Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/2630
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Margret Anouncia, S. ; editor. ; | en_US |
dc.contributor.author | Wiil, Uffe Kock. ; editor. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:39:16Z | - |
dc.date.available | 2020-05-17T08:39:16Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9789811066801 ; 978-981-10-6680-1 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/2630 | - |
dc.description | QA76.76.A65 ; | en_US |
dc.description | en_US | |
dc.description | Printed edition: ; 9789811066795 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | 005.7 ; 23 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | 42 ; | en_US |
dc.description.abstract | This book provides a major forum for the technical advancement of knowledge management and its applications across diversified domains. Pursuing an interdisciplinary approach, it focuses on methods used to identify and acquire valid, potentially useful knowledge sources. Managing the gathered knowledge and applying it to multiple domains including health care, social networks, data mining, recommender systems, image processing, pattern recognition and predictions using machine learning techniques is the major strength of this book. e Effective knowledge management has become a key to the success of business organizations, and can offer a substantial competitive edge. e So as to be accessible to all scholars, this book combines the core ideas of knowledge management and its applications in numerous domains, illustrated in case studies. The techniques and concepts proposed here can be extended in future to accommodate changing business organizationsee needs as well as practitionersee innovative ideas. ; | en_US |
dc.description.statementofresponsibility | edited by S. Margret Anouncia, Uffe Kock Wiil. | en_US |
dc.description.tableofcontents | Part I. Knowledge Manipulation Techniques for Internet Technologies -- Chapter 1.eImplementation of Connected Dominating Set in Fog Computing using Knowledge upgraded IoT Devices.-eChapter 2.eDeveloping Security Intelligence in Big Data.-eChapter 3.eMethods to Investigate Concept Drift in Big Data Streams.-eChapter 4.eSemantic Interpretation of Tweets: A Contextual Knowledge Based Approach for Tweet Analysis.-eChapter 5.eWorkload Assessment for a Sustainable Manufacturing Paradigm Using Social Network Analysis Method.-ePart II. Knowledge Computing for Large Organizations -- Chapter 6.eVirtual Data Warehouse Model Employing Cryptoeemath Algorithm and Intelligent Sensor Algorithm for Secured Transmission and Performance Enhancement.-eChapter 7.eFramework for Geo Spatial Query Processing by Integrating Cassandra with Hadoop.-eChapter 8.eKnowledge Computational Intelligence in Network Intrusion Detection Systems.-eChapter 9.eEfficacy of Knowledge Mining and Machine Learning Techniques in Health Care Industry.-eChapter 10.eCryptanalysis of Protocol for Enhanced Threshold Proxy Signature Scheme Based on Elliptic Curve Cryptography for Known Signers.-eChapter 11.ePartial Fractional Derivative (PFD) based Texture Analysis Model for Medical Image Segmentation.-eChapter 12.eBreast Cancer Classification using Deep Neural Networks -- Part III. Knowledge Computing and Competency Development -- Chapter 13.eSense Disambiguation of English Simple Prepositions in the Context of English-Hindi Machine Translation System.-eChapter 14.eBlock-level Handwritten Indic Script Identification using 4-directional Mask Oriented Features.-eChapter 15.eUser Interface Design recommendations through Multi Criteria Decision Analysis.-eChapter 16.eAffirmation of Emotionally Resilient Students by Eliminating Adolescent Psychiatric Disorder with the Employment of Cognitive Behavioural Therapy. ; | en_US |
dc.format.extent | XXI, 293 p. 107 illus., 64 illus. in color. ; online resource. ; | en_US |
dc.publisher | Springer Singapore : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.haspart | 9789811066801.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Artificial Intelligence | en_US |
dc.subject | Computational intelligence. ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Information Systems Applications | en_US |
dc.subject | Computational Intelligence. ; | en_US |
dc.subject | Artificial Intelligence and Robotics | en_US |
dc.title | Knowledge Computing and Its Applications | en_US |
dc.title.alternative | Knowledge Manipulation and Processing Techniques: Volume 1 / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Singapore : | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9789811066801.pdf | 11.73 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Margret Anouncia, S. ; editor. ; | en_US |
