LEADER 04557nam 22006495 450 001 9910627238903321 005 20251009073456.0 010 $a981-19-4193-9 024 7 $a10.1007/978-981-19-4193-1 035 $a(MiAaPQ)EBC7101871 035 $a(Au-PeEL)EBL7101871 035 $a(CKB)24950530200041 035 $a(DE-He213)978-981-19-4193-1 035 $a(PPN)264957237 035 $a(EXLCZ)9924950530200041 100 $a20220928d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aEmerging Technologies in Data Mining and Information Security $eProceedings of IEMIS 2022, Volume 1 /$fedited by Paramartha Dutta, Satyajit Chakrabarti, Abhishek Bhattacharya, Soumi Dutta, Vincenzo Piuri 205 $a1st ed. 2023. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2023. 215 $a1 online resource (752 pages) 225 1 $aLecture Notes in Networks and Systems,$x2367-3389 ;$v491 311 08$aPrint version: Dutta, Paramartha Emerging Technologies in Data Mining and Information Security Singapore : Springer,c2022 9789811941924 327 $aPart 1: Computational Intelligence -- Chapter 1. An Interpretive Saga of SQL Injection Attacks -- Chapter 2. Numerical Simulation of Boundary Layer Flow of MHD influenced Nanofluid over an Exponentially Elongating sheet -- Chapter 3. Driver Drowsiness Detection and Traffic Sign Recognition System -- Chapter 4. Application of Data Visualization: Realization of Car Rental System -- Chapter 5. Physical and Mental Health Problem's Technical Resolutions -- Chapter 6. Entropy Generation Analysis of MHD Fluid Flow Over Stretching Surface with Heat and Mass Transfer -- Chapter 7. A Stacking Ensemble Framework for Android Malware Prediction -- Chapter 8. A comparative analysis of performances of different ensemble approaches for classification of Android Malwares -- Chapter 9. Natural Language Processing In Chat-Bots -- Chapter 10. CT Image Denoising Using Bilateral Filter And Method Noise Thresholding In Shearlet Domain -- Chapter 11. Reactive Mass Diffusion in Viscoelastic Fluid Past a StretchableExponential Sheet Due to Variation in Wall Concentration -- Chapter 12. Technology Adoption for Facilitating Knowledge Management Practices in Firms -- Chapter 13. Slip Flow and Heat Transition for Hydromagnetic Elastico-viscous Fluid past a Flat Moving Plate -- Chapter 14. Comprehensive analysis of various distance metrics on colour based CBIR System -- Chapter 15. Numerical Simulation of MHD Viscous Fluid Flow over a Porous Stretching Surface with the Effects of Power-law Heat and Mass Flux. 330 $aThis book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2022) held at Institute of Engineering & Management, Kolkata, India, during February 23?25, 2022. The book is organized in three volumes and includes high-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers and case studies related to all the areas of data mining, machine learning, Internet of Things (IoT) and information security. 410 0$aLecture Notes in Networks and Systems,$x2367-3389 ;$v491 606 $aComputational intelligence 606 $aInformation storage and retrieval systems 606 $aImage processing$xDigital techniques 606 $aComputer vision 606 $aArtificial intelligence$xData processing 606 $aComputational Intelligence 606 $aInformation Storage and Retrieval 606 $aComputer Imaging, Vision, Pattern Recognition and Graphics 606 $aData Science 615 0$aComputational intelligence. 615 0$aInformation storage and retrieval systems. 615 0$aImage processing$xDigital techniques. 615 0$aComputer vision. 615 0$aArtificial intelligence$xData processing. 615 14$aComputational Intelligence. 615 24$aInformation Storage and Retrieval. 615 24$aComputer Imaging, Vision, Pattern Recognition and Graphics. 615 24$aData Science. 676 $a005.8 702 $aDutta$b Paramartha 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910627238903321 996 $aEmerging technologies in data mining and information security$92571987 997 $aUNINA