Big Data, Machine Learning, and Applications : Proceedings of the 2nd International Conference, BigDML 2021 / edited by Malaya Dutta Borah, Dolendro Singh Laiphrakpam, Nitin Auluck, Valentina Emilia Balas
Android application-based security surveillance implementing machine learning -- Realtime Object Distance Measurement Using Stereo Vision Image Processing -- An Insight on Drone Applications in Surveillance Domain -- Handwritten Mixed Numerals Classification System -- IoT Based Smart Farm Monitoring System -- An Extensive Review of the Supervised Learning Algorithms for Spiking Neural Networks -- Multitask learning based simultaneous facial gender and age recognition with a weighted loss function -- VISUALIZING CRIME HOTSPOTS BY ANALYSING ONLINE NEWSPAPER ARTICLES -- Applications of Machine Learning for Face Mask Detection during COVID-19 Pandemic -- A cascaded deep learning approach for detection and localization of crop-weeds in RGB images for oral presentation -- Ensemble of Deep Learning Enabled Tamil Handwritten Character Recognition Model -- A Comparative Study of Loss Functions for Deep Neural Networks in Time Series Analysis -- Learning Algorithm for Threshold Softmax Layer to Handle Unknown Class Problem -- Traffic Monitoring and Violation Detection using Deep Learning -- Conjugate Gradient Method for finding Optimal Parameters in Linear Regression -- Rugby ball detection, tracking and future trajectory prediction algorithm -- EARLY DETECTION OF HEART DISEASE USING FEATURE SELECTION AND CLASSIFICATION TECHNIQUES -- Gun Detection System for Surveillance Cameras using HOG assisted KNN classifier -- Optimized detection, classification and tracking with YOLOV5, HSV color thresholding and KCF tracking -- Covid-19 detection using chest X-ray images -- Comparative Analysis of LDA Algorithm for Low Resource Indian Languages with its Translated English Documents -- Text Style Transfer: A Comprehensive Study on Methodologies and Evaluation -- Classification of Hindustani Musical Ragas using One Dimensional Convolutional Neural Networks -- W-Tree: A Concept Correlation Tree for Data Analysis and Annotations -- Crawl Smart: A Domain Specific Crawler -- Evaluating the effect of leading indicators in customer churn prediction -- Classification of Skin Lesion Using Image Processing and ResNet50 -- Data Collection and Pre-Processing for Machine Learning-based Student Dropout Prediction -- Nested Named Entity Recognition in Multilingual Code-Switched NLP -- Deep Learning based Semantic Segmentation of Blood Cells from Microscopic Images -- A Partitioned Task Offloading Approach for Privacy Preservation at Edge -- Artificial Intelligence in Radiological Covid19 Detection: A State of the Art Review -- Anomaly Detection in SCADA Industrial Control Systems using Bi-directional Long Short-Term Memory -- Implementing Autonomous Navigation on an Omni Wheeled Robot Using 2D LiDAR, Tracking Camera and ROS -- Analysis of Deep Learning Models for Text Summarization of User Manuals -- Modelling Seismic Performance of Reinforced Concrete Buildings within Response Spectrum Framework -- A Survey on DDoS Detection using Deep Learning in Software Defined Networking -- A data driven approach to predict the risk of readmission among patients with Diabetes Mellitus -- Segmentation of dentin and enamel from panoramic dental Radiographic image (OPG) to detect tooth wear -- REVISITING FACIAL KEY POINT DETECTION - AN EFFICIENT APPROACH USING DEEP NEURAL NETWORKS -- A Hybrid Framework using Natural Language Processing and Collaborative Filtering for Performance Efficient Feedback Mining and Recommendation -- Facial Recognition based Automatic Attendance Management System using Deep Learning -- Improved Hamming-Space Based Nearest Neighbour Big Data Retrieval Algorithm -- Application of Infrared thermography in assessment of Diabetic foot anomalies: a treatise -- A Survey and Classification on Recommendation Systems -- Analysis of Synthetic Data Generation Techniques in Diabetes Prediction -- Beyond Information Exchange: An Approach to Deploy Network Properties for Information Diffusion -- Sentiment Analysis on worldwide COVID-19 outbreak -- Post Vaccination Risk Prediction of COVID-19: Machine Learning Approach -- Offensive Language Detection in Under-resourced Algerian Dialectal Arabic Language -- A Comparative Analysis of Modern Machine Learning Approaches for Automatic Classication of Scientic Articles -- A review of Machine Learning algorithms on different Breast cancer datasets -- The Online Behaviour of the Algerian Abusers in Social Media Networks -- Interactive Attention AI to translate low light photos to captions for night scene understanding in women safety -- AI visualization in Nanoscale Microscopy -- Convolutional Gated MLP: Combining Convolutions & gMLP -- Unique Covariate Identity (UCI) Detection for Emotion Recognition through EEG Signals -- A Simple and Effective Method for Segmenting Lung Regions from CT Scan Images using K-Means -- Risk-Based Portfolio Optimization on Some Selected Sectors of the Indian Stock Market..
