Data mining Books

321 products


  • Deep Reinforcement Learning: Fundamentals, Research and Applications

    Springer Verlag, Singapore Deep Reinforcement Learning: Fundamentals, Research and Applications

    1 in stock

    Book SynopsisDeep reinforcement learning (DRL) is the combination of reinforcement learning (RL) and deep learning. It has been able to solve a wide range of complex decision-making tasks that were previously out of reach for a machine, and famously contributed to the success of AlphaGo. Furthermore, it opens up numerous new applications in domains such as healthcare, robotics, smart grids and finance. Divided into three main parts, this book provides a comprehensive and self-contained introduction to DRL. The first part introduces the foundations of deep learning, reinforcement learning (RL) and widely used deep RL methods and discusses their implementation. The second part covers selected DRL research topics, which are useful for those wanting to specialize in DRL research. To help readers gain a deep understanding of DRL and quickly apply the techniques in practice, the third part presents mass applications, such as the intelligent transportation system and learning to run, with detailed explanations. The book is intended for computer science students, both undergraduate and postgraduate, who would like to learn DRL from scratch, practice its implementation, and explore the research topics. It also appeals to engineers and practitioners who do not have strong machine learning background, but want to quickly understand how DRL works and use the techniques in their applications.Table of Contents

    1 in stock

    £132.99

  • Emerging Technologies in Data Mining and

    Springer Verlag, Singapore Emerging Technologies in Data Mining and

    Out of stock

    Book SynopsisThis book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2020) held at the University of Engineering & Management, Kolkata, India, during July 2020. The book is organized in three volumes and includes high-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers, and case studies related to all the areas of data mining, machine learning, Internet of things (IoT), and information security. Table of ContentsChapter 1. Layered Ensemble Learning for Effective Binary Classification.- Chapter 2. A Preliminary Study of Knowledge Graphs and their Construction.- Chapter 3. A Simple Ensemble Learning Algorithm for a Real time High Dimensional Data.- Chapter 4. Promising Highest Resilient Network using preventive Route selection algorithm- IPSDSDV in MANET.- Chapter 5. An ANN Approach of Twisted Fiestel Block Ciphering.- Chapter 6. Musical Instrument Classification Based On Machine Learning Algorithm.- Chapter 7. Analytical Survey and Comparative Analysis of Socialized Network via Data Mining and Machine Learning Techniques.- Chapter 8. Assessment of Severity Classification of Traffic Accidents on the basis of K-means Clustering and Adaptive Neuro-Fuzzy Inference System.- Chapter 9. Design and Implementation of Login Based Wi-Fi Hotspot Network for an University Campus.- Chapter 10. A Framework to Capture the Shift in Dynamics of a Multi-Phase Protest - A Case Study of Hong Kong Protests.- Chapter 11. A Comparative Study to Analyze the Performance of Advanced Pattern Recognition Algorithms for Multi-Class Classification.- Chapter 12. ECG Signal Denoising Using A Novel Solution To The Heat Equation Through Wavelet Transform.- Chapter 13. Design and Implementation of Chao-Cryptic Architecture on FPGA for Secure Audio Communication.- Chapter 14. Diffusion + Confusion: Chaos Assisted Two Fold Cryptosystem for Secure Video Transmission.- Chapter 15. Chaos Blend LFSR – Duo Approach on FPGA for Medical Image Security.

    Out of stock

    £134.99

  • Enabling Smart Urban Services with GPS Trajectory

    Springer Verlag, Singapore Enabling Smart Urban Services with GPS Trajectory

    1 in stock

    Book SynopsisWith the proliferation of GPS devices in daily life, trajectory data that records where and when people move is now readily available on a large scale. As one of the most typical representatives, it has now become widely recognized that taxi trajectory data provides rich opportunities to enable promising smart urban services. Yet, a considerable gap still exists between the raw data available, and the extraction of actionable intelligence. This gap poses fundamental challenges on how we can achieve such intelligence. These challenges include inaccuracy issues, large data volumes to process, and sparse GPS data, to name but a few. Moreover, the movements of taxis and the leaving trajectory data are the result of a complex interplay between several parties, including drivers, passengers, travellers, urban planners, etc. In this book, we present our latest findings on mining taxi GPS trajectory data to enable a number of smart urban services, and to bring us one step closer to the vision of smart mobility. Firstly, we focus on some fundamental issues in trajectory data mining and analytics, including data map-matching, data compression, and data protection. Secondly, driven by the real needs and the most common concerns of each party involved, we formulate each problem mathematically and propose novel data mining or machine learning methods to solve it. Extensive evaluations with real-world datasets are also provided, to demonstrate the effectiveness and efficiency of using trajectory data. Unlike other books, which deal with people and goods transportation separately, this book also extends smart urban services to goods transportation by introducing the idea of crowdshipping, i.e., recruiting taxis to make package deliveries on the basis of real-time information. Since people and goods are two essential components of smart cities, we feel this extension is bot logical and essential. Lastly, we discuss the most important scientific problems and open issues in mining GPS trajectory data.Table of Contents1. Trajectory data map-matching 1.1 Introduction 1.2 Definitions and problem formulation 1.3 SD-Matching algorithm 1.4 Evaluations 1.5 Conclusions and discussions 2. Trajectory data compression 2.1 Introduction 2.2 Basic concepts and system overview 2.3 HCC algorithm 2.4 System implementation 2.5 Evaluations 2.6 Conclusions 3. Trajectory data protection 3.1 Introduction 3.2 Preliminary 3.3 Trajectory protection mechanism 3.4 Performance evaluations 3.5 Conclusions Part II: Enabling Smart Urban Services: Travellers 4. TripPlanner: Personalized trip planning leveraging heterogeneous trajectory data 4.1 Introduction 4.2 TripPlanner System 4.3 Dynamic network modelling 4.4 The two-phase approach 4.5 System evaluations 4.6 Conclusions and future work 5. ScenicPlanner: Recommending the most beautiful driving routes 5.1 Introduction 5.2 Preliminary 5.3 The two-phase approach 5.4 Experimental evaluations 5.5 Conclusion and future work Part III: Enabling Smart Urban Services: Drivers 6. GreenPlanner: Planning fuel-efficient driving routes 6.1 Introduction 6.2 Basic concepts and problem formulation 6.3 Personal fuel consumption model building 6.4 Fuel-efficient driving route planning 6.5 Evaluations 6.6 Conclusions and future work 7. Hunting or waiting: Earning more by understanding taxi service strategies 7.1 Introduction 7.2 Empirical study 7.3 Taxi strategy formulation 7.4 Understanding taxi service strategies 7.5 Conclusions Part IV: Enabling Smart Urban Services: Passengers 8. iBOAT: Real-time detection of anomalous taxi trajectories from GPS traces 8.1 Introduction 8.2 Preliminaries and problem definition 8.3 Isolation-based online anomalous trajectory detection 8.4 Empirical evaluations 8.5 Fraud behaviour analysis 8.6 Conclusions and future work 9. Real-Time imputing trip purpose leveraging heterogeneous trajectory data 9.1 Introduction 9.2 Basic concepts and problem statement 9.3 Imputing trip purposes 9.4 Enabling real-time response 9.5 Evaluations 9.6 Conclusions and future work Part V: Enabling Smart Urban Services: Urban Planners 10. GPS environment friendliness estimation with trajectory data 10.1 Introduction 10.2 Basic concepts 10.3 Methodology 10.4 Experiments 10.5 Limitations and future work 10.6 Conclusions 11. B-Planner: Planning night bus routes using taxi trajectory data 11.1 Introduction 11.2 Candidate bus stop identification 11.3 Bus route selection 11.4 Experimental evaluations 11.5 Conclusions and future work 12. VizTripPurpose: Understanding city-wide passengers’ travel behaviours 12.1 Introduction 12.2 System overview 12.3 Trip2Vec model 12.4 User interfaces 12.5 Case studies 12.6 Conclusions and future work Part VI: Enabling Smart Urban Services: Beyond People Transportation 13. CrowdDeliver: Arriving as soon as possible 13.1 Introduction 13.2 Basic concepts, assumptions and problem statement 13.3 Overview of CrowdDeliver 13.4 Two-phase approach 13.5 Evaluations 13.6 Conclusions and future work 14. CrowdExpress: Arriving by the user-specified deadline 14.1 Introduction 14.2 Preliminary, problem statement and system overview 14.3 Offline package transport network building 14.4 Online taxi scheduling and package routing 14.5 Experimental evaluations 14.6 Conclusions and future work Part VII: Open Issues and Conclusions 15. Open Issues 16. Conclusions

