![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > Databases > Data mining
RDF-based knowledge graphs require additional formalisms to be fully context-aware, which is presented in this book. This book also provides a collection of provenance techniques and state-of-the-art metadata-enhanced, provenance-aware, knowledge graph-based representations across multiple application domains, in order to demonstrate how to combine graph-based data models and provenance representations. This is important to make statements authoritative, verifiable, and reproducible, such as in biomedical, pharmaceutical, and cybersecurity applications, where the data source and generator can be just as important as the data itself. Capturing provenance is critical to ensure sound experimental results and rigorously designed research studies for patient and drug safety, pathology reports, and medical evidence generation. Similarly, provenance is needed for cyberthreat intelligence dashboards and attack maps that aggregate and/or fuse heterogeneous data from disparate data sources to differentiate between unimportant online events and dangerous cyberattacks, which is demonstrated in this book. Without provenance, data reliability and trustworthiness might be limited, causing data reuse, trust, reproducibility and accountability issues. This book primarily targets researchers who utilize knowledge graphs in their methods and approaches (this includes researchers from a variety of domains, such as cybersecurity, eHealth, data science, Semantic Web, etc.). This book collects core facts for the state of the art in provenance approaches and techniques, complemented by a critical review of existing approaches. New research directions are also provided that combine data science and knowledge graphs, for an increasingly important research topic.
As data mining is one of the most rapidly changing disciplines with new technologies and concepts continually under development, academicians, researchers, and professionals of the discipline need access to the most current information about the concepts, issues, trends, and technologies in this emerging field.""Social Implications of Data Mining and Information Privacy: Interdisciplinary Frameworks and Solutions"" serves as a critical source of information related to emerging issues and solutions in data mining and the influence of political and socioeconomic factors. An immense breakthrough, this essential reference provides concise coverage of emerging issues and technological solutions in data mining, and covers problems with applicable laws governing such issues.
This book sets the stage of the evolution of corporate governance, laws and regulations, other forms of governance, and the interaction between data governance and other corporate governance sub-disciplines. Given the continuously evolving and complex regulatory landscape and the growing number of laws and regulations, compliance is a widely discussed issue in the field of data. This book considers the cost of non-compliance bringing in examples from different industries of instances in which companies failed to comply with rules, regulations, and other legal obligations, and goes on to explain how data governance helps in avoiding such pitfalls. The first in a three-volume series on data governance, this book does not assume any prior or specialist knowledge in data governance and will be highly beneficial for IT, management and law students, academics, information management and business professionals, and researchers to enhance their knowledge and get guidance in managing their own data governance projects from a governance and compliance perspective.
This proceedings is focused on the emerging concept of Collaborative Innovation Networks (COINs). COINs are at the core of collaborative knowledge networks, distributed communities taking advantage of the wide connectivity and the support of communication technologies, spanning beyond the organizational perimeter of companies on a global scale. The book presents the refereed conference papers from the 7th International Conference on COINs, October 8-9, 2019, in Warsaw, Poland. It includes papers for both application areas of COINs, (1) optimizing organizational creativity and performance, and (2) discovering and predicting new trends by identifying COINs on the Web through online social media analysis. Papers at COINs19 combine a wide range of interdisciplinary fields such as social network analysis, group dynamics, design and visualization, information systems and the psychology and sociality of collaboration, and intercultural analysis through the lens of online social media. They will cover most recent advances in areas from leadership and collaboration, trend prediction and data mining, to social competence and Internet communication.
This proceedings volume gathers together selected peer-reviewed papers presented at the second edition of the XXVI International Joint Conference on Industrial Engineering and Operations Management (IJCIEOM), which was virtually held on February 22-24, 2021 with the main organization based at the Pontifical Catholic University of Rio de Janeiro, Brazil. Works cover a range of topics in industrial engineering, including operations and process management, global operations, managerial economics, data science and stochastic optimization, logistics and supply chain management, quality management, product development, strategy and organizational engineering, knowledge and information management, sustainability, and disaster management, to name a few. These topics broadly involve fields like operations, manufacturing, industrial and production engineering, and management. This book can be a valuable resource for researchers and practitioners in optimization research, operations research, and correlated fields.
