My Account Log in

1 option

Emerging Technologies in Data Mining and Information Security : Proceedings of IEMIS 2018, Volume 1 / edited by Ajith Abraham, Paramartha Dutta, Jyotsna Kumar Mandal, Abhishek Bhattacharya, Soumi Dutta.

Springer Nature - Springer Intelligent Technologies and Robotics eBooks 2019 English International Available online

View online
Format:
Book
Contributor:
Abraham, Ajith., Editor.
Dutta, Paramartha., Editor.
Mandal, Jyotsna Kumar., Editor.
Bhattacharya, Abhishek., Editor.
Dutta, Soumi., Editor.
Series:
Advances in Intelligent Systems and Computing, 2194-5365 ; 755
Language:
English
Subjects (All):
Computational intelligence.
Artificial intelligence.
Data protection.
Computational Intelligence.
Artificial Intelligence.
Data and Information Security.
Local Subjects:
Computational Intelligence.
Artificial Intelligence.
Data and Information Security.
Physical Description:
1 online resource (848 pages) : illustrations.
Edition:
1st ed. 2019.
Place of Publication:
Singapore : Springer Nature Singapore : Imprint: Springer, 2019.
Summary:
This book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2018) held at the University of Engineering & Management, Kolkata, India, on February 23–25, 2018. It comprises high-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers, and case studies related to all the areas of data mining, machine learning, Internet of Things (IoT) and information security.
Contents:
Chapter 1: Application of ANN for On-line Monitoring and Security Estimation of Power System
Chapter 2: Crop Prediction Models – A Review
Chapter 3: Rainfall Prediction : A Comparative study of Neural Network architectures
Chapter 4: Prediction of Bacteriophage Protein Locations Using Deep Neural Networks
Chapter 5: Classification of Phishing Websites using Moth-flame Optimized Neural Network
Chapter 6: Design and Analysis of Intrusion Detection System via Neural Network, SVM and Neuro fuzzy
Chapter 7: Grammar-based White-box Testing via Automated Constraint Path Generation.
Notes:
Includes bibliographical references and index.
ISBN:
981-13-1951-0

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account