    1 in stock

    £125.99

  • Personalized Privacy Protection in Big Data

    Springer Verlag, Singapore Personalized Privacy Protection in Big Data

    1 in stock

    Book SynopsisThis book presents the data privacy protection which has been extensively applied in our current era of big data. However, research into big data privacy is still in its infancy. Given the fact that existing protection methods can result in low data utility and unbalanced trade-offs, personalized privacy protection has become a rapidly expanding research topic.In this book, the authors explore emerging threats and existing privacy protection methods, and discuss in detail both the advantages and disadvantages of personalized privacy protection. Traditional methods, such as differential privacy and cryptography, are discussed using a comparative and intersectional approach, and are contrasted with emerging methods like federated learning and generative adversarial nets.The advances discussed cover various applications, e.g. cyber-physical systems, social networks, and location-based services. Given its scope, the book is of interest to scientists, policy-makers, researchers, and postgraduates alike.Table of Contents· Chapter 1: Introductiono Privacy research landscape o Personalized privacy overview o Contribution of this book o Remainder of the book · Chapter 2: Current Methods of Privacy Protection o Cryptography based methods o Differential privacy methods o Anonymity-based methods o Clustering-base methods o Machine learning and AI methods · Chapter 3: Privacy Attacks o Attack classification o Rationale of the attacks o The comparison of attacks · Chapter 4: Personalize Privacy Defense o Personalized privacy in cyber-physical systems o Personalized privacy in social networks o Personalized privacy in smart city o Personalized privacy in location-based services o Personalized privacy on the rise · Chapter 5: Future Directions o Trade-off optimization o Decentralized privacy protection o Privacy-preserving federated learning o Federated generative adversarial nets · Chapter6: Summary and Outlook

    1 in stock

    £49.49

  • Data Science: 7th International Conference of

    Springer Verlag, Singapore Data Science: 7th International Conference of

    3 in stock

    Book SynopsisThis two volume set (CCIS 1451 and 1452) constitutes the refereed proceedings of the 7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021 held in Taiyuan, China, in September 2021.The 81 papers presented in these two volumes were carefully reviewed and selected from 256 submissions. The papers are organized in topical sections on big data management and applications; social media and recommendation systems; infrastructure for data science; basic theory and techniques for data science; machine learning for data science; multimedia data management and analysis; ​social media and recommendation systems; data security and privacy; applications of data science; education research, methods and materials for data science and engineering; research demo.Table of ContentsBig Data Management and Applications.- Social Media and Recommendation Systems.- Infrastructure for Data Science.- Basic Theory and Techniques for Data Science.- Machine Learning for Data Science.- Multimedia Data Management and Analysis.

    3 in stock

    £98.99

  • Data Science: 7th International Conference of

    Springer Verlag, Singapore Data Science: 7th International Conference of

    1 in stock

    Book SynopsisThis two volume set (CCIS 1451 and 1452) constitutes the refereed proceedings of the 7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021 held in Taiyuan, China, in September 2021.The 81 papers presented in these two volumes were carefully reviewed and selected from 256 submissions. The papers are organized in topical sections on big data management and applications; social media and recommendation systems; infrastructure for data science; basic theory and techniques for data science; machine learning for data science; multimedia data management and analysis; ​social media and recommendation systems; data security and privacy; applications of data science; education research, methods and materials for data science and engineering; research demo.Table of ContentsSocial Media and Recommendation Systems.- Data Security and Privacy.- Applications of Data Science.- Education research, methods and materials for data science and engineering.- Research demo.