Organizations that utilize data mining techniques can amass valuable information on clients habits and preferences, behavior patterns, purchase patterns, sales patterns, and stock forecasts. Ethical Data Mining Applications for Socio-Economic Development provides an overview of data mining techniques under an ethical lens, investigating developments in research and best practices, while evaluating experimental cases to identify potential ethical dilemmas in the information and communications technology sector. The cases and research in this book will benefit scientists, researchers, and practitioners working in the field of data mining, data warehousing, and database management to ensure that data obtained through web-based investigations is properly handled at all organizational levels. This book is part of the Advances in Data Mining and Database Management series collection.
This book is a significant contribution to the subject of mining time-changing data streams and addresses the design of learning algorithms for this purpose. It introduces new contributions on several different aspects of the problem, identifying research opportunities and increasing the scope for applications. It also includes an in-depth study of stream mining and a theoretical analysis of proposed methods and algorithms. The first section is concerned with the use of an adaptive sliding window algorithm (ADWIN). Since this has rigorous performance guarantees, using it in place of counters or accumulators, it offers the possibility of extending such guarantees to learning and mining algorithms not initially designed for drifting data. Testing with several methods, including Naive Bayes, clustering, decision trees and ensemble methods, is discussed as well. The second part of the book describes a formal study of connected acyclic graphs, or 'trees', from the point of view of closure-based mining, presenting efficient algorithms for subtree testing and for mining ordered and unordered frequent closed trees. Lastly, a general methodology to identify closed patterns in a data stream is outlined. This is applied to develop an incremental method, a sliding-window based method, and a method that mines closed trees adaptively from data streams. These are used to introduce classification methods for tree data streams.
With the proliferation of GPS devices in daily life, trajectory data that records where and when people move is now readily available on a large scale. As one of the most typical representatives, it has now become widely recognized that taxi trajectory data provides rich opportunities to enable promising smart urban services. Yet, a considerable gap still exists between the raw data available, and the extraction of actionable intelligence. This gap poses fundamental challenges on how we can achieve such intelligence. These challenges include inaccuracy issues, large data volumes to process, and sparse GPS data, to name but a few. Moreover, the movements of taxis and the leaving trajectory data are the result of a complex interplay between several parties, including drivers, passengers, travellers, urban planners, etc. In this book, we present our latest findings on mining taxi GPS trajectory data to enable a number of smart urban services, and to bring us one step closer to the vision of smart mobility. Firstly, we focus on some fundamental issues in trajectory data mining and analytics, including data map-matching, data compression, and data protection. Secondly, driven by the real needs and the most common concerns of each party involved, we formulate each problem mathematically and propose novel data mining or machine learning methods to solve it. Extensive evaluations with real-world datasets are also provided, to demonstrate the effectiveness and efficiency of using trajectory data. Unlike other books, which deal with people and goods transportation separately, this book also extends smart urban services to goods transportation by introducing the idea of crowdshipping, i.e., recruiting taxis to make package deliveries on the basis of real-time information. Since people and goods are two essential components of smart cities, we feel this extension is bot logical and essential. Lastly, we discuss the most important scientific problems and open issues in mining GPS trajectory data.
Research and development surrounding the use of data queries is receiving increased attention from computer scientists and data specialists alike. Through the use of query technology, large volumes of data in databases can be retrieved, and information systems built based on databases can support problem solving and decision making across industries. The Handbook of Research on Innovative Database Query Processing Techniques focuses on the growing topic of database query processing methods, technologies, and applications. Aimed at providing an all-inclusive reference source of technologies and practices in advanced database query systems, this book investigates various techniques, including database and XML queries, spatiotemporal data queries, big data queries, metadata queries, and applications of database query systems. This comprehensive handbook is a necessary resource for students, IT professionals, data analysts, and academicians interested in uncovering the latest methods for using queries as a means to extract information from databases. This all-inclusive handbook includes the latest research on topics pertaining to information retrieval, data extraction, data management, design and development of database queries, and database and XM queries.
