LEADER 05307nam 22006615 450 001 9910364954403321 005 20251113175836.0 010 $a3-030-37188-3 024 7 $a10.1007/978-3-030-37188-3 035 $a(CKB)4100000010013766 035 $a(MiAaPQ)EBC5997053 035 $a(DE-He213)978-3-030-37188-3 035 $a(PPN)242818560 035 $a(EXLCZ)994100000010013766 100 $a20191212d2019 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aBig Data Analytics $e7th International Conference, BDA 2019, Ahmedabad, India, December 17?20, 2019, Proceedings /$fedited by Sanjay Madria, Philippe Fournier-Viger, Sanjay Chaudhary, P. Krishna Reddy 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (466 pages) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI,$x2946-1642 ;$v11932 311 08$a3-030-37187-5 327 $aBig Data Analytics: Vision and Perspectives -- Transforming Sensing Data into Smart Data for Smart Sustainable Cities -- Deep Learning Models for Medical Image Analysis: Challenges and Future Directions -- Recent Advances and Challenges in design of Non-Goal Oriented Dialogue System -- Data Cube is Dead, Long Life to Data Cube in the Age of Web Data -- Search and Information Extraction -- Improving Result Diversity using Query Term Proximity in Exploratory Search -- Segment-search vs Knowledge Graphs: Making a Keyword Search Engine for Web Documents -- Pairing Users in Social Media via Processing Meta-data from Conversational Files -- Large-Scale Information Extraction from Emails with Data Constraints -- Comparative Analysis of Rule-based, Dictionary-based and Hybrid Stemmers for Gujarati Language -- Predictive Analytics in Medical and Agricultural Domains -- Artificial Intelligence and Bayesian Knowledge Network in Health Care ? Smartphone Apps for diagnosis and differentiation of anemias with higher accuracy at Resource Constrained Point-of-Care settings -- Analyzing Domain Knowledge for Big Data Analysis: A Case Study with Urban Tree Type Classification -- Market Intelligence for Agricultural Commodities using Forecasting and Deep Learning Techniques -- Graph Analytics -- TKG: Efficient Mining of Top-K Frequent Subgraphs -- Why Multilayer Networks Instead Of Simple Graphs? Modeling Effectiveness And Analysis Flexibility & Efficiency! -- Gossip Based Distributed Real Time Task Scheduling with Guaranteed Performance on Heterogeneous Networks -- Data-Driven Optimization of Public Transit Schedule -- Pattern Mining -- Discovering Spatial High Utility Frequent Itemsets in Spatiotemporal Databases -- Efficient Algorithms For Flock Detection in Large Spatio-Temporal Data -- Local Temporal Compression for (Globally) Evolving Spatial Surfaces -- An Explicit Relationship between Sequential Patterns and their Concise Representations -- Machine Learning -- A novel approach to identify the determinants of online review helpfulness and predict the helpfulness score across product categories -- Analysis and Recognition of Hand-drawn Images with Effective Data Handling -- Real Time Static Gesture Detection Using Deep Learning -- Interpreting Context of Images using Scene Graphs -- Deep Learning in the Domain of Near-Duplicate Document Detection. 330 $aThis book constitutes the refereed proceedings of the 7th International Conference on Big Data analytics, BDA 2019, held in Ahmedabad, India, in December 2019. The 25 papers presented in this volume were carefully reviewed and selected from 53 submissions. The papers are organized in topical sections named: big data analytics: vision and perspectives; search and information extraction; predictive analytics in medical and agricultural domains; graph analytics; pattern mining; and machine learning. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI,$x2946-1642 ;$v11932 606 $aData mining 606 $aArtificial intelligence 606 $aApplication software 606 $aDatabase management 606 $aData Mining and Knowledge Discovery 606 $aArtificial Intelligence 606 $aComputer and Information Systems Applications 606 $aDatabase Management 615 0$aData mining. 615 0$aArtificial intelligence. 615 0$aApplication software. 615 0$aDatabase management. 615 14$aData Mining and Knowledge Discovery. 615 24$aArtificial Intelligence. 615 24$aComputer and Information Systems Applications. 615 24$aDatabase Management. 676 $a005.7 676 $a006.312 702 $aMadria$b Sanjay$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aFournier-Viger$b Philippe$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aChaudhary$b Sanjay$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aReddy$b P. Krishna$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910364954403321 996 $aBig data analytics$91523196 997 $aUNINA LEADER 03976nam 22006735 450 001 9910299836603321 005 20251113184711.0 010 $a3-319-19659-6 024 7 $a10.1007/978-3-319-19659-6 035 $a(CKB)3710000000434070 035 $a(EBL)2094890 035 $a(SSID)ssj0001524826 035 $a(PQKBManifestationID)11859564 035 $a(PQKBTitleCode)TC0001524826 035 $a(PQKBWorkID)11484925 035 $a(PQKB)11136298 035 $a(DE-He213)978-3-319-19659-6 035 $a(MiAaPQ)EBC2094890 035 $a(PPN)186396457 035 $a(EXLCZ)993710000000434070 100 $a20150610d2015 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aColliding Bodies Optimization $eExtensions and Applications /$fby A. Kaveh, V.R. Mahdavi 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (291 p.) 300 $aDescription based upon print version of record. 311 08$a3-319-19658-8 320 $aIncludes bibliographical references. 327 $aTheoretical background of the CBO algorithm: Introduction -- Colliding bodies optimization -- Enhanced versions of the CBO algorithm -- CBO for multi-objective optimization problem -- Applications of the CBO: CBO for optimal design of structures with continuous variables -- CBO for optimal design of structures with discrete variables -- Optimum design of castellated beams utilizing CBO -- CBO for optimal design of concrete structures -- CBO for p-median problems -- CBO for structuring sparse matrices -- BCO and ECBO in construction management -- Appendix: Computer codes for colliding bodies optimization and its different variants. 