語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Emerging Technologies in Data Mining...
~
SpringerLink (Online service)
Emerging Technologies in Data Mining and Information Security = Proceedings of IEMIS 2018, Volume 1 /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Emerging Technologies in Data Mining and Information Security/ edited by Ajith Abraham, Paramartha Dutta, Jyotsna Kumar Mandal, Abhishek Bhattacharya, Soumi Dutta.
其他題名:
Proceedings of IEMIS 2018, Volume 1 /
其他作者:
Abraham, Ajith.
面頁冊數:
XXVIII, 861 p. 433 illus., 220 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Computational intelligence. -
電子資源:
https://doi.org/10.1007/978-981-13-1951-8
ISBN:
9789811319518
Emerging Technologies in Data Mining and Information Security = Proceedings of IEMIS 2018, Volume 1 /
Emerging Technologies in Data Mining and Information Security
Proceedings of IEMIS 2018, Volume 1 /[electronic resource] :edited by Ajith Abraham, Paramartha Dutta, Jyotsna Kumar Mandal, Abhishek Bhattacharya, Soumi Dutta. - 1st ed. 2019. - XXVIII, 861 p. 433 illus., 220 illus. in color.online resource. - Advances in Intelligent Systems and Computing,7552194-5357 ;. - Advances in Intelligent Systems and Computing,335.
Chapter 1: Application of ANN for On-line Monitoring and Security Estimation of Power System -- Chapter 2: Crop Prediction Models – A Review -- Chapter 3: Rainfall Prediction : A Comparative study of Neural Network architectures -- Chapter 4: Prediction of Bacteriophage Protein Locations Using Deep Neural Networks -- Chapter 5: Classification of Phishing Websites using Moth-flame Optimized Neural Network -- Chapter 6: Design and Analysis of Intrusion Detection System via Neural Network, SVM and Neuro fuzzy -- Chapter 7: Grammar-based White-box Testing via Automated Constraint Path Generation.
This book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2018) held at the University of Engineering & Management, Kolkata, India, on February 23–25, 2018. It comprises high-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers, and case studies related to all the areas of data mining, machine learning, Internet of Things (IoT) and information security.
ISBN: 9789811319518
Standard No.: 10.1007/978-981-13-1951-8doiSubjects--Topical Terms:
568984
Computational intelligence.
LC Class. No.: Q342
Dewey Class. No.: 006.3
Emerging Technologies in Data Mining and Information Security = Proceedings of IEMIS 2018, Volume 1 /
LDR
:02695nam a22003975i 4500
001
1011227
003
DE-He213
005
20200701182802.0
007
cr nn 008mamaa
008
210106s2019 si | s |||| 0|eng d
020
$a
9789811319518
$9
978-981-13-1951-8
024
7
$a
10.1007/978-981-13-1951-8
$2
doi
035
$a
978-981-13-1951-8
050
4
$a
Q342
072
7
$a
UYQ
$2
bicssc
072
7
$a
TEC009000
$2
bisacsh
072
7
$a
UYQ
$2
thema
082
0 4
$a
006.3
$2
23
245
1 0
$a
Emerging Technologies in Data Mining and Information Security
$h
[electronic resource] :
$b
Proceedings of IEMIS 2018, Volume 1 /
$c
edited by Ajith Abraham, Paramartha Dutta, Jyotsna Kumar Mandal, Abhishek Bhattacharya, Soumi Dutta.
250
$a
1st ed. 2019.
264
1
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2019.
300
$a
XXVIII, 861 p. 433 illus., 220 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Advances in Intelligent Systems and Computing,
$x
2194-5357 ;
$v
755
505
0
$a
Chapter 1: Application of ANN for On-line Monitoring and Security Estimation of Power System -- Chapter 2: Crop Prediction Models – A Review -- Chapter 3: Rainfall Prediction : A Comparative study of Neural Network architectures -- Chapter 4: Prediction of Bacteriophage Protein Locations Using Deep Neural Networks -- Chapter 5: Classification of Phishing Websites using Moth-flame Optimized Neural Network -- Chapter 6: Design and Analysis of Intrusion Detection System via Neural Network, SVM and Neuro fuzzy -- Chapter 7: Grammar-based White-box Testing via Automated Constraint Path Generation.
520
$a
This book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2018) held at the University of Engineering & Management, Kolkata, India, on February 23–25, 2018. It comprises high-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers, and case studies related to all the areas of data mining, machine learning, Internet of Things (IoT) and information security.
650
0
$a
Computational intelligence.
$3
568984
650
0
$a
Artificial intelligence.
$3
559380
650
0
$a
Computer security.
$3
557122
650
1 4
$a
Computational Intelligence.
$3
768837
650
2 4
$a
Artificial Intelligence.
$3
646849
650
2 4
$a
Systems and Data Security.
$3
677062
700
1
$a
Abraham, Ajith.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
670176
700
1
$a
Dutta, Paramartha.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1048724
700
1
$a
Mandal, Jyotsna Kumar.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1208238
700
1
$a
Bhattacharya, Abhishek.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1298793
700
1
$a
Dutta, Soumi.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1298794
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811319501
776
0 8
$i
Printed edition:
$z
9789811319525
830
0
$a
Advances in Intelligent Systems and Computing,
$x
2194-5357 ;
$v
335
$3
1253884
856
4 0
$u
https://doi.org/10.1007/978-981-13-1951-8
912
$a
ZDB-2-INR
912
$a
ZDB-2-SXIT
950
$a
Intelligent Technologies and Robotics (SpringerNature-42732)
950
$a
Intelligent Technologies and Robotics (R0) (SpringerNature-43728)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入