1 - 20
Next
- Qamar, Usman, author.
- Second edition. - Cham : Springer, 2023.
- Description
- Book — 1 online resource : illustrations (black and white).
- Summary
-
- 1. Introduction
- 2. Applications of Data Science
- 3. Widely Used Techniques in Data Science Applications
- 4. Data Preprocessing
- 5. Classification
- 6. Clustering
- 7. Text Mining
- 8. Deep Learning
- 9. Frequent Pattern Mining
- 10. Regression Analysis
- 11. Data Science Programming Language
- 12. Practical Data Science with WEKA.
2. Democratizing analytics [2023]
- Burroughs, Melissa, author.
- [First edition]. - Sebastopol, CA : O'Reilly Media, Inc., [2023]
- Description
- Book — 1 online resource (46 pages)
- Summary
-
Today, enterprises have more data at their disposal than ever before. Yet relatively few companies can quickly and efficiently get data to the people who need it for critical insights and important decisions. In this insightful report, David Sweenor and Melissa Burroughs from Alteryx explain analytic democratization, a strategy that leading organizations are now using to manage data access, analytics platforms, and data-driven decision-making. By democratizing analytics, you can enable all people within your business to create and leverage data-driven insights quickly and effectively. This self-service approach frees IT and data science personnel to focus on high-value initiatives. You'll learn how empowering knowledge workers with analytic access will benefit your business through optimized processes, faster translation of needs into solutions, and greater innovation.
- Moses, Barr, author.
- First edition. - Sebastopol, CA : O'Reilly media, 2022.
- Description
- Book — 1 online resource (xvi, 288 pages)
- Summary
-
Do your product dashboards look funky? Are your quarterly reports stale? Is the dataset you're using broken or just plain wrong? These problems affect almost every team, yet they're usually addressed on an ad hoc basis and in a reactive manner. If you answered yes to any of the questions above, this book is for you. Many data engineering teams today face the "good pipelines, bad data" problem. It doesn't matter how advanced your data infrastructure is if the data you're piping is bad. In this book, Barr Moses, Lior Gavish, and Molly Vorwerck from the data reliability company Monte Carlo explain how to tackle data quality and trust at scale by leveraging best practices and technologies used by some of the world's most innovative companies. Build more trustworthy and reliable data pipelines Write scripts to make data checks and identify broken pipelines with data observability Program your own data quality monitors from scratch Develop and lead data quality initiatives at your company Generate a dashboard to highlight your company's key data assets Automate data lineage graphs across your data ecosystem Build anomaly detectors for your critical data assets.
(source: Nielsen Book Data)
- Ye, Chen, 1985-
- Singapore : Springer, 2022.
- Description
- Book — 1 online resource (91 pages)
- Summary
-
- Chapter 1 Introduction
- 1.1 Knowledge Discovery
- 1.2 Main Challenges
- 1.3 Book Overview
- Chapter 2 Functional-dependency-based truth discovery for isomorphic data
- 2.1 Handling independent constraints
- 2.2 Handling inter-related constraints
- 2.3 Inter-source data aggregation
- 2.4 Update source weights
- Chapter 3 Denial-constraint-based truth discovery for isomorphic data
- Describe the truth discovery strategies for isomorphic data based on denial constraints
- 4.1 Denial constraint transformation
- 4.2 Optimized solution
- 4.3 Scalable strategies
- Chapter 4 Pattern discovery for heterogeneous data
- 4.1 Problem definition for multi-source heterogeneous data
- 4.2 Optimization framework
- 4.3 PatternFinder algorithm
- 4.4 The optimized grouping strategy
- Chapter 5 Deep fact discovery for text data
- 5.1 Fact extraction via mining patterns
- 5.2 The CNN-LSTM architecture
- 5.3 The fact encoder and pattern embedding
- 5.4 Training and inference.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Charlotte, NC : Information Age Publishing, Incorporated, [2021]
- Description
- Book — 1 online resource (166 p.).