    1 in stock

    £80.99

  • Preference-based Spatial Co-location Pattern

    Springer Verlag, Singapore Preference-based Spatial Co-location Pattern

    2 in stock

    Book SynopsisThe development of information technology has made it possible to collect large amounts of spatial data on a daily basis. It is of enormous significance when it comes to discovering implicit, non-trivial and potentially valuable information from this spatial data. Spatial co-location patterns reveal the distribution rules of spatial features, which can be valuable for application users. This book provides commercial software developers with proven and effective algorithms for detecting and filtering these implicit patterns, and includes easily implemented pseudocode for all the algorithms. Furthermore, it offers a basis for further research in this promising field.Preference-based co-location pattern mining refers to mining constrained or condensed co-location patterns instead of mining all prevalent co-location patterns. Based on the authors’ recent research, the book highlights techniques for solving a range of problems in this context, including maximal co-location pattern mining, closed co-location pattern mining, top-k co-location pattern mining, non-redundant co-location pattern mining, dominant co-location pattern mining, high utility co-location pattern mining, user-preferred co-location pattern mining, and similarity measures between spatial co-location patterns.Presenting a systematic, mathematical study of preference-based spatial co-location pattern mining, this book can be used both as a textbook for those new to the topic and as a reference resource for experienced professionals.Table of Contents

    2 in stock

    £107.99

  • Network Behavior Analysis: Measurement, Models,

    Springer Verlag, Singapore Network Behavior Analysis: Measurement, Models,

    1 in stock

    Book SynopsisThis book provides a comprehensive overview of network behavior analysis that mines Internet traffic data in order to extract, model, and make sense of behavioral patterns in Internet “objects” such as end hosts, smartphones, Internet of things, and applications. The objective of this book is to fill the book publication gap in network behavior analysis, which has recently become an increasingly important component of comprehensive network security solutions for data center networks, backbone networks, enterprise networks, and edge networks.The book presents fundamental principles and best practices for measuring, extracting, modeling and analyzing network behavior for end hosts and applications on the basis of Internet traffic data. In addition, it explains the concept and key elements (e.g., what, who, where, when, and why) of communication patterns and network behavior of end hosts and network applications, drawing on data mining, machine learning, information theory, probabilistic graphical and structural modeling to do so. The book also discusses the benefits of network behavior analysis for applications in cybersecurity monitoring, Internet traffic profiling, anomaly traffic detection, and emerging application detections.The book will be of particular interest to researchers and practitioners in the fields of Internet measurement, traffic analysis, and cybersecurity, since it provides a spectrum of innovative techniques for summarizing behavior models, structural models, and graphic models of Internet traffic, and explains how to leverage the results for a broad range of real-world applications in network management, security operations, and cyber-intelligent analysis. After finishing this book, readers will 1) have learned the principles and practices of measuring, modeling, and analyzing network behavior on the basis of massive Internet traffic data; 2) be able to make sense of network behavior for a spectrum of applications ranging from cybersecurity and network monitoring to emerging application detection; and 3) understand how to explore network behavior analysis to complement traditional perimeter-based firewall and intrusion detection systems in order to detect unusual traffic patterns or zero-day security threats using data mining and machine learning techniques. To ideally benefit from this book, readers should have a basic grasp of TCP/IP protocols, data packets, network flows, and Internet applications.Table of ContentsChapter 1: Introduction.- Chapter 2: Background of Network Behavior Modeling and Analysis.- Chapter 3: Behavior Modeling of Network Traffic.- Chapter 4: Structural Modeling of Network Traffic.- Chapter 5: Graphic Modeling of Network Traffic.- Chapter 6: Real-Time Network Behavior Analysis.- Chapter 7: Applications.- Chapter 8: Research Frontiers of Network Behavior Analysis.

    1 in stock

    £107.99

  • Knowledge Discovery from Multi-Sourced Data

    Springer Verlag, Singapore Knowledge Discovery from Multi-Sourced Data

    3 in stock

    Book SynopsisThis book addresses several knowledge discovery problems on multi-sourced data where the theories, techniques, and methods in data cleaning, data mining, and natural language processing are synthetically used. This book mainly focuses on three data models: the multi-sourced isomorphic data, the multi-sourced heterogeneous data, and the text data. On the basis of three data models, this book studies the knowledge discovery problems including truth discovery and fact discovery on multi-sourced data from four important properties: relevance, inconsistency, sparseness, and heterogeneity, which is useful for specialists as well as graduate students. Data, even describing the same object or event, can come from a variety of sources such as crowd workers and social media users. However, noisy pieces of data or information are unavoidable. Facing the daunting scale of data, it is unrealistic to expect humans to “label” or tell which data source is more reliable. Hence, it is crucial to identify trustworthy information from multiple noisy information sources, referring to the task of knowledge discovery. At present, the knowledge discovery research for multi-sourced data mainly faces two challenges. On the structural level, it is essential to consider the different characteristics of data composition and application scenarios and define the knowledge discovery problem on different occasions. On the algorithm level, the knowledge discovery task needs to consider different levels of information conflicts and design efficient algorithms to mine more valuable information using multiple clues. Existing knowledge discovery methods have defects on both the structural level and the algorithm level, making the knowledge discovery problem far from totally solved.Table of ContentsChapter 1 Introduction 1.1 Knowledge Discovery 1.2 Main Challenges 1.3 Book Overview Chapter 2 Functional-dependency-based truth discovery for isomorphic data 2.1 Handling independent constraints 2.2 Handling inter-related constraints 2.3 Inter-source data aggregation 2.4 Update source weights Chapter 3 Denial-constraint-based truth discovery for isomorphic data Describe the truth discovery strategies for isomorphic data based on denial constraints 4.1 Denial constraint transformation 4.2 Optimized solution 4.3 Scalable strategies Chapter 4 Pattern discovery for heterogeneous data 4.1 Problem definition for multi-source heterogeneous data 4.2 Optimization framework 4.3 PatternFinder algorithm 4.4 The optimized grouping strategy Chapter 5 Deep fact discovery for text data 5.1 Fact extraction via mining patterns 5.2 The CNN-LSTM architecture 5.3 The fact encoder and pattern embedding 5.4 Training and inference

    3 in stock

    £40.49

  • Computational Methods and Data Engineering:

    Springer Verlag, Singapore Computational Methods and Data Engineering:

    3 in stock

    Book SynopsisThe book features original papers from International Conference on Computational Methods and Data Engineering (ICCMDE 2021), organized by School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, Tamil Nadu, India, during November 25–26, 2021. The book covers innovative and cutting-edge work of researchers, developers, and practitioners from academia and industry working in the area of advanced computing.Table of ContentsChapter 1. A Graph Based Extractive Assamese Text Summarization.- Chapter 2. Internet of Things (IoT) for Secure Data and M2M Communications.- Chapter 3. Deveelopment of Walking Assistants for Visually Challenged Person.- Chapter 4. A PERFORMANCE STUDY OF PREDICTION MODELS FOR DIABETES PREDICTION USING MACHINE LEARNING.- Chapter 5. Orthopantomogram (OPG) Image Analysis using Bounding Box Algorithm.- Chapter 6. Design and Analysis of an Improved Artificial Neural Network Controller for the Energy Efficiency Enhancement of Wind Power Plant.- Chapter 7. Detection of Renal Calculi using Convolutional Neural Networks.- Chapter 8. Question Answering and Text Generation using BERT and GPT-2 Model.- Chapter 9. Improved Lenet Model for Flower Classification Using GPU Computing.- Chapter 10. Distributed computing over the Next Generation Mobile Communication Network (NGMCN) is an emerging technology.- Chapter 11. The ELF Tribe: Redefining Primary Education in a Post-COVID Era.- Chapter 12. An Extreme Machine Learning Mdel for Evaluating Landslide Hazard Zonation in Nilgiris District, Causative Factors and Risk Assessment using Earth Observation Techniques.- Chapter 13. Analysis of Cross-Site Scripting Vulnerabilities in Various Day-to-Day Web Applications.- Chapter 14. Detecting Cyberbullying with text classification using 1DCNN and Glove Embeddings.- Chapter 15. A Bayesian Network Based Software Requirement Complexity Prediction Model.

    3 in stock

    £161.99

  • Smart Data Intelligence: Proceedings of ICSMDI

    Springer Verlag, Singapore Smart Data Intelligence: Proceedings of ICSMDI

    3 in stock

    Book SynopsisThis book presents high-quality research papers presented at 2nd International Conference on Smart Data Intelligence (ICSMDI 2022) organized by Kongunadu College of Engineering and Technology at Trichy, Tamil Nadu, India, during April 2022. This book brings out the new advances and research results in the fields of algorithmic design, data analysis, and implementation on various real-time applications. It discusses many emerging related fields like big data, data science, artificial intelligence, machine learning, and deep learning which have deployed a paradigm shift in various data-driven approaches that tends to evolve new data-driven research opportunities in various influential domains like social networks, healthcare, information, and communication applications.Table of ContentsDetection and Analysis of Sentiments on Twitter Using Machine Learning Algorithm.- Malware Attack Detection on IoT Devices Using Machine Learning.- BeSafe: IoT Based Safety Band.- Stock Market Analysis and forecasting with Statistical and Deep Learning Methods.- The paradigm shift in Higher Education from traditional learning to digitalisation.- Designing a socially intelligent system by cognitive modeling of human-environment interaction.- Web-Based recycle Waste Management for Ecommerce.

    3 in stock

    £208.99

  • Knowledge and Systems Sciences: 21st International Symposium, KSS 2022, Beijing, China, June 11–12, 2022, Proceedings

    Springer Verlag, Singapore Knowledge and Systems Sciences: 21st International Symposium, KSS 2022, Beijing, China, June 11–12, 2022, Proceedings

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 21st International Symposium on Knowledge and Systems Sciences, KSS 2022, held in Beijing, China, in June 2022.The 14 revised full papers and 3 short paper presented were carefully reviewed and selected from 51 submissions. The papers are organized in topical secions on ​data mining and machine learning; model-based systems engineering; complex systems modeling and knowledge technologies.Table of ContentsData Mining and Machine Learning.- Model-based Systems Engineering.- Complex Systems Modeling and Knowledge Technologies.

    1 in stock

    £58.49

  • Proceedings of International Conference on Data

    Springer Verlag, Singapore Proceedings of International Conference on Data

    1 in stock

    Book SynopsisThis book gathers outstanding papers presented at the International Conference on Data Science and Applications (ICDSA 2022), organized by Soft Computing Research Society (SCRS) and Jadavpur University, Kolkata, India, from 26 to 27 March 2022. It covers theoretical and empirical developments in various areas of big data analytics, big data technologies, decision tree learning, wireless communication, wireless sensor networking, bioinformatics and systems, artificial neural networks, deep learning, genetic algorithms, data mining, fuzzy logic, optimization algorithms, image processing, computational intelligence in civil engineering, and creative computing.Table of ContentsCancer Prognosis by Using Machine Learning and Data Science: A systematic review.- Understanding Agriculture Scenario of Punjab: A Qualitative Research of Crop parameter in relation to fertilizer usage.- Face Detection Based Border Security System Using Haar-Cascade and LBPH Algorithm.- Proposed Experimental Design of a Portable COVID-19 Screening Device Using Cough Audio Samples.- Big Data Framework for Analytics Business Intelligence.- Technological Impacts of AI on Hospitality and Tourism Industry.- Improvement of Real-Time Kinematic Positioning Using Kalman Filter-Based Singular Spectrum Analysis during Geomagnetic Storm for Thailand sector.

    1 in stock

    £189.99

  • Data Mining: 20th Australasian Conference, AusDM 2022, Western Sydney, Australia, December 12–15, 2022, Proceedings

    Springer Verlag, Singapore Data Mining: 20th Australasian Conference, AusDM 2022, Western Sydney, Australia, December 12–15, 2022, Proceedings

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 20th Australasian Conference on Data Mining, AusDM 2022, held in Western Sydney, Australia, during December 12–15, 2022. The 17 full papers included in this book were carefully reviewed and selected from 44 submissions. They were organized in topical sections as ​research track and application track.Table of Contents​Research Track.- Measuring Content Preservation in Textual Style Transfer.- A Temperature-Modified Dynamic Embedded Topic Model.- Measuring Difficulty of Learning using Ensembles Methods.- Graph Embeddings for Non-IID Data Feature Representation Learning.- Enhancing Understandability of Omics Data with SHAP, Embedding Projections and Interactive Visualisations.- WinDrift: Early Detction of Concept Drift through the use of Corresponding and Hierarchical Time Windows.- Investigation of Explainability Techniques for Multimodal Transformers.- Effective Imbalance Learning Utilizing Informative Data.- Interpretable Decision Tree via Human-In-The-Loop-Learning.- Application Track.- A Comparative Look at the Resilience of Discriminative and Generative Classifiers to Missing Data in Longitudinal Datasets.- Hierarchical Topic Model Inference by Community Discovery on Word Co-Occurrence Networks.- UMLS-Based Question-Answering Approach for Automatic Initial Frailty Assessment.- Natural Language Query For Technical Knowledge Graph Navigation.- Decomposition of Service Level Encoding for Anomaly Detcion.- Improving Ads-Profitability Using Traffic Fingerprints.- Attractiveness Analysis for Health Claims on Food Packages.- SchedmaDB: A Dataset for Structures in Relational Data.

