![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Databases > Data mining
Computational Analysis of Terrorist Groups: Lashkar-e-Taiba provides an in-depth look at Web intelligence, and how advanced mathematics and modern computing technology can influence the insights we have on terrorist groups. This book primarily focuses on one famous terrorist group known as Lashkar-e-Taiba (or LeT), and how it operates. After 10 years of counter Al Qaeda operations, LeT is considered by many in the counter-terrorism community to be an even greater threat to the US and world peace than Al Qaeda. Computational Analysis of Terrorist Groups: Lashkar-e-Taiba is the first book that demonstrates how to use modern computational analysis techniques including methods for "big data" analysis. This book presents how to quantify both the environment in which LeT operate, and the actions it took over a 20-year period, and represent it as a relational database table. This table is then mined using sophisticated data mining algorithms in order to gain detailed, mathematical, computational and statistical insights into LeT and its operations. This book also provides a detailed history of Lashkar-e-Taiba based on extensive analysis conducted by using open source information and public statements. Each chapter includes a case study, as well as a slide describing the key results which are available on the authors' web sites. Computational Analysis of Terrorist Groups: Lashkar-e-Taiba is designed for a professional market composed of government or military workers, researchers and computer scientists working in the web intelligence field. Advanced-level students in computer science will also find this valuable as a reference book.
This book constitutes the proceedings of 26th International Conference on Advanced Information Systems Engineering, CAiSE 2014, held in Thessaloniki, Greece in June 2014. The 41 papers and 3 keynotes presented were carefully reviewed and selected from 226 submissions. The accepted papers were presented in 13 sessions: clouds and services; requirements; product lines; requirements elicitation; processes; risk and security; process models; data mining and streaming; process mining; models; mining event logs; databases; software engineering.
This book constitutes the refereed proceedings of the 19th International Conference on Applications of Natural Language to Information Systems, NLDB 2014, held in Montpellier, France, in June 2014. The 13 long papers, 8 short papers, 14 poster papers, and 7 demo papers presented together with 2 invited talks in this volume were carefully reviewed and selected from 73 submissions. The papers cover the following topics: syntactic, lexical and semantic analysis; information extraction; information retrieval and sentiment analysis and social networks.
This book constitutes the refereed proceedings of the 11th International Workshop on Computational Processing of the Portuguese Language, PROPOR 2014, held in Sao Carlos, Brazil, in October 2014. The 14 full papers and 19 short papers presented in this volume were carefully reviewed and selected from 63 submissions. The papers are organized in topical sections named: speech language processing and applications; linguistic description, syntax and parsing; ontologies, semantics and lexicography; corpora and language resources and natural language processing, tools and applications.
This book constitutes the refereed proceedings of the 10th International Conference on Data Integration in the Life Sciences, DILS 2014, held in Lisbon, Portugal, in July 2014. The 9 revised full papers and the 5 short papers included in this volume were carefully reviewed and selected from 20 submissions. The papers cover a range of important topics such as data integration platforms and applications; biodiversity data management; ontologies and visualization; linked data and query processing.
This book constitutes the workshop proceedings of the 19th International Conference on Database Systems for Advanced Applications, DASFAA 2014, held in Bali, Indonesia, in April 2014. The volume contains papers from 4 workshops, each focusing on hot topics related to database systems and applications: the Second International Workshop on Big Data Management and Analytics, BDMA 2014; the Third International Workshop on Data Management for Emerging Network Infrastructure, DaMEN 2014; the Third International Workshop on Spatial Information Modeling, Management and Mining, SIM(3) 2014, and the DASFAA Workshop on Uncertain and Crowdsourced Data, UnCrowd 2014.
This book - in conjunction with the volumes LNCS 8588 and LNBI 8590 - constitutes the refereed proceedings of the 10th International Conference on Intelligent Computing, ICIC 2014, held in Taiyuan, China, in August 2014. The 85 papers of this volume were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections such as soft computing; artificial bee colony algorithms; unsupervised learning; kernel methods and supporting vector machines; machine learning; fuzzy theory and algorithms; image processing; intelligent computing in computer vision; intelligent computing in communication networks; intelligent image/document retrievals; intelligent data analysis and prediction; intelligent agent and Web applications; intelligent fault diagnosis; knowledge representation/reasoning; knowledge discovery and data mining; natural language processing and computational linguistics; next gen sequencing and metagenomics; intelligent computing in scheduling and engineering optimization; advanced modeling, control and optimization techniques for complex engineering systems; complex networks and their applications; time series forecasting and analysis using artificial neural networks; computer human interaction using multiple visual cues and intelligent computing; biometric system and security for intelligent computing.