330 $aThis book presents and applies a novel efficient meta-heuristic optimization algorithm called Colliding Bodies Optimization (CBO) for various optimization problems. The first part of the book introduces the concepts and methods involved, while the second is devoted to the applications. Though optimal design of structures is the main topic, two chapters on optimal analysis and applications in constructional management are also included.  This algorithm is based on one-dimensional collisions between bodies, with each agent solution being considered as an object or body with mass. After a collision of two moving bodies with specified masses and velocities, these bodies again separate, with new velocities. This collision causes the agents to move toward better positions in the search space.  The main algorithm (CBO) is internally parameter independent, setting it apart from previously developed meta-heuristics. This algorithm is enhanced (ECBO) for more efficient applications in the optimal design of structures.  The algorithms are implemented in standard computer programming languages (MATLAB and C++) and two main codes are provided for ease of use. 606 $aEngineering mathematics 606 $aEngineering$xData processing 606 $aCivil engineering 606 $aMechanical engineering 606 $aMathematical and Computational Engineering Applications 606 $aCivil Engineering 606 $aMechanical Engineering 615 0$aEngineering mathematics. 615 0$aEngineering$xData processing. 615 0$aCivil engineering. 615 0$aMechanical engineering. 615 14$aMathematical and Computational Engineering Applications. 615 24$aCivil Engineering. 615 24$aMechanical Engineering. 676 $a519 676 $a620 676 $a621 676 $a624 700 $aKaveh$b A$g(Ali),$f1948-$4aut$4http://id.loc.gov/vocabulary/relators/aut$01596023 702 $aMahdavi$b V.R$4aut$4http://id.loc.gov/vocabulary/relators/aut 906 $aBOOK 912 $a9910299836603321 996 $aColliding bodies optimization$94407079 997 $aUNINA LEADER 04956nam 22007695 450 001 9910349432303321 005 20251113174855.0 010 $a9783319941479 010 $a331994147X 024 7 $a10.1007/978-3-319-94147-9 035 $a(CKB)3810000000358691 035 $a(DE-He213)978-3-319-94147-9 035 $a(MiAaPQ)EBC6304202 035 $a(PPN)229494633 035 $a(EXLCZ)993810000000358691 100 $a20180616d2018 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber Security Cryptography and Machine Learning $eSecond International Symposium, CSCML 2018, Beer Sheva, Israel, June 21?22, 2018, Proceedings /$fedited by Itai Dinur, Shlomi Dolev, Sachin Lodha 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XII, 287 p. 86 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v10879 300 $aIncludes index. 311 08$a9783319941462 311 08$a3319941461 327 $aInvited Paper - Optical Cryptography for Cyber Secured and Stealthy Fiber-Optic Communication Transmission -- Efficient Construction of the Kite Generator Revisited -- Using Noisy Binary Search for Differentially Private Anomaly Detection -- Distributed Web Mining of Ethereum -- An Information-Flow Control model for Online Social Networks based on user-attribute credibility and connection-strength factors. -Detecting and Coloring Anomalies in real cellular network using Principle Component Analysis -- Self-Stabilizing Byzantine Tolerant Replicated State Machine Based on Failure Detectors -- Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area Networks (LPWANs -- Privacy Via Maintaining Small Similitude Data for Big Data Statistical Representation -- Highway State Gating for Recurrent Highway Networks: Improving information flow through time -- Secured Data Gathering Protocol for IoT Networks -- Towards building active application defense systems -- Secure Non-Interactive User Re-Enrollment in Biometrics-based Identification and Authentication Systems -- Brief Announcement: Image authentication using Hyperspectral layers -- Brief Announcement: Graph-based and Probabilistic Discrete Models Used in Detection of Malicious Attacks -- Intercepting a Stealthy Network -- Privacy in E-Shopping Transactions: Exploring and Addressing the Trade-Offs -- Detection in the Dark - Exploiting XSS Vulnerability in C&C Panels as a New Technique to Detect Malwares -- A Planning Approach to Monitoring Computer Programs' Behavior -- Brief Announcement: Gradual Learning of Deep Recurrent Neural Network -- Brief Announcement: Adversarial Evasion of Western Electric Rules -- Brief Announcement: Deriving Context for Touch Events. 330 $aThis book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018. The 16 full and 6 short papers presented in this volume were carefully reviewed and selected from 44 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in the scope. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v10879 606 $aData protection 606 $aOperating systems (Computers) 606 $aApplication software 606 $aData mining 606 $aComputers and civilization 606 $aComputer networks 606 $aData and Information Security 606 $aOperating Systems 606 $aComputer and Information Systems Applications 606 $aData Mining and Knowledge Discovery 606 $aComputers and Society 606 $aComputer Communication Networks 615 0$aData protection. 615 0$aOperating systems (Computers). 615 0$aApplication software. 615 0$aData mining. 615 0$aComputers and civilization. 615 0$aComputer networks. 615 14$aData and Information Security. 615 24$aOperating Systems. 615 24$aComputer and Information Systems Applications. 615 24$aData Mining and Knowledge Discovery. 615 24$aComputers and Society. 615 24$aComputer Communication Networks. 676 $a005.8 702 $aDinur$b Itai$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDolev$b Shlomi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLodha$b Sachin$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349432303321 996 $aCyber Security Cryptography and Machine Learning$92200042 997 $aUNINA