1 - 17
1. Understanding search engines [electronic resource] : mathematical modeling and text retrieval [2005]
- Berry, Michael W.
- 2nd ed - Philadelphia, Pa. : Society for Industrial and Applied Mathematics (SIAM, 3600 Market Street, Floor 6, Philadelphia, PA 19104), 2005
- Description
- Book — 1 electronic text (xvii, 117 p.) : ill., digital file
- Summary
-
- Preface to the second edition
- Preface to the first edition
- 1. Introduction
- 2. Document file preparation
- 3. Vector space models
- 4. Matrix decompositions
- 5. Query management
- 6. Ranking and relevance feedback
- 7. Searching by link structure
- 8. User interface considerations
- 9. Further reading
- Bibliography
- Index.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Berry, Michael W.
- Philadelphia, PA : Society for Industrial and Applied Mathematics, c1999.
- Description
- Book — xiii, 116 p. : ill. ; 23 cm.
- Summary
-
- Introduction
- Document file preparation
- Vector space models
- Matrix decompositions
- Query management
- Ranking and relevance feedback
- User interface considerations
- A course project
- Further reading.
(source: Nielsen Book Data)
- Online
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
TK5105.884 .B47 1999 | Available |
- London ; New York : Springer, ©2012.
- Description
- Book — 1 online resource (xiii, 346 pages) : illustrations (some color) Digital: text file.PDF.
- Summary
-
- Parallel Numerical Computing from Illiac IV to Exascale--The Contributions of Ahmed H. Sameh / Kyle A. Gallivan, Efstratios Gallopoulos
- Computational Capacity-Based Codesign of Computer Systems / David J. Kuck
- Measuring Computer Performance / William Jalby, David C. Wong, David J. Kuck
- A Compilation Framework for the Automatic Restructuring of Pointer-Linked Data Structures / Harmen L.A. van der Spek, C.W. Mattias Holm
- Dense Linear Algebra on Accelerated Multicore Hardware / Jack Dongarra, Jakub Kurzak, Piotr Luszczek
- The Explicit Spike Algorithm: Iterative Solution of the Reduced System / Carl Christian Kjelgaard Mikkelsen
- The Spike Factorization as Domain Decomposition Method; Equivalent and Variant Approaches / Victor Eijkhout, Robert van de Geijn
- Parallel Solution of Sparse Linear Systems / Murat Manguoglu
- Parallel Block-Jacobi SVD Methods / Martin Bečka, Gabriel Okša, Marián Vajteršic
- Robust and Efficient Multifrontal Solver for Large Discretized PDEs / Jianlin Xia
- A Preconditioned Scheme for Nonsymmetric Saddle-Point Problems / Abdelkader Baggag
- Effect of Ordering for Iterative Solvers in Structural Mechanics Problems / Sami A. Kilic
- Scaling Hypre's Multigrid Solvers to 100,000 Cores / Allison H. Baker, Robert D. Falgout
- A Riemannian Dennis-Moré Condition / Kyle A. Gallivan, Chunhong Qi, P.-A. Absil
- A Jump-Start of Non-negative Least Squares Solvers / Mu Wang, Xiaoge Wang
- Fast Nonnegative Tensor Factorization with an Active-Set-Like Method / Jingu Kim, Haesun Park
- Knowledge Discovery Using Nonnegative Tensor Factorization with Visual Analytics / Andrey A. Puretskiy, Michael W. Berry.
(source: Nielsen Book Data)
4. Lecture notes in data mining [2006]
- Singapore ; Hackensack, NJ : World Scientific, ©2006.
- Description
- Book — 1 online resource (xiii, 222 pages) : illustrations
- Summary
-
- Point Estimation Algorithms
- Applications of Bayes Theorem
- Similarity Measures
- Decision Trees
- Genetic Algorithms
- Classification: Distance Based Algorithms
- Decision Tree-Based Algorithms
- Covering (Rule-Based) Algorithms
- Clustering: An Overview
- Clustering Hierarchical Algorithms
- Clustering Partitional Algorithms
- Clustering: Large Databases
- Clustering Categorical Attributes
- Association Rules: An Overview
- Association Rules: Parallel and Distributed Algorithms
- Association Rules: Advanced Techniques and Measures
- Spatial Mining: Techniques and Algorithms.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Hackensack, NJ : World Scientific, c2006.
