Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/2630
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMargret Anouncia, S. ; editor. ;en_US
dc.contributor.authorWiil, Uffe Kock. ; editor. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:39:16Z-
dc.date.available2020-05-17T08:39:16Z-
dc.date.issued2018en_US
dc.identifier.isbn9789811066801 ; 978-981-10-6680-1 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/2630-
dc.descriptionQA76.76.A65 ;en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9789811066795 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.description005.7 ; 23 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description42 ;en_US
dc.description.abstractThis book provides a major forum for the technical advancement of knowledge management and its applications across diversified domains. Pursuing an interdisciplinary approach, it focuses on methods used to identify and acquire valid, potentially useful knowledge sources. Managing the gathered knowledge and applying it to multiple domains including health care, social networks, data mining, recommender systems, image processing, pattern recognition and predictions using machine learning techniques is the major strength of this book. e Effective knowledge management has become a key to the success of business organizations, and can offer a substantial competitive edge. e So as to be accessible to all scholars, this book combines the core ideas of knowledge management and its applications in numerous domains, illustrated in case studies. The techniques and concepts proposed here can be extended in future to accommodate changing business organizationsee needs as well as practitionersee innovative ideas. ;en_US
dc.description.statementofresponsibilityedited by S. Margret Anouncia, Uffe Kock Wiil.en_US
dc.description.tableofcontentsPart I. Knowledge Manipulation Techniques for Internet Technologies -- Chapter 1.eImplementation of Connected Dominating Set in Fog Computing using Knowledge upgraded IoT Devices.-eChapter 2.eDeveloping Security Intelligence in Big Data.-eChapter 3.eMethods to Investigate Concept Drift in Big Data Streams.-eChapter 4.eSemantic Interpretation of Tweets: A Contextual Knowledge Based Approach for Tweet Analysis.-eChapter 5.eWorkload Assessment for a Sustainable Manufacturing Paradigm Using Social Network Analysis Method.-ePart II. Knowledge Computing for Large Organizations -- Chapter 6.eVirtual Data Warehouse Model Employing Cryptoeemath Algorithm and Intelligent Sensor Algorithm for Secured Transmission and Performance Enhancement.-eChapter 7.eFramework for Geo Spatial Query Processing by Integrating Cassandra with Hadoop.-eChapter 8.eKnowledge Computational Intelligence in Network Intrusion Detection Systems.-eChapter 9.eEfficacy of Knowledge Mining and Machine Learning Techniques in Health Care Industry.-eChapter 10.eCryptanalysis of Protocol for Enhanced Threshold Proxy Signature Scheme Based on Elliptic Curve Cryptography for Known Signers.-eChapter 11.ePartial Fractional Derivative (PFD) based Texture Analysis Model for Medical Image Segmentation.-eChapter 12.eBreast Cancer Classification using Deep Neural Networks -- Part III. Knowledge Computing and Competency Development -- Chapter 13.eSense Disambiguation of English Simple Prepositions in the Context of English-Hindi Machine Translation System.-eChapter 14.eBlock-level Handwritten Indic Script Identification using 4-directional Mask Oriented Features.-eChapter 15.eUser Interface Design recommendations through Multi Criteria Decision Analysis.-eChapter 16.eAffirmation of Emotionally Resilient Students by Eliminating Adolescent Psychiatric Disorder with the Employment of Cognitive Behavioural Therapy. ;en_US
dc.format.extentXXI, 293 p. 107 illus., 64 illus. in color. ; online resource. ;en_US
dc.publisherSpringer Singapore :en_US
dc.publisherImprint: Springer,en_US
dc.relation.haspart9789811066801.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectArtificial Intelligenceen_US
dc.subjectComputational intelligence. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectInformation Systems Applicationsen_US
dc.subjectComputational Intelligence. ;en_US
dc.subjectArtificial Intelligence and Roboticsen_US
dc.titleKnowledge Computing and Its Applicationsen_US
dc.title.alternativeKnowledge Manipulation and Processing Techniques: Volume 1 /en_US
dc.typeBooken_US
