LEADER 01537nam 2200361Ia 450 001 996397267203316 005 20221108074916.0 035 $a(CKB)4940000000060372 035 $a(EEBO)2248553521 035 $a(OCoLC)9920178200971 035 $a(EXLCZ)994940000000060372 100 $a19900521d1627 uy | 101 0 $aeng 135 $aurbn||||a|bb| 200 12$aA iournall, and relation of the action which by His Maiesties commandement, Edward Lord Cecil, baron of Putney, and Vicount of Wimbledon, admirall, and lieutenant generall of His Maiesties forces, did vndertake vpon the coast of Spaine, 1625$b[electronic resource] 210 $a[London? $cElliot's Court Press?]$d1627 215 $a[2], 30 p 300 $aPublisher suggested by STC (2nd ed.). 300 $aSignatures: A-D?. 300 $aImperfect: cropped. 300 $aReproduction of original in the British Library. 330 $aeebo-0018 606 $aCadiz Expedition, 1625 607 $aGreat Britain$xHistory, Naval$yStuarts, 1603-1714 615 0$aCadiz Expedition, 1625. 700 $aWimbledon$b Edward Cecil$cViscount,$f1572-1638.$01001769 801 0$bEBL 801 1$bEBL 801 2$bWaOLN 906 $aBOOK 912 $a996397267203316 996 $aA iournall, and relation of the action which by His Maiesties commandement, Edward Lord Cecil, baron of Putney, and Vicount of Wimbledon, admirall, and lieutenant generall of His Maiesties forces, did vndertake vpon the coast of Spaine, 1625$92301468 997 $aUNISA LEADER 04644nam 22006015 450 001 9910659483603321 005 20250627130250.0 010 $a9783031196089$b(electronic bk.) 010 $z9783031196072 024 7 $a10.1007/978-3-031-19608-9 035 $a(MiAaPQ)EBC7193353 035 $a(Au-PeEL)EBL7193353 035 $a(CKB)26105674300041 035 $a(DE-He213)978-3-031-19608-9 035 $a(PPN)268204888 035 $a(EXLCZ)9926105674300041 100 $a20230208d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aBig Data, Cloud Computing, and Data Science Engineering /$fedited by Roger Lee 205 $a1st ed. 2023. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2023. 215 $a1 online resource (190 pages) 225 1 $aStudies in Computational Intelligence,$x1860-9503 ;$v1075 300 $aIncludes index. 311 08$aPrint version: Lee, Roger Big Data, Cloud Computing, and Data Science Engineering Cham : Springer International Publishing AG,c2023 9783031196072 327 $aResearch on Development of Sponsorship Effect Analysis Module Using Text Mining Technique -- A Study on the Relationship between ESG News Keywords and ESG Ratings -- Development of Associated Company Network Visualiza-tion Techniques using Company Product and Service In-formation ? Using Cosine Similarity Function -- Hybrid CNN-LSTM based time series data prediction model study -- A Study on Predicting Employee Attrition Using Machine Learning -- A study on the Intention to continue using a Highway Driving assistance (HDA) system based on Advanced Driver Assistance System (ADAS) -- Security Policy Deploying System for Zero Trust Environment -- TTY Session Audit Techniques for Linux Platform1 -- A Study on the Role of Higher Education and Human Re-sources Development for Data Driven AI Society -- The Way Forward for Security Vulnerability Disclosure Policy: Comparative Analysis of US, EU, and Nether-lands -- Study on Government Data Governance Framework: based on the National Data Strategy in theUS, the UK, Australia, and Japan -- A Study on the Attack Index Packet Filtering Algorithm Based on Web Vulnerability -- Analysis of IoT research topics using LDA Modeling -- Log4j Vulnerability Analysis and Detection Pattern Pro-duction Technology based on Snort Rules -- A Study on Technology Innovation at Incheon International Airport: Focusing on RAISA. 330 $aThis book presents scientific results of the 7th IEEE/ACIS International Conference on Big Data, Cloud Computing, Data Science & Engineering (BCD 2021) which was held on August 4-6, 2022 in Danang, Vietnam. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. All aspects (theory, applications, and tools) of computer and information science, the practical challenges encountered along the way, and the solutions adopted to solve them are all explored here in the results of the articles featured in this book. The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the program committee and underwent further rigorous rounds of review. From this second round of review, 15 of the conference?s most promising papers are then published in this Springer (SCI) book and not the conference proceedings. We impatiently await the important contributions that we know these authors will bring to the field of computer and information science. 410 0$aStudies in Computational Intelligence,$x1860-9503 ;$v1075 606 $aEngineering$xData processing 606 $aComputational intelligence 606 $aBig data 606 $aData Engineering 606 $aComputational Intelligence 606 $aBig Data 615 0$aEngineering$xData processing. 615 0$aComputational intelligence. 615 0$aBig data. 615 14$aData Engineering. 615 24$aComputational Intelligence. 615 24$aBig Data. 676 $a005.7 676 $a005.7 702 $aLee$b Roger 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9910659483603321 996 $aBig Data, Cloud Computing, and Data Science Engineering$92853075 997 $aUNINA