![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Databases > Data mining
This 2 volume-set of IFIP AICT 583 and 584 constitutes the refereed proceedings of the 16th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2020, held in Neos Marmaras, Greece, in June 2020.* The 70 full papers and 5 short papers presented were carefully reviewed and selected from 149 submissions. They cover a broad range of topics related to technical, legal, and ethical aspects of artificial intelligence systems and their applications and are organized in the following sections: Part I: classification; clustering - unsupervised learning -analytics; image processing; learning algorithms; neural network modeling; object tracking - object detection systems; ontologies - AI; and sentiment analysis - recommender systems. Part II: AI ethics - law; AI constraints; deep learning - LSTM; fuzzy algebra - fuzzy systems; machine learning; medical - health systems; and natural language. *The conference was held virtually due to the COVID-19 pandemic.
This textbook grew out of notes for the ECE143 Programming for Data Analysis class that the author has been teaching at University of California, San Diego, which is a requirement for both graduate and undergraduate degrees in Machine Learning and Data Science. This book is ideal for readers with some Python programming experience. The book covers key language concepts that must be understood to program effectively, especially for data analysis applications. Certain low-level language features are discussed in detail, especially Python memory management and data structures. Using Python effectively means taking advantage of its vast ecosystem. The book discusses Python package management and how to use third-party modules as well as how to structure your own Python modules. The section on object-oriented programming explains features of the language that facilitate common programming patterns. After developing the key Python language features, the book moves on to third-party modules that are foundational for effective data analysis, starting with Numpy. The book develops key Numpy concepts and discusses internal Numpy array data structures and memory usage. Then, the author moves onto Pandas and details its many features for data processing and alignment. Because strong visualizations are important for communicating data analysis, key modules such as Matplotlib are developed in detail, along with web-based options such as Bokeh, Holoviews, Altair, and Plotly. The text is sprinkled with many tricks-of-the-trade that help avoid common pitfalls. The author explains the internal logic embodied in the Python language so that readers can get into the Python mindset and make better design choices in their codes, which is especially helpful for newcomers to both Python and data analysis. To get the most out of this book, open a Python interpreter and type along with the many code samples.
The book proposes a systematic approach to big data collection, documentation and development of analytic procedures that foster collaboration on a large scale. This approach, designated as "data factoring" emphasizes the need to think of each individual dataset developed by an individual project as part of a broader data ecosystem, easily accessible and exploitable by parties not directly involved with data collection and documentation. Furthermore, data factoring uses and encourages pre-analytic operations that add value to big data sets, especially recombining and repurposing. The book proposes a research-development agenda that can undergird an ideal data factory approach. Several programmatic chapters discuss specialized issues involved in data factoring (documentation, meta-data specification, building flexible, yet comprehensive data ontologies, usability issues involved in collaborative tools, etc.). The book also presents case studies for data factoring and processing that can lead to building better scientific collaboration and data sharing strategies and tools. Finally, the book presents the teaching utility of data factoring and the ethical and privacy concerns related to it. Chapter 9 of this book is available open access under a CC BY 4.0 license at link.springer.com
DATA SCIENCE IN THEORY AND PRACTICE EXPLORE THE FOUNDATIONS OF DATA SCIENCE WITH THIS INSIGHTFUL NEW RESOURCE Data Science in Theory and Practice delivers a comprehensive treatment of the mathematical and statistical models useful for analyzing data sets arising in various disciplines, like banking, finance, health care, bioinformatics, security, education, and social services. Written in five parts, the book examines some of the most commonly used and fundamental mathematical and statistical concepts that form the basis of data science. The authors go on to analyze various data transformation techniques useful for extracting information from raw data, long memory behavior, and predictive modeling. The book offers readers a multitude of topics all relevant to the analysis of complex data sets. Along with a robust exploration of the theory underpinning data science, it contains numerous applications to specific and practical problems. The book also provides examples of code algorithms in R and Python and provides pseudo-algorithms to port the code to any other language. Ideal for students and practitioners without a strong background in data science, readers will also learn from topics like: Analyses of foundational theoretical subjects, including the history of data science, matrix algebra and random vectors, and multivariate analysis A comprehensive examination of time series forecasting, including the different components of time series and transformations to achieve stationarity Introductions to both the R and Python programming languages, including basic data types and sample manipulations for both languages An exploration of algorithms, including how to write one and how to perform an asymptotic analysis A comprehensive discussion of several techniques for analyzing and predicting complex data sets Perfect for advanced undergraduate and graduate students in Data Science, Business Analytics, and Statistics programs, Data Science in Theory and Practice will also earn a place in the libraries of practicing data scientists, data and business analysts, and statisticians in the private sector, government, and academia.
