LEADER 02581nam 2200565 450 001 9910809001303321 005 20230126212232.0 010 $a1-4438-6710-1 035 $a(CKB)2670000000568533 035 $a(EBL)1790906 035 $a(SSID)ssj0001408782 035 $a(PQKBManifestationID)11766405 035 $a(PQKBTitleCode)TC0001408782 035 $a(PQKBWorkID)11352995 035 $a(PQKB)11562693 035 $a(MiAaPQ)EBC1790906 035 $a(Au-PeEL)EBL1790906 035 $a(CaPaEBR)ebr10934879 035 $a(CaONFJC)MIL645724 035 $a(OCoLC)891446584 035 $a(EXLCZ)992670000000568533 100 $a20141003h20132013 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aDalit women and dropout rates in collegiate education $ea study of the Warangal District of Andhra Pradesh /$fby Silveru Harinath 210 1$aNewcastle upon Tyne, England :$cCambridge Scholars Publishing,$d2013. 210 4$dİ2013 215 $a1 online resource (102 p.) 300 $aDescription based upon print version of record. 311 $a1-4438-4454-3 311 $a1-322-14469-9 320 $aIncludes bibliographical references. 327 $aTABLE OF CONTENTS; ACKNOWLEDGEMENTS; ABBREVIATIONS; CHAPTER ONE - INTRODUCTION; CHAPTER TWO - REVIEW OF LITERATURE; CHAPTER THREE - COLLEGIATE EDUCATION AND THE SOCIO-ECONOMIC PROFILE OF DALIT WOMEN IN PALAKURTY MANDAL; CHAPTER FOUR - DALIT WOMEN IN COLLEGIATE EDUCATION; CHAPTER FIVE - CONCLUSION; BIBLIOGRAPHY; QUESTIONNAIRE 330 $aCaste is an inescapable aspect in terms of education in the Indian state, as it is in many other aspects of public life. Education standards have changed throughout the course of Indian history, but the subjugated Dalits, and particularly female children belonging to this caste, still face the hurdles of caste discrimination in society and in the education sector in particular. Despite introducing state education policies, the scale and size of these policies have not resulted in an increase ... 606 $aDalit women$zIndia$zAndhra Pradesh$xSocial conditions 606 $aDalit women$zIndia$zAndhra Pradesh 615 0$aDalit women$xSocial conditions. 615 0$aDalit women 676 $a305.420954 700 $aHarinath$b Silveru$01626504 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910809001303321 996 $aDalit women and dropout rates in collegiate education$93962575 997 $aUNINA LEADER 07137nam 22006495 450 001 996668468003316 005 20250724130248.0 010 $a981-9698-72-3 024 7 $a10.1007/978-981-96-9872-1 035 $a(MiAaPQ)EBC32234556 035 $a(Au-PeEL)EBL32234556 035 $a(CKB)39710507000041 035 $a(DE-He213)978-981-96-9872-1 035 $a(EXLCZ)9939710507000041 100 $a20250724d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvanced Intelligent Computing Technology and Applications $e21st International Conference, ICIC 2025, Ningbo, China, July 26?29, 2025, Proceedings, Part IV /$fedited by De-Shuang Huang, Wei Chen, Yijie Pan, Haiming Chen 205 $a1st ed. 2025. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2025. 215 $a1 online resource (895 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15845 311 08$a981-9698-71-5 327 $a -- Information Security -- DDos Attack Identification Based on Temporal Features. -- An Intonation-Based Black-Box Generative Adversarial Attack Method for Audio. -- RanHunter: Advancing Ransomware Detection with Channel Attention and Multi-Head Attention. -- Cellular-Snooper: A General and Real-Time Mobile Application Fingerprinting Attack in LTE Networks. -- True or False? Dually Perceiving Relevance of Source Post and Comment Flow for Rumor Detection. -- Explanation-Inspired Transferable Adversarial Attacks with Layer-Wise Increment Decomposition. -- CNN-DST-IDS: CNN and D-S Evidence Theory Based Intrusion Detection System. -- PPAGAN: A Privacy-Preserving Self-Attention GAN Framework for Image Synthesis. -- ADPF: Adversarial Sample Detection Based on Prediction Feature. -- MvSMIA: Multi-View Source Membership Inference Attack in Federated Learning. -- RDP-FedAB: A Federated Learning Framework Balancing Privacy Protection and Model Performance. -- Transferable Adversarial Attacks via Diffusion-Based Keyword Embedding and Latent Optimization. -- Optimization of IoUT Systems: A Hierarchical Federated Transfer Learning Approach Based on UAV Computation Offloading. -- Malicious Encrypted Traffic Detection with Transformer and Dual-Layer Meta-Update Incremental Learning. -- ElevPatch: An Adversarial Patch Attack Scheme Based on YOLO11 Object