Data Mining : 16th Australasian Conference, AusDM 2018, Bahrurst, NSW, Australia, November 28–30, 2018, Revised Selected Papers / / edited by Rafiqul Islam, Yun Sing Koh, Yanchang Zhao, Graco Warwick, David Stirling, Chang-Tsun Li, Zahidul Islam |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XV, 398 p. 177 illus., 100 illus. in color.) |
Disciplina | 787.61 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Data mining
Machine learning Application software Computer security Data Mining and Knowledge Discovery Machine Learning Information Systems Applications (incl. Internet) Systems and Data Security |
ISBN | 981-13-6661-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Classification tasks -- Transport, Environment and Energy -- Applied Data Mining -- Privacy and Clustering -- Statistics in Data Science -- Health, Software and Smart Phone -- Image Data Mining -- Industry Showcase. |
Record Nr. | UNINA-9910350232803321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
International Conference on Applications and Techniques in Cyber Intelligence ATCI 2019 : Applications and Techniques in Cyber Intelligence / / edited by Jemal H. Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam, Zheng Xu, Mohammed Atiquzzaman |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (xxxii, 2,132 pages) : illustrations |
Disciplina | 005.8 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Computational intelligence
Artificial intelligence Computational Intelligence Artificial Intelligence |
ISBN | 3-030-25128-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910484249303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
International Conference on Applications and Techniques in Cyber Security and Intelligence : Applications and Techniques in Cyber Security and Intelligence / / edited by Jemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Edizioni della Normale, , 2018 |
Descrizione fisica | 1 online resource (xv, 520 pages) : 160 illustrations |
Disciplina | 006.3 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Computational intelligence
Artificial intelligence Computational Intelligence Artificial Intelligence |
ISBN | 3-319-67071-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910299878803321 |
Cham : , : Springer International Publishing : , : Imprint : Edizioni della Normale, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018 : Applications and Techniques in Cyber Security and Intelligence / / edited by Jemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam, Zheng Xu, Mohammed Atiquzzaman |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (305 pages) |
Disciplina | 005.8 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Computational intelligence
Artificial intelligence Computational Intelligence Artificial Intelligence |
ISBN | 3-319-98776-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Convolutional Neural Network Deep-Learning Models for Prediction of Shared Bicycle Demand -- Analysis of Feature Selection Techniques for Correlation-Based Network Anomaly Detection -- An RFID Path Authentication Protocol Based on Chebyshev Polynomials -- An Efficient Authentication Protocol for RFID-based Supply Chains -- Research on the Two Stage Full Life Cycle Management of Police Equipment -- Research on Audio and Video Transmission Strategy for Android -- Emojis Sentiment Analysis Based on Big Social Media Data -- A Transfer Learning Approach for Credit Scoring -- A Parallel Programming Model Research Based on Heterogeneous Multi-core Embedded Processor -- An Improved Apriori-Pro Algorithm -- An Improved Fuzzy Support Vector Machine Algorithm Based on Refactoring Class Center -- An Ensemble Data Stream Mining Algorithm for Class-imbalanced Applications -- A Gaussian-Based Trust Model for Nodes of Sensor Networks -- A Study of Face Recognition System’s Testing and Evaluation Methods -- Network Security Problems and Solutions of Video Surveillance System -- Image Encryption Algorithms Based on Chaos Through Dual Scrambling of Dynamic Josephus Ring and Bit -- Statistical Analysis of Traffic-related Social Media Data of Multiple Cities in China -- Exploring Influential Factors in Recommending Algorithms for All Items and Niche Items -- A Distributed Approach of Accompany Vehicle Discovery -- Spatial Context for Correlation Filter Tracking -- The Automobile Recommendation Method Based on Sentiment Analysis of Online Comments -- An Adaptive Tracking Algorithm for Micro-Blog Topic based on Association Semantic Network -- Knowledge Extracting from Micro-Blog Topic -- Personal Relations Extraction from Microblog Text Based on Relations Trigger Words -- Recommendation Algorithm Based on Latent Semantic of Tags -- Ontology-supported Case-based Reasoning Approach for Double Scenario Model Construction in International Disaster Medical Relief Action -- Web Sanitization from Malicious Code Injection Attacks -- Event Element Recognition Based on Improved K-means Algorithm -- A Comparative Method of Legal Documents Based on LDA -- Feature Selection Approach for Twitter Sentiment Analysis and Text classification Based on Chi-square and Naïve Bayes -- A Combined Approach of Long Term Spectral Flatness and Formant Based Voice Activity Detection -- Design and Development of Automatic Packaging Equipment for Boxed Drugs -- Development of Automatic Material Sorting Machine Based on PLC -- Intelligent Counter-terrorism Equipment Status and Development -- A Monitoring System of Ground-Air Interaction Multi-Sensory Fusion Plant Growth Condition -- RSCHE: A Virtual Grid Structure Based Routing Scheme with Cell-Header Group Exchanged for Wireless Sensor Network -- A Improved Person Reidentification Method by Selective Convolutional Descriptor Aggregation -- A Survey of Multi-object Video Tracking Algorithms -- An Overview of Image-based Person Re-identification -- Electrical Data Recovery with Weather Information via Collective Matrix Factorization -- Two-Phases Detection Scheme: Detecting Android Malware in Android Markets -- A Software Quality Testing Evaluation Method and its Power Grid Application -- An Index Display Software Evaluation Architecture for Power Grid Application on Big Data Platform -- A Unified Access Method of Heterogeneous Big Data in Power Grid Application -- Regional Power Grid dispatch and Control Integrated Backup System Based on Cloud Computing -- Detection of Anomaly in Firewall Rule-Sets -- Classification and Coding of Pipe Gallery BIM Model for Operation and Maintenance -- A UAV Operational Situation Similarity Measurement Method Based on Empirical Mode Decomposition -- Research on Parking Guidance Information System Based on "Internet Plus" -- Dynamic Multi-objective Optimization for Mixed Traffic Flow Based on Partial Least Squares Prediction Model -- Multi-objective Genetic Algorithm BasedPrefabricated Component Production Process Optimization Considering the Demand Fluctuations in the Construction Site -- Anomaly Detection in Time Series Data Based on Unthresholded Recurrence Plots -- A Two-stage Temporal Anomaly Detection Algorithm Based on Danger Theory -- A Data-driven Framework for Tunnel Infrastructure Maintenance -- A Heuristic for Legacy Information System Remodularization -- E-maintenance Platform Design for Public Infrastructure based on IFC and Semantic Web Technologies -- Building and Application of Shield Construction Big Data Analysis Platform -- A Professional Competence Measurement Approach Based on a Modified PageRank Algorithm -- Particle-Filter-based Prediction for Anomaly Detection -- Analysis on Building a Green Eco-smart City Based on Block Chain Technology -- 3D Indoor Network Model for Emergency Response of Multi-utility Tunnel -- Computer Data Integration Analysis of the Personal Credit Reporting System -- Digital Image Encryption Algorithm Based on Affine Cipher -- Research on the Evaluation Methods of the Guidance and Test on the Student Employment Based on the Computer Model -- Research on the Ideological and Political Assessment System Based on the Data Visualization -- Research on the Interaction Mechanism Between the Ideological and Political Education and the Computer Network Under the New Media Environment -- Research on the Key Technology of the Computer Graphics and Image Processing -- Research on the Security Management Information System Based on the Data Mining. |
Record Nr. | UNINA-9910484527703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|