This book provides a comprehensive introduction to the application of artificial intelligence in social computing, from fundamental data processing to advanced social network computing. To broaden readers' understanding of the topics addressed, it includes extensive data and a large number of charts and references, covering theories, techniques and applications. It particularly focuses on data collection, data mining, artificial intelligence algorithms in social computing, and several key applications of social computing application, and also discusses network propagation mechanisms and dynamic analysis, which provide useful insights into how information is disseminated in online social networks. This book is intended for readers with a basic knowledge of advanced mathematics and computer science.
This book focuses on applications of social network analysis in predictive policing. Data science is used to identify potential criminal activity by analyzing the relationships between offenders to fully understand criminal collaboration patterns. Co-offending networks-networks of offenders who have committed crimes together-have long been recognized by law enforcement and intelligence agencies as a major factor in the design of crime prevention and intervention strategies. Despite the importance of co-offending network analysis for public safety, computational methods for analyzing large-scale criminal networks are rather premature. This book extensively and systematically studies co-offending network analysis as effective tool for predictive policing. The formal representation of criminological concepts presented here allow computer scientists to think about algorithmic and computational solutions to problems long discussed in the criminology literature. For each of the studied problems, we start with well-founded concepts and theories in criminology, then propose a computational method and finally provide a thorough experimental evaluation, along with a discussion of the results. In this way, the reader will be able to study the complete process of solving real-world multidisciplinary problems.
This book explores internet applications in which a crucial role is played by classification, such as spam filtering, recommender systems, malware detection, intrusion detection and sentiment analysis. It explains how such classification problems can be solved using various statistical and machine learning methods, including K nearest neighbours, Bayesian classifiers, the logit method, discriminant analysis, several kinds of artificial neural networks, support vector machines, classification trees and other kinds of rule-based methods, as well as random forests and other kinds of classifier ensembles. The book covers a wide range of available classification methods and their variants, not only those that have already been used in the considered kinds of applications, but also those that have the potential to be used in them in the future. The book is a valuable resource for post-graduate students and professionals alike.
This book provides a comprehensive introduction to rough set-based feature selection. Rough set theory, first proposed by Zdzislaw Pawlak in 1982, continues to evolve. Concerned with the classification and analysis of imprecise or uncertain information and knowledge, it has become a prominent tool for data analysis, and enables the reader to systematically study all topics in rough set theory (RST) including preliminaries, advanced concepts, and feature selection using RST. The book is supplemented with an RST-based API library that can be used to implement several RST concepts and RST-based feature selection algorithms. The book provides an essential reference guide for students, researchers, and developers working in the areas of feature selection, knowledge discovery, and reasoning with uncertainty, especially those who are working in RST and granular computing. The primary audience of this book is the research community using rough set theory (RST) to perform feature selection (FS) on large-scale datasets in various domains. However, any community interested in feature selection such as medical, banking, and finance can also benefit from the book. This second edition also covers the dominance-based rough set approach and fuzzy rough sets. The dominance-based rough set approach (DRSA) is an extension of the conventional rough set approach and supports the preference order using the dominance principle. In turn, fuzzy rough sets are fuzzy generalizations of rough sets. An API library for the DRSA is also provided with the second edition of the book.
In this book, Helen Kennedy argues that as social media data mining becomes more and more ordinary, as we post, mine and repeat, new data relations emerge. These new data relations are characterised by a widespread desire for numbers and the troubling consequences of this desire, and also by the possibility of doing good with data and resisting data power, by new and old concerns, and by instability and contradiction. Drawing on action research with public sector organisations, interviews with commercial social insights companies and their clients, focus groups with social media users and other research, Kennedy provides a fascinating and detailed account of living with social media data mining inside the organisations that make up the fabric of everyday life.