This book constitutes refereed proceedings of the Second International Conference on Big Data, Machine Learning, and Applications, BigDML 2021. The volume focuses on topics such as computing methodology; machine learning; artificial intelligence; information systems; security and privacy. This volume will benefit research scholars, academicians, and industrial people who work on data storage and machine learning..
Medienart: |
E-Book |
---|
Erscheinungsjahr: |
2024. |
---|---|
Erschienen: |
Singapore: Springer Nature Singapore ; 2024. Singapore: Imprint: Springer ; 2024. |
Ausgabe: |
1st ed. 2024. |
Reihe: |
---|
Sprache: |
Englisch |
---|
Beteiligte Personen: |
Borah, Malaya Dutta [HerausgeberIn] |
---|
Links: |
doi.org [lizenzpflichtig] |
---|
ISBN: |
---|
Themen: |
Artificial intelligence. |
---|
Umfang: |
1 Online-Ressource(XII, 778 p. 395 illus., 294 illus. in color.) |
---|
doi: |
10.1007/978-981-99-3481-2 |
---|
funding: |
|
---|---|
Förderinstitution / Projekttitel: |
|
PPN (Katalog-ID): |
1871972981 |
---|
LEADER | 01000nam a22002652 4500 | ||
---|---|---|---|
001 | 1871972981 | ||
003 | DE-627 | ||
005 | 20231205113156.0 | ||
007 | cr uuu---uuuuu | ||
008 | 231205s2024 si |||||o 00| ||eng c | ||
020 | |a 9789819934812 |9 978-981-99-3481-2 | ||
024 | 7 | |a 10.1007/978-981-99-3481-2 |2 doi | |
035 | |a (DE-627)1871972981 | ||
035 | |a (DE-599)KEP098544365 | ||
035 | |a (DE-He213)978-981-99-3481-2 | ||
035 | |a (EBP)098544365 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
044 | |c XB-SG | ||
072 | 7 | |a UK |2 bicssc | |
072 | 7 | |a COM043000 |2 bisacsh | |
245 | 1 | 0 | |a Big Data, Machine Learning, and Applications |b Proceedings of the 2nd International Conference, BigDML 2021 |c edited by Malaya Dutta Borah, Dolendro Singh Laiphrakpam, Nitin Auluck, Valentina Emilia Balas |
250 | |a 1st ed. 2024. | ||
264 | 1 | |a Singapore |b Springer Nature Singapore |c 2024. | |
264 | 1 | |a Singapore |b Imprint: Springer |c 2024. | |
300 | |a 1 Online-Ressource(XII, 778 p. 395 illus., 294 illus. in color.) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Lecture Notes in Electrical Engineering |v 1053 | |
520 | |a Android application-based security surveillance implementing machine learning -- Realtime Object Distance Measurement Using Stereo Vision Image Processing -- An Insight on Drone Applications in Surveillance Domain -- Handwritten Mixed Numerals Classification System -- IoT Based Smart Farm Monitoring System -- An Extensive Review of the Supervised Learning Algorithms for Spiking Neural Networks -- Multitask learning based simultaneous facial gender and age recognition with a weighted loss function -- VISUALIZING CRIME HOTSPOTS BY ANALYSING ONLINE NEWSPAPER ARTICLES -- Applications of Machine Learning for Face Mask Detection during COVID-19 Pandemic -- A cascaded deep learning approach for detection and