Search Results for - Narrowed by: Chaki, Nabendu. editor. - E-Book - Computational Intelligence.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dAUTHOR$002509Author$002509Chaki$00252C$002bNabendu.$002beditor.$002509Chaki$00252C$002bNabendu.$002beditor.$0026qf$003dITYPE$002509Material$002bType$0025091$00253AE-BOOKS$002509E-Book$0026qf$003dSUBJECT$002509Subject$002509Computational$002bIntelligence.$002509Computational$002bIntelligence.$0026ps$003d300?2024-06-19T21:54:56ZProgress in Advanced Computing and Intelligent Engineering Proceedings of ICACIE 2016, Volume 2ent://SD_ILS/0/SD_ILS:20869062024-06-19T21:54:56Z2024-06-19T21:54:56Zby Saeed, Khalid. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6875-1">https://doi.org/10.1007/978-981-10-6875-1</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Sixent://SD_ILS/0/SD_ILS:20863692024-06-19T21:54:56Z2024-06-19T21:54:56Zby Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8183-5">https://doi.org/10.1007/978-981-10-8183-5</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Fiveent://SD_ILS/0/SD_ILS:20870302024-06-19T21:54:56Z2024-06-19T21:54:56Zby Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8180-4">https://doi.org/10.1007/978-981-10-8180-4</a><br/>Format: Electronic Resources<br/>Proceedings of International Conference on Computational Intelligence and Data Engineering ICCIDE 2017ent://SD_ILS/0/SD_ILS:20880662024-06-19T21:54:56Z2024-06-19T21:54:56Zby Chaki, Nabendu. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6319-0">https://doi.org/10.1007/978-981-10-6319-0</a><br/>Format: Electronic Resources<br/>Progress in Advanced Computing and Intelligent Engineering Proceedings of ICACIE 2016, Volume 1ent://SD_ILS/0/SD_ILS:20881752024-06-19T21:54:56Z2024-06-19T21:54:56Zby Saeed, Khalid. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6872-0">https://doi.org/10.1007/978-981-10-6872-0</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume 2ent://SD_ILS/0/SD_ILS:20883582024-06-19T21:54:56Z2024-06-19T21:54:56Zby Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-81-322-2653-6">https://doi.org/10.1007/978-81-322-2653-6</a><br/>Format: Electronic Resources<br/>Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics ICACNI 2015, Volume 2ent://SD_ILS/0/SD_ILS:20871512024-06-19T21:54:56Z2024-06-19T21:54:56Zby Nagar, Atulya. editor.<br/><a href="https://doi.org/10.1007/978-81-322-2529-4">https://doi.org/10.1007/978-81-322-2529-4</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume 1ent://SD_ILS/0/SD_ILS:20874432024-06-19T21:54:56Z2024-06-19T21:54:56Zby Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-81-322-2650-5">https://doi.org/10.1007/978-81-322-2650-5</a><br/>Format: Electronic Resources<br/>Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics ICACNI 2015, Volume 1ent://SD_ILS/0/SD_ILS:20865442024-06-19T21:54:56Z2024-06-19T21:54:56Zby Nagar, Atulya. editor.<br/><a href="https://doi.org/10.1007/978-81-322-2538-6">https://doi.org/10.1007/978-81-322-2538-6</a><br/>Format: Electronic Resources<br/>