dc.publisher.placeSingapore :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9789811066801.pdf11.73 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMargret Anouncia, S. ; editor. ;en_US
dc.contributor.authorWiil, Uffe Kock. ; editor. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:39:16Z-
dc.date.available2020-05-17T08:39:16Z-
dc.date.issued2018en_US
dc.identifier.isbn9789811066801 ; 978-981-10-6680-1 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/2630-
dc.descriptionQA76.76.A65 ;en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9789811066795 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.description005.7 ; 23 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description42 ;en_US
dc.description.abstractThis book provides a major forum for the technical advancement of knowledge management and its applications across diversified domains. Pursuing an interdisciplinary approach, it focuses on methods used to identify and acquire valid, potentially useful knowledge sources. Managing the gathered knowledge and applying it to multiple domains including health care, social networks, data mining, recommender systems, image processing, pattern recognition and predictions using machine learning techniques is the major strength of this book. e Effective knowledge management has become a key to the success of business organizations, and can offer a substantial competitive edge. e So as to be accessible to all scholars, this book combines the core ideas of knowledge management and its applications in numerous domains, illustrated in case studies. The techniques and concepts proposed here can be extended in future to accommodate changing business organizationsee needs as well as practitionersee innovative ideas. ;en_US
dc.description.statementofresponsibilityedited by S. Margret Anouncia, Uffe Kock Wiil.en_US
dc.description.tableofcontentsPart I. Knowledge Manipulation Techniques for Internet Technologies -- Chapter 1.eImplementation of Connected Dominating Set in Fog Computing using Knowledge upgraded IoT Devices.-eChapter 2.eDeveloping Security Intelligence in Big Data.-eChapter 3.eMethods to Investigate Concept Drift in Big Data Streams.-eChapter 4.eSemantic Interpretation of Tweets: A Contextual Knowledge Based Approach for Tweet Analysis.-eChapter 5.eWorkload Assessment for a Sustainable Manufacturing Paradigm Using Social Network Analysis Method.-ePart II. Knowledge Computing for Large Organizations -- Chapter 6.eVirtual Data Warehouse Model Employing Cryptoeemath Algorithm and Intelligent Sensor Algorithm for Secured Transmission and Performance Enhancement.-eChapter 7.eFramework for Geo Spatial Query Processing by Integrating Cassandra with Hadoop.-eChapter 8.eKnowledge Computational Intelligence in Network Intrusion Detection Systems.-eChapter 9.eEfficacy of Knowledge Mining and Machine Learning Techniques in Health Care Industry.-eChapter 10.eCryptanalysis of Protocol for Enhanced Threshold Proxy Signature Scheme Based on Elliptic Curve Cryptography for Known Signers.-eChapter 11.ePartial Fractional Derivative (PFD) based Texture Analysis Model for Medical Image Segmentation.-eChapter 12.eBreast Cancer Classification using Deep Neural Networks -- Part III. Knowledge Computing and Competency Development -- Chapter 13.eSense Disambiguation of English Simple Prepositions in the Context of English-Hindi Machine Translation System.-eChapter 14.eBlock-level Handwritten Indic Script Identification using 4-directional Mask Oriented Features.-eChapter 15.eUser Interface Design recommendations through Multi Criteria Decision Analysis.-eChapter 16.eAffirmation of Emotionally Resilient Students by Eliminating Adolescent Psychiatric Disorder with the Employment of Cognitive Behavioural Therapy. ;en_US
dc.format.extentXXI, 293 p. 107 illus., 64 illus. in color. ; online resource. ;en_US
dc.publisherSpringer Singapore :en_US
dc.publisherImprint: Springer,en_US
dc.relation.haspart9789811066801.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectArtificial Intelligenceen_US
dc.subjectComputational intelligence. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectInformation Systems Applicationsen_US
dc.subjectComputational Intelligence. ;en_US
dc.subjectArtificial Intelligence and Roboticsen_US
dc.titleKnowledge Computing and Its Applicationsen_US
dc.title.alternativeKnowledge Manipulation and Processing Techniques: Volume 1 /en_US
dc.typeBooken_US
dc.publisher.placeSingapore :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9789811066801.pdf11.73 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMargret Anouncia, S. ; editor. ;en_US
