LEADER 04376nam 22006255 450 001 9910483831103321 005 20230717145655.0 010 $a981-15-1480-1 024 7 $a10.1007/978-981-15-1480-7 035 $a(CKB)4100000010674059 035 $a(MiAaPQ)EBC6141313 035 $a(DE-He213)978-981-15-1480-7 035 $a(PPN)243226837 035 $a(EXLCZ)994100000010674059 100 $a20200317d2020 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aProceedings of the Third International Conference on Computational Intelligence and Informatics $eICCII 2018 /$fedited by K. Srujan Raju, A. Govardhan, B. Padmaja Rani, R. Sridevi, M. Ramakrishna Murty 205 $a1st ed. 2020. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2020. 215 $a1 online resource (881 pages) 225 1 $aAdvances in Intelligent Systems and Computing,$x2194-5365 ;$v1090 311 $a981-15-1479-8 320 $aIncludes bibliographical references and index. 327 $aChapter 1. Storing Live Sensor Data to the Platforms of Internet of Things (IoT) using Arduino and Associated Microchips -- Chapter 2. Comparative Study of Performance of Tabulation & Partition method for Minimization of DFA -- Chapter 3. Click Through Rate Prediction Using Decision Tree -- Chapter 4. A New Framework Approach to Wine data set using Highest Voting by Item Endorsement -- Chapter 5. Study and Ranking of Vulnerabilities in the Indian Mobile Banking Applications using Static Analysis and Bayes Classification -- Chapter 6. Analysis Of Object Identification Using Quadrature Bank Filter In Wavelet Transforms -- Chapter 7. Experimental Analysis of the Changes in Speech while Normal Speaking, Walking, Running and Eating -- Chapter 8. UIP-A Smart Web Application to Manage Network Environments -- Chapter 9. Energy Distribution in a Smart Grid with Load Weight and Time Zone -- Chapter 10. Matrix Approach to Perform Dependent Failure Analysis in compliance with Functional Safety Standards -- Chapter 11. A Cloud-based Privacy Preserving e-healthcare System using Particle Swarm Optimization -- Chapter 12. Improved Approach to Extract Knowledge from Unstructured Data Using Applied Natural Language Processing Techniques -- Chapter 13. Word Sense Disambiguation in Telugu Language Using Knowledge Based Approach -- Chapter 14. A Study of Digital Banking: Security Issues and Challenges -- Chapter 15. Encoding Approach for Intrusion Detection Using PCA and KNN Classifier. 330 $aThis book features high-quality papers presented at the International Conference on Computational Intelligence and Informatics (ICCII 2018), which was held on 28?29 December 2018 at the Department of Computer Science and Engineering, JNTUH College of Engineering, Hyderabad, India. The papers focus on topics such as data mining, wireless sensor networks, parallel computing, image processing, network security, MANETS, natural language processing and Internet of things. . 410 0$aAdvances in Intelligent Systems and Computing,$x2194-5365 ;$v1090 606 $aComputational intelligence 606 $aTelecommunication 606 $aBioinformatics 606 $aComputational Intelligence 606 $aCommunications Engineering, Networks 606 $aComputational and Systems Biology 615 0$aComputational intelligence. 615 0$aTelecommunication. 615 0$aBioinformatics. 615 14$aComputational Intelligence. 615 24$aCommunications Engineering, Networks. 615 24$aComputational and Systems Biology. 676 $a006.3 702 $aRaju$b K. Srujan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGovardhan$b A$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRani$b B. Padmaja$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSridevi$b R$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMurty$b M. Ramakrishna$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483831103321 996 $aProceedings of the Third International Conference on Computational Intelligence and Informatics$92095489 997 $aUNINA