localization of crop-weeds in RGB images for oral presentation -- Ensemble of Deep Learning Enabled Tamil Handwritten Character Recognition Model -- A Comparative Study of Loss Functions for Deep Neural Networks in Time Series Analysis -- Learning Algorithm for Threshold Softmax Layer to Handle Unknown Class Problem -- Traffic Monitoring and Violation Detection using Deep Learning -- Conjugate Gradient Method for finding Optimal Parameters in Linear Regression -- Rugby ball detection, tracking and future trajectory prediction algorithm -- EARLY DETECTION OF HEART DISEASE USING FEATURE SELECTION AND CLASSIFICATION TECHNIQUES -- Gun Detection System for Surveillance Cameras using HOG assisted KNN classifier -- Optimized detection, classification and tracking with YOLOV5, HSV color thresholding and KCF tracking -- Covid-19 detection using chest X-ray images -- Comparative Analysis of LDA Algorithm for Low Resource Indian Languages with its Translated English Documents -- Text Style Transfer: A Comprehensive Study on Methodologies and Evaluation -- Classification of Hindustani Musical Ragas using One Dimensional Convolutional Neural Networks -- W-Tree: A Concept Correlation Tree for Data Analysis and Annotations -- Crawl Smart: A Domain Specific Crawler -- Evaluating the effect of leading indicators in customer churn prediction -- Classification of Skin Lesion Using Image Processing and ResNet50 -- Data Collection and Pre-Processing for Machine Learning-based Student Dropout Prediction -- Nested Named Entity Recognition in Multilingual Code-Switched NLP -- Deep Learning based Semantic Segmentation of Blood Cells from Microscopic Images -- A Partitioned Task Offloading Approach for Privacy Preservation at Edge -- Artificial Intelligence in Radiological Covid19 Detection: A State of the Art Review -- Anomaly Detection in SCADA Industrial Control Systems using Bi-directional Long Short-Term Memory -- Implementing Autonomous Navigation on an Omni Wheeled Robot Using 2D LiDAR, Tracking Camera and ROS -- Analysis of Deep Learning Models for Text Summarization of User Manuals -- Modelling Seismic Performance of Reinforced Concrete Buildings within Response Spectrum Framework -- A Survey on DDoS Detection using Deep Learning in Software Defined Networking -- A data driven approach to predict the risk of readmission among patients with Diabetes Mellitus -- Segmentation of dentin and enamel from panoramic dental Radiographic image (OPG) to detect tooth wear -- REVISITING FACIAL KEY POINT DETECTION - AN EFFICIENT APPROACH USING DEEP NEURAL NETWORKS -- A Hybrid Framework using Natural Language Processing and Collaborative Filtering for Performance Efficient Feedback Mining and Recommendation -- Facial Recognition based Automatic Attendance Management System using Deep Learning -- Improved Hamming-Space Based Nearest Neighbour Big Data Retrieval