Data Mining: Practical Machine Learning Tools and Techniques, Fourth Edition, offers a thorough grounding in machine learning concepts, along with practical advice on applying these tools and techniques in real-world data mining situations. This highly anticipated fourth edition of the most acclaimed work on data mining and machine learning teaches readers everything they need to know to get going, from preparing inputs, interpreting outputs, evaluating results, to the algorithmic methods at the heart of successful data mining approaches.
Extensive updates reflect the technical changes and modernizations that have taken place in the field since the last edition, including substantial new chapters on probabilistic methods and on deep learning. Accompanying the book is a new version of the popular WEKA machine learning software from the University of Waikato. Authors Witten, Frank, Hall, and Pal include today's techniques coupled with the methods at the leading edge of contemporary research.
Please visit the book companion website at https: //www.cs.waikato.ac.nz/ ml/weka/book.html.
It contains
Powerpoint slides for Chapters 1-12. This is a very comprehensive teaching resource, with many PPT slides covering each chapter of the book
Online Appendix on the Weka workbench; again a very comprehensive learning aid for the open source software that goes with the book
Table of contents, highlighting the many new sections in the 4th edition, along with reviews of the 1st edition, errata, etc.
Provides a thorough grounding in machine learning concepts, as well as practical advice on applying the tools and techniques to data mining projects
Presents concrete tips and techniques for performance improvement that work by transforming the input or output in machine learning methods
Includes a downloadable WEKA software toolkit, a comprehensive collection of machine learning algorithms for data mining tasks-in an easy-to-use interactive interface
Includes open-access online courses that introduce practical applications of the material in the book
Автор: Miroslav Bursa et al Название: Information Technology in Bio- and Medical Informatics ISBN: 3319642642 ISBN-13(EAN): 9783319642642 Издательство: Springer Рейтинг: Цена: 6986.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the refereed proceedings of the 8th International Conference on Information Technology in Bio- and Medical Informatics, ITBAM 2017, held in Lyon, France, in August 2017. The 3 revised full papers and 6 poster papers presented were carefully reviewed and selected from 15 submissions.
Автор: V. S. Shankar Sriram; V. Subramaniyaswamy; N. Sasi Название: Applications and Techniques in Information Security ISBN: 9811508704 ISBN-13(EAN): 9789811508707 Издательство: Springer Рейтинг: Цена: 6986.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the refereed proceedings of the 10th International Conference on Applications and Techniques in Information Security, ATIS 2019, held in Tamil Nadul, India, in November 2019.The 22 full papers and 2 short papers presented in the volume were carefully reviewed and selected from 50 submissions. The papers are organized in the following topical sections: information security; network security; intrusion detection system; authentication and key management system; security centric applications.
Автор: Eroglu Название: RF Circuit Design Techniques for MF-UHF Applications ISBN: 1138077607 ISBN-13(EAN): 9781138077607 Издательство: Taylor&Francis Рейтинг: Цена: 13014.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
Magnetic resonance imaging, semiconductor processing, and RFID are some of the critical applications within the medium frequency (MF) to ultrahigh frequency (UHF) range that require RF designers to have a solid understanding of analytical and experimental RF techniques. Designers need to be able to design components and devices cost effectively, and integrate them with high efficiency, minimal loss, and required power. Computer-aided design (CAD) tools also play an important part in helping to reduce costs and improve accuracy through optimization. RF Circuit Design Techniques for MF-UHF Applications explains how to design, simulate, and implement RF/microwave components and devices for applications within the medium frequency (MF) to ultrahigh frequency (UHF) range. The book makes RF design simple by expertly blending theory, simulation, and practical application examples.
A Practical Guide to RF Circuit Design in the MF-UHF Range: Theory, Simulation, and Real-World Application Examples
After a review of network parameters used in the analysis of RF components and devices, the book examines MF-UHF design techniques in detail. These include techniques for designing high-power microstrip circuits, directional couplers, transformers, composite and multilayer inductors, filters, combiners/dividers, and RFID systems. For every device, the book gives the required theory and then explains the verification process with CAD tools. In addition, each design is illustrated with real-life implementation examples that use a variety of CAD tools such as MATLAB(R), Mathcad, HFSS(TM), Ansoft Designer(R), Sonnet(R), and PSpice(R). Design tables, curves, and charts are included to demonstrate an efficient design process. Throughout, the book also offers practical hints to help engineers shorten the design time.
Design MF-UHF Devices More Cost-Effectively
The book reflects the optimum design methodology used in RF engineering, from the application of theory, to simulation for verification, to experimentation. Packed with useful techniques, tips, and examples, it is an invaluable resource for engineers, researchers, and students working in the MF-UHF range.