The two volume set LNAI 8481 and 8482 constitutes the refereed conference proceedings of the 27th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2014, held in Kaohsiung, Taiwan, in June 2014. The total of 106 papers selected for the proceedings were carefully reviewed and selected from various submissions. The papers deal with a wide range of topics from applications of applied intelligent systems to solve real-life problems in all areas including engineering, science, industry, automation and robotics, business and finance, medicine and biomedicine, bioinformatics, cyberspace and human-machine interaction.
This book constitutes the refereed proceedings of the 10th IEEE International Conference Beyond Databases, Architectures, and Structures, BDAS 2014, held in Ustron, Poland, in May 2014. This book consists of 56 carefully revised selected papers that are assigned to 11 thematic groups: query languages, transactions and query optimization; data warehousing and big data; ontologies and semantic web; computational intelligence and data mining; collective intelligence, scheduling, and parallel processing; bioinformatics and biological data analysis; image analysis and multimedia mining; security of database systems; spatial data analysis; applications of database systems; Web and XML in database systems.
This book provides a comprehensive tutorial on similarity operators. The authors systematically survey the set of similarity operators, primarily focusing on their semantics, while also touching upon mechanisms for processing them effectively. The book starts off by providing introductory material on similarity search systems, highlighting the central role of similarity operators in such systems. This is followed by a systematic categorized overview of the variety of similarity operators that have been proposed in literature over the last two decades, including advanced operators such as RkNN, Reverse k-Ranks, Skyline k-Groups and K-N-Match. Since indexing is a core technology in the practical implementation of similarity operators, various indexing mechanisms are summarized. Finally, current research challenges are outlined, so as to enable interested readers to identify potential directions for future investigations. In summary, this book offers a comprehensive overview of the field of similarity search operators, allowing readers to understand the area of similarity operators as it stands today, and in addition providing them with the background needed to understand recent novel approaches.
The latest inventions in internet technology influence most of business and daily activities. Internet security, internet data management, web search, data grids, cloud computing, and web-based applications play vital roles, especially in business and industry, as more transactions go online and mobile. Issues related to ubiquitous computing are becoming critical. Internet technology and data engineering should reinforce efficiency and effectiveness of business processes. These technologies should help people make better and more accurate decisions by presenting necessary information and possible consequences for the decisions. Intelligent information systems should help us better understand and manage information with ubiquitous data repository and cloud computing. This book is a compilation of some recent research findings in Internet Technology and Data Engineering. This book provides state-of-the-art accounts in computational algorithms/tools, database management and database technologies, intelligent information systems, data engineering applications, internet security, internet data management, web search, data grids, cloud computing, web-based application, and other related topics.
What are the possibilities for process mining in hospitals? In this book the authors provide an answer to this question by presenting a healthcare reference model that outlines all the different classes of data that are potentially available for process mining in healthcare and the relationships between them. Subsequently, based on this reference model, they explain the application opportunities for process mining in this domain and discuss the various kinds of analyses that can be performed. They focus on organizational healthcare processes rather than medical treatment processes. The combination of event data and process mining techniques allows them to analyze the operational processes within a hospital based on facts, thus providing a solid basis for managing and improving processes within hospitals. To this end, they also explicitly elaborate on data quality issues that are relevant for the data aspects of the healthcare reference model. This book mainly targets advanced professionals involved in areas related to business process management, business intelligence, data mining, and business process redesign for healthcare systems as well as graduate students specializing in healthcare information systems and process analysis.
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2014, held in Tainan, Taiwan, in May 2014 in conjunction with PAKDD 2014, the 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 7 revised full papers presented together with one short paper were carefully reviewed and selected from 10 submissions. The papers are organized in topical sections on regional data sets and case studies, cybercrime, information security engineering and text mining.