dc.contributor.author | Wiil, Uffe Kock. ; editor. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:39:16Z | - |
dc.date.available | 2020-05-17T08:39:16Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9789811066801 ; 978-981-10-6680-1 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/2630 | - |
dc.description | QA76.76.A65 ; | en_US |
dc.description | en_US | |
dc.description | Printed edition: ; 9789811066795 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | 005.7 ; 23 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | 42 ; | en_US |
dc.description.abstract | This book provides a major forum for the technical advancement of knowledge management and its applications across diversified domains. Pursuing an interdisciplinary approach, it focuses on methods used to identify and acquire valid, potentially useful knowledge sources. Managing the gathered knowledge and applying it to multiple domains including health care, social networks, data mining, recommender systems, image processing, pattern recognition and predictions using machine learning techniques is the major strength of this book. e Effective knowledge management has become a key to the success of business organizations, and can offer a substantial competitive edge. e So as to be accessible to all scholars, this book combines the core ideas of knowledge management and its applications in numerous domains, illustrated in case studies. The techniques and concepts proposed here can be extended in future to accommodate changing business organizationsee needs as well as practitionersee innovative ideas. ; | en_US |
dc.description.statementofresponsibility | edited by S. Margret Anouncia, Uffe Kock Wiil. | en_US |
dc.description.tableofcontents | Part I. Knowledge Manipulation Techniques for Internet Technologies -- Chapter 1.eImplementation of Connected Dominating Set in Fog Computing using Knowledge upgraded IoT Devices.-eChapter 2.eDeveloping Security Intelligence in Big Data.-eChapter 3.eMethods to Investigate Concept Drift in Big Data Streams.-eChapter 4.eSemantic Interpretation of Tweets: A Contextual Knowledge Based Approach for Tweet Analysis.-eChapter 5.eWorkload Assessment for a Sustainable Manufacturing Paradigm Using Social Network Analysis Method.-ePart II. Knowledge Computing for Large Organizations -- Chapter 6.eVirtual Data Warehouse Model Employing Cryptoeemath Algorithm and Intelligent Sensor Algorithm for Secured Transmission and Performance Enhancement.-eChapter 7.eFramework for Geo Spatial Query Processing by Integrating Cassandra with Hadoop.-eChapter 8.eKnowledge Computational Intelligence in Network Intrusion Detection Systems.-eChapter 9.eEfficacy of Knowledge Mining and Machine Learning Techniques in Health Care Industry.-eChapter 10.eCryptanalysis of Protocol for Enhanced Threshold Proxy Signature Scheme Based on Elliptic Curve Cryptography for Known Signers.-eChapter 11.ePartial Fractional Derivative (PFD) based Texture Analysis Model for Medical Image Segmentation.-eChapter 12.eBreast Cancer Classification using Deep Neural Networks -- Part III. Knowledge Computing and Competency Development -- Chapter 13.eSense Disambiguation of English Simple Prepositions in the Context of English-Hindi Machine Translation System.-eChapter 14.eBlock-level Handwritten Indic Script Identification using 4-directional Mask Oriented Features.-eChapter 15.eUser Interface Design recommendations through Multi Criteria Decision Analysis.-eChapter 16.eAffirmation of Emotionally Resilient Students by Eliminating Adolescent Psychiatric Disorder with the Employment of Cognitive Behavioural Therapy. ; | en_US |
dc.format.extent | XXI, 293 p. 107 illus., 64 illus. in color. ; online resource. ; | en_US |
dc.publisher | Springer Singapore : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.haspart | 9789811066801.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Artificial Intelligence | en_US |
dc.subject | Computational intelligence. ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Information Systems Applications | en_US |
dc.subject | Computational Intelligence. ; | en_US |
dc.subject | Artificial Intelligence and Robotics | en_US |
dc.title | Knowledge Computing and Its Applications | en_US |
dc.title.alternative | Knowledge Manipulation and Processing Techniques: Volume 1 / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Singapore : | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9789811066801.pdf | 11.73 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Margret Anouncia, S. ; editor. ; | en_US |
