Sebanyak 14 item atau buku ditemukan

Fisika Dasar Teori, Soal, dan Penyelesaian

Handbook of Research on Securing Cloud-Based Databases with Biometric Applications

Cloud technologies have revolutionized the way we store information and perform various computing tasks. With the rise of this new technology, the ability to secure information stored on the cloud becomes a concern. The Handbook of Research on Securing Cloud-Based Databases with Biometric Applications explores the latest innovations in promoting cloud security through human authentication techniques. Exploring methods of access by identification, including the analysis of facial features, fingerprints, DNA, dental characteristics, and voice patterns, this publication is designed especially for IT professionals, academicians, and upper-level students seeking current research surrounding cloud security.

In an effort to address the array of security and authentication issues in the cloud
environment, the use of biometric parameter-based security mechanisms are
exponentially increasing. This book starts with basic concepts of Bigdata
computing strategies and takes readers through the cloud computing security
issues and architecture, biometric authentication, NoSQL database, cloud
database security issues and challenges, efficient KDC scheme to support
dynamic scalability on ...

Research and Development in Knowledge Discovery and Data Mining

Second Pacific-Asia Conference, PAKDD'98, Melbourne, Australia, April 15-17, 1998, Proceedings

This book constitutes the refereed proceedings of the Second Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD-98, held in Melbourne, Australia, in April 1998. The book presents 30 revised full papers selected from a total of 110 submissions; also included are 20 poster presentations. The papers contribute new results to all current aspects in knowledge discovery and data mining on the research level as well as on the level of systems development. Among the areas covered are machine learning, information systems, the Internet, statistics, knowledge acquisition, data visualization, software reengineering, and knowledge based systems.

This book constitutes the refereed proceedings of the Second Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD-98, held in Melbourne, Australia, in April 1998.

Contrast Data Mining

Concepts, Algorithms, and Applications

A Fruitful Field for Researching Data Mining Methodology and for Solving Real-Life Problems Contrast Data Mining: Concepts, Algorithms, and Applications collects recent results from this specialized area of data mining that have previously been scattered in the literature, making them more accessible to researchers and developers in data mining and other fields. The book not only presents concepts and techniques for contrast data mining, but also explores the use of contrast mining to solve challenging problems in various scientific, medical, and business domains. Learn from Real Case Studies of Contrast Mining Applications In this volume, researchers from around the world specializing in architecture engineering, bioinformatics, computer science, medicine, and systems engineering focus on the mining and use of contrast patterns. They demonstrate many useful and powerful capabilities of a variety of contrast mining techniques and algorithms, including tree-based structures, zero-suppressed binary decision diagrams, data cube representations, and clustering algorithms. They also examine how contrast mining is used in leukemia characterization, discriminative gene transfer and microarray analysis, computational toxicology, spatial and image data classification, voting analysis, heart disease prediction, crime analysis, understanding customer behavior, genetic algorithms, and network security.

Contrast data mining is an important and focused subarea of data mining. Its aim
is to find interesting contrast patterns that describe significant differences
between datasets satisfying various contrasting conditions. The contrasting
conditions ...

Analisis hasil penelitian arkeologi empat, Kuningan, 10-16 September 1991

Prehistoric metallurgy of Indonesia; conference on results of archaeological research.

KEPUSTAKAAN Bambang Harsrinuksmo dan S Lumintu 1988 "Keris dan
Senjata Tradisional lainnya", Ensiklopedi Budaya Nasional, Jakarta: ... Parmono
Atmadi 1979 "Beberapa Patokan Perancangan Bangunan Candi", Pelita
Borobudur.

FORTRAN 77

a structured, disciplined style

Fundamental Approaches to Software Engineering

11th International Conference, FASE 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Budapest, Hungary, March 29-April 6, 2008, Proceedings

This proceedings volume covers requirements and architectures, models and model transformations, conceptual models and UML, service engineering and adaptable services, verification and testing, and objects and components.

This area has been addressed by a number of researchers [16,2,19], including
our own work on formalizing feature models in higher-order logic [12]. Feature
models are not the only way to describe the capabilities of a product line.

Creative HTML Design

Explains how to create Web sites, work with pictures and color, use tables, and organize pages on a server

GIF Transparency Compositing Chart Aliased Anti-Aliased Glow When the
different examples of edges are made into transparent GIFs using 1-color
transparency, did you notice how every example except the aliased version
picked up the ...