![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Databases > Data mining
Clinical Decision Support and Beyond: Progress and Opportunities in Knowledge-Enhanced Health and Healthcare, now in its third edition, discusses the underpinnings of effective, reliable, and easy-to-use clinical decision support systems at the point of care as a productive way of managing the flood of data, knowledge, and misinformation when providing patient care. Incorporating CDS into electronic health record systems has been underway for decades; however its complexities, costs, and user resistance have lagged its potential. Thus it is of utmost importance to understand the process in detail, to take full advantage of its capabilities. The book expands and updates the content of the previous edition, and discusses topics such as integration of CDS into workflow, context-driven anticipation of needs for CDS, new forms of CDS derived from data analytics, precision medicine, population health, integration of personal monitoring, and patient-facing CDS. In addition, it discusses population health management, public health CDS and CDS to help reduce health disparities. It is a valuable resource for clinicians, practitioners, students and members of medical and biomedical fields who are interested to learn more about the potential of clinical decision support to improve health and wellness and the quality of health care.
Data warehousing is an important topic that is of interest to both the industry and the knowledge engineering research communities. Both data mining and data warehousing technologies have similar objectives and can potentially benefit from each other's methods to facilitate knowledge discovery. Improving Knowledge Discovery through the Integration of Data Mining Techniques provides insight concerning the integration of data mining and data warehousing for enhancing the knowledge discovery process. Decision makers, academicians, researchers, advanced-level students, technology developers, and business intelligence professionals will find this book useful in furthering their research exposure to relevant topics in knowledge discovery.
Community structure is a salient structural characteristic of
many real-world networks. Communities are generally hierarchical,
overlapping, multi-scale and coexist with other types of structural
regularities of networks. This poses major challenges for
conventional methods of community detection. This book will
comprehensively introduce the latest advances in community
detection, especially the detection of overlapping and hierarchical
community structures, the detection of multi-scale communities in
heterogeneous networks, and the exploration of multiple types of
structural regularities. These advances have been successfully
applied to analyze large-scale online social networks, such as
Facebook and Twitter. This book provides readers a convenient way
to grasp the cutting edge of community detection in complex
networks.
The topic of preferences is a new branch of machine learning and data mining, and it has attracted considerable attention in artificial intelligence research in previous years. It involves learning from observations that reveal information about the preferences of an individual or a class of individuals. Representing and processing knowledge in terms of preferences is appealing as it allows one to specify desires in a declarative way, to combine qualitative and quantitative modes of reasoning, and to deal with inconsistencies and exceptions in a flexible manner. And, generalizing beyond training data, models thus learned may be used for preference prediction. This is the first book dedicated to this topic, and the treatment is comprehensive. The editors first offer a thorough introduction, including a systematic categorization according to learning task and learning technique, along with a unified notation. The first half of the book is organized into parts on label ranking, instance ranking, and object ranking; while the second half is organized into parts on applications of preference learning in multiattribute domains, information retrieval, and recommender systems. The book will be of interest to researchers and practitioners in artificial intelligence, in particular machine learning and data mining, and in fields such as multicriteria decision-making and operations research.
This book introduces the concepts, applications and development of data science in the telecommunications industry by focusing on advanced machine learning and data mining methodologies in the wireless networks domain. Mining Over Air describes the problems and their solutions for wireless network performance and quality, device quality readiness and returns analytics, wireless resource usage profiling, network traffic anomaly detection, intelligence-based self-organizing networks, telecom marketing, social influence, and other important applications in the telecom industry. Written by authors who study big data analytics in wireless networks and telecommunication markets from both industrial and academic perspectives, the book targets the pain points in telecommunication networks and markets through big data. Designed for both practitioners and researchers, the book explores the intersection between the development of new engineering technology and uses data from the industry to understand consumer behavior. It combines engineering savvy with insights about human behavior. Engineers will understand how the data generated from the technology can be used to understand the consumer behavior and social scientists will get a better understanding of the data generation process.
Organizations rely on data mining and warehousing technologies to store, integrate, query, and analyze essential data. Strategic Advancements in Utilizing Data Mining and Warehousing Technologies: New Concepts and Developments discusses developments in data mining and warehousing as well as techniques for successful implementation. Contributions investigate theoretical queries along with real-world applications, providing a useful foundation for academicians and practitioners to research new techniques and methodologies.
"Machine Learning and Data Mining for Computer Security" provides an overview of the current state of research in machine learning and data mining as it applies to problems in computer security. This book has a strong focus on information processing and combines and extends results from computer security. The first part of the book surveys the data sources, the learning and mining methods, evaluation methodologies, and past work relevant for computer security. The second part of the book consists of articles written by the top researchers working in this area. These articles deals with topics of host-based intrusion detection through the analysis of audit trails, of command sequences and of system calls as well as network intrusion detection through the analysis of TCP packets and the detection of malicious executables. This book fills the great need for a book that collects and frames work on developing and applying methods from machine learning and data mining to problems in computer security.
