Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Applications of computing > Databases > Data mining
Advances in hardware technology have lead to an ability to collect data with the use of a variety of sensor technologies. In particular sensor notes have become cheaper and more efficient, and have even been integrated into day-to-day devices of use, such as mobile phones. This has lead to a much larger scale of applicability and mining of sensor data sets. The human-centric aspect of sensor data has created tremendous opportunities in integrating social aspects of sensor data collection into the mining process. Managing and Mining Sensor Data is a contributed volume by prominent leaders in this field, targeting advanced-level students in computer science as a secondary text book or reference. Practitioners and researchers working in this field will also find this book useful.
This book covers key issues related to Geospatial Semantic Web, including geospatial web services for spatial data interoperability; geospatial ontology for semantic interoperability; ontology creation, sharing, and integration; querying knowledge and information from heterogeneous data source; interfaces for Geospatial Semantic Web, VGI (Volunteered Geographic Information) and Geospatial Semantic Web; challenges of Geospatial Semantic Web; and development of Geospatial Semantic Web applications. This book also describes state-of-the-art technologies that attempt to solve these problems such as WFS, WMS, RDF, OWL and GeoSPARQL and demonstrates how to use the Geospatial Semantic Web technologies to solve practical real-world problems such as spatial data interoperability.
This book constitutes the proceedings of the Third Asia Pacific Conference on Business Process Management held in Busan, South Korea, in June 2015. Overall, 37 contributions from ten countries were submitted. After each submission was reviewed by at least three Program Committee members, 12 full and two short papers were accepted for publication in this volume. These papers cover various topics and are categorized under four main research focuses in BPM: advancement in workflow technologies, resources allocation strategies, process mining, and emerging topics in BPM.
This book explores how PPPM, clinical practice, and basic research could be best served by information technology (IT). A use-case was developed for hepatocellular carcinoma (HCC). The subject was approached with four interrelated tasks: (1) review of clinical practices relating to HCC; (2) propose an IT system relating to HCC, including clinical decision support and research needs; (3) determine how a clinical liver cancer center can contribute; and, (4) examine the enhancements and impact that the first three tasks will have on the management of HCC. An IT System for Personalized Medicine (ITS-PM) for HCC will provide the means to identify and determine the relative value of the wide number of variables, including clinical assessment of the patient -- functional status, liver function, degree of cirrhosis, and comorbidities; tumor biology, at a molecular, genetic and anatomic level; tumor burden and individual patient response; medical and operative treatments and their outcomes.
This book presents a comprehensive and systematic introduction to transforming process-oriented data into information about the underlying business process, which is essential for all kinds of decision-making. To that end, the authors develop step-by-step models and analytical tools for obtaining high-quality data structured in such a way that complex analytical tools can be applied. The main emphasis is on process mining and data mining techniques and the combination of these methods for process-oriented data. After a general introduction to the business intelligence (BI) process and its constituent tasks in chapter 1, chapter 2 discusses different approaches to modeling in BI applications. Chapter 3 is an overview and provides details of data provisioning, including a section on big data. Chapter 4 tackles data description, visualization, and reporting. Chapter 5 introduces data mining techniques for cross-sectional data. Different techniques for the analysis of temporal data are then detailed in Chapter 6. Subsequently, chapter 7 explains techniques for the analysis of process data, followed by the introduction of analysis techniques for multiple BI perspectives in chapter 8. The book closes with a summary and discussion in chapter 9. Throughout the book, (mostly open source) tools are recommended, described and applied; a more detailed survey on tools can be found in the appendix, and a detailed code for the solutions together with instructions on how to install the software used can be found on the accompanying website. Also, all concepts presented are illustrated and selected examples and exercises are provided. The book is suitable for graduate students in computer science, and the dedicated website with examples and solutions makes the book ideal as a textbook for a first course in business intelligence in computer science or business information systems. Additionally, practitioners and industrial developers who are interested in the concepts behind business intelligence will benefit from the clear explanations and many examples.
This book constitutes the proceedings of the 6th International Conference on Pattern Recognition and Machine Intelligence, PReMI 2015, held in Warsaw, Poland, in June/July 2015. The total of 53 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 90 submissions. They were organized in topical sections named: foundations of machine learning; image processing; image retrieval; image tracking; pattern recognition; data mining techniques for large scale data; fuzzy computing; rough sets; bioinformatics; and applications of artificial intelligence.