The collection and analysis of data play an important role in many fields of science and technology, such as computational biology, quantitative finance, information engineering, machine learning, neuroscience, medicine, and the social sciences. Especially in the era of big data, researchers can easily collect data characterised by massive dimensions and complexity. In celebration of Professor Kai-Tai Fang's 80th birthday, we present this book, which furthers new and exciting developments in modern statistical theories, methods and applications. The book features four review papers on Professor Fang's numerous contributions to the fields of experimental design, multivariate analysis, data mining and education. It also contains twenty research articles contributed by prominent and active figures in their fields. The articles cover a wide range of important topics such as experimental design, multivariate analysis, data mining, hypothesis testing and statistical models.
This book presents a comprehensive review for Knowledge Engineering tools and techniques that can be used in Artificial Intelligence Planning and Scheduling. KE tools can be used to aid in the acquisition of knowledge and in the construction of domain models, which this book will illustrate. AI planning engines require a domain model which captures knowledge about how a particular domain works - e.g. the objects it contains and the available actions that can be used. However, encoding a planning domain model is not a straightforward task - a domain expert may be needed for their insight into the domain but this information must then be encoded in a suitable representation language. The development of such domain models is both time-consuming and error-prone. Due to these challenges, researchers have developed a number of automated tools and techniques to aid in the capture and representation of knowledge. This book targets researchers and professionals working in knowledge engineering, artificial intelligence and software engineering. Advanced-level students studying AI will also be interested in this book.
This book focuses on data and how modern business firms use social data, specifically Online Social Networks (OSNs) incorporated as part of the infrastructure for a number of emerging applications such as personalized recommendation systems, opinion analysis, expertise retrieval, and computational advertising. This book identifies how in such applications, social data offers a plethora of benefits to enhance the decision making process. This book highlights that business intelligence applications are more focused on structured data; however, in order to understand and analyse the social big data, there is a need to aggregate data from various sources and to present it in a plausible format. Big Social Data (BSD) exhibit all the typical properties of big data: wide physical distribution, diversity of formats, non-standard data models, independently-managed and heterogeneous semantics but even further valuable with marketing opportunities. The book provides a review of the current state-of-the-art approaches for big social data analytics as well as to present dissimilar methods to infer value from social data. The book further examines several areas of research that benefits from the propagation of the social data. In particular, the book presents various technical approaches that produce data analytics capable of handling big data features and effective in filtering out unsolicited data and inferring a value. These approaches comprise advanced technical solutions able to capture huge amounts of generated data, scrutinise the collected data to eliminate unwanted data, measure the quality of the inferred data, and transform the amended data for further data analysis. Furthermore, the book presents solutions to derive knowledge and sentiments from BSD and to provide social data classification and prediction. The approaches in this book also incorporate several technologies such as semantic discovery, sentiment analysis, affective computing and machine learning. This book has additional special feature enriched with numerous illustrations such as tables, graphs and charts incorporating advanced visualisation tools in accessible an attractive display.
The book includes both invited and contributed chapters dealing with advanced methods and theoretical development for the analysis of social networks and applications in numerous disciplines. Some authors explore new trends related to network measures, multilevel networks and clustering on networks, while other contributions deepen the relationship among statistical methods for data mining and social network analysis. Along with the new methodological developments, the book offers interesting applications to a wide set of fields, ranging from the organizational and economic studies, collaboration and innovation, to the less usual field of poetry. In addition, the case studies are related to local context, showing how the substantive reasoning is fundamental in social network analysis. The list of authors includes both top scholars in the field of social networks and promising young researchers. All chapters passed a double blind review process followed by the guest editors. This edited volume will appeal to students, researchers and professionals.
Activity recognition has emerged as a challenging and high-impact research field, as over the past years smaller and more powerful sensors have been introduced in wide-spread consumer devices. Validation of techniques and algorithms requires large-scale human activity corpuses and improved methods to recognize activities and the contexts in which they occur. This book deals with the challenges of designing valid and reproducible experiments, running large-scale dataset collection campaigns, designing activity and context recognition methods that are robust and adaptive, and evaluating activity recognition systems in the real world with real users.
