Limit search to available items
Book Cover
E-book

Title TRENDS IN FUTURE INFORMATICS AND EMERGING TECHNOLOGIES
Published [S.l.] : BENTHAM SCIENCE PUBLISHER, 2021

Copies

Description 1 online resource
Contents Cover -- Title -- Copyright -- End User License Agreement -- Contents -- Foreword -- Preface -- List of Contributors -- Respite for Customer's Privacy Issues using Privacy Preserving Data Mining -- Deepak Kumar1 and Ankita2,* -- INTRODUCTION -- DATA MINING -- HOW DATA MINING IS CARRIED OUT IN RETAIL SECTOR -- IS PRIVACY OF CUSTOMER AT STAKE? -- WHY DATA MINING IS REQUIRED IN RETAIL SECTOR -- Procuring and Engaging Customer -- Market Basket Analysis -- Clients Segmentation and Target Advertising -- PRIVACY AND PRIVACY PRESERVING DATA MINING -- Privacy Defined -- PRIVACY PRESERVING DATA MINING
Privacy Preserving Data Mining Techniques -- DATA HIDING TECHNIQUES -- Data Perturbation -- Noise Inclusion -- Data Swapping -- Cryptography -- Anonymization Technique: Masking of Personal Identifiers -- Suppression -- Generalization -- Condensation Approach -- CONCLUSION -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- Internet Gaming Disorder: Symptoms, Neurological Issues, and Effective Assessment Modalities -- Abhishek Jain1, Kapil Dev Gupta1,* and Shanu Sharma1 -- INTRODUCTION -- INTERNET GAMING DISORDER (IGD) -- IGD: SYMPTOMS AND SOCIAL IMPACT
IGD ASSESSMENT: MODALITIES AND METHODS -- Personality Tests -- Functional Magnetic Resonance Imaging (fMRI) -- Positron Emission Tomography (PET) -- Single Positron Emission Computed Tomography (SPECT) -- Electroencephalogram(EEG) -- Hybrid Modalities -- COMPARATIVE ANALYSIS OF IGD ASSESSMENT MODALITIES -- CONCLUSION -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- A Machine Learning APP for Prediction of Pandemic such as COVID-19 -- Smriti Jojo1, Saru Dhir1,* and Madhurima 1 -- INTRODUCTION -- LITERATURE REVIEW -- PROPOSED WORK -- Methodology Used
RESULTS AND DISCUSSIONS -- CONCLUSION AND RECOMMENDATION -- IMPLICATION FOR FUTURE RESEARCH -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- Different Authorization Mechanism for Software System -- Sudhir Kumar Gupta1, Deepak Kumar1,*, Munesh Chandra Trivedi2 and Kamal Nayan Agarwal3 -- INTRODUCTION -- LITERATURE SURVEY -- Role-Based Access Control (RBAC) -- COMPARISION -- CONCLUSION -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- A Swift Approach for Malware Detection
S. Hasnain Pasha1, Deepti Mehrotra1, Abhishek Srivastava1,* and Chetna Choudhary1 -- INTRODUCTION -- MACHINE LEARNING -- Classification Algorithms -- METHODOLOGY -- Dataset Description -- Learning Phase -- Checking Phase -- Our Approach -- Experimental Results -- CONCLUSION -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- Measuring Academics' Intentions to use a Project Management System (PMS): A Case Study of the College of Computing and Information Technology, Shaqra University -- Nayyar Ahmed Khan1,* -- INTRODUCTION -- FRAMEWORK AND HYPOTHESIS
Subject Computer science.
Information technology.
Electronic data processing.
data processing.
computer science.
information technology.
Electronic data processing
Computer science
Information technology
Form Electronic book
Author Kumar, Deepak
DHIR, SARU
ISBN 9814998451
9789814998451