As urban congestion continues to be an ever increasing problem, routing in these settings has become an important area of operations research. This monograph provides cutting-edge research, utilizing the recent advances in technology, to quantify the value of dynamic, time-dependent information for advanced vehicle routing in city logistics. The methodology of traffic data collection is enhanced by GPS based data collection, resulting in a comprehensive number of travel time records. Data Mining is also applied to derive dynamic information models as required by time-dependent optimization. Finally, well-known approaches of vehicle routing are adapted in order to handle dynamic information models. This book interweaves the usually distinct areas of traffic data collection, information retrieval and time-dependent optimization by an integrated methodological approach, which refers to synergies of Data Mining and Operations Research techniques by example of city logistics applications. These procedures will help improve the reliability of logistics services in congested urban areas.
This book is the outcome of the Dagstuhl Seminar 13201 on Information Visualization - Towards Multivariate Network Visualization, held in Dagstuhl Castle, Germany in May 2013. The goal of this Dagstuhl Seminar was to bring together theoreticians and practitioners from Information Visualization, HCI and Graph Drawing with a special focus on multivariate network visualization, i.e., on graphs where the nodes and/or edges have additional (multidimensional) attributes. The integration of multivariate data into complex networks and their visual analysis is one of the big challenges not only in visualization, but also in many application areas. Thus, in order to support discussions related to the visualization of real world data, also invited researchers from selected application areas, especially bioinformatics, social sciences and software engineering. The unique "Dagstuhl climate" ensured an open and undisturbed atmosphere to discuss the state-of-the-art, new directions and open challenges of multivariate network visualization.
This book provides a comprehensive yet short description of the basic concepts of Complex Network theory. In contrast to other books the authors present these concepts through real case studies. The application topics span from Foodwebs, to the Internet, the World Wide Web and the Social Networks, passing through the International Trade Web and Financial time series. The final part is devoted to definition and implementation of the most important network models. The text provides information on the structure of the data and on the quality of available datasets. Furthermore it provides a series of codes to allow immediate implementation of what is theoretically described in the book. Readers already used to the concepts introduced in this book can learn the art of coding in Python by using the online material. To this purpose the authors have set up a dedicated web site where readers can download and test the codes. The whole project is aimed as a learning tool for scientists and practitioners, enabling them to begin working instantly in the field of Complex Networks.
The textbook at hand aims to provide an introduction to the use of automated methods for gathering strategic competitiveintelligence. Hereby, the text does not describe a singleton research discipline in its own right, such as machine learning or Web mining. It rather contemplates an "application scenario," namely the gathering of knowledge that appears of paramount importance to organizations, e.g., companies and corporations. To this end, the book first summarizes the range of research disciplines that contribute to addressing the issue, extracting from each those grains that are of utmost relevance to the depicted application scope. Moreover, the book presents systems that put these techniques to practical use (e.g., reputation monitoring platforms) and takes an inductive approach to define the "gestalt" of mining for competitive strategic intelligence by selecting major use cases that are laid out and explained in detail. These pieces form the first part of the book. Each of those use cases is backed by a number of research papers, some of which are contained in its largely original version in the second part of the monograph. "
Biomarker discovery is an important area of biomedical research that may lead to significant breakthroughs in disease analysis and targeted therapy. Biomarkers are biological entities whose alterations are measurable and are characteristic of a particular biological condition. Discovering, managing, and interpreting knowledge of new biomarkers are challenging and attractive problems in the emerging field of biomedical informatics. This volumeis a collection of state-of-the-artresearch into the application of data mining to the discovery and analysis of new biomarkers. Presenting new results, models and algorithms, the included contributions focus on biomarker data integration, information retrieval methods, and statistical machine learning techniques. This volume is intended for students, and researchers in bioinformatics, proteomics, and genomics, as wellengineers and applied scientistsinterested in the interdisciplinary application of data mining techniques."