6. Data science and multiple criteria decision making approaches in finance : applications and methods [2021]
- Silahtaroğlu, Gökhan, 1967- author.
- Cham, Switzerland : Springer, [2021]
- Description
- Book — xvi, 173 pages ; 25 cm
- Summary
-
- 1. Introduction to Data Science and Machine Learning Algorithms.-
- 2. Identifying Indicators of Global Financial Crisis with Fuzzy Logic and Data Science: A Comparative Analysis between Developing and Developed Economies.-
- 3. Determining the Ways to Increase Economic Growth of Developing and Developed Economies: An Application with Data Mining and Fuzzy TOPSIS.-
- 4. Profitability Prediction of Turkish Banking Industry: A Comparative Analysis with Data Science and Fuzzy ANP.-
- 5. The Influence of the Politicians on Macroeconomic Performance: An Analysis of Donald Trump's Tweets.-
- 6. How is the Stock Exchange Index Affected by the Disclosures of Politicians?.-
- 7. Defining the Significant Factors of Currency Exchange Rate Risk by Considering Text Mining and Fuzzy AHP.-
- 8. Emerging Applications and the Future of Data Science.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Online
Business Library
Business Library | Status |
---|---|
Stacks | Request (opens in new tab) |
HD30.23 .S55 2021 | Unknown |
- Cady, Field, 1984- author.
- Hoboken, NJ : John Wiley, 2021.
- Description
- Book — 1 online resource (xii, 186 pages)
- Summary
-
- Introduction
- Chapter 1: The Business Side of Data Science
- Chapter 2: Working with Modern Data
- Chapter 3: Telling the Story, Summarizing the Data
- Chapter 4: Machine Learning
- Chapter 5: Knowing the Tools
- Chapter 6: Deep Learning and Artificial Intelligence Postscript Index.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Munro, Rob, author.
- 1st edition. - Manning Publications, 2021.
- Description
- Book — 1 online resource (424 pages) Digital: text file.
- Summary
-
Human-in-the-Loop Machine Learning lays out methods for humans and machines to work together effectively. You'll find best practices on selecting sample data for human feedback, quality control for human annotations, and designing annotation interfaces. You'll learn to create training data for labeling, object detection, and semantic segmentation, sequence labeling, and more. The book starts with the basics and progresses to advanced techniques like transfer learning and self-supervision within annotation workflows.
- Campesato, Oswald author.
- Dulles : Mercury Learning and Information, 2021.
- Description
- Book — 1 online resource
- Online
- Smith, Gary, author.
- First edition - Oxford ; New York, NY : Oxford University Press, 2020
- Description
- Book — 1 online resource
- Summary
-
- 1: Survival of the Sweaty Patter-Processors
- 2: Predicting What is Predictable
- 3: Duped and Deceived
- 4: Fooled Again and Again
- 5: The Paradox of Big Data
- 6: Fruitless Searches
- 7: The Reproducibility Crisis
- 8: Who Stepped In It?
- 9: Seeing Things for What They Are.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Michel, René.
- Cham : Springer, 2019.
- Description
- Book — 1 online resource (373 pages)
- Summary
-
- List of Symbols.- List of Figures.- List of Tables.- Introduction.- The Traditional Approach: Gross Scoring.- Basic Net Scoring Methods: The Uplift Approach.- Validation of Net Models: Measuring Stability and Discriminatory Power.- Supplementary Methods for Variable Transformation and Selection.- A Simulation Framework for the Validation of Research Hypotheses on Net Scoring.- Software Implementations.- Data Prerequisites.- Practical Issues and Business Cases.- Summary and Outlook.- Appendix.- Other Literature on Net Scoring.- Index.-.
