Cognitive social mining applications in data analytics and forensics:
"This book presents the most recent challenges and developments in 'machine learning in data analytics and forensics for cognitive social mining' from the perspective of providing awareness and its best practices for the real world"--
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)
IGI Global
[c2019]
|
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 |
Zusammenfassung: | "This book presents the most recent challenges and developments in 'machine learning in data analytics and forensics for cognitive social mining' from the perspective of providing awareness and its best practices for the real world"-- |
Beschreibung: | 25 PDFs (xxi, 326 Seiten) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781522575238 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00207834 | ||
003 | IGIG | ||
005 | 20181127155936.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 181128s2019 pau fob 001 0 eng d | ||
010 | |z 2018029253 | ||
020 | |a 9781522575238 |q eISBN | ||
020 | |z 9781522575221 |q h/c | ||
024 | 7 | |a 10.4018/978-1-5225-7522-1 |2 doi | |
035 | |a (CaBNVSL)slc20552015 | ||
035 | |a (OCoLC)1076773899 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a QA76.9.D343 |b C477 2019e | |
082 | 7 | |a 006.3/12 |2 23 | |
245 | 0 | 0 | |a Cognitive social mining applications in data analytics and forensics |c Anandakumar Haldorai and Arulmurugan Ramu, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) |b IGI Global |c [c2019] | |
300 | |a 25 PDFs (xxi, 326 Seiten) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. The potential of cognitive social mining applications in data analytics for protecting social media users for national and international security -- Chapter 2. Data mining techniques for social network analysis -- Chapter 3. Semantic-based indexing approaches for medical document clustering using cognitive search -- Chapter 4. Efficient space communication and management (SCOAM) using cognitive radio networks based on deep learning techniques: cognitive radio in space communication -- Chapter 5. Side channel attacks in cloud computing -- Chapter 6. Cognitive social mining analysis using data mining techniques -- Chapter 7. Cognitive mining for exploratory data analytics using clustering based on particle swarm optimization: cognitive mining for exploratory data analytics -- Chapter 8. A review of artificial intelligence technologies to achieve machining objectives -- Chapter 9. Data mining for social network analysis using a CLIQUE algorithm -- Chapter 10. Privacy information leakage prevention in cognitive social mining applications: causes and prevention measures -- Chapter 11. Study of efficient hybrid wireless networks using qos-oriented distributed routing protocol: qos-oriented distributed routing protocol -- Chapter 12. Machine learning techniques for healthcare applications: early autism detection using ensemble approach and breast cancer prediction using SMO and IBK -- Chapter 13. A detailed study on security concerns of VANET and cognitive radio vanets -- Chapter 14. Application of cognitive computing in healthcare -- Chapter 15. Cognitive social exchange: a case study. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book presents the most recent challenges and developments in 'machine learning in data analytics and forensics for cognitive social mining' from the perspective of providing awareness and its best practices for the real world"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | 0 | |a Description based on title screen (IGI Global, viewed 11/28/2018). | |
650 | 0 | |a Data mining. | |
650 | 0 | |a Online social networks |x Data processing. | |
653 | |a Cloud Computing. | ||
653 | |a Cognitive Computing. | ||
653 | |a Data Mining. | ||
653 | |a Healthcare. | ||
653 | |a Indexing. | ||
653 | |a Machine Learning Techniques. | ||
653 | |a Medical Document Clustering. | ||
653 | |a Real-Time Ubiquitous Social Mining Services. | ||
653 | |a Security. | ||
653 | |a Social Mining. | ||
653 | |a Social Network Analysis. | ||
653 | |a Social Platforms. | ||
700 | 1 | |a Haldorai, Anandakumar |d 1983- |e editor. | |
700 | 1 | |a Ramu, Arulmurugan |d 1985- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2018029253 | |
776 | 0 | 8 | |i Print version: |z 1522575227 |z 9781522575221 |w (DLC) 2018029253 |
966 | 4 | 0 | |l DE-862 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7522-1 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7522-1 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00207834 |
---|---|
_version_ | 1826942595496935424 |
adam_text | |
any_adam_object | |
author2 | Haldorai, Anandakumar 1983- Ramu, Arulmurugan 1985- |
author2_role | edt edt |
author2_variant | a h ah a r ar |
author_facet | Haldorai, Anandakumar 1983- Ramu, Arulmurugan 1985- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.D343 C477 2019e |
callnumber-search | QA76.9.D343 C477 2019e |
callnumber-sort | QA 276.9 D343 C477 42019E |
callnumber-subject | QA - Mathematics |
collection | ZDB-98-IGB |
contents | Chapter 1. The potential of cognitive social mining applications in data analytics for protecting social media users for national and international security -- Chapter 2. Data mining techniques for social network analysis -- Chapter 3. Semantic-based indexing approaches for medical document clustering using cognitive search -- Chapter 4. Efficient space communication and management (SCOAM) using cognitive radio networks based on deep learning techniques: cognitive radio in space communication -- Chapter 5. Side channel attacks in cloud computing -- Chapter 6. Cognitive social mining analysis using data mining techniques -- Chapter 7. Cognitive mining for exploratory data analytics using clustering based on particle swarm optimization: cognitive mining for exploratory data analytics -- Chapter 8. A review of artificial intelligence technologies to achieve machining objectives -- Chapter 9. Data mining for social network analysis using a CLIQUE algorithm -- Chapter 10. Privacy information leakage prevention in cognitive social mining applications: causes and prevention measures -- Chapter 11. Study of efficient hybrid wireless networks using qos-oriented distributed routing protocol: qos-oriented distributed routing protocol -- Chapter 12. Machine learning techniques for healthcare applications: early autism detection using ensemble approach and breast cancer prediction using SMO and IBK -- Chapter 13. A detailed study on security concerns of VANET and cognitive radio vanets -- Chapter 14. Application of cognitive computing in healthcare -- Chapter 15. Cognitive social exchange: a case study. |