Detector. -- MetaSSL-ETD: Robust Detection of Malicious Encrypted Traffic Based on Semi-Supervised Meta-Learning. -- A Steganalysis Framework for Enhancing Model Generalization Performance. -- Frequency-Aware Purification: A Black-box Defense against Backdoor Attacks. -- Stealthy Backdoors in Vertical Federated Learning. -- CTI-Shapley: An ATT&CK-Guided Enhanced Shapley Value Mechanism for Benefit Distribution in Cyber Threat Intelligence Sharing. -- Distributed Cumulative Gradient Backdoor Attack Against Federated Learning. -- MSIAA: Multi-Scale Inversion Adversarial Attack on Face Recognition. -- Leveraging Fine-Tuned Large Language Models for Device Fingerprint Extraction in IoT Security. -- MICD: Deepfake Detection with Masked Identity Consistency Detector. -- PGAE: A Perturbed Graph Autoencoder Integrating Explicit and Implicit Features for APT Detection. -- Durability-Optimized Model Poisoning Attack against Federated Learning Systems. -- Explainable Machine Learning Models for Phishing Website Detection: Enhancing Transparency and Accuracy in Cybersecurity. -- FRIFL: A Fair and Robust Incentive Mechanism for Heterogeneous Federated Learning. -- Reversible Data Hiding for 3D Mesh Models in Encrypted Domain Based on Adaptive MSB and Difference Prediction. -- FedFIP: A Personalized Federated Learning Optimization Method with Differential Privacy Protection. -- ProAnalyzer: Inferring Network Service's Fuzzing Format with Grey-box Metric. -- Research on Differential Privacy in Personalized Heterogeneous Federated Learning Based on Fisher Information Matrix. -- APFedEmb: An Adaptive and Personalized Federated Knowledge Graph Embedding Framework for Link Prediction. -- Federated Knowledge Collaborative Recommendation System with Privacy Preserving. -- Towards Reliable Detection of Malicious DNS-over-HTTPS (DoH) Tunneling Traffic under Low-quality Training Data. -- Ensemble Partitioning: A Defense Mechanism Against Membership Inference Attacks in ML Models. -- A Trusted Computing Power Network Scheduling Algorithm Based on Federated Learning. -- Secure Outsourced Matrix Multiplication of Floating Point Numbers. -- Research on Synthetic Trajectory Data Publication Resisting Location Inference Attacks Based on Differential Privacy. -- Alias6: An IPv6 Alias Resolution Technology Based on Multiple Fingerprint Features. -- Update Recovery Attacks on Two-Dimensional Encrypted Databases: Exploiting Volume Pattern Leakage in Range Queries. -- VulPelican: an LLM and Interactive Static Analysis Tool Based Vulnerability Detection Framework. -- Energy-aware Task Scheduling Using DVFS and On/Off Switching in Data Center. 330 $aThis 20-volume set LNCS 15842-15861 constitutes - in conjunction with the 4-volume set LNAI 15862-15865 and the 4-volume set LNBI 15866-15869 - the refereed proceedings of the 21st International Conference on Intelligent Computing, ICIC 2025, held in Ningbo, China, during July 26-29, 2025. The total of 1206 regular papers were carefully reviewed and selected from 4032 submissions. This year, the conference concentrated mainly on the theories and methodologies as well as the emerging applications of intelligent computing. Its aim was to unify the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. Therefore, the theme for this conference was "Advanced Intelligent Computing Technology and Applications". 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15845 606 $aComputational intelligence 606 $aComputer networks 606 $aMachine learning 606 $aApplication software 606 $aComputational Intelligence 606 $aComputer Communication Networks 606 $aMachine Learning 606 $aComputer and Information Systems Applications 615 0$aComputational intelligence. 615 0$aComputer networks. 615 0$aMachine learning. 615 0$aApplication software. 615 14$aComputational Intelligence. 615 24$aComputer Communication Networks. 615 24$aMachine Learning. 615 24$aComputer and Information Systems Applications. 676 $a006.3 700 $aHuang$b De-Shuang$01732604 701 $aChen$b Wei$0636150 701 $aPan$b Yijie$01758608 701 $aChen$b Haiming$01833175 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996668468003316 996 $aAdvanced Intelligent Computing Technology and Applications$94409129 997 $aUNISA