This book constitutes the refereed proceedings of the 27th Canadian Conference on Artificial Intelligence, Canadian AI 2014, held in Montreal, QC, Canada, in May 2014. The 22 regular papers and 18 short papers presented together with 3 invited talks were carefully reviewed and selected from 94 submissions. The papers cover a variety of topics within AI, such as: agent systems; AI applications; automated reasoning; bioinformatics and BioNLP; case-based reasoning; cognitive models; constraint satisfaction; data mining; E-commerce; evolutionary computation; games; information retrieval; knowledge representation; machine learning; multi-media processing; natural language processing; neural nets; planning; privacy-preserving data mining; robotics; search; smart graphics; uncertainty; user modeling; web applications.
This two-volume set, consisting of LNCS 8403 and LNCS 8404, constitutes the thoroughly refereed proceedings of the 14th International Conference on Intelligent Text Processing and Computational Linguistics, CICLing 2014, held in Kathmandu, Nepal, in April 2014. The 85 revised papers presented together with 4 invited papers were carefully reviewed and selected from 300 submissions. The papers are organized in the following topical sections: lexical resources; document representation; morphology, POS-tagging, and named entity recognition; syntax and parsing; anaphora resolution; recognizing textual entailment; semantics and discourse; natural language generation; sentiment analysis and emotion recognition; opinion mining and social networks; machine translation and multilingualism; information retrieval; text classification and clustering; text summarization; plagiarism detection; style and spelling checking; speech processing; and applications.
This book constitutes the refereed proceedings of the Third International Conference on Health Information Science, HIS 2014, held in Shenzhen, China, in April 2014. The 29 full papers presented were carefully reviewed and selected from 61 submissions. They cover a wide range of topics in health information sciences and systems that support the health information management and health service delivery. They deal with medical/health/biomedicine information resources, such as patient medical records, devices and equipments, software and tools to capture, store, retrieve, process, analyse, and optimize the use of information in the health domain; data management, data mining, and knowledge discovery, all of which play a key role in the decision making, management of public health, examination of standards, privacy and security issues; computer visualization and artificial intelligence for computer-aided diagnosis; and development of new architectures and applications for health information systems.
The technique of data fusion has been used extensively in information retrieval due to the complexity and diversity of tasks involved such as web and social networks, legal, enterprise, and many others. This book presents both a theoretical and empirical approach to data fusion. Several typical data fusion algorithms are discussed, analyzed and evaluated. A reader will find answers to the following questions, among others: What are the key factors that affect the performance of data fusion algorithms significantly? What conditions are favorable to data fusion algorithms? CombSum and CombMNZ, which one is better? and why? What is the rationale of using the linear combination method? How can the best fusion option be found under any given circumstances?"
This, the 13th issue of Transactions on Large-Scale Data and Knowledge-Centered Systems, contains six revised selected regular papers. Topics covered include federated data sources, information filtering, web data clouding, query reformulation, package skyline queries and SPARQL query processing over a LaV (Local-as-View) integration system.
This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at the 8th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2015) and the 6th International Conference on European Transnational Education (ICEUTE 2015). These conferences were held in the beautiful and historic city of Burgos (Spain), in June 2015. The aim of the 8th CISIS conference is to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of Computational Intelligence, Information Security, and Data Mining. The need for intelligent, flexible behaviour by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event. After a through peer-review process, the CISIS 2015 International Program Committee selected 43 papers, written by authors from 16 different countries. In the case of 6th ICEUTE conference, the International Program Committee selected 12 papers (from 7 countries). These papers are published in present conference proceedings, achieving an acceptance rate of about 39%. The selection of papers was extremely rigorous in order to maintain the high quality of the conference and we would like to thank the members of the Program Committees for their hard work in the reviewing process. This is a crucial process to the creation of a high standard conference and the CISIS and ICEUTE conferences would not exist without their help.
This book presents recent research work and results in the area of communication and information technologies. The book includes the main results of the 11th International Conference on Computing and Information Technology (IC2IT) held during July 2nd-3rd, 2015 in Bangkok, Thailand. The book is divided into the two main parts Data Mining and Machine Learning as well as Data Network and Communications. New algorithms and methods of data mining asr discussed as well as innovative applications and state-of-the-art technologies on data mining, machine learning and data networking. |
You may like...
Second Language Processing - An Analysis…
James F. Lee, Alessandro G. Benati
Hardcover
R6,242
Discovery Miles 62 420
|