Algorithm -- Application of Infrared thermography in assessment of Diabetic foot anomalies: a treatise -- A Survey and Classification on Recommendation Systems -- Analysis of Synthetic Data Generation Techniques in Diabetes Prediction -- Beyond Information Exchange: An Approach to Deploy Network Properties for Information Diffusion -- Sentiment Analysis on worldwide COVID-19 outbreak -- Post Vaccination Risk Prediction of COVID-19: Machine Learning Approach -- Offensive Language Detection in Under-resourced Algerian Dialectal Arabic Language -- A Comparative Analysis of Modern Machine Learning Approaches for Automatic Classication of Scientic Articles -- A review of Machine Learning algorithms on different Breast cancer datasets -- The Online Behaviour of the Algerian Abusers in Social Media Networks -- Interactive Attention AI to translate low light photos to captions for night scene understanding in women safety -- AI visualization in Nanoscale Microscopy -- Convolutional Gated MLP: Combining Convolutions & gMLP -- Unique Covariate Identity (UCI) Detection for Emotion Recognition through EEG Signals -- A Simple and Effective Method for Segmenting Lung Regions from CT Scan Images using K-Means -- Risk-Based Portfolio Optimization on Some Selected Sectors of the Indian Stock Market. | ||
520 | |a This book constitutes refereed proceedings of the Second International Conference on Big Data, Machine Learning, and Applications, BigDML 2021. The volume focuses on topics such as computing methodology; machine learning; artificial intelligence; information systems; security and privacy. This volume will benefit research scholars, academicians, and industrial people who work on data storage and machine learning. | ||
650 | 0 | |a Computer engineering. | |
650 | 0 | |a Computer networks . | |
650 | 0 | |a Computer systems. | |
650 | 0 | |a Computers, Special purpose. | |
650 | 0 | |a Artificial intelligence. | |
700 | 1 | |a Borah, Malaya Dutta |e herausgeberin |4 edt | |
700 | 1 | |a Laiphrakpam, Dolendro Singh |e herausgeberin |0 (orcid)0000-0001-6169-4200 |4 edt | |
700 | 1 | |a Auluck, Nitin |e herausgeberin |4 edt | |
700 | 1 | |a Balas, Valentina Emilia |e herausgeberin |4 edt | |
776 | 1 | |z 9789819934805 | |
776 | 1 | |z 9789819934829 | |
776 | 1 | |z 9789819934836 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9789819934805 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9789819934829 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9789819934836 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-981-99-3481-2 |m X:SPRINGER |x Resolving-System |z lizenzpflichtig |
912 | |a ZDB-2-SEB |b 2024 | ||
912 | |a ZDB-2-SCS |b 2024 | ||
912 | |a ZDB-2-SXCS |b 2024 | ||
912 | |a GBV_ILN_22 | ||
912 | |a ISIL_DE-18 | ||
912 | |a SYSFLAG_1 | ||
912 | |a GBV_KXP | ||
912 | |a GBV_ILN_22_i22818 | ||
912 | |a GBV_ILN_60 | ||
