GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Data mining.  (1)
  • Singapore :Springer Singapore Pte. Limited,  (1)
  • American Chemical Society (ACS)
Document type
Publisher
  • Singapore :Springer Singapore Pte. Limited,  (1)
  • American Chemical Society (ACS)
Language
Years
  • 1
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Data mining. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (172 pages)
    Edition: 1st ed.
    ISBN: 9789811037795
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.555
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Acknowledgements -- About the Book -- Contents -- About the Editors -- 1 Research on SaaS-Based Mine Emergency Rescue Preplan and Case Management System -- Abstract -- 1 Introduction -- 2 SaaS and Service-Oriented Architecture -- 3 The Architecture of System -- 4 The Components of System -- 5 System Implementation and Testing -- 6 Conclusion -- Acknowledgements -- References -- 2 An Investigation of Matching Approaches in Fingerprints Identification -- Abstract -- 1 Introduction -- 2 Research Method -- 2.1 Research Questions -- 2.2 Research Strategies -- 3 Fingerprints Matching Approaches -- 3.1 Taxonomy of the Study -- 3.2 Generic Process of Three Main Types of Fingerprints Matching -- 4 Current Issues of the Matching Approaches -- Acknowledgements -- References -- 3 Figure Plagiarism Detection Using Content-Based Features -- Abstract -- 1 Introduction -- 2 Content-Based Feature Extraction -- 3 Similarity Detection -- 4 Result and Evaluation -- 5 Conclusions -- Acknowledgements -- References -- 4 An Efficient Content-Based Image Retrieval (CBIR) Using GLCM for Feature Extraction -- Abstract -- 1 Introduction -- 2 Proposed System -- 2.1 Preprocessing Phase -- 2.2 Feature Extraction Phase -- 3 Methodology -- 4 Similarity Feature Extraction -- 5 Algorithm for GLCM -- 6 Results and Discussion -- 7 Comparative Analysis -- 8 Conclusions -- References -- 5 Emotion Recognition System Based on Facial Expressions Using SVM -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Emotion Recognition -- 3.1 Image Preprocessing -- 3.2 Feature Extraction -- 3.3 Feature Selection -- 3.4 Expression Recognition -- 3.5 Experiments Results -- 4 Conclusion -- References -- 6 An AES-CHAOS-Based Hybrid Approach to Encrypt Multiple Images -- Abstract -- 1 Introduction -- 1.1 Fast Chaotic Algorithm -- 1.2 AES Image Encryption -- 1.3 Cramer's Rule. , 2 Literature Review -- 3 Proposed Algorithm -- 4 Results -- 5 Conclusion -- References -- 7 Automatic Text Summarization of Video Lectures Using Subtitles -- Abstract -- 1 Introduction -- 2 Proposed System -- 2.1 Proposed Architecture -- 2.1.1 Data Preprocessing -- 2.1.2 Feature Selection for Summarization -- 2.1.3 Processing After Feature Selection for Summarization -- 3 Conclusion -- References -- 8 Classification of EMG Signals Using ANFIS for the Detection of Neuromuscular Disorders -- Abstract -- 1 Introduction -- 2 Proposed Model -- 2.1 Preprocessing of the EMG Signal -- 2.2 Processing or Feature Extraction of EMG Signal -- 2.3 Classification of EMG Signal -- 3 Results and Analysis -- 4 Conclusion -- References -- 9 Evaluating Similarity of Websites Using Genetic Algorithm for Web Design Reorganisation -- Abstract -- 1 Introduction -- 2 Web Mining-A Background -- 2.1 Web Mining Taxonomy -- 2.2 Web Mining Tasks -- 3 Literature Survey -- 4 Proposed Methodology -- 5 Experimental Evaluation -- 5.1 Proposed Genetic Algorithm -- 5.2 Computation of Similarity -- 6 Conclusion -- References -- 10 Fusion of Misuse Detection with Anomaly Detection Technique for Novel Hybrid Network Intrusion Detection System -- Abstract -- 1 Introduction -- 2 Proposed Hybrid Intrusion Detection Methodology -- 2.1 Feature Preparation Module -- 2.2 Misuse Analyzer Module -- 2.3 Anomaly Analyzer Module -- 3 Simulation Results -- 4 Conclusion -- References -- 11 Analysis of Reconfigurable Fabric Architecture with Cryptographic Application Using Hashing Techniques -- Abstract -- 1 Introduction -- 2 Methodology -- 3 Implementation of Reconfigurable Fabric -- 4 Interconnect Topologies -- 5 Operation -- 6 Results -- 6.1 Hashing Function -- 7 Conclusion -- References -- 12 Privacy Preservation of Infrequent Itemsets Mining Using GA Approach -- Abstract -- 1 Introduction. , 2 Literature Survey -- 3 Problem Definition -- 4 Proposed Framework -- 5 Proposed Algorithm -- 5.1 Illustrated Example -- 6 Result Analysis -- 7 Conclusion -- References -- 13 A Quinphone-Based Context-Dependent Acoustic Modeling for LVCSR -- Abstract -- 1 Introduction -- 2 Working of ASR -- 3 Phonetic Representation of Speech Signals -- 3.1 Modeling Using Monophones -- 3.2 Modeling Using Triphones -- 3.3 Modeling Using Quinphones -- 4 Implementation -- 4.1 Speech Data Preparation -- 4.2 Training -- 4.3 ASR Performance Analysis -- 5 Experiments -- 5.1 Testing with Varying Vocabulary Sizes -- 5.2 Testing with Varying Gaussian Mixtures -- 6 Conclusion -- References -- 14 Slot-Loaded Microstrip Antenna: A Possible Solution for Wide Banding and Attaining Low Cross-Polarization -- Abstract -- 1 Introduction -- 2 Theoretical Background -- 3 Proposed Structure -- 4 Results and Discussions -- 5 Conclusions -- Acknowledgements -- References -- 15 Fractal PKC-Based Key Management Scheme for Wireless Sensor Networks -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 System Model -- 3.2 Fractal-based Key Pair Generation and Key Exchange -- 4 Fractal PKC-based Key Management Scheme: FPKM -- 4.1 Set-up Phase -- 4.2 Clustering Phase -- 4.3 Rekeying Phase -- 5 The Performance Evaluation of Proposed Scheme -- 6 Conclusion -- References -- 16 Histogram-Based Human Segmentation Technique for Infrared Images -- Abstract -- 1 Introduction -- 2 The Proposed Method -- 2.1 Selection of ROIs -- 2.2 Human Candidates Segmentation -- 3 Experiment Results -- 4 Conclusion -- References -- 17 Medical Image Segmentation Based on Beta Mixture Distribution for Effective Identification of Lesions -- Abstract -- 1 Introduction -- 2 Probability Distribution Functions of Beta Mixture Model Using the EM Algorithm -- 3 Clustering Algorithm Based on Fuzzy c-Means. , 4 Dataset -- 5 Segmentation Algorithm -- 5.1 Experimentation -- 6 Results Derived and Performance Analysis -- 7 Conclusion -- References -- 18 Toward Segmentation of Images Based on Non-Normal Mixture Models Based on Bivariate Skew Distribution -- Abstract -- 1 Introduction -- 2 Bivariate Skew Gaussian Mixture Model -- 3 k-Means Algorithm -- 4 Data Set Considered -- 5 Feature Selection -- 6 Experiment Result and Performance Evolution -- 7 Conclusion -- References -- 19 Development of Video Surveillance System in All-Black Environment Based on Infrared Laser Light -- Abstract -- 1 Introduction -- 2 Design of Video Capture System -- 2.1 IR Laser Aiding Light Module -- 2.2 Photoelectric Sensor Module -- 2.3 Central Control Module -- 3 System Testing -- 4 Conclusion -- Acknowledgements -- References -- 20 Data Preprocessing Techniques for Research Performance Analysis -- Abstract -- 1 Introduction -- 2 Literature Review -- 2.1 Business Intelligence -- 2.2 Data Preprocessing -- 3 Research Performance Analysis -- 3.1 Data Preprocessing Approach -- 4 Conclusion -- Acknowledgements -- References -- Author Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...