dc.contributor.author | Wiil, Uffe Kock. ; editor. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:39:16Z | - |
dc.date.available | 2020-05-17T08:39:16Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9789811066801 ; 978-981-10-6680-1 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/2630 | - |
dc.description | QA76.76.A65 ; | en_US |
dc.description | en_US | |
dc.description | Printed edition: ; 9789811066795 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | 005.7 ; 23 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | 42 ; | en_US |
dc.description.abstract | This book provides a major forum for the technical advancement of knowledge management and its applications across diversified domains. Pursuing an interdisciplinary approach, it focuses on methods used to identify and acquire valid, potentially useful knowledge sources. Managing the gathered knowledge and applying it to multiple domains including health care, social networks, data mining, recommender systems, image processing, pattern recognition and predictions using machine learning techniques is the major strength of this book. e Effective knowledge management has become a key to the success of business organizations, and can offer a substantial competitive edge. e So as to be accessible to all scholars, this book combines the core ideas of knowledge management and its applications in numerous domains, illustrated in case studies. The techniques and concepts proposed here can be extended in future to accommodate changing business organizationsee needs as well as practitionersee innovative ideas. ; | en_US |
dc.description.statementofresponsibility | edited by S. Margret Anouncia, Uffe Kock Wiil. | en_US |
dc.description.tableofcontents | Part I. Knowledge Manipulation Techniques for Internet Technologies -- Chapter 1.eImplementation of Connected Dominating Set in Fog Computing using Knowledge upgraded IoT Devices.-eChapter 2.eDeveloping Security Intelligence in Big Data.-eChapter 3.eMethods to Investigate Concept Drift in Big Data Streams.-eChapter 4.eSemantic Interpretation of Tweets: A Contextual Knowledge Based Approach for Tweet Analysis.-eChapter 5.eWorkload Assessment for a Sustainable Manufacturing Paradigm Using Social Network Analysis Method.-ePart II. Knowledge Computing for Large Organizations -- Chapter 6.eVirtual Data Warehouse Model Employing Cryptoeemath Algorithm and Intelligent Sensor Algorithm for Secured Transmission and Performance Enhancement.-eChapter 7.eFramework for Geo Spatial Query Processing by Integrating Cassandra with Hadoop.-eChapter 8.eKnowledge Computational Intelligence in Network Intrusion Detection Systems.-eChapter 9.eEfficacy of Knowledge Mining and Machine Learning Techniques in Health Care Industry.-eChapter 10.eCryptanalysis of Protocol for Enhanced Threshold Proxy Signature Scheme Based on Elliptic Curve Cryptography for Known Signers.-eChapter 11.ePartial Fractional Derivative (PFD) based Texture Analysis Model for Medical Image Segmentation.-eChapter 12.eBreast Cancer Classification using Deep Neural Networks -- Part III. Knowledge Computing and Competency Development -- Chapter 13.eSense Disambiguation of English Simple Prepositions in the Context of English-Hindi Machine Translation System.-eChapter 14.eBlock-level Handwritten Indic Script Identification using 4-directional Mask Oriented Features.-eChapter 15.eUser Interface Design recommendations through Multi Criteria Decision Analysis.-eChapter 16.eAffirmation of Emotionally Resilient Students by Eliminating Adolescent Psychiatric Disorder with the Employment of Cognitive Behavioural Therapy. ; | en_US |
dc.format.extent | XXI, 293 p. 107 illus., 64 illus. in color. ; online resource. ; | en_US |
dc.publisher | Springer Singapore : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.haspart | 9789811066801.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Artificial Intelligence | en_US |
dc.subject | Computational intelligence. ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Information Systems Applications | en_US |
dc.subject | Computational Intelligence. ; | en_US |
dc.subject | Artificial Intelligence and Robotics | en_US |
dc.title | Knowledge Computing and Its Applications | en_US |
dc.title.alternative | Knowledge Manipulation and Processing Techniques: Volume 1 / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Singapore : | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9789811066801.pdf | 11.73 MB | Adobe PDF | Preview File |