912 | |a ISIL_DE-705 | ||
912 | |a GBV_ILN_62 | ||
912 | |a ISIL_DE-28 | ||
912 | |a GBV_ILN_65 | ||
912 | |a ISIL_DE-3 | ||
912 | |a GBV_ILN_100 | ||
912 | |a ISIL_DE-Ma9 | ||
912 | |a GBV_ILN_101 | ||
912 | |a ISIL_DE-Ma14 | ||
912 | |a GBV_ILN_105 | ||
912 | |a ISIL_DE-841 | ||
912 | |a GBV_ILN_110 | ||
912 | |a ISIL_DE-Luen4 | ||
912 | |a GBV_ILN_120 | ||
912 | |a ISIL_DE-715 | ||
912 | |a GBV_ILN_122 | ||
912 | |a ISIL_DE-897 | ||
912 | |a GBV_ILN_130 | ||
912 | |a ISIL_DE-700 | ||
912 | |a GBV_ILN_132 | ||
912 | |a ISIL_DE-959 | ||
912 | |a GBV_ILN_140 | ||
912 | |a ISIL_DE-839 | ||
912 | |a GBV_ILN_161 | ||
912 | |a ISIL_DE-960 | ||
912 | |a GBV_ILN_185 | ||
912 | |a ISIL_DE-Sra5 | ||
912 | |a GBV_ILN_231 | ||
912 | |a ISIL_DE-527 | ||
912 | |a GBV_ILN_264 | ||
912 | |a ISIL_DE-897-1 | ||
912 | |a GBV_ILN_2001 | ||
912 | |a ISIL_DE-21 | ||
912 | |a GBV_ILN_2005 | ||
912 | |a ISIL_DE-291 | ||
912 | |a GBV_ILN_2007 | ||
912 | |a ISIL_DE-352E | ||
912 | |a GBV_ILN_2014 | ||
912 | |a ISIL_DE-90 | ||
912 | |a GBV_ILN_2015 | ||
912 | |a ISIL_DE-93 | ||
912 | |a GBV_ILN_2017 | ||
912 | |a ISIL_DE-576 | ||
912 | |a GBV_ILN_2020 | ||
912 | |a ISIL_DE-Ch1 | ||
912 | |a GBV_ILN_2034 | ||
912 | |a ISIL_DE-Rt2 | ||
912 | |a GBV_ILN_2055 | ||
912 | |a ISIL_DE-840 | ||
912 | |a GBV_ILN_2057 | ||
912 | |a ISIL_DE-L189 | ||
912 | |a GBV_ILN_2068 | ||
912 | |a ISIL_DE-Fn1 | ||
912 | |a GBV_ILN_2111 | ||
912 | |a ISIL_DE-944 | ||
912 | |a GBV_ILN_2152 | ||
912 | |a ISIL_DE-941 | ||
912 | |a GBV_ILN_2153 | ||
912 | |a ISIL_DE-Hed2 | ||
951 | |a BO | ||
953 | |2 045F |a 621.39 | ||
953 | |2 045F |a 004.6 | ||
980 | |2 22 |1 01 |x 0018 |b 4489901151 |c 00 |f --%%-- |d --%%-- |e s |j --%%-- |h olrm-h228-scs |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. |y zi22818 |z 21-02-24 | ||
980 | |2 60 |1 01 |x 0705 |b 4427853013 |c 00 |f --%%-- |d --%%-- |e s |j --%%-- |h SpringerLink |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. |k Nur für Angehörige der HSU: Volltextzugang von außerhalb des Campus mit Anmeldung über Shibboleth mit Ihrer Bibliothekskennung |y z |z 06-12-23 | ||
980 | |2 62 |1 01 |x 0028 |b 4515953125 |h OLR-Springer-EBS_Computer Science |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. |k Temporär im Bestand der UB Rostock |y z |z 25-04-24 | ||
980 | |2 65 |1 01 |x 0003 |b 4427893562 |c 03 |f --%%-- |d ebook |e --%%-- |j --%%-- |h OLR-SEB-ZDB-2-SCS |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Die Weitergabe an Dritte sowie systematisches Downloaden sind untersagt. |y k3o |z 07-12-23 | ||
980 | |2 100 |1 01 |x 3100 |b 4435753200 |c 00 |f --%%-- |d --%%-- |e s |j --%%-- |c 09 |f --%%-- |d eBook Springer |e --%%-- |j --%%-- |h OLR-SEB |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. |y z |z 13-12-23 | ||
