LEADER 03645nam 22005775 450 001 9910482961203321 005 20181212032104.0 010 $a981-13-1951-0 024 7 $a10.1007/978-981-13-1951-8 035 $a(CKB)4100000007204774 035 $a(MiAaPQ)EBC5614204 035 $a(DE-He213)978-981-13-1951-8 035 $a(EXLCZ)994100000007204774 100 $a20181212d2019 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aEmerging Technologies in Data Mining and Information Security$b[electronic resource] $eProceedings of IEMIS 2018, Volume 1 /$fedited by Ajith Abraham, Paramartha Dutta, Jyotsna Kumar Mandal, Abhishek Bhattacharya, Soumi Dutta 205 $a1st ed. 2019. 210 1$aSingapore :$cSpringer Singapore :$cImprint: Springer,$d2019. 215 $a1 online resource (848 pages) $cillustrations 225 1 $aAdvances in Intelligent Systems and Computing,$x2194-5357 ;$v755 311 $a981-13-1950-2 320 $aIncludes bibliographical references and index. 327 $aChapter 1: Application of ANN for On-line Monitoring and Security Estimation of Power System -- Chapter 2: Crop Prediction Models ? A Review -- Chapter 3: Rainfall Prediction : A Comparative study of Neural Network architectures -- Chapter 4: Prediction of Bacteriophage Protein Locations Using Deep Neural Networks -- Chapter 5: Classification of Phishing Websites using Moth-flame Optimized Neural Network -- Chapter 6: Design and Analysis of Intrusion Detection System via Neural Network, SVM and Neuro fuzzy -- Chapter 7: Grammar-based White-box Testing via Automated Constraint Path Generation. 330 $aThis book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2018) held at the University of Engineering & Management, Kolkata, India, on February 23?25, 2018. It comprises high-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers, and case studies related to all the areas of data mining, machine learning, Internet of Things (IoT) and information security. 410 0$aAdvances in Intelligent Systems and Computing,$x2194-5357 ;$v755 606 $aEngineering 606 $aArtificial intelligence 606 $aComputer security 606 $aComputational Intelligence$3http://scigraph.springernature.com/things/product-market-codes/T11014 606 $aArtificial Intelligence$3http://scigraph.springernature.com/things/product-market-codes/I21000 606 $aSystems and Data Security$3http://scigraph.springernature.com/things/product-market-codes/I28060 615 0$aEngineering. 615 0$aArtificial intelligence. 615 0$aComputer security. 615 14$aComputational Intelligence. 615 24$aArtificial Intelligence. 615 24$aSystems and Data Security. 676 $a006.312 702 $aAbraham$b Ajith$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDutta$b Paramartha$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMandal$b Jyotsna Kumar$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBhattacharya$b Abhishek$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDutta$b Soumi$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910482961203321 996 $aEmerging technologies in data mining and information security$92571987 997 $aUNINA