Computational intelligence in data mining : proceedings of the International Conference on CIDM, 10-11 December 2016 /: proceedings of the International Conference on CIDM, 10-11 December 2016. (2017)
- Record Type:
- Book
- Title:
- Computational intelligence in data mining : proceedings of the International Conference on CIDM, 10-11 December 2016 /: proceedings of the International Conference on CIDM, 10-11 December 2016. (2017)
- Main Title:
- Computational intelligence in data mining : proceedings of the International Conference on CIDM, 10-11 December 2016
- Further Information:
- Note: Himansu Sekhar Behera, Durga Prasad Mohapatra, editors.
- Editors:
- Behera, Himansu Sekhar
Mohapatra, Durga Prasad - Other Names:
- International Conference on "Computational Intelligence in Data Mining", 3rd
- Contents:
- Preface; Acknowledgements; About the Conference; Contents; About the Editors; 1 Safety and Crime Assistance System for a Fast Track Response on Mobile Devices in Bhubaneswar; Abstract; 1 Introduction; 2 Problem Statement; 3 Current Mechanism of Response to Crimes; 4 How the Situation can be Tackled?; 4.1 Victim at Center Approach; 4.2 Information Passing in Victim at Center Approach; 5 Safety and Crime Assistance System; 5.1 SCAS Architecture; 5.2 SCAS Advantages in Accidental Scenes; 5.3 Technical Architecture and Feasibility of SCAS; 6 Issues. 7 Process Workflow, Login Page, and Registration Page8 Conclusion; References; 2 Major Global Energy (Biomass); Abstract; 1 Introduction; 2 Biomass as a Renewable Resource; 2.1 Biomass Energy -Bio Power; 2.2 Environment Impact; 2.3 Working of Biomass Heating Plant; 2.4 Various Issue; 2.5 Benefits of Biomass Heating; 2.6 Disadvantage; 2.7 Application; 3 Conclusion; Acknowledgements; References; 3 Detecting Targeted Malicious E-Mail Using Linear Regression Algorithm with Data Mining Techniques; Abstract; 1 Introduction; 2 Literature Survey; 3 Design and Implementation; 3.1 Data Importing. 3.2 Data Preprocessing3.3 Data Mining; 3.4 Data Visualization; 4 Experiments and Results; 5 Conclusion and Future Work; Acknowledgements; References; 4 Classical and Evolutionary Image Contrast Enhancement Techniques: Comparison by Case Studies; Abstract; 1 Introduction; 2 Procedure; 2.1 Transformation Function and Objective Function Used; 2.1.1Preface; Acknowledgements; About the Conference; Contents; About the Editors; 1 Safety and Crime Assistance System for a Fast Track Response on Mobile Devices in Bhubaneswar; Abstract; 1 Introduction; 2 Problem Statement; 3 Current Mechanism of Response to Crimes; 4 How the Situation can be Tackled?; 4.1 Victim at Center Approach; 4.2 Information Passing in Victim at Center Approach; 5 Safety and Crime Assistance System; 5.1 SCAS Architecture; 5.2 SCAS Advantages in Accidental Scenes; 5.3 Technical Architecture and Feasibility of SCAS; 6 Issues. 7 Process Workflow, Login Page, and Registration Page8 Conclusion; References; 2 Major Global Energy (Biomass); Abstract; 1 Introduction; 2 Biomass as a Renewable Resource; 2.1 Biomass Energy -Bio Power; 2.2 Environment Impact; 2.3 Working of Biomass Heating Plant; 2.4 Various Issue; 2.5 Benefits of Biomass Heating; 2.6 Disadvantage; 2.7 Application; 3 Conclusion; Acknowledgements; References; 3 Detecting Targeted Malicious E-Mail Using Linear Regression Algorithm with Data Mining Techniques; Abstract; 1 Introduction; 2 Literature Survey; 3 Design and Implementation; 3.1 Data Importing. 3.2 Data Preprocessing3.3 Data Mining; 3.4 Data Visualization; 4 Experiments and Results; 5 Conclusion and Future Work; Acknowledgements; References; 4 Classical and Evolutionary Image Contrast Enhancement Techniques: Comparison by Case Studies; Abstract; 1 Introduction; 2 Procedure; 2.1 Transformation Function and Objective Function Used; 2.1.1 Algorithm for GA Based Approach; 2.1.2 Implementation of ABC Algorithm; 3 Results and Discussion; 3.1 Visual Comparison; 3.2 Quantitative Comparison; 3.2.1 Entropy; 3.2.2 Fitness Value; 3.2.3 SNR; 4 Conclusions; References. Cost Effectiveness Analysis of a Vertical Midimew-Connected Mesh Network (VMMN)1 Introduction; 2 Interconnection of Vertical-Midimew Connected Mesh Network; 2.1 Basic Module; 2.2 Higher Level Network; 3 Cost Effectiveness Analysis; 3.1 Cost Parameters; 3.2 Distance Parameters; 3.3 Packing Density; 3.4 Message Traffic Density; 3.5 Cost Effective Factor; 3.6 Time-Cost Effective Factor; 4 Conclusion; References; 6 Cluster Analysis Using Firefly-Based K-means Algorithm: A Combined Approach; Abstract; 1 Introduction; 2 Preliminaries; 2.1 K-means Algorithm; 2.2 Firefly Algorithm (FA). 3 Proposed Algorithm4 Experimental Set up and Result Analysis; 4.1 Parameter Set up; 4.2 Dataset Information; 4.3 Experimental Results and Analysis; 5 Conclusion and Future Work; References; A Study of Dimensionality Reduction Techniques with Machine Learning Methods for Credit Risk Prediction; 1 Introduction; 2 Literature Review; 3 Methodology; 3.1 Information Gain; 3.2 Gain Ratio; 3.3 Principle Component Analysis; 3.4 Linear Discriminant Analysis; 3.5 Proposed Method; 4 Experiments; 4.1 Data Set Description; 4.2 Performance Measures; 5 Results and Analysis; 6 Conclusion; References. … (more)
- Publisher Details:
- Singapore : Springer
- Publication Date:
- 2017
- Extent:
- 1 online resource (xix, 847 pages), illustrations
- Subjects:
- 006.3
Computational intelligence -- Congresses
Data mining -- Congresses
COMPUTERS -- Databases -- Data Mining
COMPUTERS -- Intelligence (AI) & Semantics
Computational intelligence
Data mining
Engineering
Computational Intelligence
Data Mining and Knowledge Discovery
Artificial Intelligence (incl. Robotics)
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9789811038747
9811038740
9811038732
9789811038730 - Related ISBNs:
- 9789811038730
- Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed May 25, 2017).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.405776
- Ingest File:
- 02_476.xml