980 | |2 101 |1 01 |x 3101 |b 443576640X |c 00 |f --%%-- |d --%%-- |e s |j --%%-- |c 09 |f --%%-- |d eBook Springer |e --%%-- |j --%%-- |h OLR-SEB |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. |y z |z 13-12-23 | ||
980 | |2 105 |1 01 |x 0841 |b 4442419973 |h OLR-ESP |k Campuslizenz Universität / Technische Hochschule Lübeck. - Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. |y x |z 21-12-23 | ||
980 | |2 110 |1 01 |x 3110 |b 4442395497 |h OLR-SEB |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. |y z |z 20-12-23 | ||
980 | |2 120 |1 01 |x 0715 |b 4454067260 |c 00 |f --%%-- |d --%%-- |e g |j --%%-- |h alma |y z |z 11-01-24 | ||
980 | |2 122 |1 01 |x 0897 |b 4467555501 |h OLR-Springer-SCS |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Die Weitergabe an Dritte sowie systematisches Downloaden sind untersagt. |y z |z 24-01-24 | ||
980 | |2 130 |1 01 |x 0700 |b 4453845200 |h OLR-SEB |k Vervielfältigungen (z. B. Kopien, Downloads) nur für den eigenen wissenschaftlichen Gebrauch. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots |y z |z 11-01-24 | ||
980 | |2 132 |1 01 |x 0959 |b 4493396164 |h OLR-ESP |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. |y k |z 28-02-24 | ||
980 | |2 140 |1 01 |x 0839 |b 446755968X |h OLR-Springer-SCS |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Die Weitergabe an Dritte sowie systematisches Downloaden sind untersagt. |y z |z 24-01-24 | ||
980 | |2 161 |1 01 |x 0960 |b 4453149018 |h OLR-SEB |k Campusweiter Zugriff (Hochschule Hannover). - Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. |u fhebook |y z |z 10-01-24 | ||
980 | |2 185 |1 01 |x 3519 |b 4453157703 |h OLR-ESP |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden. |y z |z 10-01-24 | ||
980 | |2 231 |1 01 |x 0527 |b 4427844944 |h OLR-SEB |k Ausdruck und Kopien sind ausschließlich für den eigenen wissenschaftlichen Gebrauch gestattet |y z |z 06-12-23 | ||
980 | |2 264 |1 01 |x 3264 |b 4467571949 |h OLR-Springer-SCS |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Die Weitergabe an Dritte sowie systematisches Downloaden sind untersagt. |y z |z 24-01-24 | ||
980 | |2 2001 |1 01 |x DE-21 |b 4460898586 |c 00 |f --%%-- |d --%%-- |e --%%-- |j n |y l01 |z 18-01-24 | ||
980 | |2 2005 |1 01 |x DE-291 |b 4441939086 |c 00 |f --%%-- |d --%%-- |e --%%-- |j n |k Zugriff nur aus dem Universitätsnetz |y l01 |z 20-12-23 | ||
980 | |2 2007 |1 01 |x DE-352E |b 444190228X |c 00 |f --%%-- |d --%%-- |e n |j --%%-- |y l01 |z 20-12-23 | ||
980 | |2 2014 |1 01 |x DE-90 |b 4448029670 |c 00 |f --%%-- |d --%%-- |e --%%-- |j kp |y l01 |z 04-01-24 | ||
980 | |2 2015 |1 01 |x DE-93 |b 446742119X |c 00 |f --%%-- |d --%%-- |e --%%-- |j p |k Campuslizenz |y l01 |z 24-01-24 | ||
980 | |2 2017 |1 01 |x DE-576 |b 4425659414 |c 00 |f --%%-- |d --%%-- |e --%%-- |j n |k Besitznachweis BSZ nur für Dateneinspielung, keine echte Lizenz vorhanden |y l01 |z 05-12-23 | ||