- Description
- Book — 1 online resource (xiii, 222 p.) : ill.
- Summary
-
- Point Estimation Algorithms
- Applications of Bayes Theorem
- Similarity Measures
- Decision Trees
- Genetic Algorithms
- Classification: Distance Based Algorithms
- Decision Tree-Based Algorithms
- Covering (Rule-Based) Algorithms
- Clustering: An Overview
- Clustering Hierarchical Algorithms
- Clustering Partitional Algorithms
- Clustering: Large Databases
- Clustering Categorical Attributes
- Association Rules: An Overview
- Association Rules: Parallel and Distributed Algorithms
- Association Rules: Advanced Techniques and Measures
- Spatial Mining: Techniques and Algorithms.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Description
- Book
- Online
Special Collections
Special Collections | Status |
---|---|
University Archives | Request via Aeon (opens in new tab) |
047096-09 | In-library use |
- Cham : Springer, 2020.
- Description
- Book — 1 online resource (191 pages)
- Summary
-
- Chapte
- r1: A Systematic Review on Supervised & Unsupervised Machine Learning Algorithms for Data Science.- Chapte
- r2: Overview of One-Pass and Discard-After-Learn Concepts for Classification and Clustering in Streaming Environment with Constraints.- Chapte
- r3: Distributed Single-Source Shortest Path Algorithms with Two Dimensional Graph Layout.- Chapte
- r4: Using Non-Negative Tensor Decomposition for Unsupervised Textual Influence Modeling.- Chapte
- r5: Survival Support Vector Machines: A Simulation Study and Its Health-related Application.- Chapte
- r6: Semantic Unsupervised Learning for Word Sense Disambiguation.- Chapte
- r7: Enhanced Tweet Hybrid Recommender System using Unsupervised Topic Modeling and Matrix Factorization based Neural Network.- Chapte
- r8: New Applications of a Supervised Computational Intelligence (CI) Approach: Case Study in Civil Engineering.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- SCDS (Conference) (2nd : 2016 : Kuala Lumpur, Malaysia)
- Singapore : Springer, 2016.
- Description
- Book — 1 online resource (xix, 311 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Artificial neural networks.- Classification, clustering, visualization.- Fuzzy logic.- Information and sentiment analytics.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- SCDS (Conference) (1st : 2015 : Putrajaya, Malaysia)
- Singapore : Springer, 2015.
- Description
- Book — 1 online resource (xi, 270 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Intro
- Preface
- Organization
- Contents
- Part I Data Mining
- An Improved Particle Swarm Optimization via Velocity-Based Reinitialization for Feature Selection
- 1 Introduction
- 2 Related Works
- 3 The Proposed PSO_ImVBR Method
- 4 Experimental Setup
- 5 Results and Discussion
- 6 Conclusion
- References
- Classifying Forum Questions Using PCA and Machine Learning for Improving Online CQA
- 1 Introduction
- 2 Experiment
- 2.1 CQA Dataset and Motivation
- 2.2 Classification Algorithms
- 2.3 Factor Analysis
- 2.4 Classification Model Performance
- 3 Conclusions
- 3.3 Missing Values
- 3.4 Typing Errors
- 3.5 Redundant Data
- 3.6 Incorrect Data Values
- 4 Findings and Discussion
- 4.1 Enhancement of Data Cleansing Process
- 4.2 Data Type Mismatch
- 4.3 Specification Mismatch
- 4.4 Missing Values
- 4.5 Typing Error
- 4.6 Redundant Data
- 4.7 Incorrect Data Values
- 5 Conclusion
- References
- Reviewing Classification Approaches in Sentiment Analysis
- 1 Introduction
- 2 Related Works
- 3 Sentiment Classification Approaches
- 3.1 Lexicon-Based Approach
- 3.2 Machine Learning Approach
- 4 Comparison of Sentiment Classification Approaches
- 5 Conclusion
- References
- Comparisons of ADABOOST, KNN, SVM and Logistic Regression in Classification of Imbalanced Dataset
- 1 Introduction
- 2 Literature Review