Описание: Artificial intelligence is at the forefront of research and implementation in many industries including healthcare and agriculture. Whether it's detecting disease or generating algorithms, deep learning techniques are advancing exponentially. Researchers and professionals need a platform in which they can keep up with machine learning trends and their developments in the real world.
The Handbook of Research on Applications and Implementations of Machine Learning Techniques provides innovative insights into the multi-disciplinary applications of machine learning algorithms for data analytics. The content within this publication examines disease identification, neural networks, and language support. It is designed for IT professionals, developers, data analysts, technology specialists, R&D professionals, industrialists, practitioners, researchers, academicians, and students seeking research on deep learning procedures and their enactments in the fields of medicine, engineering, and computer science.
Описание: This class-tested textbook will provide in-depth coverage of the fundamentals of machine learning, with an exploration of applications in information security. The book will cover malware detection, cryptography, and intrusion detection. The book will be relevant for students in machine learning and computer security courses.
Автор: Dooho Choi; Sylvain Guilley Название: Information Security Applications ISBN: 3319565486 ISBN-13(EAN): 9783319565484 Издательство: Springer Рейтинг: Цена: 9083.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the thoroughly refereed post-workshop proceedings of the 17th International Workshop on Information Security Applications, WISA 2016, held on Jeju Island, Korea, in August 2016. The papers are organized in topical sections such as network security, threat analysis, application security, cryptographic.
Автор: Brent ByungHoon Kang; JinSoo Jang Название: Information Security Applications ISBN: 3030179818 ISBN-13(EAN): 9783030179816 Издательство: Springer Рейтинг: Цена: 8104.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Information Security Applications, WISA 2018, held on Jeju Island, Korea, in August 2018.
Описание: As the advancement of technology continues, cyber security continues to play a significant role in today's world. With society becoming more dependent on the internet, new opportunities for virtual attacks can lead to the exposure of critical information. Machine and deep learning techniques to prevent this exposure of information are being applied to address mounting concerns in computer security.
The Handbook of Research on Machine and Deep Learning Applications for Cyber Security is a pivotal reference source that provides vital research on the application of machine learning techniques for network security research. While highlighting topics such as web security, malware detection, and secure information sharing, this publication explores recent research findings in the area of electronic security as well as challenges and countermeasures in cyber security research. It is ideally designed for software engineers, IT specialists, cybersecurity analysts, industrial experts, academicians, researchers, and post-graduate students.
Описание: The book highlights innovative ideas, cutting-edge findings, and novel techniques, methods and applications touching on all aspects of technology and intelligence in smart city management and services. Above all, it explores developments and applications that are of practical use and value for Cyber Intelligence-related methods, which are frequently used in the context of city management and services.
Автор: Kuan-Ching Li; Xiaofeng Chen; Willy Susilo Название: Advances in Cyber Security: Principles, Techniques, and Applications ISBN: 9811314829 ISBN-13(EAN): 9789811314827 Издательство: Springer Рейтинг: Цена: 22359.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resource-constrained environments; the book highlights the latest developments in this area. Authentication is another central issue in cyber security. In this book, we address this aspect and sub-aspects ranging from cryptographic approaches to practical design issues, such as CAPTCHA. Privacy is another main topic that is discussed in detail, from techniques for enhancing privacy to pseudonymous schemes.Addressing key issues in the emerging field of cyber security, this book effectively bridges the gap between computer security and threat attacks, and showcases promising applications involving cryptography and security.
Автор: Bahram Javidi Название: Optical and Digital Techniques for Information Security ISBN: 1441919201 ISBN-13(EAN): 9781441919205 Издательство: Springer Рейтинг: Цена: 21661.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: There are wide-ranging implications in information security beyond national defense. Securing our information has implications for virtually all aspects of our lives, including protecting the privacy of our ?nancial transactions and medical records, facilitating all operations of government, maintaining the integrity of national borders, securing important facilities, ensuring the safety of our food and commercial products, protecting the safety of our aviation system--even safeguarding the integrity of our very identity against theft. Information security is a vital element in all of these activities, particularly as information collection and distribution become ever more connected through electronic information delivery systems and commerce. This book encompasses results of research investigation and technologies that can be used to secure, protect, verify, and authenticate objects and inf- mation from theft, counterfeiting, and manipulation by unauthorized persons and agencies. The book has drawn on the diverse expertise in optical sciences and engineering, digital image processing, imaging systems, information p- cessing, mathematical algorithms, quantum optics, computer-based infor- tion systems, sensors, detectors, and biometrics to report novel technologies that can be applied to information-security issues. The book is unique because it has diverse contributions from the ?eld of optics, which is a new emerging technology for security, and digital techniques that are very accessible and can be interfaced with optics to produce highly e?ective security systems.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru