Data Mining and Machine Learning Applications
- Length: 496 pages
- Edition: 1
- Language: English
- Publisher: Wiley-Scrivener
- Publication Date: 2022-03-02
- ISBN-10: 1119791782
- ISBN-13: 9781119791782
- Sales Rank: #0 (See Top 100 Books)
DATA MINING AND MACHINE LEARNING APPLICATIONS
The book elaborates in detail on the current needs of data mining and machine learning and promotes mutual understanding among research in different disciplines, thus facilitating research development and collaboration.
Data, the latest currency of today’s world, is the new gold. In this new form of gold, the most beautiful jewels are data analytics and machine learning. Data mining and machine learning are considered interdisciplinary fields. Data mining is a subset of data analytics and machine learning involves the use of algorithms that automatically improve through experience based on data.
Massive datasets can be classified and clustered to obtain accurate results. The most common technologies used include classification and clustering methods. Accuracy and error rates are calculated for regression and classification and clustering to find actual results through algorithms like support vector machines and neural networks with forward and backward propagation. Applications include fraud detection, image processing, medical diagnosis, weather prediction, e-commerce and so forth.
The book features:
- A review of the state-of-the-art in data mining and machine learning,
- A review and description of the learning methods in human-computer interaction,
- Implementation strategies and future research directions used to meet the design and application requirements of several modern and real-time applications for a long time,
- The scope and implementation of a majority of data mining and machine learning strategies.
- A discussion of real-time problems.
Audience
Industry and academic researchers, scientists, and engineers in information technology, data science and machine and deep learning, as well as artificial intelligence more broadly.
Cover Table of Contents Title Page Copyright Preface 1 Introduction to Data Mining 1.1 Introduction 1.2 Knowledge Discovery in Database (KDD) 1.3 Issues in Data Mining 1.4 Data Mining Algorithms 1.5 Data Warehouse 1.6 Data Mining Techniques 1.7 Data Mining Tools References 2 Classification and Mining Behavior of Data 2.1 Introduction 2.2 Main Characteristics of Mining Behavioral Data 2.3 Research Method 2.4 Results 2.5 Discussion 2.6 Conclusion References 3 A Comparative Overview of Hybrid Recommender Systems: Review, Challenges, and Prospects 3.1 Introduction 3.2 Related Work on Different Recommender System References 4 Stream Mining: Introduction, Tools & Techniques and Applications 4.1 Introduction 4.2 Data Reduction: Sampling and Sketching 4.3 Concept Drift 4.4 Stream Mining Operations 4.5 Tools & Techniques 4.6 Applications 4.7 Conclusion References 5 Data Mining Tools and Techniques: Clustering Analysis 5.1 Introduction 5.2 Data Mining Task 5.3 Data Mining Algorithms and Methodologies 5.4 Clustering the Nearest Neighbor 5.5 Data Mining Applications 5.6 Materials and Strategies for Document Clustering 5.7 Discussion and Results References 6 Data Mining Implementation Process 6.1 Introduction 6.2 Data Mining Historical Trends 6.3 Processes of Data Analysis References 7 Predictive Analytics in IT Service Management (ITSM) 7.1 Introduction 7.2 Analytics: An Overview 7.3 Significance of Predictive Analytics in ITSM 7.4 Ticket Analytics: A Case Study 7.5 Conclusion References 8 Modified Cross-Sell Model for Telecom Service Providers Using Data Mining Techniques 8.1 Introduction 8.2 Literature Review 8.3 Methodology and Implementation 8.4 Data Partitioning 8.5 Conclusions References 9 Inductive Learning Including Decision Tree and Rule Induction Learning 9.1 Introduction 9.2 The Inductive Learning Algorithm (ILA) 9.3 Proposed Algorithms 9.4 Divide & Conquer Algorithm 9.5 Decision Tree Algorithms 9.6 Conclusion and Future Work References 10 Data Mining for Cyber-Physical Systems 10.1 Introduction 10.2 Feature Recovering Methodologies 10.3 CPS vs. IT Systems 10.4 Collections, Sources, and Generations of Big Data for CPS 10.5 Spatial Prediction 10.6 Clustering of Big Data 10.7 NoSQL 10.8 Cyber Security and Privacy Big Data 10.9 Smart Grids 10.10 Military Applications 10.11 City Management 10.12 Clinical Applications 10.13 Calamity Events 10.14 Data Streams Clustering by Sensors 10.15 The Flocking Model 10.16 Calculation Depiction 10.17 Initialization 10.18 Representative Maintenance and Clustering 10.19 Results 10.20 Conclusion References 11 Developing Decision Making and Risk Mitigation: Using CRISP-Data Mining 11.1 Introduction 11.2 Background 11.3 Methodology of CRISP-DM 11.4 Stage One—Determine Business Objectives 11.5 Stage Two—Data Sympathetic 11.6 Stage Three—Data Preparation 11.7 Stage Four—Modeling 11.8 Stage Five—Evaluation 11.9 Stage Six—Deployment 11.10 Data on ERP Systems 11.11 Usage of CRISP-DM Methodology 11.12 Modeling 11.13 Assessment 11.14 Distribution 11.15 Results and Discussion 11.16 Conclusion References 12 Human–Machine Interaction and Visual Data Mining 12.1 Introduction 12.2 Related Researches 12.3 Visual Genes 12.4 Visual Hypotheses 12.5 Visual Strength and Conditioning 12.6 Visual Optimization 12.7 The Vis 09 Model 12.8 Graphic Monitoring and Contact With Human–Computer 12.9 Mining HCI Information Using Inductive Deduction Viewpoint 12.10 Visual Data Mining Methodology 12.11 Machine Learning Algorithms for Hand Gesture Recognition 12.12 Learning 12.13 Detection 12.14 Recognition 12.15 Proposed Methodology for Hand Gesture Recognition 12.16 Result 12.17 Conclusion References 13 MSDTrA: A Boosting Based-Transfer Learning Approach for Class Imbalanced Skin Lesion Dataset for Melanoma Detection 13.1 Introduction 13.2 Literature Survey 13.3 Methods and Material 13.4 Experimental Results 13.5 Libraries Used 13.6 Comparing Algorithms Based on Decision Boundaries 13.7 Evaluating Results 13.8 Conclusion References 14 New Algorithms and Technologies for Data Mining 14.1 Introduction 14.2 Machine Learning Algorithms 14.3 Supervised Learning 14.4 Unsupervised Learning 14.5 Semi-Supervised Learning 14.6 Regression Algorithms 14.7 Case-Based Algorithms 14.8 Regularization Algorithms 14.9 Decision Tree Algorithms 14.10 Bayesian Algorithms 14.11 Clustering Algorithms 14.12 Association Rule Learning Algorithms 14.13 Artificial Neural Network Algorithms 14.14 Deep Learning Algorithms 14.15 Dimensionality Reduction Algorithms 14.16 Ensemble Algorithms 14.17 Other Machine Learning Algorithms 14.18 Data Mining Assignments 14.19 Data Mining Models 14.20 Non-Parametric & Parametric Models 14.21 Flexible vs. Restrictive Methods 14.22 Unsupervised vs. Supervised Learning 14.23 Data Mining Methods 14.24 Proposed Algorithm 14.25 The Regret of Learning Phase 14.26 Conclusion References 15 Classification of EEG Signals for Detection of Epileptic Seizure Using Restricted Boltzmann Machine Classifier 15.1 Introduction 15.2 Related Work 15.3 Material and Methods 15.4 Experimental Framework 15.5 Experimental Results and Discussion 15.6 Discussion 15.7 Conclusion References 16 An Enhanced Security of Women and Children Using Machine Learning and Data Mining Techniques 16.1 Introduction 16.2 Related Work 16.3 Issue and Solution 16.4 Selection of Data 16.5 Pre-Preparation Data 16.6 Application Development 16.7 Use Case For The Application 16.8 Conclusion References 17 Conclusion and Future Direction in Data Mining and Machine Learning 17.1 Introduction 17.2 Machine Learning 17.3 Conclusion References Index End User License Agreement
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.