![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Databases > Data mining
Organizations rely on data mining and warehousing technologies to store, integrate, query, and analyze essential data. Strategic Advancements in Utilizing Data Mining and Warehousing Technologies: New Concepts and Developments discusses developments in data mining and warehousing as well as techniques for successful implementation. Contributions investigate theoretical queries along with real-world applications, providing a useful foundation for academicians and practitioners to research new techniques and methodologies.
"Machine Learning and Data Mining for Computer Security" provides an overview of the current state of research in machine learning and data mining as it applies to problems in computer security. This book has a strong focus on information processing and combines and extends results from computer security. The first part of the book surveys the data sources, the learning and mining methods, evaluation methodologies, and past work relevant for computer security. The second part of the book consists of articles written by the top researchers working in this area. These articles deals with topics of host-based intrusion detection through the analysis of audit trails, of command sequences and of system calls as well as network intrusion detection through the analysis of TCP packets and the detection of malicious executables. This book fills the great need for a book that collects and frames work on developing and applying methods from machine learning and data mining to problems in computer security.
Interval computing combined with fuzzy logic has become an emerging tool in studying artificial intelligence and knowledge processing (AIKP) applications since it models uncertainties frequently raised in the field. This book provides introductions for both interval and fuzzy computing in a very accessible style. Application algorithms covered in this book include quantitative and qualitative data mining with interval valued datasets, decision making systems with interval valued parameters, interval valued Nash games and interval weighted graphs. Successful applications in studying finance and economics, etc are also included. This book can serve as a handbook or a text for readers interested in applying interval and soft computing for AIKP.
'Data Mining with Ontologies' examines methodologies and research for the development of ontological foundations for data mining.
This book offers researchers an understanding of the fundamental issues and a good starting point to work on this rapidly expanding field. It provides a comprehensive survey of current developments of heterogeneous information network. It also presents the newest research in applications of heterogeneous information networks to similarity search, ranking, clustering, recommendation. This information will help researchers to understand how to analyze networked data with heterogeneous information networks. Common data mining tasks are explored, including similarity search, ranking, and recommendation. The book illustrates some prototypes which analyze networked data. Professionals and academics working in data analytics, networks, machine learning, and data mining will find this content valuable. It is also suitable for advanced-level students in computer science who are interested in networking or pattern recognition.
Advance Praise for Indian Mujahideen: Computational Analysis and Public Policy This book presents a highly innovative computational approach to analyzing the strategic behavior of terrorist groups and formulating counter-terrorism policies. It would be very useful for international security analysts and policymakers. Uzi Arad, National Security Advisor to the Prime Minister of Israel and Head, Israel National Security Council (2009-2011) An important book on a complex security problem. Issues have been analysed in depth based on quality research. Insightful and well-balanced in describing the way forward. Naresh Chandra, Indian Ambassador to the USA (1996-2001) and Cabinet Secretary (1990-1992). An objective and clinical account of the origins, aims, extra-territorial links and modus-operandi, of a growingly dangerous terrorist organization that challenges the federal, democratic, secular and pluralistic ethos of India s polity. The authors have meticulously researched and analysed the multi-faceted challenges that the Indian Mujahideen poses and realistically dwelt on the ways in which these challenges could be faced and overcome. G. Parthasarathy, High Commissioner of India to Australia (1995-1998) and Pakistan (1998-2000). This book provides the first in-depth look at how advanced mathematics and modern computing technology can influence insights on analysis and policies directed at the Indian Mujahideen (IM) terrorist group. The book also summarizes how the IM group is committed to the destabilization of India by leveraging links with other terror groups such as Lashkar-e-Taiba, and through support from the Pakistani Government and Pakistan s intelligence service. Foreword by The Hon. Louis J. Freeh."
Data Mining and Multi agent Integration aims to re?ect state of the art research and development of agent mining interaction and integration (for short, agent min ing). The book was motivated by increasing interest and work in the agents data min ing, and vice versa. The interaction and integration comes about from the intrinsic challenges faced by agent technology and data mining respectively; for instance, multi agent systems face the problem of enhancing agent learning capability, and avoiding the uncertainty of self organization and intelligence emergence. Data min ing, if integrated into agent systems, can greatly enhance the learning skills of agents, and assist agents with predication of future states, thus initiating follow up action or intervention. The data mining community is now struggling with mining distributed, interactive and heterogeneous data sources. Agents can be used to man age such data sources for data access, monitoring, integration, and pattern merging from the infrastructure, gateway, message passing and pattern delivery perspectives. These two examples illustrate the potential of agent mining in handling challenges in respective communities. There is an excellent opportunity to create innovative, dual agent mining interac tion and integration technology, tools and systems which will deliver results in one new technology.