This book presents a comprehensive report on the evolution of Fuzzy Logic since its formulation in Lotfi Zadeh's seminal paper on "fuzzy sets," published in 1965. In addition, it features a stimulating sampling from the broad field of research and development inspired by Zadeh's paper. The chapters, written by pioneers and prominent scholars in the field, show how fuzzy sets have been successfully applied to artificial intelligence, control theory, inference, and reasoning. The book also reports on theoretical issues; features recent applications of Fuzzy Logic in the fields of neural networks, clustering, data mining and software testing; and highlights an important paradigm shift caused by Fuzzy Logic in the area of uncertainty management. Conceived by the editors as an academic celebration of the fifty years' anniversary of the 1965 paper, this work is a must-have for students and researchers willing to get an inspiring picture of the potentialities, limitations, achievements and accomplishments of Fuzzy Logic-based systems.
Hyperspectral Image Fusion is the first text dedicated to the fusion techniques for such a huge volume of data consisting of a very large number of images. This monograph brings out recent advances in the research in the area of visualization of hyperspectral data. It provides a set of pixel-based fusion techniques, each of which is based on a different framework and has its own advantages and disadvantages. The techniques are presented with complete details so that practitioners can easily implement them. It is also demonstrated how one can select only a few specific bands to speed up the process of fusion by exploiting spatial correlation within successive bands of the hyperspectral data. While the techniques for fusion of hyperspectral images are being developed, it is also important to establish a framework for objective assessment of such techniques. This monograph has a dedicated chapter describing various fusion performance measures that are applicable to hyperspectral image fusion. This monograph also presents a notion of consistency of a fusion technique which can be used to verify the suitability and applicability of a technique for fusion of a very large number of images. This book will be a highly useful resource to the students, researchers, academicians and practitioners in the specific area of hyperspectral image fusion, as well as generic image fusion.
This book constitutes the refereed proceedings of the First International Conference on Decision Support Systems Technology, ICDSST 2015, held in Belgrade, Serbia, in May 2015. The theme of the event was "Big Data Analytics for Decision-Making" and it was organized by the EURO (Association of European Operational Research Societies) working group of Decision Support Systems (EWG-DSS). The eight papers presented in this book were selected out of 26 submissions after being carefully reviewed by at least three internationally known experts from the ICDSST 2015 Program Committee and external invited reviewers. The selected papers are representative of current and relevant research activities in the area of decision support systems, such as decision analysis for enterprise systems and non-hierarchical networks, integrated solutions for decision support and knowledge management in distributed environments, decision support system evaluations and analysis through social networks, and decision support system applications in real-world environments. The volume is completed by an additional invited paper on big data decision-making use cases.
This book constitutes the refereed proceedings of the 26th Australasian Database Conference, ADC 2015, held in Melbourne, VIC, Australia, in June 2015. The 24 full papers presented together with 5 demo papers were carefully reviewed and selected from 43 submissions. The Australasian Database Conference is an annual international forum for sharing the latest research advancements and novel applications of database systems, data driven applications and data analytics between researchers and practitioners from around the globe, particularly Australia and New Zealand. The mission of ADC is to share novel research solutions to problems of today's information society that fulfill the needs of heterogeneous applications and environments and to identify new issues and directions for future research. ADC seeks papers from academia and industry presenting research on all practical and theoretical aspects of advanced database theory and applications, as well as case studies and implementation experiences.
This book presents recent research work and results in the area of communication and information technologies. The book includes the main results of the 11th International Conference on Computing and Information Technology (IC2IT) held during July 2nd-3rd, 2015 in Bangkok, Thailand. The book is divided into the two main parts Data Mining and Machine Learning as well as Data Network and Communications. New algorithms and methods of data mining asr discussed as well as innovative applications and state-of-the-art technologies on data mining, machine learning and data networking.
This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at the 8th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2015) and the 6th International Conference on European Transnational Education (ICEUTE 2015). These conferences were held in the beautiful and historic city of Burgos (Spain), in June 2015. The aim of the 8th CISIS conference is to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of Computational Intelligence, Information Security, and Data Mining. The need for intelligent, flexible behaviour by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event. After a through peer-review process, the CISIS 2015 International Program Committee selected 43 papers, written by authors from 16 different countries. In the case of 6th ICEUTE conference, the International Program Committee selected 12 papers (from 7 countries). These papers are published in present conference proceedings, achieving an acceptance rate of about 39%. The selection of papers was extremely rigorous in order to maintain the high quality of the conference and we would like to thank the members of the Program Committees for their hard work in the reviewing process. This is a crucial process to the creation of a high standard conference and the CISIS and ICEUTE conferences would not exist without their help.
This book is mainly about an innovative and fundamental method called "intelligent knowledge" to bridge the gap between data mining and knowledge management, two important fields recognized by the information technology (IT) community and business analytics (BA) community respectively. The book includes definitions of the "first-order" analytic process, "second-order" analytic process and intelligent knowledge, which have not formally been addressed by either data mining or knowledge management. Based on these concepts, which are especially important in connection with the current Big Data movement, the book describes a framework of domain-driven intelligent knowledge discovery. To illustrate its technical advantages for large-scale data, the book employs established approaches, such as Multiple Criteria Programming, Support Vector Machine and Decision Tree to identify intelligent knowledge incorporated with human knowledge. The book further shows its applicability by means of real-life data analyses in the contexts of internet business and traditional Chinese medicines.