- (source: Nielsen Book Data)
- 4.2.3 Model Stability Rank Correlation4.3 Discriminatory Power; 4.3.1 Qini; 4.3.2 AUnROC; 4.3.3 A Significance-Based Measure; 4.4 Model Validation and Adjustment Over Time; References; 5 Supplementary Methods for Variable Transformation and Selection; 5.1 Variable Transformation; 5.1.1 Binning Methods; 5.1.2 Transformation of Categorical to Numerical Variables; 5.2 Variable Preselection; 5.2.1 Summary of Preselection Methods; 5.2.1.1 Net Scoring with Just One Layer of a Decision Tree Procedure; 5.2.1.2 χ2net, 2 Statistic with More Than Two Values; 5.2.1.3 χ2 Statistic with Uplift Impact
(source: Nielsen Book Data)
- Berlin, Germany : Springer, 2019.
- Description
- Book — 1 online resource (ix, 135 pages) : illustrations (some color)
- Summary
-
- Privacy-Preserving Top-k Query Processing in Distributed Systems.- Trust Factors and Insider Threats in Permissioned Distributed Ledgers - An Analytical Study and Evaluation of Popular DLT Frameworks.- Polystore and Tensor Data Model for Logical Data Independence and Impedance Mismatch in Big Data Analytics.- A General Framework for Multiple Choice Question Answering Based on Mutual Information and Reinforced Co-occurrence.- Rejig: A Scalable Online Algorithm for Cache Server Configuration Changes.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- D. Miller, James.
- 3rd ed. - Birmingham : Packt Publishing, 2018.
- Description
- Book — 1 online resource (566 pages)
- Summary
-
- Table of Contents The Splunk 7 Interface Understanding Search Tables, Charts and Fields Data Models and Pivots Simple XML Dashboards Advanced Search Examples Extending Search Working with Apps Building Advanced Dashboards Summary Indexes and CSV Files Configuring Splunk Advanced Deployments Extending Splunk Machine Learning Toolkit.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
14. Network data mining and analysis [2018]
- Gao, Ming (Data analyst), author.
- New Jersey : World Scientific, [2018]
- Description
- Book — 1 online resource.
- Summary
-
Online social networking sites like Facebook, LinkedIn, and Twitter, offer millions of members the opportunity to befriend one another, send messages to each other, and post content on the site - actions which generate mind-boggling amounts of data every day.To make sense of the massive data from these sites, we resort to social media mining to answer questions like the following:Social media shatters the boundaries between the real world and the virtual world. We can now integrate social theories with computational methods to study how individuals interact with each other and how social communities form in bipartite and signed networks. The uniqueness of social media data calls for novel data mining techniques that can effectively handle user generated content with rich social relations. The study and development of these new techniques are under the purview of social media mining, an emerging discipline under the umbrella of data mining. Social Media Mining is the process of representing, analyzing, and extracting actionable patterns from social media data.
(source: Nielsen Book Data)
15. Data mining : a tutorial-based primer [2017]
- Roiger, Richard J., author.