The last decade has witnessed the rise of big data in game development as the increasing proliferation of Internet-enabled gaming devices has made it easier than ever before to collect large amounts of player-related data. At the same time, the emergence of new business models and the diversification of the player base have exposed a broader potential audience, which attaches great importance to being able to tailor game experiences to a wide range of preferences and skill levels. This, in turn, has led to a growing interest in data mining techniques, as they offer new opportunities for deriving actionable insights to inform game design, to ensure customer satisfaction, to maximize revenues, and to drive technical innovation. By now, data mining and analytics have become vital components of game development. The amount of work being done in this area nowadays makes this an ideal time to put together a book on this subject. Data Analytics Applications in Gaming and Entertainment seeks to provide a cross section of current data analytics applications in game production. It is intended as a companion for practitioners, academic researchers, and students seeking knowledge on the latest practices in game data mining. The chapters have been chosen in such a way as to cover a wide range of topics and to provide readers with a glimpse at the variety of applications of data mining in gaming. A total of 25 authors from industry and academia have contributed 12 chapters covering topics such as player profiling, approaches for analyzing player communities and their social structures, matchmaking, churn prediction and customer lifetime value estimation, communication of analytical results, and visual approaches to game analytics. This book's perspectives and concepts will spark heightened interest in game analytics and foment innovative ideas that will advance the exciting field of online gaming and entertainment.
Exploratory data analysis, also known as data mining or knowledge discovery from databases, is typically based on the optimisation of a specific function of a dataset. Such optimisation is often performed with gradient descent or variations thereof. In this book, we first lay the groundwork by reviewing some standard clustering algorithms and projection algorithms before presenting various non-standard criteria for clustering. The family of algorithms developed are shown to perform better than the standard clustering algorithms on a variety of datasets. We then consider extensions of the basic mappings which maintain some topology of the original data space. Finally we show how reinforcement learning can be used as a clustering mechanism before turning to projection methods. We show that several varieties of reinforcement learning may also be used to define optimal projections for example for principal component analysis, exploratory projection pursuit and canonical correlation analysis. The new method of cross entropy adaptation is then introduced and used as a means of optimising projections. Finally an artificial immune system is used to create optimal projections and combinations of these three methods are shown to outperform the individual methods of optimisation.
This book introduces research presented at the "International Conference on Artificial Intelligence: Advances and Applications-2019 (ICAIAA 2019)," a two-day conference and workshop bringing together leading academicians, researchers as well as students to share their experiences and findings on all aspects of engineering applications of artificial intelligence. The book covers research in the areas of artificial intelligence, machine learning, and deep learning applications in health care, agriculture, business and security. It also includes research in core concepts of computer networks, intelligent system design and deployment, real-time systems, WSN, sensors and sensor nodes, SDN and NFV. As such it is a valuable resource for students, academics and practitioners in industry working on AI applications.
This book offers a selection of the best papers presented at the 13th International Symposium on Location Based Services (LBS 2016), which was held in Vienna (Austria) from November 14 to 16, 2016. It provides an overview of recent research in the field, including the latest advances in outdoor/indoor positioning, smart environment, spatial modeling, personalization and context awareness, cartographic communication, novel user interfaces, crowd sourcing, social media, big data analysis, usability and privacy.
In this book, we primarily focus on studies that provide objective, unobtrusive, and innovative measures (e.g., indirect measures, content analysis, or analysis of trace data) of SEL skills (e.g., collaboration, creativity, persistence), relying primarily on learning analytics methods and approaches that would potentially allow for expanding the assessment of SEL skills and competencies at scale. What makes the position of learning analytics pivotal in this endeavor to redefine measurement of SEL skills are constant changes and advancements in learning environments and the quality and quantity of data collected about learners and the process of learning. Contemporary learning environments that utilize virtual and augmented reality to enhance learning opportunities accommodate for designing tasks and activities that allow learners to elicit behaviors (either in face-to-face or online context) not being captured in traditional educational settings. Novel insights provided in the book span across diverse types of learning contexts and learner populations. Specifically, the book addresses relevant and emerging theories and frameworks (in various disciplines such as education, psychology, or workforce) that inform assessments of SEL skills and competencies. In so doing, the book maps the landscape of the novel learning analytics methods and approaches, along with their application in the SEL assessment for K-12 learners as well as adult learners. Critical to the notion of the SEL assessment are data sources. In that sense, the book outlines where and how data related to learners' 21st century skills and competencies can be measured and collected. Linking theory to data, the book further discusses tools and methods that are being used to operationalize SEL and link relevant skills and competencies with cognitive assessment. Finally, the book addresses aspects of generalizability and applicability, showing promising approaches for translating research findings into actionable insights that would inform various stakeholders (e.g., learners, instructors, administrators, policy makers).
