Role of data mining and machine learning techniques in medical imaging

2020 ◽  
Vol 15 (3) ◽  
pp. 340
Author(s):  
Abhishek Agnihotri ◽  
Vikash Yadav ◽  
Vandana Dixit Kaushik
2021 ◽  
Vol 297 ◽  
pp. 01032
Author(s):  
Harish Kumar ◽  
Anshal Prasad ◽  
Ninad Rane ◽  
Nilay Tamane ◽  
Anjali Yeole

Phishing is a common attack on credulous people by making them disclose their unique information. It is a type of cyber-crime where false sites allure exploited people to give delicate data. This paper deals with methods for detecting phishing websites by analyzing various features of URLs by Machine learning techniques. This experimentation discusses the methods used for detection of phishing websites based on lexical features, host properties and page importance properties. We consider various data mining algorithms for evaluation of the features in order to get a better understanding of the structure of URLs that spread phishing. To protect end users from visiting these sites, we can try to identify the phishing URLs by analyzing their lexical and host-based features.A particular challenge in this domain is that criminals are constantly making new strategies to counter our defense measures. To succeed in this contest, we need Machine Learning algorithms that continually adapt to new examples and features of phishing URLs.


Author(s):  
Deepti Rani ◽  
Anju Sangwan ◽  
Anupma Sangwan ◽  
Tajinder Singh

With the enormous growth of sensor networks, information seeking from such networks has become an invaluable source of knowledge for various organizations to enhance the comprehension of people interests. Not only wireless sensor networks (WSNs) but its various classes also remain the hot topics of research. In this chapter, the primary focus is to understand the concept of sensor network in underwater scenario. Various mechanisms are used to recognize the activities underwater using sensor which examines the real-time events. With these features, a few challenges are also associated with sensor networks, which are addressed here. Machine learning (ML) techniques are the perfect key of success to resolve such issues due to their feasibility and adaption in complex problem environment. Therefore, various ML techniques have been explained to enhance the operational performance of WSNs, especially in underwater WSNs (UWSNs). The main objective of this chapter is to understand the concepts of UWSNs and role of ML to address the performance issues of UWSNs.


Author(s):  
Bhavani Thuraisingham

Data mining is the process of posing queries to large quantities of data and extracting information often previously unknown using mathematical, statistical, and machine-learning techniques. Data mining has many applications in a number of areas, including marketing and sales, medicine, law, manufacturing, and, more recently, homeland security. Using data mining, one can uncover hidden dependencies between terrorist groups as well as possibly predict terrorist events based on past experience. One particular data-mining technique that is being investigated a great deal for homeland security is link analysis, where links are drawn between various nodes, possibly detecting some hidden links.


Sign in / Sign up

Export Citation Format

Share Document