'Data Mining with Ontologies' examines methodologies and research for the development of ontological foundations for data mining.
Interval computing combined with fuzzy logic has become an emerging tool in studying artificial intelligence and knowledge processing (AIKP) applications since it models uncertainties frequently raised in the field. This book provides introductions for both interval and fuzzy computing in a very accessible style. Application algorithms covered in this book include quantitative and qualitative data mining with interval valued datasets, decision making systems with interval valued parameters, interval valued Nash games and interval weighted graphs. Successful applications in studying finance and economics, etc are also included. This book can serve as a handbook or a text for readers interested in applying interval and soft computing for AIKP.
This book addresses and examines the impacts of applications and services for data management and analysis, such as infrastructure, platforms, software, and business processes, on both academia and industry. The chapters cover effective approaches in dealing with the inherent complexity and increasing demands of big data management from an applications perspective. Various case studies included have been reported by data analysis experts who work closely with their clients in such fields as education, banking, and telecommunications. Understanding how data management has been adapted to these applications will help students, instructors and professionals in the field. Application areas also include the fields of social network analysis, bioinformatics, and the oil and gas industries.
This book offers researchers an understanding of the fundamental issues and a good starting point to work on this rapidly expanding field. It provides a comprehensive survey of current developments of heterogeneous information network. It also presents the newest research in applications of heterogeneous information networks to similarity search, ranking, clustering, recommendation. This information will help researchers to understand how to analyze networked data with heterogeneous information networks. Common data mining tasks are explored, including similarity search, ranking, and recommendation. The book illustrates some prototypes which analyze networked data. Professionals and academics working in data analytics, networks, machine learning, and data mining will find this content valuable. It is also suitable for advanced-level students in computer science who are interested in networking or pattern recognition.
Data Mining and Multi agent Integration aims to re?ect state of the art research and development of agent mining interaction and integration (for short, agent min ing). The book was motivated by increasing interest and work in the agents data min ing, and vice versa. The interaction and integration comes about from the intrinsic challenges faced by agent technology and data mining respectively; for instance, multi agent systems face the problem of enhancing agent learning capability, and avoiding the uncertainty of self organization and intelligence emergence. Data min ing, if integrated into agent systems, can greatly enhance the learning skills of agents, and assist agents with predication of future states, thus initiating follow up action or intervention. The data mining community is now struggling with mining distributed, interactive and heterogeneous data sources. Agents can be used to man age such data sources for data access, monitoring, integration, and pattern merging from the infrastructure, gateway, message passing and pattern delivery perspectives. These two examples illustrate the potential of agent mining in handling challenges in respective communities. There is an excellent opportunity to create innovative, dual agent mining interac tion and integration technology, tools and systems which will deliver results in one new technology.
Advance Praise for Indian Mujahideen: Computational Analysis and Public Policy This book presents a highly innovative computational approach to analyzing the strategic behavior of terrorist groups and formulating counter-terrorism policies. It would be very useful for international security analysts and policymakers. Uzi Arad, National Security Advisor to the Prime Minister of Israel and Head, Israel National Security Council (2009-2011) An important book on a complex security problem. Issues have been analysed in depth based on quality research. Insightful and well-balanced in describing the way forward. Naresh Chandra, Indian Ambassador to the USA (1996-2001) and Cabinet Secretary (1990-1992). An objective and clinical account of the origins, aims, extra-territorial links and modus-operandi, of a growingly dangerous terrorist organization that challenges the federal, democratic, secular and pluralistic ethos of India s polity. The authors have meticulously researched and analysed the multi-faceted challenges that the Indian Mujahideen poses and realistically dwelt on the ways in which these challenges could be faced and overcome. G. Parthasarathy, High Commissioner of India to Australia (1995-1998) and Pakistan (1998-2000). This book provides the first in-depth look at how advanced mathematics and modern computing technology can influence insights on analysis and policies directed at the Indian Mujahideen (IM) terrorist group. The book also summarizes how the IM group is committed to the destabilization of India by leveraging links with other terror groups such as Lashkar-e-Taiba, and through support from the Pakistani Government and Pakistan s intelligence service. Foreword by The Hon. Louis J. Freeh."