- Boca Raton : Taylor & Francis, CRC Press, [2017]
- Description
- Book — 1 online resource
- Summary
-
- Data Mining Fundamentals
- Data Mining: A First View DATA SCIENCE, ANALYTICS, MINING, AND KNOWLEDGE DISCOVERY IN DATABASES WHAT CAN COMPUTERS LEARN? IS DATA MINING APPROPRIATE FOR MY PROBLEM? DATA MINING OR KNOWLEDGE ENGINEERING? A NEAREST NEIGHBOR APPROACH DATA MINING, BIG DATA, AND CLOUD COMPUTING DATA MINING ETHICS INTRINSIC VALUE AND CUSTOMER CHURN CHAPTER SUMMARY KEY TERMS
- Data Mining: A Closer Look DATA MINING STRATEGIES SUPERVISED DATA MINING TECHNIQUES ASSOCIATION RULES CLUSTERING TECHNIQUES EVALUATING PERFORMANCE CHAPTER SUMMARY KEY TERMS
- Basic Data Mining Techniques CHAPTER OBJECTIVES DECISION TREES A BASIC COVERING RULE ALGORITHM GENERATING ASSOCIATION RULES THE K-MEANS ALGORITHM GENETIC LEARNING CHOOSING A DATA MINING TECHNIQUE CHAPTER SUMMARY KEY TERMS
- Tools for Knowledge Discovery
- Weka-An Environment for Knowledge Discovery GETTING STARTED WITH WEKA BUILDING DECISION TREES GENERATING PRODUCTION RULES WITH PART ATTRIBUTE SELECTION AND NEAREST NEIGHBOR CLASSIFICATION ASSOCIATION RULES COST/BENEFIT ANALYSIS UNSUPERVISED CLUSTERING WITH THE K-MEANS ALGORITHM CHAPTER SUMMARY
- Knowledge Discovery with RapidMiner GETTING STARTED WITH RAPIDMINER BUILDING DECISION TREES GENERATING RULES ASSOCIATION RULE LEARNING UNSUPERVISED CLUSTERING WITH K-MEANS ATTRIBUTE SELECTION AND NEAREST NEIGHBOR CLASSIFICATION CHAPTER SUMMARY
- The Knowledge Discovery Process A PROCESS MODEL FOR KNOWLEDGE DISCOVERY GOAL IDENTIFICATION 2016.3 CREATING A TARGET DATA SET DATA PREPROCESSING DATA TRANSFORMATION DATA MINING INTERPRETATION AND EVALUATION TAKING ACTION THE CRISP-DM PROCESS MODEL CHAPTER SUMMARY KEY TERMS
- Formal Evaluation Techniques WHAT SHOULD BE EVALUATED? TOOLS FOR EVALUATION COMPUTING TEST SET CONFIDENCE INTERVALS COMPARING SUPERVISED LEARNER MODELS UNSUPERVISED EVALUATION TECHNIQUES EVALUATING SUPERVISED MODELS WITH NUMERIC OUTPUT COMPARING MODELS WITH RAPIDMINER ATTRIBUTE EVALUATION FOR MIXED DATA TYPES PARETO LIFT CHARTS CHAPTER SUMMARY KEY TERMS
- Building Neural Networks
- Neural Networks FEED-FORWARD NEURAL NETWORKS NEURAL NETWORK TRAINING: A CONCEPTUAL VIEW NEURAL NETWORK EXPLANATION GENERAL CONSIDERATIONS NEURAL NETWORK TRAINING: A DETAILED VIEW CHAPTER SUMMARY KEY TERMS
- Building Neural Networks with Weka DATA SETS FOR BACKPROPAGATION LEARNING MODELING THE EXCLUSIVE-OR FUNCTION: NUMERIC OUTPUT MODELING THE EXCLUSIVE-OR FUNCTION: CATEGORICAL OUTPUT MINING SATELLITE IMAGE DATA UNSUPERVISED NEURAL NET CLUSTERING CHAPTER SUMMARY KEY TERMS
- Building Neural Networks with RapidMiner MODELING THE EXCLUSIVE-OR FUNCTION MINING SATELLITE IMAGE DATA PREDICTING CUSTOMER CHURN RAPIDMINER'S SELF-ORGANIZING MAP OPERATOR CHAPTER SUMMARY
- Advanced Data Mining Techniques
- Supervised Statistical Techniques BAYES CLASSIFIER SUPPORT VECTOR MACHINES LINEAR REGRESSION ANALYSIS REGRESSION TREES LOGISTIC REGRESSION CHAPTER SUMMARY KEY TERMS
- Unsupervised Clustering Techniques AGGLOMERATIVE CLUSTERING CONCEPTUAL CLUSTERING EXPECTATION MAXIMIZATION GENETIC ALGORITHMS AND UNSUPERVISED CLUSTERING CHAPTER SUMMARY KEY TERMS
- Specialized Techniques TIME-SERIES ANALYSIS MINING THE WEB MINING TEXTUAL DATA TECHNIQUES FOR LARGE-SIZED, IMBALANCED, AND STREAMING DATA ENSEMBLE TECHNIQUES FOR IMPROVING PERFORMANCE CHAPTER SUMMARY KEY TERMS
- The Data Warehouse OPERATIONAL DATABASES DATA WAREHOUSE DESIGN ONLINE ANALYTICAL PROCESSING EXCEL PIVOT TABLES FOR DATA ANALYTICS CHAPTER SUMMARY KEY TERMS.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
16. Event mining : algorithms and applications [2016]
- Boca Raton, Florida : CRC Press, [2016]
- Description
- Book — 1 online resource
- Summary
-
- 1. Event generation and system monitoring
- 2. Pattern discovery and summarization
- 3. Applications
17. Event mining : algorithms and applications [2016]
- Boca Raton, Florida : CRC Press, [2016]
- Description
- Book — 1 online resource : text file, PDF.
