Description |
1 online resource |
Contents |
Cover -- Title -- Copyright -- End User License Agreement -- Contents -- Foreword -- Preface -- List of Contributors -- Respite for Customer's Privacy Issues using Privacy Preserving Data Mining -- Deepak Kumar1 and Ankita2,* -- INTRODUCTION -- DATA MINING -- HOW DATA MINING IS CARRIED OUT IN RETAIL SECTOR -- IS PRIVACY OF CUSTOMER AT STAKE? -- WHY DATA MINING IS REQUIRED IN RETAIL SECTOR -- Procuring and Engaging Customer -- Market Basket Analysis -- Clients Segmentation and Target Advertising -- PRIVACY AND PRIVACY PRESERVING DATA MINING -- Privacy Defined -- PRIVACY PRESERVING DATA MINING |
|
Privacy Preserving Data Mining Techniques -- DATA HIDING TECHNIQUES -- Data Perturbation -- Noise Inclusion -- Data Swapping -- Cryptography -- Anonymization Technique: Masking of Personal Identifiers -- Suppression -- Generalization -- Condensation Approach -- CONCLUSION -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- Internet Gaming Disorder: Symptoms, Neurological Issues, and Effective Assessment Modalities -- Abhishek Jain1, Kapil Dev Gupta1,* and Shanu Sharma1 -- INTRODUCTION -- INTERNET GAMING DISORDER (IGD) -- IGD: SYMPTOMS AND SOCIAL IMPACT |
|
IGD ASSESSMENT: MODALITIES AND METHODS -- Personality Tests -- Functional Magnetic Resonance Imaging (fMRI) -- Positron Emission Tomography (PET) -- Single Positron Emission Computed Tomography (SPECT) -- Electroencephalogram(EEG) -- Hybrid Modalities -- COMPARATIVE ANALYSIS OF IGD ASSESSMENT MODALITIES -- CONCLUSION -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- A Machine Learning APP for Prediction of Pandemic such as COVID-19 -- Smriti Jojo1, Saru Dhir1,* and Madhurima 1 -- INTRODUCTION -- LITERATURE REVIEW -- PROPOSED WORK -- Methodology Used |
|
RESULTS AND DISCUSSIONS -- CONCLUSION AND RECOMMENDATION -- IMPLICATION FOR FUTURE RESEARCH -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- Different Authorization Mechanism for Software System -- Sudhir Kumar Gupta1, Deepak Kumar1,*, Munesh Chandra Trivedi2 and Kamal Nayan Agarwal3 -- INTRODUCTION -- LITERATURE SURVEY -- Role-Based Access Control (RBAC) -- COMPARISION -- CONCLUSION -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- A Swift Approach for Malware Detection |
|
S. Hasnain Pasha1, Deepti Mehrotra1, Abhishek Srivastava1,* and Chetna Choudhary1 -- INTRODUCTION -- MACHINE LEARNING -- Classification Algorithms -- METHODOLOGY -- Dataset Description -- Learning Phase -- Checking Phase -- Our Approach -- Experimental Results -- CONCLUSION -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- Measuring Academics' Intentions to use a Project Management System (PMS): A Case Study of the College of Computing and Information Technology, Shaqra University -- Nayyar Ahmed Khan1,* -- INTRODUCTION -- FRAMEWORK AND HYPOTHESIS |
Subject |
Computer science.
|
|
Information technology.
|
|
Electronic data processing.
|
|
data processing.
|
|
computer science.
|
|
information technology.
|
|
Electronic data processing
|
|
Computer science
|
|
Information technology
|
Form |
Electronic book
|
Author |
Kumar, Deepak
|
|
DHIR, SARU
|
ISBN |
9814998451 |
|
9789814998451 |
|