    1 in stock

    £53.99

  • Lecture Notes In Data Mining

    World Scientific Publishing Co Pte Ltd Lecture Notes In Data Mining

    Out of stock

    Book SynopsisThe continual explosion of information technology and the need for better data collection and management methods has made data mining an even more relevant topic of study. Books on data mining tend to be either broad and introductory or focus on some very specific technical aspect of the field.This book is a series of seventeen edited “student-authored lectures” which explore in depth the core of data mining (classification, clustering and association rules) by offering overviews that include both analysis and insight.The initial chapters lay a framework of data mining techniques by explaining some of the basics such as applications of Bayes Theorem, similarity measures, and decision trees. Before focusing on the pillars of classification, clustering and association rules, the book also considers alternative candidates such as point estimation and genetic algorithms.The book's discussion of classification includes an introduction to decision tree algorithms, rule-based algorithms (a popular alternative to decision trees) and distance-based algorithms. Five of the lecture-chapters are devoted to the concept of clustering or unsupervised classification. The functionality of hierarchical and partitional clustering algorithms is also covered as well as the efficient and scalable clustering algorithms used in large databases. The concept of association rules in terms of basic algorithms, parallel and distributive algorithms and advanced measures that help determine the value of association rules are discussed. The final chapter discusses algorithms for spatial data mining.Table of ContentsPoint Estimation Algorithms; Applications of Bayes Theorem; Similarity Measures; Decision Trees; Genetic Algorithms; Classification: Distance Based Algorithms; Decision Tree-Based Algorithms; Covering (Rule-Based) Algorithms; Clustering: An Overview; Clustering Hierarchical Algorithms; Clustering Partitional Algorithms; Clustering: Large Databases; Clustering Categorical Attributes; Association Rules: An Overview; Association Rules: Parallel and Distributed Algorithms; Association Rules: Advanced Techniques and Measures; Spatial Mining: Techniques and Algorithms.

    Out of stock

    £88.20

  • Recent Advances In Data Mining Of Enterprise

    World Scientific Publishing Co Pte Ltd Recent Advances In Data Mining Of Enterprise

    Out of stock

    Book SynopsisThe main goal of the new field of data mining is the analysis of large and complex datasets. Some very important datasets may be derived from business and industrial activities. This kind of data is known as “enterprise data”. The common characteristic of such datasets is that the analyst wishes to analyze them for the purpose of designing a more cost-effective strategy for optimizing some type of performance measure, such as reducing production time, improving quality, eliminating wastes, or maximizing profit. Data in this category may describe different scheduling scenarios in a manufacturing environment, quality control of some process, fault diagnosis in the operation of a machine or process, risk analysis when issuing credit to applicants, management of supply chains in a manufacturing system, or data for business related decision-making.Table of ContentsEnterprise Data Mining ? A Review and Research Directions (T W Liao); Application and Comparison of Classification Techniques in Controlling Credit Risk (L Yu et al.); Predictive Classification with Imbalanced Enterprise data (S Daskalaki et al.); Data Mining Applications of Process Platform Formation for High Variety Production (J Jiao & L Zhang); Multivariate Control Charts from a Data Mining Perspective (G C Porzio & G Ragozini); Maintenance Planning Using Enterprise Data Mining (L P Khoo et al.); Mining Images of Cell-Based Assays (P Perner); Support Vector Machines and Applications (T B Trafalis & O O Oladunni); A Survey of Manifold-Based Learning Methods (X Huo et al.); and other papers.

    Out of stock

    £234.00

  • Review Comment Analysis For E-commerce

    World Scientific Publishing Co Pte Ltd Review Comment Analysis For E-commerce

    Out of stock

    Book SynopsisThis book presents the recent achievements on the processing of representative user generated content (UGC) on E-commerce websites. This large size of UGC is valuable information for data mining to help customer/object profiling. It provides a comprehensive overview on the concept of customer credibility, object-oriented review summarization technology and content-based collaborative filtering algorithm. It covers a feedback mechanism which is designed to discover customer credibility, which is used to define the professional degree of review content; product-oriented review summarization for restaurants or trip arrangements, and introduced content-based collaborative filtering for product recommendation.

    Out of stock

    £71.25

  • Review Comment Analysis For E-commerce

    World Scientific Publishing Co Pte Ltd Review Comment Analysis For E-commerce

    Out of stock

    Book SynopsisThis book presents the recent achievements on the processing of representative user generated content (UGC) on E-commerce websites. This large size of UGC is valuable information for data mining to help customer/object profiling. It provides a comprehensive overview on the concept of customer credibility, object-oriented review summarization technology and content-based collaborative filtering algorithm. It covers a feedback mechanism which is designed to discover customer credibility, which is used to define the professional degree of review content; product-oriented review summarization for restaurants or trip arrangements, and introduced content-based collaborative filtering for product recommendation.

    Out of stock

    £55.10

  • Discovery And Fusion Of Uncertain Knowledge In

    World Scientific Publishing Co Pte Ltd Discovery And Fusion Of Uncertain Knowledge In

    Out of stock

    Book SynopsisData analysis is of upmost importance in the mining of big data, where knowledge discovery and inference are the basis for intelligent systems to support the real world applications. However, the process involves knowledge acquisition, representation, inference and data, Bayesian network (BN) is the key technology plays a key role in knowledge representation, in order to pave way to cope with incomplete, fuzzy data to solve the real-life problems.This book presents Bayesian network as a technology to support data-intensive and incremental learning in knowledge discovery, inference and data fusion in uncertain environment.