- 2.1 Machine Learning Techniques
- 2.2 Oversampling and Undersampling
- 3 Method
- 3.1 Data Set
- 3.2 Methods
- 4 Results and Discussions
- 5 Conclusions
- References
- Finding Significant Factors on World Ranking of e-Governments by Feature Selection Methods over KPIs
- 1 Introduction
- 2 Empirical Data Analysis
- 2.1 The Dataset
- 2.2 Feature Selection Algorithm
- 2.3 The Experimental Results
- 2.4 Comparison with Other Methods
- 3 Conclusions
- References
- Part II Fuzzy Computing
- Possibility Vague Soft Expert Set Theory and Its Application in Decision Making
- 1 Introduction
- 2 Preliminaries
- 3 Possibility Vague Soft Expert Sets
- 4 Basic Operations on Possibility Vague Soft Expert Sets
- 5 Application of PVSESs in a Decision Making Problem
- 6 Conclusion
- References
- An Iterative Method for Solving Fuzzy Fractional Differential Equations
- 1 Introduction
- 2 BasicConcepts
- 3 Solution Method
- 4 NumericalExperiment
- 5 Conclusion
- References
10. Computational information retrieval [2001]
- Computational Information Retrieval Conference (2000 : Raleigh, N.C.)
- Philadelphia : Society for Industrial and Applied Mathematics, c2001.
- Description
- Book — xii, 185 p. : ill. ; 26 cm.
- Summary
-
Computational Information Retrieval Workshop held October 2000, Raleigh, North Carolina This volume contains selected papers that focus on the use of linear algebra, computational statistics, and computer science in the development of algorithms and software systems for text retrieval. Experts in information modeling and retrieval share their perspectives on the design of scalable but precise text retrieval systems, revealing many of the challenges and obstacles that mathematical and statistical models must overcome to be viable for automated text processing. This very useful proceedings is an excellent companion for courses in information retrieval, applied linear algebra, and applied statistics.
(source: Nielsen Book Data)
- Online
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
QA76.9 .D3 C655 2000 | Available |
- International Conference on Data Science and Emerging Technologies (2022 : Online)
- Singapore : Springer, 2023.
- Description
- Book — 1 online resource.
- Summary
-
- Part I: Artificial Intelligence
- Extractive Text Summarization Using Syntactic Sub- Graph Models
- Analysis of Big Five Personality Factors to determine the Appropriate Type of Career using the C4.5 Algorithm
- Predicting Disaster Type from Social Media Imagery via Deep Neural Networks Directed by Visual Attention
- Dissemination Management for Official Statistics Using Artificial Intelligence-Based Media Monitoring
- Part II: Computational Vision
- A Naive but Effective Post-Processing Approach for Dark Channel Prior (DCP)
- COVID-19 Face Mask Classification Using Deep Learning
- Gender Classification Using Transfer Learning and Fine-Tuning
- Multi-Language Recognition Translator by Using the Convolutional Neural Network (CNN) Algorithm and Optical Character Recognition (OCR)
- Autonomous Driving Through Road Segmentation Based on Computer Vision Techniques
- Part III: Cybersecurity
- Phishing Attack Types and Mitigation: A Survey
- A Review of Privacy Protection Methods for Smart Homes Against Wireless Snooping Attack
- Development of Graph-Based Knowledge on Ransom-Ware Attacks Using Twitter Data
- Part IV: Big Data Analytics
- BigMDHealth: Supporting Multidimensional Big Data Management and Analytics over Big Healthcare Data via Effective and Efficient Multidimensional Aggregate Queries over Key-Value Stores (Prof Alredo's paper)
- Design and Implementation of Data Warehouse Solution at Kumpulan Wang Persaraan (KWAP)
- Consumer Behavior Prediction During Covid-19 Pandemic Conditions Using Sentiment Analytics