This book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2020) held at the University of Engineering & Management, Kolkata, India, during July 2020. The book is organized in three volumes and includes high-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers, and case studies related to all the areas of data mining, machine learning, Internet of things (IoT), and information security.
This book provides an introduction to the field of periodic pattern mining, reviews state-of-the-art techniques, discusses recent advances, and reviews open-source software. Periodic pattern mining is a popular and emerging research area in the field of data mining. It involves discovering all regularly occurring patterns in temporal databases. One of the major applications of periodic pattern mining is the analysis of customer transaction databases to discover sets of items that have been regularly purchased by customers. Discovering such patterns has several implications for understanding the behavior of customers. Since the first work on periodic pattern mining, numerous studies have been published and great advances have been made in this field. The book consists of three main parts: introduction, algorithms, and applications. The first chapter is an introduction to pattern mining and periodic pattern mining. The concepts of periodicity, periodic support, search space exploration techniques, and pruning strategies are discussed. The main types of algorithms are also presented such as periodic-frequent pattern growth, partial periodic pattern-growth, and periodic high-utility itemset mining algorithm. Challenges and research opportunities are reviewed. The chapters that follow present state-of-the-art techniques for discovering periodic patterns in (1) transactional databases, (2) temporal databases, (3) quantitative temporal databases, and (4) big data. Then, the theory on concise representations of periodic patterns is presented, as well as hiding sensitive information using privacy-preserving data mining techniques. The book concludes with several applications of periodic pattern mining, including applications in air pollution data analytics, accident data analytics, and traffic congestion analytics.
This book discusses recent research and applications in intelligent service computing in mobile environments. The authors first explain how advances in artificial intelligence and big data have allowed for an array of intelligent services with complex and diverse applications. They then show how this brings new opportunities and challenges for service computing. The book, made up of contributions from academic and industry, aims to present advances in intelligent services, new algorithms and techniques in the field, foundational theory and systems, as well as practical real-life applications. Some of the topics discussed include cognition, modeling, description and verification for intelligent services; discovery, recommendation and selection for intelligent services; formal verification, testing and inspection for intelligent services; and composition and cooperation methods for intelligent services.
The field of data mining is receiving significant attention in today's information-rich society, where data is available from different sources and formats, in large volumes, and no longer constitutes a bottleneck for knowledge acquisition. This rich information has paved the way for novel areas of research, particularly in the crime data analysis realm. Data Mining Trends and Applications in Criminal Science and Investigations presents scientific concepts and frameworks of data mining and analytics implementation and uses across various domains, such as public safety, criminal investigations, intrusion detection, crime scene analysis, and suspect modeling. Exploring the diverse ways that data is revolutionizing the field of criminal science, this publication meets the research needs of law enforcement professionals, data analysts, investigators, researchers, and graduate-level students.
This book gathers a collection of high-quality peer-reviewed research papers presented at the 2nd International Conference on Data and Information Sciences (ICDIS 2019), held at Raja Balwant Singh Engineering Technical Campus, Agra, India, on March 29-30, 2019. In chapters written by leading researchers, developers, and practitioner from academia and industry, it covers virtually all aspects of computational sciences and information security, including central topics like artificial intelligence, cloud computing, and big data. Highlighting the latest developments and technical solutions, it will show readers from the computer industry how to capitalize on key advances in next-generation computer and communication technology.