    Out of stock

    £73.15

  • Data Mining In Time Series And Streaming

    World Scientific Publishing Co Pte Ltd Data Mining In Time Series And Streaming

    Out of stock

    Book SynopsisThis compendium is a completely revised version of an earlier book, Data Mining in Time Series Databases, by the same editors. It provides a unique collection of new articles written by leading experts that account for the latest developments in the field of time series and data stream mining.The emerging topics covered by the book include weightless neural modeling for mining data streams, using ensemble classifiers for imbalanced and evolving data streams, document stream mining with active learning, and many more. In particular, it addresses the domain of streaming data, which has recently become one of the emerging topics in Data Science, Big Data, and related areas. Existing titles do not provide sufficient information on this topic.

    Out of stock

    £76.00

  • Network Data Mining And Analysis

    World Scientific Publishing Co Pte Ltd Network Data Mining And Analysis

    Out of stock

    Book SynopsisOnline social networking sites like Facebook, LinkedIn, and Twitter, offer millions of members the opportunity to befriend one another, send messages to each other, and post content on the site — actions which generate mind-boggling amounts of data every day.To make sense of the massive data from these sites, we resort to social media mining to answer questions like the following:

    Out of stock

    £85.50

  • Role Mining In Business: Taming Role-based Access

    World Scientific Publishing Co Pte Ltd Role Mining In Business: Taming Role-based Access

    Out of stock

    Book SynopsisWith continuous growth in the number of information objects and the users that can access these objects, ensuring that access is compliant with company policies has become a big challenge. Role-based Access Control (RBAC) — a policy-neutral access control model that serves as a bridge between academia and industry — is probably the most suitable security model for commercial applications.Interestingly, role design determines RBAC's cost. When there are hundreds or thousands of users within an organization, with individual functions and responsibilities to be accurately reflected in terms of access permissions, only a well-defined role engineering process allows for significant savings of time and money while protecting data and systems.Among role engineering approaches, searching through access control systems to find de facto roles embedded in existing permissions is attracting increasing interest. The focus falls on role mining, which is applied data mining techniques to automate — to the extent possible — the role design task.This book explores existing role mining algorithms and offers insights into the automated role design approaches proposed in the literature. Alongside theory, this book acts as a practical guide for using role mining tools when implementing RBAC. Besides a comprehensive survey of role mining techniques deeply rooted in academic research, this book also provides a summary of the role-based approach, access control concepts and describes a typical role engineering process.Among the pioneering works on role mining, this book blends business elements with data mining theory, and thus further extends the applications of role mining into business practice. This makes it a useful guide for all academics, IT and business professionals.Table of ContentsFundamentals: Managing Access Rights; Role-Based Access Control; Role Engineering; A Step-to-Step Methodology for Role Mining; The Hidden Structure of Roles; Pattern Identification in Users' Entitlements: Enumerating Candidate Roles; Minimizing the Effort of Administering RBAC; Devising Meaningful Roles: Measuring the Meaning of Roles; Visual Role Mining; Taming Role Mining Complexity: Splitting Up the Mining Task; Stable Roles; Imputing Missing Grants; The Risk of Unmanageable Roles: The Risk of Meaningless Roles; Ranking Users and Permissions.

    Out of stock

    £83.60

  • Linear Algebra Tools For Data Mining

    World Scientific Publishing Co Pte Ltd Linear Algebra Tools For Data Mining

    Out of stock

    Book SynopsisThis comprehensive volume presents the foundations of linear algebra ideas and techniques applied to data mining and related fields. Linear algebra has gained increasing importance in data mining and pattern recognition, as shown by the many current data mining publications, and has a strong impact in other disciplines like psychology, chemistry, and biology. The basic material is accompanied by more than 550 exercises and supplements, many accompanied with complete solutions and MATLAB applications.Table of ContentsModules and Linear Spaces; Matrices; MATLAV; Determinants; Norms on Linear Spaces; Inner Product Spaces; Convexity; Eigenvalues; Similarity and Spectra; Singular Values; Graphs and Matrices; Data Sample Matrices; Least Squares Approximation and Data Mining; Dimensionality Reduction Techniques; The K-Means Clustering Algorithm; Spectral Properties of Graphs and Spectral Clustering.

    Out of stock

    £252.00

  • Biological Data Mining And Its Applications In

    World Scientific Publishing Co Pte Ltd Biological Data Mining And Its Applications In

    Out of stock

    Book SynopsisBiologists are stepping up their efforts in understanding the biological processes that underlie disease pathways in the clinical contexts. This has resulted in a flood of biological and clinical data from genomic and protein sequences, DNA microarrays, protein interactions, biomedical images, to disease pathways and electronic health records. To exploit these data for discovering new knowledge that can be translated into clinical applications, there are fundamental data analysis difficulties that have to be overcome. Practical issues such as handling noisy and incomplete data, processing compute-intensive tasks, and integrating various data sources, are new challenges faced by biologists in the post-genome era. This book will cover the fundamentals of state-of-the-art data mining techniques which have been designed to handle such challenging data analysis problems, and demonstrate with real applications how biologists and clinical scientists can employ data mining to enable them to make meaningful observations and discoveries from a wide array of heterogeneous data from molecular biology to pharmaceutical and clinical domains.

    Out of stock

    £126.00

  • Data Mining With Decision Trees: Theory And

    World Scientific Publishing Co Pte Ltd Data Mining With Decision Trees: Theory And

    Out of stock

    Book SynopsisDecision trees have become one of the most powerful and popular approaches in knowledge discovery and data mining; it is the science of exploring large and complex bodies of data in order to discover useful patterns. Decision tree learning continues to evolve over time. Existing methods are constantly being improved and new methods introduced.This 2nd Edition is dedicated entirely to the field of decision trees in data mining; to cover all aspects of this important technique, as well as improved or new methods and techniques developed after the publication of our first edition. In this new edition, all chapters have been revised and new topics brought in. New topics include Cost-Sensitive Active Learning, Learning with Uncertain and Imbalanced Data, Using Decision Trees beyond Classification Tasks, Privacy Preserving Decision Tree Learning, Lessons Learned from Comparative Studies, and Learning Decision Trees for Big Data. A walk-through guide to existing open-source data mining software is also included in this edition.This book invites readers to explore the many benefits in data mining that decision trees offer:Table of ContentsIntroduction to Decision Trees; Growing Decision Trees; Evaluation of Classification Trees; Splitting Criteria; Pruning Trees; Advanced Decision Trees; Decision Forests; Incremental Learning of Decision Trees; Feature Selection; Fuzzy Decision Trees; Hybridization of Decision Trees with Other Techniques; Beyond Classification Tasks; Privacy Preserving Decision Tree Learning; Decision Tees Learning in Uncertain and Imbalanced Data; Decision Trees Performance Analysis: Lessons Learned from Comparative Studies; Fast induction of Decision Trees and Big Data; Using Existing Software - A Walk-through Guide.