- Summary
-
- Introduction Tao Li Data-Driven System Management Overview of the Book Content of the Book Conclusion
- Event Generation and System Monitoring Event Generation: From Logs to Events Liang Tang and Tao Li Chapter Overview Log Parser Log Message Classification Log Message Clustering Tree Structure-Based Clustering Message Signature-Based Event Generation Summary
- Optimizing System Monitoring Configurations Liang Tang and Tao Li Chapter Overview Automatic Monitoring Eliminating False Positive Eliminating False Negative Evaluation Summary
- Pattern Discovery and Summarization Event Pattern Mining Chunqiu Zeng and Tao Li Introduction Sequential Pattern Fully Dependent Pattern Partially Periodic Dependent Pattern Mutually Dependent Pattern T-Pattern Frequent Episode Event Burst Rare Event Correlated Pattern between Time Series and Event A Case Study Conclusion
- Mining Time Lags Chunqiu Zeng, Liang Tang, and Tao Li Introduction Nonparametric Method Parametric Method Empirical Studies Summary
- Log Event Summarization Yexi Jiang and Tao Li Introduction Summarizing with Frequency Changing Summarizing with Temporal Dynamics Facilitating the Summarization Tasks Summary
- Applications Data-Driven Applications in System Management Wubai Zhou, Chunqiu Zeng, Liang Tang, and Tao Li System Diagnosis Searching Similar Sequential Textual Event Segments Hierarchical Multi-Label Ticket Classification Tickets Resolution Recommendation Summary
- Social Media Event Summarization Using Twitter Streams Chao Shen and Tao Li Introduction Problem Formulation Tweet Context Analysis Sub-Event Detection Methods Multi-Tweet Summarization Experiments Conclusion and Future Work
- A Glossary appears at the end of each chapter.
- (source: Nielsen Book Data)
- Introduction. Event Generation and System Monitoring. Pattern Discovery and Summarization. Applications.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
Event mining encompasses techniques for automatically and efficiently extracting valuable knowledge from historical event/log data. The field, therefore, plays an important role in data-driven system management. Event Mining: Algorithms and Applications presents state-of-the-art event mining approaches and applications with a focus on computing sys.