Collaboratively Constructed Language Resources (CCLRs) such as Wikipedia, Wiktionary, Linked Open Data, and various resources developed using crowdsourcing techniques such as Games with a Purpose and Mechanical Turk have substantially contributed to the research in natural language processing (NLP). Various NLP tasks utilize such resources to substitute for or supplement conventional lexical semantic resources and linguistically annotated corpora. These resources also provide an extensive body of texts from which valuable knowledge is mined. There are an increasing number of community efforts to link and maintain multiple linguistic resources. This book aims offers comprehensive coverage of CCLR-related topics, including their construction, utilization in NLP tasks, and interlinkage and management. Various Bachelor/Master/Ph.D. programs in natural language processing, computational linguistics, and knowledge discovery can use this book both as the main text and as a supplementary reading. The book also provides a valuable reference guide for researchers and professionals for the above topics.
The present book outlines a new approach to possibilistic clustering in which the sought clustering structure of the set of objects is based directly on the formal definition of fuzzy cluster and the possibilistic memberships are determined directly from the values of the pairwise similarity of objects. The proposed approach can be used for solving different classification problems. Here, some techniques that might be useful at this purpose are outlined, including a methodology for constructing a set of labeled objects for a semi-supervised clustering algorithm, a methodology for reducing analyzed attribute space dimensionality and a methods for asymmetric data processing. Moreover, a technique for constructing a subset of the most appropriate alternatives for a set of weak fuzzy preference relations, which are defined on a universe of alternatives, is described in detail, and a method for rapidly prototyping the Mamdani's fuzzy inference systems is introduced. This book addresses engineers, scientists, professors, students and post-graduate students, who are interested in and work with fuzzy clustering and its applications
After a brief presentation of the state of the art of process-mining techniques, Andrea Burratin proposes different scenarios for the deployment of process-mining projects, and in particular a characterization of companies in terms of their process awareness. The approaches proposed in this book belong to two different computational paradigms: first to classic "batch process mining," and second to more recent "online process mining." The book encompasses a revised version of the author's PhD thesis, which won the "Best Process Mining Dissertation Award" in 2014, awarded by the IEEE Task Force on Process Mining.
This unique text/reference describes an exciting and novel approach to supercomputing in the DataFlow paradigm. The major advantages and applications of this approach are clearly described, and a detailed explanation of the programming model is provided using simple yet effective examples. The work is developed from a series of lecture courses taught by the authors in more than 40 universities across more than 20 countries, and from research carried out by Maxeler Technologies, Inc. Topics and features: presents a thorough introduction to DataFlow supercomputing for big data problems; reviews the latest research on the DataFlow architecture and its applications; introduces a new method for the rapid handling of real-world challenges involving large datasets; provides a case study on the use of the new approach to accelerate the Cooley-Tukey algorithm on a DataFlow machine; includes a step-by-step guide to the web-based integrated development environment WebIDE.
This volume comprises papers dedicated to data science and the extraction of knowledge from many types of data: structural, quantitative, or statistical approaches for the analysis of data; advances in classification, clustering and pattern recognition methods; strategies for modeling complex data and mining large data sets; applications of advanced methods in specific domains of practice. The contributions offer interesting applications to various disciplines such as psychology, biology, medical and health sciences; economics, marketing, banking and finance; engineering; geography and geology; archeology, sociology, educational sciences, linguistics and musicology; library science. The book contains the selected and peer-reviewed papers presented during the European Conference on Data Analysis (ECDA 2013) which was jointly held by the German Classification Society (GfKl) and the French-speaking Classification Society (SFC) in July 2013 at the University of Luxembourg.
Imagine James Bond meets Sherlock Holmes: Counterterrorism and Cybersecurity is the sequel to Facebook Nation in the Total Information Awareness book series by Newton Lee. The book examines U.S. counterterrorism history, technologies, and strategies from a unique and thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from great thought leaders, and even the make-believe of Hollywood. Demystifying Total Information Awareness, the author expounds on the U.S. intelligence community, artificial intelligence in data mining, social media and privacy, cyber attacks and prevention, causes and cures for terrorism, and longstanding issues of war and peace. The book offers practical advice for businesses, governments, and individuals to better secure the world and protect cyberspace. It quotes U.S. Navy Admiral and NATO's Supreme Allied Commander James Stavridis: "Instead of building walls to create security, we need to build bridges." The book also provides a glimpse into the future of Plan X and Generation Z, along with an ominous prediction from security advisor Marc Goodman at TEDGlobal 2012: "If you control the code, you control the world." Counterterrorism and Cybersecurity: Total Information Awareness will keep you up at night but at the same time give you some peace of mind knowing that "our problems are manmade - therefore they can be solved by man [or woman]," as President John F. Kennedy said at the American University commencement in June 1963.