Even though many data analytics tools have been developed in the past years, their usage in the field of cyber twin warrants new approaches that consider various aspects including unified data representation, zero-day attack detection, data sharing across threat detection systems, real-time analysis, sampling, dimensionality reduction, resource-constrained data processing, and time series analysis for anomaly detection. Further study is required to fully understand the opportunities, benefits, and difficulties of data analytics and the internet of things in today's modern world. New Approaches to Data Analytics and Internet of Things Through Digital Twin considers how data analytics and the internet of things can be used successfully within the field of digital twin as well as the potential future directions of these technologies. Covering key topics such as edge networks, deep learning, intelligent data analytics, and knowledge discovery, this reference work is ideal for computer scientists, industry professionals, researchers, scholars, practitioners, academicians, instructors, and students.
Cluster or co-cluster analyses are important tools in a variety of scientific areas. The introduction of this book presents a state of the art of already well-established, as well as more recent methods of co-clustering. The authors mainly deal with the two-mode partitioning under different approaches, but pay particular attention to a probabilistic approach. Chapter 1 concerns clustering in general and the model-based clustering in particular. The authors briefly review the classical clustering methods and focus on the mixture model. They present and discuss the use of different mixtures adapted to different types of data. The algorithms used are described and related works with different classical methods are presented and commented upon. This chapter is useful in tackling the problem of co-clustering under the mixture approach. Chapter 2 is devoted to the latent block model proposed in the mixture approach context. The authors discuss this model in detail and present its interest regarding co-clustering. Various algorithms are presented in a general context. Chapter 3 focuses on binary and categorical data. It presents, in detail, the appropriated latent block mixture models. Variants of these models and algorithms are presented and illustrated using examples. Chapter 4 focuses on contingency data. Mutual information, phi-squared and model-based co-clustering are studied. Models, algorithms and connections among different approaches are described and illustrated. Chapter 5 presents the case of continuous data. In the same way, the different approaches used in the previous chapters are extended to this situation. Contents 1. Cluster Analysis. 2. Model-Based Co-Clustering. 3. Co-Clustering of Binary and Categorical Data. 4. Co-Clustering of Contingency Tables. 5. Co-Clustering of Continuous Data. About the Authors Gerard Govaert is Professor at the University of Technology of Compiegne, France. He is also a member of the CNRS Laboratory Heudiasyc (Heuristic and diagnostic of complex systems). His research interests include latent structure modeling, model selection, model-based cluster analysis, block clustering and statistical pattern recognition. He is one of the authors of the MIXMOD (MIXtureMODelling) software. Mohamed Nadif is Professor at the University of Paris-Descartes, France, where he is a member of LIPADE (Paris Descartes computer science laboratory) in the Mathematics and Computer Science department. His research interests include machine learning, data mining, model-based cluster analysis, co-clustering, factorization and data analysis. Cluster Analysis is an important tool in a variety of scientific areas. Chapter 1 briefly presents a state of the art of already well-established as well more recent methods. The hierarchical, partitioning and fuzzy approaches will be discussed amongst others. The authors review the difficulty of these classical methods in tackling the high dimensionality, sparsity and scalability. Chapter 2 discusses the interests of coclustering, presenting different approaches and defining a co-cluster. The authors focus on co-clustering as a simultaneous clustering and discuss the cases of binary, continuous and co-occurrence data. The criteria and algorithms are described and illustrated on simulated and real data. Chapter 3 considers co-clustering as a model-based co-clustering. A latent block model is defined for different kinds of data. The estimation of parameters and co-clustering is tackled under two approaches: maximum likelihood and classification maximum likelihood. Hard and soft algorithms are described and applied on simulated and real data. Chapter 4 considers co-clustering as a matrix approximation. The trifactorization approach is considered and algorithms based on update rules are described. Links with numerical and probabilistic approaches are established. A combination of algorithms are proposed and evaluated on simulated and real data. Chapter 5 considers a co-clustering or bi-clustering as the search for coherent co-clusters in biological terms or the extraction of co-clusters under conditions. Classical algorithms will be described and evaluated on simulated and real data. Different indices to evaluate the quality of coclusters are noted and used in numerical experiments.