    Out of stock

    £94.50

  • Springer Neural Information Processing

    15 in stock

    Book SynopsisLoTraNet: Locality-guided Transformer Network for Image Manipulation Localization.- Progressive EMD-based Trajectory Prediction: A Multistage Approach for Enhanced Human Trajectory Forecasting.- Dual-Level Contrastive Learning Framework.- DLAFormer: A Novel Approach to Image Super-Resolution with Comprehensive Attention Mechanisms.- Audio-Infused Automatic Image Colorization by Exploiting Audio Scene Semantics.- CoMISI: Multimodal Speaker Identification in Diverse Audio-Visual Conditions through Cross-Modal Interaction.- Multi-scale Spatial Feature Aggregation For Effcient Super Resolution.- SCANet: Split Coordinate Attention Network for Building Footprint Extraction.- XFusion: Cross-Attention Transformer for Multi-Focus Image Fusion.- Guided DiffusionDet: Guided Diffusion Model for Object Detection with Resample Mechanism.- Mutual Information-based Mixed Precision Quantization.- MLLM-Driven Semantic Enhancement and Alignment for Text-Based Person Search.- TFCM: Tuning-Free Facial Concept-Erasure in Text-to-Image Models through Attention and Sample Modulation.- Selecting the Best Sequential Transfer Path for Medical Image Segmentation with Limited Labeled Data.- Knowledge Distillation with Differentiable Optimal Transport on Graph Neural Networks.- Test-Time Intensity Consistency Adaptation for Shadow Detection.- Learning from Noisy Labels for Long-tailed Data via Optimal Transport.- LCRPS: Large-Capacity Residual Plane Steganography Based on Multiple Adversarial Networks.- Aesthetics-Guided Multi-scale Feature Fusion for Style Transfer.- BEVRoad: A Cross-Modal and Temporary-Recurrent 3D Object Detector for Infrastructure Perception.- Dilated Pyramid Attention in Hierarchical Vision Transformer for Texture Recognition.- Attention-based Domain Adaptive YOLO For Cross-domain Object Detection.- In-WSOD: Integrality Weakly Supervised Object Detection with Classification and Localization Consistency.- GLEGNet: Infrared and Visible Image Fusion Via Global-Local Feature Extraction and Edge-Gradient Preservation.- Mending of Spatio-Temporal Dependencies in Block Adjacency Matrix.- CaDT-Net: A Cascaded Deformable Transformer Network for Multiclass Breast Cancer Histopathological Image Classification.- DIFA: Deformable Implicit Feature Alignment for Roadside Cooperative Perception.- Transferring Teacher’s Invariance to Student Through Data Augmentation Optimization.- AARR-Net: An Attention Assistance Feature Fusion and Model Recursive Recovery Network for Category-level 6D Object Pose Estimation.- BRS-YOLO: A Balanced Optical Remote Sensing Object Detection Method.- HDKI: A Hierarchical Deep Koopman Framework for Spatio-Temporal Prediction with Image Observations.

    15 in stock

    £61.74

  • Springer Neural Information Processing

    1 in stock

    Book Synopsis

    1 in stock

    £58.49

  • Springer Nature Switzerland AG Neural Information Processing

    1 in stock

    Book Synopsis

    1 in stock

    £71.99

  • Springer Nature Switzerland AG Neural Information Processing

    1 in stock

    Book Synopsis

    1 in stock

    £71.99

  • World Scientific Publishing Co Pte Ltd Data Mining And Warehousing Techniques With

    Out of stock

    Book Synopsis

    Out of stock

    £117.40

  • Data Science: 9th International Conference of

    Springer Verlag, Singapore Data Science: 9th International Conference of

    1 in stock

    Book SynopsisThis two-volume set (CCIS 1879 and 1880) constitutes the refereed proceedings of the 9th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2023 held in Harbin, China, during September 22–24, 2023. The 52 full papers and 14 short papers presented in these two volumes were carefully reviewed and selected from 244 submissions. The papers are organized in the following topical sections:Part I: Applications of Data Science, Big Data Management and Applications, Big Data Mining and Knowledge Management, Data Visualization, Data-driven Security, Infrastructure for Data Science, Machine Learning for Data Science and Multimedia Data Management and Analysis.Part II: Data-driven Healthcare, Data-driven Smart City/Planet, Social Media and Recommendation Systems and Education using big data, intelligent computing or data mining, etc.Table of Contents​Applications of Data Science.- Construction of Software Design and Programming Practice Course in Information and Communication Engineering.- A Self-Attention-Based Stock Prediction Method Using Long Short-Term Memory Network Architecture.- CAD-based Research on the Design of a Standard Unit Cabinet for Custom Furniture of the Cabinet Type.- An Improved War Strategy Optimization Algorithm for Big Data Analytics.- Research on Path Planning of Mobile Robots Based on Dyna-RQ.- Small Target Helmet Wearing Detection Algorithm based on Improved YOLO V5.- Research on Dance Evaluation Technology based on Human Posture Recognition.- Multiple-channel Weight-based CNN Fault Diagnosis Method.- Big Data Management and Applications.- Design and Implementation of Key-Value Database for Ship Virtual Test Platform Based on Distributed System.- Big Data Mining and Knowledge Management.- Research on Multi-modal Time Series Data Prediction Method Based on Dualstage Attention Mechanism.- Prediction of Time Series Data with Low Latitude Features.- Lightweight and Efficient Attention-based Superresolution Generative Adversarial Networks.- The Multisource Time Series Data Granularity Conversion Method.- Outlier Detection Model Based on Autoencoder and Data Augmentation for High-Dimensional Sparse Data.- Dimension Reduction Based on Sampling.- Complex Time Series Analysis Based on Conditional Random Fields.- Feature Extraction of Time Series Data Based on CNNCBAM.- Optimization of a Network Topology Generation Algorithm based on Spatial Information Network.- Data Visualization.- MBTIviz: A Visualization System for Research on Psycho-demographics and Personality.- Data-driven Security.- Distributed Implementation of SM4 Block Cipher Algorithm based on SPDZ Secure Multi-party Computation Protocol.- DP-ASSGD: Differential Privacy Protection Based on Stochastic Gradient Descent Optimization.- Study on Tourism Workers ’ Intercultural Communication Competence.- A Novel Federated Learning with Bidirectional Adaptive Differential Privacy.- Chaos-Based Construction of LWEs in Lattice-Based Cryptosystems.- Security Compressed Sensing Image Encryption Algorithm Based on Elliptic Curve.- Infrastructure for Data Science.- Two-dimensional Code Transmission System Based on Side Channel Feedback.- An Updatable and Revocable Decentralized Identity Management Scheme based on Blockchain.- Cloud-Edge Intelligent Collaborative Computing Model based on Transfer Learning in IoT.- Design and Validation of a Hardware-in-the-loop based Automated Driving Simulation Test Platform.- Machine Learning for Data Science.- Improving Transferability Reversible Adversarial Examples based on Flipping Transformation.- Rolling Iterative Prediction for Correlated Multivariate Time Series.- Multimedia Data Management and Analysis.- Video Popularity Prediction Based on Knowledge Graph and LSTM Network.- Design and Implementation of Speech Generation and Demonstration Research Based on Deep Learning.- Testing and Improvement of OCR Recognition Technology in Export-OrientedChinese Dictionary APP.

