LEADER 04091nam 22006855 450 001 9910484770603321 005 20251225173530.0 010 $a981-336-385-1 024 7 $a10.1007/978-981-33-6385-4 035 $a(CKB)4100000011867238 035 $a(MiAaPQ)EBC6533843 035 $a(Au-PeEL)EBL6533843 035 $a(OCoLC)1245673813 035 $a(PPN)255290306 035 $a(BIP)79763477 035 $a(BIP)78407869 035 $a(DE-He213)978-981-33-6385-4 035 $a(EXLCZ)994100000011867238 100 $a20210402d2021 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Science and Applications $eProceedings of ICISA 2020 /$fedited by Hyuncheol Kim, Kuinam J. Kim, Suhyun Park 205 $a1st ed. 2021. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2021. 215 $a1 online resource (394 pages) 225 1 $aLecture Notes in Electrical Engineering,$x1876-1119 ;$v739 311 08$a981-336-384-3 327 $aExperience and prospects of tele-health technologies -- Exploring the Effects of Network Topology Layers on Quality of Service Mechanisms in the Context of Software-Defined Networking -- Image Background Subtraction and Partial Stylization based on Style Representation of Convolutional Neural Networks -- Multi-source log clustering in distributed systems -- A Study on Classification and Integration of Research on both AI and Security in the IoT Era -- Safe Internet: An Edutainment Tool for Teenagers -- Predictive Analytics Service for Security of Blockchain and Peer-to-Peer Payment Solutions -- Deterring SLCAs by Establishment of ACSC based on IPP YoungYungShin 9.30 -- Research on life cycle model of data for handling Big Data-based security incident -- Feature Selection Based on a Shallow Convolutional Neural Network and Saliency Maps on Metagenomic Data. 330 $aThis book presents select proceedings of 11th International Conference on Information Science and Applications 2020 (ICISA 2020) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. Also the proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this book, readers can gain an understanding of the current state-of-the-art information strategies and technologies of convergence security. 410 0$aLecture Notes in Electrical Engineering,$x1876-1119 ;$v739 606 $aApplication software 606 $aTelecommunication 606 $aData protection 606 $aComputational intelligence 606 $aComputer and Information Systems Applications 606 $aCommunications Engineering, Networks 606 $aData and Information Security 606 $aComputational Intelligence 615 0$aApplication software. 615 0$aTelecommunication. 615 0$aData protection. 615 0$aComputational intelligence. 615 14$aComputer and Information Systems Applications. 615 24$aCommunications Engineering, Networks. 615 24$aData and Information Security. 615 24$aComputational Intelligence. 676 $a004 702 $aKim$b Hyuncheol 702 $aKim$b Kuinam J. 702 $aPark$b Suhyun 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484770603321 996 $aInformation Science and Applications$91465921 997 $aUNINA