The book discusses machine learning-based decision-making models, and presents intelligent, hybrid and adaptive methods and tools for solving complex learning and decision-making problems under conditions of uncertainty. Featuring contributions from data scientists, practitioners and educators, the book covers a range of topics relating to intelligent systems for decision science, and examines recent innovations, trends, and practical challenges in the field. The book is a valuable resource for academics, students, researchers and professionals wanting to gain insights into decision-making.
The series, Contemporary Perspectives on Data Mining, is composed of blind refereed scholarly research methods and applications of data mining. This series will be targeted both at the academic community, as well as the business practitioner. Data mining seeks to discover knowledge from vast amounts of data with the use of statistical and mathematical techniques. The knowledge is extracted from this data by examining the patterns of the data, whether they be associations of groups or things, predictions, sequential relationships between time order events or natural groups. Data mining applications are in finance (banking, brokerage, and insurance), marketing (customer relationships, retailing, logistics, and travel), as well as in manufacturing, health care, fraud detection, homeland security, and law enforcement.
The technologies in data mining have been applied to bioinformatics research in the past few years with success, but more research in this field is necessary. While tremendous progress has been made over the years, many of the fundamental challenges in bioinformatics are still open. Data mining plays a essential role in understanding the emerging problems in genomics, proteomics, and systems biology. ""Advanced Data Mining Technologies in Bioinformatics"" covers important research topics of data mining on bioinformatics. Readers of this book will gain an understanding of the basics and problems of bioinformatics, as well as the applications of data mining technologies in tackling the problems and the essential research topics in the field. ""Advanced Data Mining Technologies in Bioinformatics"" is extremely useful for data mining researchers, molecular biologists, graduate students, and others interested in this topic.
This 2 volume-set of IFIP AICT 583 and 584 constitutes the refereed proceedings of the 16th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2020, held in Neos Marmaras, Greece, in June 2020.* The 70 full papers and 5 short papers presented were carefully reviewed and selected from 149 submissions. They cover a broad range of topics related to technical, legal, and ethical aspects of artificial intelligence systems and their applications and are organized in the following sections: Part I: classification; clustering - unsupervised learning -analytics; image processing; learning algorithms; neural network modeling; object tracking - object detection systems; ontologies - AI; and sentiment analysis - recommender systems. Part II: AI ethics - law; AI constraints; deep learning - LSTM; fuzzy algebra - fuzzy systems; machine learning; medical - health systems; and natural language. *The conference was held virtually due to the COVID-19 pandemic.
This book discusses the impact of advanced information technologies, such as data processing, machine learning, and artificial intelligence, on organizational decision-making processes and practices. One of the book's central themes is the interplay between human reasoning and machine logic in the context of organizational functioning, specifically, the fairly common situations in which subjective beliefs are pitted against objective evidence giving rise to conflict rather than enhancing the quality of organizational sensemaking. Aiming to not only raise the awareness of the potential challenges but also to offer solutions, the book delineates and discusses the core impediments to effective human-information technology interactions, and outlines strategies for overcoming those obstacles on the way to enhancing the efficacy of organizational decision-making. |
![]() ![]() You may like...
Research Methods for Arts and Event…
A. Veal, Christine Burton
Paperback
R1,700
Discovery Miles 17 000
BEYOND QUALITY - An Agenda for Improving…
Steven R. Wilson, Robert Ballance, …
Hardcover
R3,390
Discovery Miles 33 900
Collecting Garbage - Dirty Work, Clean…
Stewart E. Perry, Raymond Russell
Paperback
R1,086
Discovery Miles 10 860
Evolution of Destination Planning and…
Larry Dwyer, Renata Tomljenovic, …
Hardcover
R4,255
Discovery Miles 42 550
Professional Beauty Therapy - Level 3
Lorraine Nordmann
Paperback
Services Marketing - A Contemporary…
Adele Berndt, Christo Boshoff
Paperback
R697
Discovery Miles 6 970
|