980 | |2 2020 |1 01 |x DE-Ch1 |b 4434310259 |c 00 |f --%%-- |d --%%-- |e n |j --%%-- |k Campuslizenz |y l01 |z 13-12-23 | ||
980 | |2 2034 |1 01 |x DE-Rt2 |b 4442666644 |c 00 |f --%%-- |d eBook |e --%%-- |j n |k Zugriff von allen im Hochschulnetz befindlichen Rechnern; Hochschulangehörige können auch über VPN von außerhalb des Campusnetzes zugreifen |y l01 |z 21-12-23 | ||
980 | |2 2055 |1 01 |x DE-840 |b 4460898594 |c 00 |f --%%-- |d Springer ebook ComputerScience |e --%%-- |j n |k Campuslizenz HHN |y l01 |z 18-01-24 | ||
980 | |2 2057 |1 01 |x DE-L189 |b 4438046424 |c 00 |f --%%-- |d --%%-- |e --%%-- |j n |k Campuslizenz |y l01 |z 15-12-23 | ||
980 | |2 2068 |1 01 |x DE-Fn1 |b 443804412X |c 00 |f --%%-- |d eBook Springer |e --%%-- |j en |y l01 |z 15-12-23 | ||
980 | |2 2111 |1 01 |x DE-944 |b 4460898608 |c 00 |f --%%-- |d E-Book Springer |e --%%-- |j n |k Elektronischer Volltext - Campuslizenz |y l01 |z 18-01-24 | ||
980 | |2 2152 |1 01 |x DE-941 |b 442560511X |c 00 |f --%%-- |d E-Book Springer |e --%%-- |j n |y l01 |z 05-12-23 | ||
980 | |2 2153 |1 01 |x DE-Hed2 |b 4474026020 |c 00 |f --%%-- |d e-Book Springer |e --%%-- |j n |k Elektronischer Volltext - Campuslizenz |y l01 |z 02-02-24 | ||
981 | |2 22 |1 01 |x 0018 |y Volltextzugang Campus |r https://doi.org/10.1007/978-981-99-3481-2 | ||
981 | |2 22 |1 01 |x 0018 |y Nur für Angehörige der Universität Hamburg: Volltextzugang von außerhalb des Campus |r http://emedien.sub.uni-hamburg.de/han/SpringerEbooks/doi.org/10.1007/978-981-99-3481-2 | ||
981 | |2 60 |1 01 |x 0705 |y Volltextzugang Campus |r https://doi.org/10.1007/978-981-99-3481-2 | ||
981 | |2 62 |1 01 |x 0028 |r https://doi.org/10.1007/978-981-99-3481-2 | ||
981 | |2 65 |1 01 |x 0003 |y Volltextzugang Campus |r https://doi.org/10.1007/978-981-99-3481-2 | ||
981 | |2 100 |1 01 |x 3100 |r https://doi.org/10.1007/978-981-99-3481-2 | ||
981 | |2 100 |1 01 |x 3100 |y für Uniangehörige: Zugang weltweit |r https://han.med.uni-magdeburg.de/han/SPR-eBook-ComputerScience-einzeln/doi.org/10.1007/978-981-99-3481-2 | ||
981 | |2 101 |1 01 |x 3101 |r https://doi.org/10.1007/978-981-99-3481-2 | ||
981 | |2 101 |1 01 |x 3101 |y für Uniangehörige: Zugang weltweit |r https://han.med.uni-magdeburg.de/han/SPR-eBook-ComputerScience-einzeln/doi.org/10.1007/978-981-99-3481-2 | ||
981 | |2 105 |1 01 |x 0841 |r https://doi.org/10.1007/978-981-99-3481-2 | ||
981 | |2 110 |1 01 |x 3110 |r https://doi.org/10.1007/978-981-99-3481-2 | ||
981 | |2 120 |1 01 |x 0715 |r http://49gbv-uob-primo.hosted.exlibrisgroup.com/openurl/49GBV_UOB/UOB_services_page?u.ignore_date_coverage=true&rft.mms_id=991016357556803501 | ||
981 | |2 122 |1 01 |x 0897 |r https://doi.org/10.1007/978-981-99-3481-2 | ||
981 | |2 130 |1 01 |x 0700 |r https://doi.org/10.1007/978-981-99-3481-2 | ||
981 | |2 132 |1 01 |x 0959 |y Zugriff nur für Angehörige der Hochschule Osnabrück im Hochschulnetz |r https://doi.org/10.1007/978-981-99-3481-2 | ||
