Sebanyak 3 item atau buku ditemukan

Web Data Mining and Applications in Business Intelligence and Counter-Terrorism

The explosion of Web-based data has created a demand among executives and technologists for methods to identify, gather, analyze, and utilize data that may be of value to corporations and organizations. The emergence of data mining, and the larger field of Web mining, has businesses lost within a confusing maze of mechanisms and strategies for obtaining and managing crucial intelligence. Web Data Mining and Applications in Business Intelligence and Counter-Terrorism responds by presenting a clear and comprehensive overview of Web mining, with emphasis on CRM and, for the first time, security and counter-terrorism applications. The tools and methods of Web mining are revealed in an easy-to-understand style, emphasizing the importance of practical, hands-on experience in the creation of successful e-business solutions. The author, a program director for Data and Applications Security at the National Science Foundations, details how both opportunities and dangers on the Web can be identified and managed. Armed with the knowledge contained in this book, businesses can collect and analyze Web-based data to help develop customer relationships, increase sales, and identify existing and potential threats. Organizations can apply these same Web mining techniques to battle the real and present danger of terrorism, demonstrating Web mining's critical role in the intelligence arsenal.

INTRODUCTION Chapter 3 provided a brief introduction to data mining and
discussed its relationship to Web data mining. This chapter provides a brief
introduction to the core technologies for data mining. These core technologies
contribute ...

Data Mining

Technologies, Techniques, Tools, and Trends

Focusing on a data-centric perspective, this book provides a complete overview of data mining: its uses, methods, current technologies, commercial products, and future challenges. Three parts divide Data Mining: Part I describes technologies for data mining - database systems, warehousing, machine learning, visualization, decision support, statistics, parallel processing, and architectural support for data mining Part II presents tools and techniques - getting the data ready, carrying out the mining, pruning the results, evaluating outcomes, defining specific approaches, examining a specific technique based on logic programming, and citing literature and vendors for up-to-date information Part III examines emerging trends - mining distributed and heterogeneous data sources; multimedia data, such as text, images, video; mining data on the World Wide Web; metadata aspects of mining; and privacy issues. This self-contained book also contains two appendices providing exceptional information on technologies, such as data management, and artificial intelligence. Is there a need for mining? Do you have the right tools? Do you have the people to do the work? Do you have sufficient funds allocated to the project? All these answers must be answered before embarking on a project. Data Mining provides singular guidance on appropriate applications for specific techniques as well as thoroughly assesses valuable product information.

CHAPTER 1 INTRODUCTION 1.1 WHAT IS DATA MINING? Data mining is the
process of posing various queries and extracting useful information, patterns, and
trends often previously unknown from large quantities of data possibly stored in ...

Design and Implementation of Data Mining Tools

Focusing on three applications of data mining, Design and Implementation of Data Mining Tools explains how to create and employ systems and tools for intrusion detection, Web page surfing prediction, and image classification. Mainly based on the authors’ own research work, the book takes a practical approach to the subject. The first part of the book reviews data mining techniques, such as artificial neural networks and support vector machines, as well as data mining applications. The second section covers the design and implementation of data mining tools for intrusion detection. It examines various designs and performance results, along with the strengths and weaknesses of the approaches. The third part presents techniques to solve the WWW prediction problem. The final part describes models that the authors have developed for image classification. Showing step by step how data mining tools are developed, this hands-on guide discusses the performance results, limitations, and unique contributions of data mining systems. It provides essential information for technologists to decide on the tools to select for a particular application, for developers to focus on alternative designs if an approach is unsuitable, and for managers to choose whether to proceed with a data mining project.

The first part of the book reviews data mining techniques, such as artificial neural networks and support vector machines, as well as data mining applications.