ctrlnum | (CaBNVSL)slc20552015 (OCoLC)1076773899 |
dewey-full | 006.3/12 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.3/12 |
dewey-search | 006.3/12 |
dewey-sort | 16.3 212 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04077nam a2200601 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00207834</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20181127155936.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">181128s2019 pau fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2018029253</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522575238</subfield><subfield code="q">eISBN</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781522575221</subfield><subfield code="q">h/c</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-7522-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc20552015</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1076773899</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.D343</subfield><subfield code="b">C477 2019e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">006.3/12</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Cognitive social mining applications in data analytics and forensics </subfield><subfield code="c">Anandakumar Haldorai and Arulmurugan Ramu, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) </subfield><subfield code="b">IGI Global</subfield><subfield code="c">[c2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">25 PDFs (xxi, 326 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. The potential of cognitive social mining applications in data analytics for protecting social media users for national and international security -- Chapter 2. Data mining techniques for social network analysis -- Chapter 3. Semantic-based indexing approaches for medical document clustering using cognitive search -- Chapter 4. Efficient space communication and management (SCOAM) using cognitive radio networks based on deep learning techniques: cognitive radio in space communication -- Chapter 5. Side channel attacks in cloud computing -- Chapter 6. Cognitive social mining analysis using data mining techniques -- Chapter 7. Cognitive mining for exploratory data analytics using clustering based on particle swarm optimization: cognitive mining for exploratory data analytics -- Chapter 8. A review of artificial intelligence technologies to achieve machining objectives -- Chapter 9. Data mining for social network analysis using a CLIQUE algorithm -- Chapter 10. Privacy information leakage prevention in cognitive social mining applications: causes and prevention measures -- Chapter 11. Study of efficient hybrid wireless networks using qos-oriented distributed routing protocol: qos-oriented distributed routing protocol -- Chapter 12. Machine learning techniques for healthcare applications: early autism detection using ensemble approach and breast cancer prediction using SMO and IBK -- Chapter 13. A detailed study on security concerns of VANET and cognitive radio vanets -- Chapter 14. Application of cognitive computing in healthcare -- Chapter 15. Cognitive social exchange: a case study.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book presents the most recent challenges and developments in 'machine learning in data analytics and forensics for cognitive social mining' from the perspective of providing awareness and its best practices for the real world"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 11/28/2018).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data mining.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Online social networks</subfield><subfield code="x">Data processing.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cloud Computing.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cognitive Computing.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Data Mining.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Healthcare.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Indexing.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Machine Learning Techniques.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Medical Document Clustering.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Real-Time Ubiquitous Social Mining Services.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Security.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Social Mining.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Social Network Analysis.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Social Platforms.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Haldorai, Anandakumar</subfield><subfield code="d">1983-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ramu, Arulmurugan</subfield><subfield code="d">1985-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2018029253</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1522575227</subfield><subfield code="z">9781522575221</subfield><subfield code="w">(DLC) 2018029253</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7522-1</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7522-1</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00207834 |
illustrated | Not Illustrated |
indexdate | 2025-03-18T14:30:30Z |
institution | BVB |
isbn | 9781522575238 |
language | English |