(source: Nielsen Book Data)
- Boca Raton, Florida : CRC Press, [2015]
- Description
- Book — 1 online resource
- Summary
-
- Introduction to Reinforcement Learning. Model-Free Policy Iteration. Policy Iteration with Value Function Approximation. Basis Design for Value Function Approximation. Sample Reuse in Policy Iteration. Active Learning in Policy Iteration. Robust Policy Iteration. Model-Free Policy Search. Direct Policy Search by Gradient Ascent. Direct Policy Search by Expectation-Maximization. Policy-Prior Search. Model-Based Reinforcement Learning. Transition Model Estimation. Dimensionality Reduction for Transition Model Estimation.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Boca Raton, Florida : CRC Press, [2015]
- Description
- Book — 1 online resource : text file, PDF
- Summary
-
- Introduction
- Kweku-Muata Osei-Bryson and Corlane Barclay Overview on Knowledge Discovery via Data Mining Process Models
- Sumana Sharma An Integrated Knowledge Discovery and Data Mining Process Model
- Sumana Sharma and Kweku-Muata Osei-Bryson A Method for Formulating the Business Objectives of Data Mining Projects
- Sumana Sharma and Kweku-Muata Osei-Bryson The Application of the Business Understanding Phase of the CRISP-DM Approach to a Knowledge Discovery Project on Education
- Corlane Barclay A Context-Aware Framework for Supporting the Evaluation of Data Mining Results
- Kweku-Muata Osei-Bryson Issues and Considerations in the Application of Data Mining in Business
- Edward Chen The Importance of Data Quality Assurance to the Data Analysis Activities of the Data Mining Process
- Patricia E. Nalwoga Lutu Critical Success Factors in Knowledge Discovery and Data Mining Projects
- Corlane Barclay Data Mining in Organizations: Opportunities and Challenges for Small Developing States
- Corlane Barclay Determining Sources of Relative Inefficiency in Heterogeneous Samples Using Multiple Data Analytic Techniques
- Sergey Samoilenko and Kweku-Muata Osei-Bryson Applications of Data Mining in Organizational Behavior
- Arash Shahin and Reza Salehzadeh Decision Making and Decision Styles of Project Managers: A Preliminary Exploration Using Data Mining Techniques
- Kweku-Muata Osei-Bryson and Corlane Barclay The Application of the CRISP-DM Process in Predicting High School Students' Examination (CSEC/CXC) Performance
- Corlane Barclay, Andrew Dennis, and Jerome Shepherd Post-Pruning in Decision Tree Induction Using Multiple Performance Measures
- Kweku-Muata Osei-Bryson Selecting Classifiers for an Ensemble-An Integrated Ensemble Generation Procedure
- Kweku-Muata Osei-Bryson A New Feature Selection Technique Applied to Credit Scoring Data Using a Rank Aggregation Approach Based on Optimization, Genetic Algorithm, and Similarity
- Bouaguel Waad, Bel Mufti Ghazi, and Limam Mohamed.
- (source: Nielsen Book Data)
- Introduction to Reinforcement Learning. Model-Free Policy Iteration. Policy Iteration with Value Function Approximation. Basis Design for Value Function Approximation. Sample Reuse in Policy Iteration. Active Learning in Policy Iteration. Robust Policy Iteration. Model-Free Policy Search. Direct Policy Search by Gradient Ascent. Direct Policy Search by Expectation-Maximization. Policy-Prior Search. Model-Based Reinforcement Learning. Transition Model Estimation. Dimensionality Reduction for Transition Model Estimation.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
Although the terms "data mining" and "knowledge discovery and data mining" (KDDM) are sometimes used interchangeably, data mining is actually just one step in the KDDM process. Data mining is the process of extracting useful information from data, while KDDM is the coordinated process of understanding the business and mining the data in order to id.
(source: Nielsen Book Data)
- Boca Raton : CRC Press, [2014]
- Description
- Book — 1 online resource
- Summary
-
- 1. Introduction to data mining and RapidMiner
- 2. Basic classification use cases for credit approval and in education
- 3. Marketing, cross-selling, and recommender system use cases
- 4. Clustering in medical and educational domains
- 5. Text mining : spam detection, language detection, and customer feedback analysis
- 6. Feature selection and classification in astroparticle physics and in medical domains
- 7. Molecular structure- and property-activity relationship modeling in biochemistry and medicine
- 8. Image mining : feature extraction, segmentation, and classification
- 9. Anomaly detection, instance selection, and prototype construction
- 10. Meta-learning, automated learner selection, feature selection, and parameter optimization
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.