Tag: Techniques

Soft Computing Techniques for Type-2 Diabetes Data Classification


Free Download Soft Computing Techniques for Type-2 Diabetes Data Classification
English | 2020 | ISBN: 0367236540 | 169 Pages | PDF EPUB (True) | 14 MB
Diabetes Mellitus (DM, commonly referred to as diabetes, is a metabolic disorder in which there are high blood sugar levels over a prolonged period. Lack of sufficient insulin causes presence of excess sugar levels in the blood. As a result the glucose levels in diabetic patients are more than normal ones. It has symptoms like frequent urination, increased hunger, increase thirst and high blood sugar. There are mainly three types of diabetes namely type-1, type-2 and gestational diabetes. Type-1 DM occurs due to immune system mistakenly attacks and destroys the beta-cells and Type-2 DM occurs due to insulin resistance. Gestational DM occurs in women during pregnancy due to insulin blocking by pregnancy harmones. Among these three types of DM, type-2 DM is more prevalence, and impacting so many millions of people across the world. Classification and predictive systems are actually reliable in the health care sector to explore hidden patterns in the patients data. These systems aid, medical professionals to enhance their diagnosis, prognosis along with remedy organizing techniques. The less percentage of improvement in classifier predictive accuracy is very important for medical diagnosis purposes where mistakes can cause a lot of damage to patient’s life. Hence, we need a more accurate classification system for prediction of type-2 DM. Although, most of the above classification algorithms are efficient, they failed to provide good accuracy with low computational cost. In this book, we proposed various classification algorithms using soft computing techniques like Neural Networks (NNs), Fuzzy Systems (FS) and Swarm Intelligence (SI). The experimental results demonstrate that these algorithms are able to produce high classification accuracy at less computational cost. The contributions presented in this book shall attempt to address the following objectives using soft computing approaches for identification of diabetes mellitus.

(more…)

Intelligent Techniques for Predictive Data Analytics


Free Download Intelligent Techniques for Predictive Data Analytics by Neha Singh, Shilpi Birla, Mohd Dilshad Ansari
English | July 18, 2024 | ISBN: 1394227965 | 272 pages | MOBI | 4.77 Mb
Comprehensive resource covering tools and techniques used for predictive analytics with practical applications across various industries

(more…)

Data Acquisition and Duplication Methods and Techniques for Gathering and Replicating Data


Free Download Data Acquisition and Duplication: Methods and Techniques for Gathering and Replicating Data by Vijay Gupta
English | July 19, 2024 | ISBN: N/A | ASIN: B0D9RX5VJ6 | 40 pages | EPUB | 0.25 Mb
Discover the essential guide to mastering data acquisition and duplication. This eBook is perfect for anyone looking to understand and improve their data management skills, from beginners to experienced professionals.

(more…)

Big Data Analytics Tools and Techniques


Free Download Big Data Analytics: Tools and Techniques by EVI Academy
English | August 29, 2024 | ISBN: N/A | ASIN: B0DFS47MPS | 133 pages | EPUB | 0.36 Mb
Unlock the full potential of your data with Big Data Analytics: Tools and Techniques-your ultimate guide to mastering the power of big data. Whether you’re a business leader, data scientist, or IT professional, this comprehensive book provides the tools, strategies, and insights you need to succeed in the rapidly evolving field of big data.

(more…)

Security Data Visualization Graphical Techniques for Network Analysis


Free Download Greg Conti, "Security Data Visualization: Graphical Techniques for Network Analysis"
English | ISBN: 1593271433 | 2007 | 272 pages | PDF | 72 MB
Information overload. If you’re responsible for maintaining your network’s security, you’re living with it every day. Logs, alerts, packet captures, and even binary files take time and effort to analyze using text-based tools – and once your analysis is complete, the picture isn’t always clear, or timely. And time is of the essence.

(more…)

MARKETING PSYCHOLOGY PERSUASION TECHNIQUES FOR SALES SUCCESS


Free Download MARKETING PSYCHOLOGY PERSUASION TECHNIQUES FOR SALES SUCCESS: NEW IDEAS SENSE, WITH CLARITY AND ROBUST PROCEDURES WITH BETTER INFORMED DECISIONS, HOW BUYERS’ … (PROFITABLE BUSINESS IDEAS AND SECRET) by RICHARD N. WILLIAMS
English | August 16, 2023 | ISBN: N/A | ASIN: B0CFWZWY5H | 74 pages | EPUB | 0.28 Mb
Introducing "Mindfluence: Mastering Marketing Psychology for Unstoppable Sales Success"

(more…)

Icelandic Magic Aims, tools and techniques of the Icelandic sorcerers


Free Download Christopher Alan Smith, "Icelandic Magic: Aims, tools and techniques of the Icelandic sorcerers"
English | 2015 | ISBN: 1905297939, 1905297920 | PDF | pages: 172 | 2.6 mb
In this unprecedented work, the author Christopher A. Smith has meticulously studied no less than 6 original Icelandic manuscripts dating from 1500 to 1860 to extract a picture of the aims, tools and techniques of Icelandic sorcerers. Set against the context of the harsh economic, social and environmental conditions of this North Atlantic island, the book gives a detailed account of the types of spells that were used and the motivations behind them.

(more…)

2021 International Conference on Applications and Techniques in Cyber Intelligence Applications and Techniques in Cyber


Free Download Jemal Abawajy, "2021 International Conference on Applications and Techniques in Cyber Intelligence: Applications and Techniques in Cyber"
English | ISBN: 3030791998 | 2021 | 1024 pages | PDF | 50 MB
This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to secure our cyberfuture. The book describes approaches and findings that are of interest to business professionals and governments seeking to secure our data and underpin infrastructures, as well as to individual users.

(more…)