981 | |2 140 |1 01 |x 0839 |r https://doi.org/10.1007/978-981-99-3481-2 | ||
981 | |2 161 |1 01 |x 0960 |r https://doi.org/10.1007/978-981-99-3481-2 | ||
981 | |2 185 |1 01 |x 3519 |y Zugriff im Netz der Hochschule Stralsund |r https://doi.org/10.1007/978-981-99-3481-2 | ||
981 | |2 231 |1 01 |x 0527 |y Nutzung ausschließlich für Angehörige der Hochschule Harz |r https://doi.org/10.1007/978-981-99-3481-2 | ||
981 | |2 264 |1 01 |x 3264 |r https://doi.org/10.1007/978-981-99-3481-2 | ||
981 | |2 2001 |1 01 |x DE-21 |r https://doi.org/10.1007/978-981-99-3481-2 | ||
981 | |2 2005 |1 01 |x DE-291 |r https://doi.org/10.1007/978-981-99-3481-2 | ||
981 | |2 2007 |1 01 |x DE-352E |r https://doi.org/10.1007/978-981-99-3481-2 | ||
981 | |2 2014 |1 01 |x DE-90 |y Zugang im Netz des KIT |r https://doi.org/10.1007/978-981-99-3481-2 | ||
981 | |2 2015 |1 01 |x DE-93 |r https://doi.org/10.1007/978-981-99-3481-2 | ||
981 | |2 2020 |1 01 |x DE-Ch1 |r https://doi.org/10.1007/978-981-99-3481-2 | ||
981 | |2 2034 |1 01 |x DE-Rt2 |r https://doi.org/10.1007/978-981-99-3481-2 | ||
981 | |2 2055 |1 01 |x DE-840 |r https://doi.org/10.1007/978-981-99-3481-2 | ||
981 | |2 2057 |1 01 |x DE-L189 |y HTWK-Zugang |r https://doi.org/10.1007/978-981-99-3481-2 | ||
981 | |2 2068 |1 01 |x DE-Fn1 |r https://doi.org/10.1007/978-981-99-3481-2 | ||
981 | |2 2111 |1 01 |x DE-944 |r https://doi.org/10.1007/978-981-99-3481-2 | ||
981 | |2 2152 |1 01 |x DE-941 |r https://doi.org/10.1007/978-981-99-3481-2 | ||
981 | |2 2153 |1 01 |x DE-Hed2 |r https://doi.org/10.1007/978-981-99-3481-2 | ||
982 | |2 132 |1 01 |x 0959 |8 00 |a EBooks Springer Computer science | ||
982 | |2 2001 |1 01 |x DE-21 |8 00 |s s |a eBook-Springer-Computer-Science-EVB | ||
983 | |2 2111 |1 01 |x DE-944 |8 00 |0 (DE-627)1353370437 |a e-Book | ||
983 | |2 2153 |1 01 |x DE-Hed2 |8 00 |0 (DE-627)1357129785 |a e-Book | ||
983 | |2 2153 |1 01 |x DE-Hed2 |8 00 |0 (DE-627)1830158732 |a eBook Computer Science EBS | ||
995 | |2 22 |1 01 |x 0018 |a olrm-h228-scs | ||
995 | |2 60 |1 01 |x 0705 |a SpringerLink | ||
995 | |2 62 |1 01 |x 0028 |a OLR-Springer-EBS_Computer Science | ||
995 | |2 65 |1 01 |x 0003 |a OLR-SEB-ZDB-2-SCS | ||
995 | |2 100 |1 01 |x 3100 |a OLR-SEB | ||
995 | |2 101 |1 01 |x 3101 |a OLR-SEB | ||
995 | |2 105 |1 01 |x 0841 |a OLR-ESP | ||
995 | |2 110 |1 01 |x 3110 |a OLR-SEB | ||
995 | |2 110 |1 01 |x 3110 |a OLR-SPRINGER-EBS | ||
995 | |2 120 |1 01 |x 0715 |a alma | ||
995 | |2 122 |1 01 |x 0897 |a OLR-Springer-SCS | ||
995 | |2 130 |1 01 |x 0700 |a OLR-SEB | ||
995 | |2 132 |1 01 |x 0959 |a OLR-ESP | ||
995 | |2 132 |1 01 |x 0959 |a OLR-ESP-SCS | ||
995 | |2 140 |1 01 |x 0839 |a OLR-Springer-SCS | ||
995 | |2 161 |1 01 |x 0960 |a OLR-SEB | ||
995 | |2 185 |1 01 |x 3519 |a OLR-ESP | ||
995 | |2 231 |1 01 |x 0527 |a OLR-SEB | ||
995 | |2 264 |1 01 |x 3264 |a OLR-Springer-SCS |