|
|
|
|
LEADER |
07304nam a2200541 4500 |
001 |
978-981-10-7641-1 |
003 |
DE-He213 |
005 |
20191028232825.0 |
007 |
cr nn 008mamaa |
008 |
180801s2019 si | s |||| 0|eng d |
020 |
|
|
|a 9789811076411
|9 978-981-10-7641-1
|
024 |
7 |
|
|a 10.1007/978-981-10-7641-1
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a Q342
|
072 |
|
7 |
|a UYQ
|2 bicssc
|
072 |
|
7 |
|a TEC009000
|2 bisacsh
|
072 |
|
7 |
|a UYQ
|2 thema
|
082 |
0 |
4 |
|a 006.3
|2 23
|
245 |
1 |
0 |
|a Data Science and Big Data Analytics
|h [electronic resource] :
|b ACM-WIR 2018 /
|c edited by Durgesh Kumar Mishra, Xin-She Yang, Aynur Unal.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Singapore :
|b Springer Singapore :
|b Imprint: Springer,
|c 2019.
|
300 |
|
|
|a XXIV, 406 p. 152 illus., 95 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes on Data Engineering and Communications Technologies,
|x 2367-4512 ;
|v 16
|
505 |
0 |
|
|a A Study of the Correlation between Internet Addiction and Aggressive Behavior Among the Namibian University Students -- An efficient model for outlier detection in time series dataset using clustering approach -- Genetic Algorithm Approach for Optimization of Biomass Estimation at LiDAR -- E-ALIVE: An Integrated Platform Based on Machine Learning Techniques to Aware and Educate Common People with the Current Statistics of Maternal and Child Health Care -- An Effective TCP's Congestion Control Approach for Cross Layer Design in MANET -- A Study on Applying Agile Methodology to Manufacturing Industry Cloud Applications -- Baron-Cohen Model based Personality Classification using Ensemble Learning -- Analysis of Routing Protocols for Large Scale Multihop Multirate MANETs -- Review on Internet Traffic Sharing using Markov Chain Model in Computer Network -- Protein Sequence of Dengue Virus Classification and Secondary Structure Prediction using Random Forest Classifier -- Anomaly detection using Dynamic Sliding Window in Wireless Body Area Networks -- Scalable Privacy preservation in Big Data with Cloud Service Access -- Effective Healthcare Services by IoT based Model of Voluntary Doctors -- Multi Layer Architectures for SQLI Detection and Prevention in Web Application Development -- Emotional State Recognition with EEG signals using Subject Independent Approach -- Development of Early Prediction Model for Epileptic Seizures -- Research Issue in data Anonymization in Electronic Health Service: A survey -- Prediction of Cervical Cancer based on the life style, habits and diseases using Regression Analysis framework -- Novel outlier detection by integration of clustering and classification -- A Study on Benefits of Big Data for Retail Industry -- Protection of User Information by using Modified Data Copy Technique in Data Mining -- Performance Analysis of Traffic at Intersection using Direction Based Clustering in VANET -- Load Balancing using Amazon Cloud Services -- A Review of Wireless Charging Nodes in Wireless Sensor Networks -- Leeway of Lean concept to optimize Bigdata in manufacturing industry: An exploratory review -- NeuroFeedback Guided Learning Style Adaptability Derived from EEG Sensors -- Monitoring Public Participation in Multi-Lateral Initiatives using Social Media Intelligence -- An efficient Context-aware Music Recommendation based on Emotion and Time Context -- Locating and Detecting Nipple for Pornographic Image Identification.-Implementation of Improved Energy Efficient FIR Filter using Reversible Logic -- A Study on benefits of Big data for healthcare sector of India -- Handling Uncertainty in Linguistics using Probability Theory -- Review of Quality of Service based Techniques in Cloud Computing -- Skyline Computation for Big Data -- Available Energy Aware Multipath Routing For Reliable Service Discovery in MANET -- Human Face Detection Enabled Smart Stick for Visually Impaired People -- Web Based Service Recommendation System by Considering User Requirements -- Optimal Energy Conservation for Route Selection to improve in MANET -- Unsupervised Machine Learning for Clustering the Infected Leaves based on the Leaf-colours -- Real Time Big Data Analysis Architecture and Application -- Missing Value Imputation in Medical Records for Remote Healthcare -- Reliable Data Discovery with Two Ray Ground Way on DSR Routing in MANET -- Secure vehicular communication using Road side unit (RSU) trust management scheme -- Recommendation Framework for Diet and Exercise based on Clinical Data: A Systematic Review -- Predictive Models for Recommanding Restaurent System by users own Preference -- Security Assessment of SAODV Protocols in Mobile Adhoc Networks -- Attack Detection and its Analysis in DTN Mobile Ad-hoc network -- Secure Sum Computation using Homomorphic Encryption -- Traffic Analysis in Location Base Routing System in MANET -- Automated Workload management using machine learning -- A survey on Link Recovery in Wireless Mesh Network using resilience scheme -- Multi User Detection in Wireless Networks Using Decision Feedback Signal Cancellation -- ANN Based Predictive State Modelling of Finite State Machines -- Deep dive exploration of mixed reality in the world of Big Data.
|
520 |
|
|
|a This book presents conjectural advances in big data analysis, machine learning and computational intelligence, as well as their potential applications in scientific computing. It discusses major issues pertaining to big data analysis using computational intelligence techniques, and the conjectural elements are supported by simulation and modelling applications to help address real-world problems. An extensive bibliography is provided at the end of each chapter. Further, the main content is supplemented by a wealth of figures, graphs, and tables, offering a valuable guide for researchers in the field of big data analytics and computational intelligence.
|
650 |
|
0 |
|a Computational intelligence.
|
650 |
|
0 |
|a Big data.
|
650 |
|
0 |
|a Data mining.
|
650 |
|
0 |
|a Computer security.
|
650 |
1 |
4 |
|a Computational Intelligence.
|0 http://scigraph.springernature.com/things/product-market-codes/T11014
|
650 |
2 |
4 |
|a Big Data.
|0 http://scigraph.springernature.com/things/product-market-codes/I29120
|
650 |
2 |
4 |
|a Data Mining and Knowledge Discovery.
|0 http://scigraph.springernature.com/things/product-market-codes/I18030
|
650 |
2 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
700 |
1 |
|
|a Mishra, Durgesh Kumar.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Yang, Xin-She.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Unal, Aynur.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811076404
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811076428
|
830 |
|
0 |
|a Lecture Notes on Data Engineering and Communications Technologies,
|x 2367-4512 ;
|v 16
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-981-10-7641-1
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-INR
|
950 |
|
|
|a Intelligent Technologies and Robotics (Springer-42732)
|