dc.contributor.authorWiil, Uffe Kock. ; editor. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:39:16Z-
dc.date.available2020-05-17T08:39:16Z-
dc.date.issued2018en_US
dc.identifier.isbn9789811066801 ; 978-981-10-6680-1 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/2630-
dc.descriptionQA76.76.A65 ;en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9789811066795 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.description005.7 ; 23 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description42 ;en_US
dc.description.abstractThis book provides a major forum for the technical advancement of knowledge management and its applications across diversified domains. Pursuing an interdisciplinary approach, it focuses on methods used to identify and acquire valid, potentially useful knowledge sources. Managing the gathered knowledge and applying it to multiple domains including health care, social networks, data mining, recommender systems, image processing, pattern recognition and predictions using machine learning techniques is the major strength of this book. e Effective knowledge management has become a key to the success of business organizations, and can offer a substantial competitive edge. e So as to be accessible to all scholars, this book combines the core ideas of knowledge management and its applications in numerous domains, illustrated in case studies. The techniques and concepts proposed here can be extended in future to accommodate changing business organizationsee needs as well as practitionersee innovative ideas. ;en_US
dc.description.statementofresponsibilityedited by S. Margret Anouncia, Uffe Kock Wiil.en_US
dc.description.tableofcontentsPart I. Knowledge Manipulation Techniques for Internet Technologies -- Chapter 1.eImplementation of Connected Dominating Set in Fog Computing using Knowledge upgraded IoT Devices.-eChapter 2.eDeveloping Security Intelligence in Big Data.-eChapter 3.eMethods to Investigate Concept Drift in Big Data Streams.-eChapter 4.eSemantic Interpretation of Tweets: A Contextual Knowledge Based Approach for Tweet Analysis.-eChapter 5.eWorkload Assessment for a Sustainable Manufacturing Paradigm Using Social Network Analysis Method.-ePart II. Knowledge Computing for Large Organizations -- Chapter 6.eVirtual Data Warehouse Model Employing Cryptoeemath Algorithm and Intelligent Sensor Algorithm for Secured Transmission and Performance Enhancement.-eChapter 7.eFramework for Geo Spatial Query Processing by Integrating Cassandra with Hadoop.-eChapter 8.eKnowledge Computational Intelligence in Network Intrusion Detection Systems.-eChapter 9.eEfficacy of Knowledge Mining and Machine Learning Techniques in Health Care Industry.-eChapter 10.eCryptanalysis of Protocol for Enhanced Threshold Proxy Signature Scheme Based on Elliptic Curve Cryptography for Known Signers.-eChapter 11.ePartial Fractional Derivative (PFD) based Texture Analysis Model for Medical Image Segmentation.-eChapter 12.eBreast Cancer Classification using Deep Neural Networks -- Part III. Knowledge Computing and Competency Development -- Chapter 13.eSense Disambiguation of English Simple Prepositions in the Context of English-Hindi Machine Translation System.-eChapter 14.eBlock-level Handwritten Indic Script Identification using 4-directional Mask Oriented Features.-eChapter 15.eUser Interface Design recommendations through Multi Criteria Decision Analysis.-eChapter 16.eAffirmation of Emotionally Resilient Students by Eliminating Adolescent Psychiatric Disorder with the Employment of Cognitive Behavioural Therapy. ;en_US
dc.format.extentXXI, 293 p. 107 illus., 64 illus. in color. ; online resource. ;en_US
dc.publisherSpringer Singapore :en_US
dc.publisherImprint: Springer,en_US
dc.relation.haspart9789811066801.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectArtificial Intelligenceen_US
dc.subjectComputational intelligence. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectInformation Systems Applicationsen_US
dc.subjectComputational Intelligence. ;en_US
dc.subjectArtificial Intelligence and Roboticsen_US
dc.titleKnowledge Computing and Its Applicationsen_US
dc.title.alternativeKnowledge Manipulation and Processing Techniques: Volume 1 /en_US
dc.typeBooken_US
dc.publisher.placeSingapore :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9789811066801.pdf11.73 MBAdobe PDFThumbnail
Preview File