This book addresses and examines the impacts of applications and services for data management and analysis, such as infrastructure, platforms, software, and business processes, on both academia and industry. The chapters cover effective approaches in dealing with the inherent complexity and increasing demands of big data management from an applications perspective. Various case studies included have been reported by data analysis experts who work closely with their clients in such fields as education, banking, and telecommunications. Understanding how data management has been adapted to these applications will help students, instructors and professionals in the field. Application areas also include the fields of social network analysis, bioinformatics, and the oil and gas industries.
Every second, users produce large amounts of image data from medical and satellite imaging systems. Image mining techniques that are capable of extracting useful information from image data are becoming increasingly useful, especially in medicine and the health sciences. Biomedical Image Analysis and Mining Techniques for Improved Health Outcomes addresses major techniques regarding image processing as a tool for disease identification and diagnosis, as well as treatment recommendation. Highlighting current research intended to advance the medical field, this publication is essential for use by researchers, advanced-level students, academicians, medical professionals, and technology developers. An essential addition to the reference material available in the field of medicine, this timely publication covers a range of applied research on data mining, image processing, computational simulation, data visualization, and image retrieval.
This book shows healthcare professionals how to turn data points into meaningful knowledge upon which they can take effective action. Actionable intelligence can take many forms, from informing health policymakers on effective strategies for the population to providing direct and predictive insights on patients to healthcare providers so they can achieve positive outcomes. It can assist those performing clinical research where relevant statistical methods are applied to both identify the efficacy of treatments and improve clinical trial design. It also benefits healthcare data standards groups through which pertinent data governance policies are implemented to ensure quality data are obtained, measured, and evaluated for the benefit of all involved. Although the obvious constant thread among all of these important healthcare use cases of actionable intelligence is the data at hand, such data in and of itself merely represents one element of the full structure of healthcare data analytics. This book examines the structure for turning data into actionable knowledge and discusses: The importance of establishing research questions Data collection policies and data governance Principle-centered data analytics to transform data into information Understanding the "why" of classified causes and effects Narratives and visualizations to inform all interested parties Actionable Intelligence in Healthcare is an important examination of how proper healthcare-related questions should be formulated, how relevant data must be transformed to associated information, and how the processing of information relates to knowledge. It indicates to clinicians and researchers why this relative knowledge is meaningful and how best to apply such newfound understanding for the betterment of all.
This book provides awareness of different evolutionary methods used for automatic generation and optimization of test data in the field of software testing. While the book highlights on the foundations of software testing techniques, it also focuses on contemporary topics for research and development. This book covers the automated process of testing in different levels like unit level, integration level, performance level, evaluation of testing strategies, testing in security level, optimizing test cases using various algorithms, and controlling and monitoring the testing process etc. This book aids young researchers in the field of optimization of automated software testing, provides academics with knowledge on the emerging field of AI in software development, and supports universities, research centers, and industries in new projects using AI in software testing. Supports the advancement in the artificial intelligence used in software development; Advances knowledge on artificial intelligence based metaheuristic approach in software testing; Encourages innovation in traditional software testing field using recent artificial intelligence. *
Data Mining for Business Applications presents the state-of-the-art research and development outcomes on methodologies, techniques, approaches and successful applications in the area. The contributions mark a paradigm shift from data-centered pattern mining to domain driven actionable knowledge discovery for next-generation KDD research and applications. The contents identify how KDD techniques can better contribute to critical domain problems in theory and practice, and strengthen business intelligence in complex enterprise applications. The volume also explores challenges and directions for future research and development in the dialogue between academia and business."
News headlines about privacy invasions, discrimination, and biases discovered in the platforms of big technology companies are commonplace today, and big tech's reluctance to disclose how they operate counteracts ideals of transparency, openness, and accountability. This book is for computer science students and researchers who want to study big tech's corporate surveillance from an experimental, empirical, or quantitative point of view and thereby contribute to holding big tech accountable. As a comprehensive technical resource, it guides readers through the corporate surveillance landscape and describes in detail how corporate surveillance works, how it can be studied experimentally, and what existing studies have found. It provides a thorough foundation in the necessary research methods and tools, and introduces the current research landscape along with a wide range of open issues and challenges. The book also explains how to consider ethical issues and how to turn research results into real-world change.
This book provides a thorough summary of the means currently available to the investigators of Artificial Intelligence for making criminal behavior (both individual and collective) foreseeable, and for assisting their investigative capacities. The volume provides chapters on the introduction of artificial intelligence and machine learning suitable for an upper level undergraduate with exposure to mathematics and some programming skill or a graduate course. It also brings the latest research in Artificial Intelligence to life with its chapters on fascinating applications in the area of law enforcement, though much is also being accomplished in the fields of medicine and bioengineering. Individuals with a background in Artificial Intelligence will find the opening chapters to be an excellent refresher but the greatest excitement will likely be the law enforcement examples, for little has been done in that area. The editors have chosen to shine a bright light on law enforcement analytics utilizing artificial neural network technology to encourage other researchers to become involved in this very important and timely field of study.
