MARC보기
LDR03802cmm u2200529Mi 4500
001000000322401
003OCoLC
00520230613114432
006m e d
007cr bn||||m|||a
008210530s2020 pau fob 001 0 eng d
020 ▼a 1799833011 ▼q eISBN
020 ▼a 9781799833017 ▼q (electronic bk.)
020 ▼z 9781799832997 ▼q h/c
020 ▼z 9781799833000 ▼q s/c
0247 ▼a 10.4018/978-1-7998-3299-7 ▼2 doi
035 ▼a 2939945 ▼b (N$T)
035 ▼a (OCoLC)1253443853
040 ▼a IGIGL ▼b eng ▼e rda ▼c IGIGL ▼d OCLCO ▼d YDX ▼d OCL ▼d N$T ▼d 248032
049 ▼a MAIN
050 4 ▼a QA76.9.D314 ▼b H36 2020e
08204 ▼a 005.8 ▼2 23
24500 ▼a Handbook of research on machine learning techniques for pattern recognition and information security / ▼c Mohit Dua, Ankit Kumar Jain, editors. ▼h [electronic resource]
264 1 ▼a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : ▼b IGI Global, ▼c 2020.
300 ▼a 1 online resource (26 PDFs (355 pages))
336 ▼a text ▼2 rdacontent
337 ▼a electronic ▼2 isbdmedia
338 ▼a online resource ▼2 rdacarrier
504 ▼a Includes bibliographical references and index.
5050 ▼a Chapter 1. Intelligent vision-based systems for public safety and protection via machine learning techniques -- Chapter 2. Comparative analysis of various soft computing technique-based automatic licence plate recognition systems -- Chapter 3. Impact of syntactical and statistical pattern recognition on prognostic reasoning -- Chapter 4. Challenges and issues in plant disease detection using deep learning -- Chapter 5. Automatic animal detection and collision avoidance system (ADCAS) using thermal camera -- Chapter 6. Distracted driver detection system using deep learning technique -- Chapter 7. Application of deep learning model convolution neural network for effective web information retrieval -- Chapter 8. Cosine transformed chaos function and block scrambling-based image encryption -- Chapter 9. An improved approach for multiple image encryption using alternate multidimensional chaos and Lorenz attractor -- Chapter 10. Simple linear iterative clustering (SLIC) and graph theory-based image segmentation -- Chapter 11. COVID-19 detection using chest x-ray and transfer learning -- Chapter 12. COVID-19-related predictions using NER on news headlines -- Chapter 13. Security issues in fog computing and ML-based solutions -- Chapter 14. Intrusion detection systems: current trends and future challenges -- Chapter 15. Vulnerability assessment and malware analysis of android apps using machine learning -- Chapter 16. Locally-adaptive nai?ve bayes framework design via density-based clustering for large scale datasets -- Chapter 17. RFID security issues, defenses, and security schemes.
5203 ▼a "This book examines the impact of machine learning techniques on pattern recognition and information security"-- ▼c Provided by publisher.
588 ▼a Description based on title screen (IGI Global, viewed 05/30/2021).
590 ▼a Added to collection customer.56279.3
650 0 ▼a Database security.
650 0 ▼a Machine learning.
650 0 ▼a Pattern recognition systems.
650 7 ▼a Pattern recognition systems. ▼2 fast ▼0 (OCoLC)fst01055266
650 7 ▼a Machine learning. ▼2 fast ▼0 (OCoLC)fst01004795
650 7 ▼a Database security. ▼2 fast ▼0 (OCoLC)fst00888063
655 4 ▼a Electronic books.
7001 ▼a Dua, Mohit, ▼d 1982-, ▼e editor.
7001 ▼a Jain, Ankit Kumar, ▼d 1986-, ▼e editor.
7102 ▼a IGI Global, ▼e publisher.
77608 ▼i Print version: ▼z 1799832996 ▼z 9781799832997 ▼w (DLC) 2019051102
85640 ▼3 EBSCOhost ▼u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2939945
938 ▼a EBSCOhost ▼b EBSC ▼n 2939945
990 ▼a 관리자
994 ▼a 92 ▼b N$T