DE-862 DE-BY-FWS DE-92 DE-522 DE-573 DE-M347 DE-706 DE-739 DE-634 |
owner_facet | DE-91 DE-BY-TUM DE-1028 DE-1046 DE-Aug4 DE-898 DE-BY-UBR DE-523 DE-859 DE-29 DE-863 DE-BY-FWS DE-1050 DE-862 DE-BY-FWS DE-92 DE-522 DE-573 DE-M347 DE-706 DE-739 DE-634 |
physical | 1 Online-Ressource (XVIII, 505 p. 279 illus., 222 illus. in color) |
psigel | ZDB-2-INR ZDB-2-INR_2023 |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Springer Nature Singapore Springer |
record_format | marc |
series2 | Smart Innovation, Systems and Technologies |
spellingShingle | Intelligent Computing and Applications Proceedings of ICDIC 2020 Computational Intelligence Data Mining and Knowledge Discovery Data and Information Security Mobile and Network Security Computer and Information Systems Applications Computational intelligence Data mining Data protection Computer networks—Security measures Application software |
title | Intelligent Computing and Applications Proceedings of ICDIC 2020 |
title_auth | Intelligent Computing and Applications Proceedings of ICDIC 2020 |
title_exact_search | Intelligent Computing and Applications Proceedings of ICDIC 2020 |
title_exact_search_txtP | Intelligent Computing and Applications Proceedings of ICDIC 2020 |
title_full | Intelligent Computing and Applications Proceedings of ICDIC 2020 edited by B. Narendra Kumar Rao, R. Balasubramanian, Shiuh-Jeng Wang, Richi Nayak |
title_fullStr | Intelligent Computing and Applications Proceedings of ICDIC 2020 edited by B. Narendra Kumar Rao, R. Balasubramanian, Shiuh-Jeng Wang, Richi Nayak |
title_full_unstemmed | Intelligent Computing and Applications Proceedings of ICDIC 2020 edited by B. Narendra Kumar Rao, R. Balasubramanian, Shiuh-Jeng Wang, Richi Nayak |
title_short | Intelligent Computing and Applications |
title_sort | intelligent computing and applications proceedings of icdic 2020 |
title_sub | Proceedings of ICDIC 2020 |
topic | Computational Intelligence Data Mining and Knowledge Discovery Data and Information Security Mobile and Network Security Computer and Information Systems Applications Computational intelligence Data mining Data protection Computer networks—Security measures Application software |
topic_facet | Computational Intelligence Data Mining and Knowledge Discovery Data and Information Security Mobile and Network Security Computer and Information Systems Applications Computational intelligence Data mining Data protection Computer networks—Security measures Application software |
url | https://doi.org/10.1007/978-981-19-4162-7 |
work_keys_str_mv | AT raobnarendrakumar intelligentcomputingandapplicationsproceedingsoficdic2020 AT balasubramanianr intelligentcomputingandapplicationsproceedingsoficdic2020 AT wangshiuhjeng intelligentcomputingandapplicationsproceedingsoficdic2020 AT nayakrichi intelligentcomputingandapplicationsproceedingsoficdic2020 |