This important text/reference presents a comprehensive review of techniques for taxonomy matching, discussing matching algorithms, analyzing matching systems, and comparing matching evaluation approaches. Different methods are investigated in accordance with the criteria of the Ontology Alignment Evaluation Initiative (OAEI). The text also highlights promising developments and innovative guidelines, to further motivate researchers and practitioners in the field. Topics and features: discusses the fundamentals and the latest developments in taxonomy matching, including the related fields of ontology matching and schema matching; reviews next-generation matching strategies, matching algorithms, matching systems, and OAEI campaigns, as well as alternative evaluations; examines how the latest techniques make use of different sources of background knowledge to enable precise matching between repositories; describes the theoretical background, state-of-the-art research, and practical real-world applications; covers the fields of dynamic taxonomies, personalized directories, catalog segmentation, and recommender systems. This stimulating book is an essential reference for practitioners engaged in data science and business intelligence, and for researchers specializing in taxonomy matching and semantic similarity assessment. The work is also suitable as a supplementary text for advanced undergraduate and postgraduate courses on information and metadata management.
This book provides a comprehensive set of characterization, prediction, optimization, evaluation, and evolution techniques for a diagnosis system for fault isolation in large electronic systems. Readers with a background in electronics design or system engineering can use this book as a reference to derive insightful knowledge from data analysis and use this knowledge as guidance for designing reasoning-based diagnosis systems. Moreover, readers with a background in statistics or data analytics can use this book as a practical case study for adapting data mining and machine learning techniques to electronic system design and diagnosis. This book identifies the key challenges in reasoning-based, board-level diagnosis system design and presents the solutions and corresponding results that have emerged from leading-edge research in this domain. It covers topics ranging from highly accurate fault isolation, adaptive fault isolation, diagnosis-system robustness assessment, to system performance analysis and evaluation, knowledge discovery and knowledge transfer. With its emphasis on the above topics, the book provides an in-depth and broad view of reasoning-based fault diagnosis system design. * Explains and applies optimized techniques from the machine-learning domain to solve the fault diagnosis problem in the realm of electronic system design and manufacturing;* Demonstrates techniques based on industrial data and feedback from an actual manufacturing line;* Discusses practical problems, including diagnosis accuracy, diagnosis time cost, evaluation of diagnosis system, handling of missing syndromes in diagnosis, and need for fast diagnosis-system development.
This book presents Proceedings of the International Conference on Intelligent Systems and Networks (ICISN 2022), held at Hanoi in Vietnam. It includes peer reviewed high quality articles on Intelligent System and Networks. It brings together professionals and researchers in the area and presents a platform for exchange of ideas and to foster future collaboration. The topics covered in this book include- Foundations of Computer Science; Computational Intelligence Language and speech processing; Software Engineering Software development methods; Wireless Communications Signal Processing for Communications; Electronics track IoT and Sensor Systems Embedded Systems; etc.
This book presents recent advances in Knowledge discovery in databases (KDD) with a focus on the areas of market basket database, time-stamped databases and multiple related databases. Various interesting and intelligent algorithms are reported on data mining tasks. A large number of association measures are presented, which play significant roles in decision support applications. This book presents, discusses and contrasts new developments in mining time-stamped data, time-based data analyses, the identification of temporal patterns, the mining of multiple related databases, as well as local patterns analysis.
This book examines the field of parallel database management systems and illustrates the great variety of solutions based on a shared-storage or a shared-nothing architecture. Constantly dropping memory prices and the desire to operate with low-latency responses on large sets of data paved the way for main memory-based parallel database management systems. However, this area is currently dominated by the shared-nothing approach in order to preserve the in-memory performance advantage by processing data locally on each server. The main argument this book makes is that such an unilateral development will cease due to the combination of the following three trends: a) Today's network technology features remote direct memory access (RDMA) and narrows the performance gap between accessing main memory on a server and of a remote server to and even below a single order of magnitude. b) Modern storage systems scale gracefully, are elastic and provide high-availability. c) A modern storage system such as Stanford's RAM Cloud even keeps all data resident in the main memory. Exploiting these characteristics in the context of a main memory-based parallel database management system is desirable. The book demonstrates that the advent of RDMA-enabled network technology makes the creation of a parallel main memory DBMS based on a shared-storage approach feasible.
This book provides an overview of the history of integrative bioinformatics and the actual situation and the relevant tools. Subjects cover the essential topics, basic introductions, and latest developments; biological data integration and manipulation; modeling and simulation of networks; as well as a number of applications of integrative bioinformatics. It aims to provide basic introduction of biological information systems and guidance for the computational analysis of systems biology. This book covers a range of issues and methods that unveil a multitude of omics data integration and relevance that integrative bioinformatics has today. It contains a unique compilation of invited and selected articles from the Journal of Integrative Bioinformatics (JIB) and annual meetings of the International Symposium on Integrative Bioinformatics. |
You may like...
Cognitive Social Mining Applications in…
Anandakumar Haldorai, Arulmurugan Ramu
Hardcover
R4,855
Discovery Miles 48 550
|