Every second, users produce large amounts of image data from medical and satellite imaging systems. Image mining techniques that are capable of extracting useful information from image data are becoming increasingly useful, especially in medicine and the health sciences. Biomedical Image Analysis and Mining Techniques for Improved Health Outcomes addresses major techniques regarding image processing as a tool for disease identification and diagnosis, as well as treatment recommendation. Highlighting current research intended to advance the medical field, this publication is essential for use by researchers, advanced-level students, academicians, medical professionals, and technology developers. An essential addition to the reference material available in the field of medicine, this timely publication covers a range of applied research on data mining, image processing, computational simulation, data visualization, and image retrieval.
This book shows healthcare professionals how to turn data points into meaningful knowledge upon which they can take effective action. Actionable intelligence can take many forms, from informing health policymakers on effective strategies for the population to providing direct and predictive insights on patients to healthcare providers so they can achieve positive outcomes. It can assist those performing clinical research where relevant statistical methods are applied to both identify the efficacy of treatments and improve clinical trial design. It also benefits healthcare data standards groups through which pertinent data governance policies are implemented to ensure quality data are obtained, measured, and evaluated for the benefit of all involved. Although the obvious constant thread among all of these important healthcare use cases of actionable intelligence is the data at hand, such data in and of itself merely represents one element of the full structure of healthcare data analytics. This book examines the structure for turning data into actionable knowledge and discusses: The importance of establishing research questions Data collection policies and data governance Principle-centered data analytics to transform data into information Understanding the "why" of classified causes and effects Narratives and visualizations to inform all interested parties Actionable Intelligence in Healthcare is an important examination of how proper healthcare-related questions should be formulated, how relevant data must be transformed to associated information, and how the processing of information relates to knowledge. It indicates to clinicians and researchers why this relative knowledge is meaningful and how best to apply such newfound understanding for the betterment of all.
News headlines about privacy invasions, discrimination, and biases discovered in the platforms of big technology companies are commonplace today, and big tech's reluctance to disclose how they operate counteracts ideals of transparency, openness, and accountability. This book is for computer science students and researchers who want to study big tech's corporate surveillance from an experimental, empirical, or quantitative point of view and thereby contribute to holding big tech accountable. As a comprehensive technical resource, it guides readers through the corporate surveillance landscape and describes in detail how corporate surveillance works, how it can be studied experimentally, and what existing studies have found. It provides a thorough foundation in the necessary research methods and tools, and introduces the current research landscape along with a wide range of open issues and challenges. The book also explains how to consider ethical issues and how to turn research results into real-world change.
The domains of Pattern Recognition and Machine Learning have experienced exceptional interest and growth, however the overwhelming number of methods and applications can make the fields seem bewildering. This text offers an accessible and conceptually rich introduction, a solid mathematical development emphasizing simplicity and intuition. Students beginning to explore pattern recognition do not need a suite of mathematically advanced methods or complicated computational libraries to understand and appreciate pattern recognition; rather the fundamental concepts and insights, eminently teachable at the undergraduate level, motivate this text. This book provides methods of analysis that the reader can realistically undertake on their own, supported by real-world examples, case-studies, and worked numerical / computational studies.
Data Mining for Business Applications presents the state-of-the-art research and development outcomes on methodologies, techniques, approaches and successful applications in the area. The contributions mark a paradigm shift from data-centered pattern mining to domain driven actionable knowledge discovery for next-generation KDD research and applications. The contents identify how KDD techniques can better contribute to critical domain problems in theory and practice, and strengthen business intelligence in complex enterprise applications. The volume also explores challenges and directions for future research and development in the dialogue between academia and business."
This important text/reference presents a comprehensive review of techniques for taxonomy matching, discussing matching algorithms, analyzing matching systems, and comparing matching evaluation approaches. Different methods are investigated in accordance with the criteria of the Ontology Alignment Evaluation Initiative (OAEI). The text also highlights promising developments and innovative guidelines, to further motivate researchers and practitioners in the field. Topics and features: discusses the fundamentals and the latest developments in taxonomy matching, including the related fields of ontology matching and schema matching; reviews next-generation matching strategies, matching algorithms, matching systems, and OAEI campaigns, as well as alternative evaluations; examines how the latest techniques make use of different sources of background knowledge to enable precise matching between repositories; describes the theoretical background, state-of-the-art research, and practical real-world applications; covers the fields of dynamic taxonomies, personalized directories, catalog segmentation, and recommender systems. This stimulating book is an essential reference for practitioners engaged in data science and business intelligence, and for researchers specializing in taxonomy matching and semantic similarity assessment. The work is also suitable as a supplementary text for advanced undergraduate and postgraduate courses on information and metadata management. |
You may like...
Analyzing Wimbledon - The Power of…
Franc Klaassen, Jan R. Magnus
Hardcover
R3,837
Discovery Miles 38 370
Professional Tennis Player 101 - A Quick…
Howexpert, Christopher Morris
Hardcover
R731
Discovery Miles 7 310
|