Optimization techniques have been widely adopted to implement various data mining algorithms. In addition to well-known Support Vector Machines (SVMs) (which are based on quadratic programming), different versions of Multiple Criteria Programming (MCP) have been extensively used in data separations. Since optimization based data mining methods differ from statistics, decision tree induction, and neural networks, their theoretical inspiration has attracted many researchers who are interested in algorithm development of data mining. "Optimization based Data Mining: Theory and Applications," mainly focuses on MCP and SVM especially their recent theoretical progress and real-life applications in various fields. These include finance, web services, bio-informatics and petroleum engineering, which has triggered the interest of practitioners who look for new methods to improve the results of data mining for knowledge discovery. Most of the material in this book is directly from the research and application activities that the authors' research group has conducted over the last ten years. Aimed at practitioners and graduates who have a fundamental knowledge in data mining, it demonstrates the basic concepts and foundations on how to use optimization techniques to deal with data mining problems.
This book is a collection of chapters written by experts on various aspects of big data. The book aims to explain what big data is and how it is stored and used. The book starts from the fundamentals and builds up from there. It is intended to serve as a review of the state-of-the-practice in the field of big data handling. The traditional framework of relational databases can no longer provide appropriate solutions for handling big data and making it available and useful to users scattered around the globe. The study of big data covers a wide range of issues including management of heterogeneous data, big data frameworks, change management, finding patterns in data usage and evolution, data as a service, service-generated data, service management, privacy and security. All of these aspects are touched upon in this book. It also discusses big data applications in different domains. The book will prove useful to students, researchers, and practicing database and networking engineers.
This updated compendium provides the linear algebra background necessary to understand and develop linear algebra applications in data mining and machine learning.Basic knowledge and advanced new topics (spectral theory, singular values, decomposition techniques for matrices, tensors and multidimensional arrays) are presented together with several applications of linear algebra (k-means clustering, biplots, least square approximations, dimensionality reduction techniques, tensors and multidimensional arrays).The useful reference text includes more than 600 exercises and supplements, many with completed solutions and MATLAB applications.The volume benefits professionals, academics, researchers and graduate students in the fields of pattern recognition/image analysis, AI, machine learning and databases.
In ancient games such as chess or go, the most brilliant players can improve by studying the strategies produced by a machine. Robotic systems practice their own movements. In arcade games, agents capable of learning reach superhuman levels within a few hours. How do these spectacular reinforcement learning algorithms work? With easy-to-understand explanations and clear examples in Java and Greenfoot, you can acquire the principles of reinforcement learning and apply them in your own intelligent agents. Greenfoot (M.Koelling, King's College London) and the hamster model (D. Bohles, University of Oldenburg) are simple but also powerful didactic tools that were developed to convey basic programming concepts. The result is an accessible introduction into machine learning that concentrates on reinforcement learning. Taking the reader through the steps of developing intelligent agents, from the very basics to advanced aspects, touching on a variety of machine learning algorithms along the way, one is allowed to play along, experiment, and add their own ideas and experiments.
This book comprises the best deliberations with the theme "Machine Learning Technologies and Applications" in the "International Conference on Advances in Computer Engineering and Communication Systems (ICACECS 2020)," organized by the Department of Computer Science and Engineering, VNR Vignana Jyothi Institute of Engineering and Technology. The book provides insights into the recent trends and developments in the field of computer science with a special focus on the machine learning and big data. The book focuses on advanced topics in artificial intelligence, machine learning, data mining and big data computing, cloud computing, Internet of things, distributed computing and smart systems.
The investigation of healthcare databases can be used to examine physician decisions and develop evidence-based treatment guidelines that optimize patient outcomes. Clinical Data Mining for Physician Decision Making and Investigating Health Outcomes: Methods for Prediction and Analysis demonstrates how concern for detail in datasets and the use of data mining techniques can extract important and meaningful knowledge from healthcare databases. Basic information on processing data with step-by-step instructions is provided, allowing readers to use their own data and follow the instructions to find meaningful results. |
You may like...
|