- Big Data Application on Prediction of HDD Manufacturing Process Performance
- Visualising Economic Situation Through Malaysia Economic Recovery Dashboard (MERD)
- Part V: Machine/Deep Learning
- Lung Nodules Classification Using Convolutional Neural Network with Transfer Learning
- Plant Growth Phase Classification Using Deep Neural Network
- The Implementation of Genetic Algorithm-Ensemble Learning on QSAR Study of Diacylglycerol Acyltransferase-1(DGAT1) Inhibitors as Anti-Diabetes
- Classification of Exercise Game Data for Rehabilitation Using Machine Learning Algorithms
- SDDLA: A New Architecture for Secured Decentralized Distributed Learning
- Gated Memory Unit: A Novel Recurrent Neural Network Architecture for Sequential Analysis
- Multi-Class Classification for Breast Cancer with High Dimensional Microarray Data Using Machine Learning Classifier
- Predicting Risks of Late Delivery to Online Shopping Customers Using Machine Learning Techniques
- Quora Insincere Questions Classification Using Attention Based Model
- Suicide Ideation Detection: A Comparative Study of Sequential and Transformer Hybrid Algorithms
- Well Log Data Preparation and Effective Utilization of Drilling Parameters Using Data Science Based Approaches
- Deep Learning-Based Approach for Classifying the Severity of Metal Corrosion Using SEM Images
- Insurance Risk Prediction Using Machine Learning
- Loan Default Forecasting Using StackNet
- Part VI: Statistical Learning
- Neural Network Autoregressive Model for Forecasting Malaysia Under-5 Mortality
- Robustness of Support Vector Regression and Random Forest Models: A Simulation Study
- The Impact of Restrictions Community Activities on COVID-19 Transmission: A Case Study in Sumatra Island, Indonesia
- Predicting Internet Usage for Digital Finance Services: Multitarget Classification Using Vector Generalized Additive Model with SMOTE-NC
- Part VII: Text Mining and Classification
- Identifying Topic Modeling Technique in Evaluating Textual Datasets
- Y-X-Y Encoding for Identifying Types of Sentence Similarity
- Evaluation of Extractive and Abstract Methods in Text Summarization.
- SCDS (Conference) (6th : 2021 : Online)
- Singapore : Springer, [2021]
- Description
- Book — 1 online resource : illustrations (chiefly color) Digital: text file.PDF.
- Summary
-
- AI Techniques and applications.- Data Analytics and Technologies.- Data Mining and Image Processing.- Machine & Statistical Learning. .
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Chichester, U.K. : Wiley, c2010.
- Description
- Book — 1 online resource (xiv, 207 p.) : ill.
- Summary
-
- List of Contributors. Preface. PART I TEXT EXTRACTION, CLASSIFICATION, AND CLUSTERING.
- 1 Automatic keyword extraction from individual documents. 1.1 Introduction. 1.2 Rapid automatic keyword extraction. 1.3 Benchmark evaluation. 1.4 Stoplist generation. 1.5 Evaluation on news articles. 1.6 Summary. 1.7 Acknowledgements.
- 2 Algebraic techniques for multilingual document clustering. 2.1 Introduction. 2.2 Background. 2.3 Experimental setup. 2.4 Multilingual LSA. 2.5 Tucker1 method. 2.6 PARAFAC2 method. 2.7 LSA with term alignments. 2.8 Latent morpho-semantic analysis (LMSA). 2.9 LMSA with term alignments. 2.10 Discussion of results and techniques. 2.11 Acknowledgements.
- 3 Content-based spam email classification using machine-learning algorithms. 3.1 Introduction. 3.2 Machine-learning algorithms. 3.3 Data preprocessing. 3.4 Evaluation of email classification. 3.5 Experiments. 3.6 Characteristics of classifiers. 3.7 Concluding remarks. 3.8 Acknowledgements.
- 4 Utilizing nonnegative matrix factorization for email classification problems. 4.1 Introduction. 4.2 Background. 4.3 NMF initialization based on feature ranking. 4.4 NMF-based classification methods. 4.5 Conclusions. 4.6 Acknowledgements.