    1 in stock

    £71.24

  • Neural Information Processing: 30th International

    Springer Verlag, Singapore Neural Information Processing: 30th International

    3 in stock

    Book SynopsisThe six-volume set LNCS 14447 until 14452 constitutes the refereed proceedings of the 30th International Conference on Neural Information Processing, ICONIP 2023, held in Changsha, China, in November 2023. The 652 papers presented in the proceedings set were carefully reviewed and selected from 1274 submissions. They focus on theory and algorithms, cognitive neurosciences; human centred computing; applications in neuroscience, neural networks, deep learning, and related fields. Table of ContentsText to Image Generation with Conformer-GAN.- MGFNet: A Multi-Granularity Feature Fusion and Mining Network for Visible-Infrared Person Re-Identification.- Isomorphic Dual-Branch Network for Non-homogeneous Image Dehazing and Super-Resolution.- Hi-Stega : A Hierarchical Linguistic Steganography Framework Combining Retrieval and Generation.- Effi-Seg: Rethinking EfficientNet Architecture for Real-time Semantic Segmentation.- Quantum Autoencoder Frameworks for Network Anomaly Detection.- Spatially-Aware Human-Object Interaction Detection with Cross-Modal Enhancement.- Intelligent trajectory tracking control of unmanned parafoil system based on SAC optimized LADRC.- CATS: Connection-aware and Interaction-based Text Steganalysis in Social Networks.- Syntax Tree Constrained Graph Network for Visual Question Answering.- CKR-Calibrator: Convolution Kernel Robustness Evaluation and Calibration.- SGLP-Net: Sparse Graph Label Propagation Network for Weakly-Supervised Temporal Action Localization.- VFIQ: A Novel Model of ViT-FSIMc Hybrid Siamese Network for Image Quality Assessment.- Spiking Reinforcement Learning for Weakly-supervised Anomaly Detection.- Resource-aware DNN Partitioning for Privacy-sensitive Edge-Cloud Systems.- A frequency reconfigurable multi-mode printed antenna.- Multi-view Contrastive learning for Knowledge-aware Recommendation.- PYGC: a PinYin Language Model Guided Correction Model for Chinese Spell Checking.- Empirical Analysis of Multi-label Classification on GitterCom using BERT.- A lightweight safety helmet detection network based on bidirectional connection module and Polarized Self-Attention.- Direct Inter-Intra View Association for Light Field Super-Resolution.- Responsive CPG-Based Locomotion Control for Quadruped Robots.- Vessel Behavior Anomaly Detection using Graph Attention Network.- TASFormer: Task-aware Image Segmentation Transformer.- Unsupervised Joint-Semantics Autoencoder Hashing for Multimedia Retrieval.- TKGR-RHETNE:A New Temporal Knowledge Graph Reasoning Model via Jointly Modeling Relevant Historical Event and Temporal Neighborhood Event Context.- High-Resolution Self-Attention with Fair Loss for Point Cloud Segmentation.- Transformer-based Video Deinterlacing Method.- SCME: A Self-Contrastive Method for Data-free and Query-Limited Model Extraction Attack.- CSEC: A Chinese Semantic Error Correction Dataset for Written Correction.- Contrastive Kernel Subspace Clustering.- UATR: An Uncertainty Aware Two-stage Refinement Model for Targeted Sentiment Analysis.- AttIN: Paying More Attention to Neighborhood Information for Entity Typing in Knowledge Graphs.- Text-based Person Re-ID by Saliency Mask and Dynamic Label Smoothing.- Robust Multi-view Spectral Clustering with Auto-encoder for Preserving Information.- Learnable Color Image Zero-Watermarking Based on Feature Comparison.- P-IoU: Accurate Motion Prediction based Data Association for Multi-Object Tracking.- WCA-VFnet:a dedicated complex forest smoke fire detector.- Label Selection Algorithm Based on Ant Colony Optimization and Reinforcement Learning for Multi-label Classification.- Reversible Data Hiding Based on Adaptive Embedding with Local Complexity.- Generalized Category Discovery with Clustering Assignment Consistency.- CInvISP: Conditional Invertible Image Signal Processing Pipeline.- Ignored Details in Eyes: Exposing GAN-generated Faces by Sclera.- A Developer Recommendation Method Based on Disentangled.- Graph Convolutional Network.- Novel Method for Radar Echo Target Detection.

    3 in stock

    £66.49

  • Nova Science Publishers Inc Machine Learning Analysis of qPCR Data Using R

    1 in stock

    Book Synopsis

    1 in stock

    £58.39

© 2025 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account