Atjaunināt sīkdatņu piekrišanu

E-grāmata: Mining Intelligence and Knowledge Exploration: 9th International Conference, MIKE 2021, Hammamet, Tunisia, November 1-3, 2021, Proceedings

Edited by , Edited by , Edited by
  • Formāts - EPUB+DRM
  • Cena: 65,42 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes revised selected papers from the refereed proceedings of the 9th International Conference on Mining Intelligence and Knowledge Exploration, MIKE 2021, which took place in Hammamet, Tunisia, in November 2021. 

The 22 full papers included in this book were carefully reviewed and selected from 61 submissions. They deal with topics such as evolutionary computation, knowledge exploration in IoT, artificial intelligence, machine learning, data mining and information retrieval, medical image analysis, pattern recognition and computer vision, speech / signal processing, text mining and natural language processing, intelligent security systems, Smart and Intelligent Systems, etc.
Type 2 Diabetes Prediction from the Weighted Data.- Harnessing Energy of
Mary Hopfield Neural Network for Connectionist Temporal Sequence
Decoding.- Integrative Analysis of miRNA-mRNA Expression Data to Identify
miRNA-targets for Oral Cancer.- Compact Associative Classification for Up and
Down Regulated Genes using Supervised Discretization and
Clustering.- Assessment of Brain Tumor in Flair MRI Slice with Joint
Thresholding and Segmentation.- Mayfly-Algorithm Selected Features for
Classification of Breast Histology Images into Benign/Malignant
Class.- Recent Trends in Human Re-identification Techniques A Comparative
Study.- Automatic Segmentation of Handwritten Devanagari word documents
enabling accurate recognition.- A Comparative Experimental on ML Based AQI
Prediction System.- Mura Defect Detection in Flat Panel Display Using
B-spline Approximation.- An efficient Sample Steering Strategy for
Correlation Filter Tracking.- A Comparative Study on Machine Learning Based
Classifier Model for Wheat Seed Classification.- Allocation of Overdue Loans
in a Sub-Saharan Africa Microfinance Institution.- Automatic Model For
Relation Extraction From Text Documents Using Deep Learning Neural
Network.- Polarized Extractive Summarization of Online Product Reviews.- Deep
Learning based NLP Embedding Approach for Biosequence Classification.- Use of
Attitude Verbs as a Device to Encode States of Mind: Navigating them
Compositionally in Linguistic Discourse.- CAI: Complex Ontology Alignments
using Lexical Indexation.- Long Short-Term Memory Recurrent Neural Network
for Automatic Recognition of Spoken English Digits.- Prediction of Smoking
addiction among youths using Elastic net and KNN: A Machine Learning
Approach.- KGChain: a Blockchain-based Approach to Secure the Knowledge Graph
Completion.- Enhanced Group Key Distribution Protocol for Intra Group and
Inter Group Communication using Access Control Polynomial.