This proceedings set contains 85 selected full papers presentedat the 3rd International Conference on Modelling, Computation and Optimization in Information Systems and Management Sciences - MCO 2015, held on May 11-13, 2015 at Lorraine University, France. The present part II of the 2 volume set includes articles devoted to Data analysis and Data mining, Heuristic / Meta heuristic methods for operational research applications, Optimization applied to surveillance and threat detection, Maintenance and Scheduling, Post Crises banking and eco-finance modelling, Transportation, as well as Technologies and methods for multi-stakeholder decision analysis in public settings.
Michael Nofer examines whether and to what extent Social Media can be used to predict stock returns. Market-relevant information is available on various platforms on the Internet, which largely consist of user generated content. For instance, emotions can be extracted in order to identify the investors' risk appetite and in turn the willingness to invest in stocks. Discussion forums also provide an opportunity to identify opinions on certain companies. Taking Social Media platforms as examples, the author examines the forecasting quality of user generated content on the Internet.
This proceedings set contains 85 selected full papers presented at the 3rd International Conference on Modelling, Computation and Optimization in Information Systems and Management Sciences - MCO 2015, held on May 11-13, 2015 at Lorraine University, France. The present part I of the 2 volume set includes articles devoted to Combinatorial optimization and applications, DC programming and DCA: thirty years of Developments, Dynamic Optimization, Modelling and Optimization in financial engineering, Multiobjective programming, Numerical Optimization, Spline Approximation and Optimization, as well as Variational Principles and Applications.
The work presented in this book is a combination of theoretical advancements of big data analysis, cloud computing, and their potential applications in scientific computing. The theoretical advancements are supported with illustrative examples and its applications in handling real life problems. The applications are mostly undertaken from real life situations. The book discusses major issues pertaining to big data analysis using computational intelligence techniques and some issues of cloud computing. An elaborate bibliography is provided at the end of each chapter. The material in this book includes concepts, figures, graphs, and tables to guide researchers in the area of big data analysis and cloud computing.
In recent years, there has been a rapid growth of location-based social networking services, such as Foursquare and Facebook Places, which have attracted an increasing number of users and greatly enriched their urban experience. Typical location-based social networking sites allow a user to "check in" at a real-world POI (point of interest, e.g., a hotel, restaurant, theater, etc.), leave tips toward the POI, and share the check-in with their online friends. The check-in action bridges the gap between real world and online social networks, resulting in a new type of social networks, namely location-based social networks (LBSNs). Compared to traditional GPS data, location-based social networks data contains unique properties with abundant heterogeneous information to reveal human mobility, i.e., "when and where a user (who) has been to for what," corresponding to an unprecedented opportunity to better understand human mobility from spatial, temporal, social, and content aspects. The mining and understanding of human mobility can further lead to effective approaches to improve current location-based services from mobile marketing to recommender systems, providing users more convenient life experience than before. This book takes a data mining perspective to offer an overview of studying human mobility in location-based social networks and illuminate a wide range of related computational tasks. It introduces basic concepts, elaborates associated challenges, reviews state-of-the-art algorithms with illustrative examples and real-world LBSN datasets, and discusses effective evaluation methods in mining human mobility. In particular, we illustrate unique characteristics and research opportunities of LBSN data, present representative tasks of mining human mobility on location-based social networks, including capturing user mobility patterns to understand when and where a user commonly goes (location prediction), and exploiting user preferences and location profiles to investigate where and when a user wants to explore (location recommendation), along with studying a user's check-in activity in terms of why a user goes to a certain location.
This book constitutes the tutorial lectures of the 4th European Business Intelligence Summer School, eBISS 2014, held in Berlin, Germany, in July 2014. The tutorials presented here in an extended and refined format were given by renowned experts and cover topics including requirements engineering for decision-support systems, visual analytics of large data sets, linked data and semantic technologies, supervised classification on data streams, and knowledge reuse in large organizations. |
You may like...
Data Visualization - Exploring and…
Michael Fry, Jeffrey Ohlmann, …
Paperback
Big Data in Complex and Social Networks
My T. Thai, Weili Wu, …
Paperback
R1,444
Discovery Miles 14 440
Handbook of Educational Data Mining
Cristobal Romero, Sebastian Ventura, …
Hardcover
R4,637
Discovery Miles 46 370
Text Analytics - An Introduction to the…
John Atkinson-Abutridy
Hardcover
R3,541
Discovery Miles 35 410
|