Kirjojen hintavertailu. Mukana 11 699 587 kirjaa ja 12 kauppaa.

Kirjahaku

Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.

16 kirjaa tekijältä Swati Patel

Data Exploration and Machine Learning using R
Cardiovascular diseases are common these days to every age group of patient. The early stage prediction may help in adapting healthy lifestyle so that high risk of life threat can be avoided. The researchers are continuously finding links from existing data sources so that heart diseases can be predicted at early stages. There are proven data mining techniques such as decision trees, support vector machine, logistic regression useful in prognosis of heart disease. This research focuses on predicting hear diseases using support vector machine and linear regression technique. The Cleveland heart disease dataset is used as sample dataset to find accuracy of these two chosen techniques. The comparison shows that logistic regression gives accurate results than support vector machine on heart disease dataset. The research analysis is conducted in R script where Cleveland Heart Disease Dataset is analyzed and two models (SVM, logistic regression) are implemented using R. The project concentrates on applying Support Vector Machine and Logistic Regression techniques on the above mentioned dataset.
Intrusion Detection System for Wireless Sensor Networks

Intrusion Detection System for Wireless Sensor Networks

Swati Patel

LAP Lambert Academic Publishing
2020
pokkari
Security of Wireless sensor network (WSN) becomes a very important issue with the rapid development of WSN that is vulnerable to a wide range of attacks due to deployment in the hostile environment and having limited resources. Intrusion detection system is one of the major and efficient defensive methods against attacks in WSN. A particularly devastating attack is selective reporting, where an intruded node forces to transfer important data inside the network to the other node. The other attacks are also important to detect. These attacks are outsider attack and blackhole attack. Blackhole attack occurs when the receiver waits more than the stipulated time to receive the data from its previous node. Outsider attack occurs when the node from outside the network tries to connect to the network. The project aims to detect these attacks and also prevent its adverse effects on the system.