LEADER 01283nam 2200361 n 450 001 996385406903316 005 20221108074158.0 035 $a(CKB)1000000000606840 035 $a(EEBO)2240917733 035 $a(UnM)99847543 035 $a(EXLCZ)991000000000606840 100 $a19911204d1569 uh | 101 0 $aeng 135 $aurbn||||a|bb| 200 10$aBy the Queene. A proclamation against the maintenaunce of pirates$b[electronic resource] 210 $aImprinted at London $cIn Powles Churchyarde by Richarde Iugge and Iohn Cawood, Printers to the Queenes Maiestie$d[1569] 215 $a1 sheet ([1] p.) 300 $aPublication date from STC. 300 $aLast complete line of text ends: "remayne". 300 $aReproduction of the original in the Bodleian Library. 330 $aeebo-0014 606 $aPirates$zEngland$vEarly works to 1800 607 $aEngland$xProclamations$vEarly works to 1800 607 $aGreat Britain$xHistory$yElizabeth, 1558-1603$vEarly works to 1800 615 0$aPirates 801 0$bCu-RivES 801 1$bCu-RivES 801 2$bCStRLIN 801 2$bWaOLN 906 $aBOOK 912 $a996385406903316 996 $aBy the Queene. A proclamation against the maintenaunce of pirates$92393475 997 $aUNISA LEADER 03181nam 22005895 450 001 9911021976603321 005 20250828130232.0 010 $a981-9660-63-7 024 7 $a10.1007/978-981-96-6063-6 035 $a(CKB)40851692600041 035 $a(DE-He213)978-981-96-6063-6 035 $a(EXLCZ)9940851692600041 100 $a20250828d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aData Mining and Information Security $eProceedings of ICDMIS 2024, Volume 4 /$fedited by Soumi Dutta, Abhishek Bhattacharya, Valentina E. Balas, Mohammad Kamrul Hasan 205 $a1st ed. 2025. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2025. 215 $a1 online resource (XVIII, 629 p. 302 illus., 260 illus. in color.) 225 1 $aLecture Notes in Networks and Systems,$x2367-3389 ;$v1388 311 08$a981-9660-62-9 327 $aExploring AI Classifiers to Identify Gestational Diabetes Mellitus during pregnancy -- Indian Sign Language Translator -- Desktop-based virtual assistant using python based on natural language processing -- Leveraging Machine Learning for Robust IoT Security: A Focus on Anomaly Detection Systems -- Analyzing the Effectiveness of Machine Learning Algorithms in Intrusion Detection. 330 $aThis book features research papers presented at the International Conference on Data Mining and Information Security (ICDMIS 2024) held at Eminent College of Management and Technology (ECMT), West Bengal, India, during October 7?8, 2024. The book is organized in five volumes and includes high-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers and case studies related to all the areas of data mining, machine learning, Internet of Things (IoT) and information security. 410 0$aLecture Notes in Networks and Systems,$x2367-3389 ;$v1388 606 $aComputational intelligence 606 $aArtificial intelligence 606 $aData mining 606 $aData protection 606 $aComputational Intelligence 606 $aArtificial Intelligence 606 $aData Mining and Knowledge Discovery 606 $aData and Information Security 615 0$aComputational intelligence. 615 0$aArtificial intelligence. 615 0$aData mining. 615 0$aData protection. 615 14$aComputational Intelligence. 615 24$aArtificial Intelligence. 615 24$aData Mining and Knowledge Discovery. 615 24$aData and Information Security. 676 $a006.3 702 $aDutta$b Soumi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBhattacharya$b Abhishek$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBalas$b Valentina E$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHasan$b Mohammad Kamrul$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9911021976603321 996 $aData Mining and Information Security$94429234 997 $aUNINA