oclc_num | 1076773899 |
open_access_boolean | |
owner | DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 25 PDFs (xxi, 326 Seiten) Also available in print. |
psigel | ZDB-98-IGB FWS_PDA_IGB ZDB-98-IGB |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | IGI Global |
record_format | marc |
spelling | Cognitive social mining applications in data analytics and forensics Anandakumar Haldorai and Arulmurugan Ramu, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) IGI Global [c2019] 25 PDFs (xxi, 326 Seiten) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. The potential of cognitive social mining applications in data analytics for protecting social media users for national and international security -- Chapter 2. Data mining techniques for social network analysis -- Chapter 3. Semantic-based indexing approaches for medical document clustering using cognitive search -- Chapter 4. Efficient space communication and management (SCOAM) using cognitive radio networks based on deep learning techniques: cognitive radio in space communication -- Chapter 5. Side channel attacks in cloud computing -- Chapter 6. Cognitive social mining analysis using data mining techniques -- Chapter 7. Cognitive mining for exploratory data analytics using clustering based on particle swarm optimization: cognitive mining for exploratory data analytics -- Chapter 8. A review of artificial intelligence technologies to achieve machining objectives -- Chapter 9. Data mining for social network analysis using a CLIQUE algorithm -- Chapter 10. Privacy information leakage prevention in cognitive social mining applications: causes and prevention measures -- Chapter 11. Study of efficient hybrid wireless networks using qos-oriented distributed routing protocol: qos-oriented distributed routing protocol -- Chapter 12. Machine learning techniques for healthcare applications: early autism detection using ensemble approach and breast cancer prediction using SMO and IBK -- Chapter 13. A detailed study on security concerns of VANET and cognitive radio vanets -- Chapter 14. Application of cognitive computing in healthcare -- Chapter 15. Cognitive social exchange: a case study. Restricted to subscribers or individual electronic text purchasers. "This book presents the most recent challenges and developments in 'machine learning in data analytics and forensics for cognitive social mining' from the perspective of providing awareness and its best practices for the real world"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 11/28/2018). Data mining. Online social networks Data processing. Cloud Computing. Cognitive Computing. Data Mining. Healthcare. Indexing. Machine Learning Techniques. Medical Document Clustering. Real-Time Ubiquitous Social Mining Services. Security. Social Mining. Social Network Analysis. Social Platforms. Haldorai, Anandakumar 1983- editor. Ramu, Arulmurugan 1985- editor. IGI Global, publisher. (Original) (DLC)2018029253 Print version: 1522575227 9781522575221 (DLC) 2018029253 |
spellingShingle | Cognitive social mining applications in data analytics and forensics Chapter 1. The potential of cognitive social mining applications in data analytics for protecting social media users for national and international security -- Chapter 2. Data mining techniques for social network analysis -- Chapter 3. Semantic-based indexing approaches for medical document clustering using cognitive search -- Chapter 4. Efficient space communication and management (SCOAM) using cognitive radio networks based on deep learning techniques: cognitive radio in space communication -- Chapter 5. Side channel attacks in cloud computing -- Chapter 6. Cognitive social mining analysis using data mining techniques -- Chapter 7. Cognitive mining for exploratory data analytics using clustering based on particle swarm optimization: cognitive mining for exploratory data analytics -- Chapter 8. A review of artificial intelligence technologies to achieve machining objectives -- Chapter 9. Data mining for social network analysis using a CLIQUE algorithm -- Chapter 10. Privacy information leakage prevention in cognitive social mining applications: causes and prevention measures -- Chapter 11. Study of efficient hybrid wireless networks using qos-oriented distributed routing protocol: qos-oriented distributed routing protocol -- Chapter 12. Machine learning techniques for healthcare applications: early autism detection using ensemble approach and breast cancer prediction using SMO and IBK -- Chapter 13. A detailed study on security concerns of VANET and cognitive radio vanets -- Chapter 14. Application of cognitive computing in healthcare -- Chapter 15. Cognitive social exchange: a case study. Data mining. Online social networks Data processing. |
title | Cognitive social mining applications in data analytics and forensics |
title_auth | Cognitive social mining applications in data analytics and forensics |
title_exact_search | Cognitive social mining applications in data analytics and forensics |
title_full | Cognitive social mining applications in data analytics and forensics Anandakumar Haldorai and Arulmurugan Ramu, editors. |
title_fullStr | Cognitive social mining applications in data analytics and forensics Anandakumar Haldorai and Arulmurugan Ramu, editors. |
title_full_unstemmed | Cognitive social mining applications in data analytics and forensics Anandakumar Haldorai and Arulmurugan Ramu, editors. |
title_short | Cognitive social mining applications in data analytics and forensics |
title_sort | cognitive social mining applications in data analytics and forensics |
topic | Data mining. Online social networks Data processing. |
topic_facet | Data mining. Online social networks Data processing. |
work_keys_str_mv | AT haldoraianandakumar cognitivesocialminingapplicationsindataanalyticsandforensics AT ramuarulmurugan cognitivesocialminingapplicationsindataanalyticsandforensics AT igiglobal cognitivesocialminingapplicationsindataanalyticsandforensics |