- 5 Constrained clustering with k -means type algorithms. 5.1 Introduction. 5.2 Notations and classical k -means. 5.3 Constrained k -means with Bregman divergences. 5.4 Constrained smoka type clustering. 5.5 Constrained spherical k -means. 5.6 Numerical experiments. 5.7 Conclusion. PART II ANOMALY AND TREND DETECTION.
- 6 Survey of text visualization techniques. 6.1 Visualization in text analysis. 6.2 Tag clouds. 6.3 Authorship and change tracking. 6.4 Data exploration and the search for novel patterns. 6.5 Sentiment tracking. 6.6 Visual analytics and FutureLens. 6.7 Scenario discovery. 6.8 Earlier prototype. 6.9 Features of FutureLens. 6.10 Scenario discovery example: bioterrorism. 6.11 Scenario discovery example: drug trafficking. 6.12 Future work.
- 7 Adaptive threshold setting for novelty mining. 7.1 Introduction. 7.2 Adaptive threshold setting in novelty mining. 7.3 Experimental study. 7.4 Conclusion.
- 8 Text mining and cybercrime. 8.1 Introduction. 8.2 Current research in Internet predation and cyberbullying. 8.3 Commercial software for monitoring chat. 8.4 Conclusions and future directions. 8.5 Acknowledgements. PART III TEXT STREAMS.
- 9 Events and trends in text streams. 9.1 Introduction. 9.2 Text streams. 9.3 Feature extraction and data reduction. 9.4 Event detection. 9.5 Trend detection. 9.6 Event and trend descriptions. 9.7 Discussion. 9.8 Summary. 9.9 Acknowledgements.
- 10 Embedding semantics in LDA topic models. 10.1 Introduction. 10.2 Background. 10.3 Latent Dirichlet allocation. 10.4 Embedding external semantics from Wikipedia. 10.5 Data-driven semantic embedding. 10.6 Related work. 10.7 Conclusion and future work. References. Index.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Washington, D.C. : United States. National Nuclear Security Administration ; Oak Ridge, Tenn. : distributed by the Office of Scientific and Technical Information, U.S. Dept. of Energy, 2007
- Description
- Book — 9 p. : digital, PDF file.
- Summary
-
Abstract not provided.
- Online
- Washington, D.C. : United States. National Nuclear Security Administration ; Oak Ridge, Tenn. : distributed by the Office of Scientific and Technical Information, U.S. Dept. of Energy, 2008
- Description
- Book — 16 p. : digital, PDF file.
- Summary
-
Abstract not provided.
- Online
- London : Springer, 2008.
- Description
- Book — xv, 240 p. : ill. ; 25 cm.
- Summary
-
- Cluster-preserving dimension reduction methods for document classification / Peg Howland, Haesun Park
- Automatic discovery of similar words / Pierre Senellart, Vincent D. Blondel
- Principal direction divisive partitioning with kernels and k-means steering / Dimitrios Zeimpekis, Efstratios Gallopoulos
- Hybrid clustering with divergences / Jacob Kogan, Charles Nicholas, Mike Wiacek
- Text clustering with local semantic kernels / Loulwah AlSumait, Carlotta Domeniconi
- Vector space models for search and cluster mining / Mei Kobayashi, Masaki Aono
- Applications of semidefinite programming in XML document classification / Zhonghang Xia ... [et al.]
- Discussion tracking in Enron email Using PARAFAC / Brett W. Bader, Michael W. Berry, Murray Browne
- Spam filtering based on latent semantic indexing / Wilfried N. Gansterer, Andreas G.K. Janecek, Robert Neumayer
- A probabilistic model for fast and confident categorization of textual documents / Cyril Goutte
- Anomaly detection using nonnegative matrix factorization / Edward G. Allan ... [et al.]
- Document representation and quality of text : an analysis / Mostafa Keikha ... [et al.]
- Appendix: SIAM text mining competition 2007.
(source: Nielsen Book Data)
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
QA76.9 .D343 S69 2008 | Available |
17. Survey of text mining II [electronic resource] : clustering, classification, and retrieval [2008]
- New York ; London : Springer, 2008.
- Description
- Book — xv, 240 p. : ill.
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.