Cognitive social mining applications in data analytics and forensics:
"This book presents the most recent challenges and developments in 'machine learning in data analytics and forensics for cognitive social mining' from the perspective of providing awareness and its best practices for the real world"--
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
[2019]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book presents the most recent challenges and developments in 'machine learning in data analytics and forensics for cognitive social mining' from the perspective of providing awareness and its best practices for the real world"-- |
Beschreibung: | 25 PDFs (xxi, 326 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781522575238 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00207834 | ||
003 | IGIG | ||
005 | 20181127155936.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 181128s2019 pau fob 001 0 eng d | ||
010 | |z 2018029253 | ||
020 | |a 9781522575238 |q eISBN | ||
020 | |z 9781522575221 |q h/c | ||
024 | 7 | |a 10.4018/978-1-5225-7522-1 |2 doi | |
035 | |a (CaBNVSL)slc20552015 | ||
035 | |a (OCoLC)1076773899 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a QA76.9.D343 |b C477 2019e | |
082 | 7 | |a 006.3/12 |2 23 | |
245 | 0 | 0 | |a Cognitive social mining applications in data analytics and forensics |c Anandakumar Haldorai and Arulmurugan Ramu, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c [2019] | |
300 | |a 25 PDFs (xxi, 326 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. The potential of cognitive social mining applications in data analytics for protecting social media users for national and international security -- Chapter 2. Data mining techniques for social network analysis -- Chapter 3. Semantic-based indexing approaches for medical document clustering using cognitive search -- Chapter 4. Efficient space communication and management (SCOAM) using cognitive radio networks based on deep learning techniques: cognitive radio in space communication -- Chapter 5. Side channel attacks in cloud computing -- Chapter 6. Cognitive social mining analysis using data mining techniques -- Chapter 7. Cognitive mining for exploratory data analytics using clustering based on particle swarm optimization: cognitive mining for exploratory data analytics -- Chapter 8. A review of artificial intelligence technologies to achieve machining objectives -- Chapter 9. Data mining for social network analysis using a CLIQUE algorithm -- Chapter 10. Privacy information leakage prevention in cognitive social mining applications: causes and prevention measures -- Chapter 11. Study of efficient hybrid wireless networks using qos-oriented distributed routing protocol: qos-oriented distributed routing protocol -- Chapter 12. Machine learning techniques for healthcare applications: early autism detection using ensemble approach and breast cancer prediction using SMO and IBK -- Chapter 13. A detailed study on security concerns of VANET and cognitive radio vanets -- Chapter 14. Application of cognitive computing in healthcare -- Chapter 15. Cognitive social exchange: a case study. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book presents the most recent challenges and developments in 'machine learning in data analytics and forensics for cognitive social mining' from the perspective of providing awareness and its best practices for the real world"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 11/28/2018). | ||
650 | 0 | |a Data mining. | |
650 | 0 | |a Online social networks |x Data processing. | |
700 | 1 | |a Haldorai, Anandakumar |d 1983- |e editor. | |
700 | 1 | |a Ramu, Arulmurugan |d 1985- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2018029253 | |
776 | 0 | 8 | |i Print version: |z 1522575227 |z 9781522575221 |w (DLC) 2018029253 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7522-1 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00207834 |
---|---|
_version_ | 1816797080961679360 |
adam_text | |
any_adam_object | |
author2 | Haldorai, Anandakumar 1983- Ramu, Arulmurugan 1985- |
author2_role | edt edt |
author2_variant | a h ah a r ar |
author_facet | Haldorai, Anandakumar 1983- Ramu, Arulmurugan 1985- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.D343 C477 2019e |
callnumber-search | QA76.9.D343 C477 2019e |
callnumber-sort | QA 276.9 D343 C477 42019E |
callnumber-subject | QA - Mathematics |
collection | ZDB-98-IGB |
contents | Chapter 1. The potential of cognitive social mining applications in data analytics for protecting social media users for national and international security -- Chapter 2. Data mining techniques for social network analysis -- Chapter 3. Semantic-based indexing approaches for medical document clustering using cognitive search -- Chapter 4. Efficient space communication and management (SCOAM) using cognitive radio networks based on deep learning techniques: cognitive radio in space communication -- Chapter 5. Side channel attacks in cloud computing -- Chapter 6. Cognitive social mining analysis using data mining techniques -- Chapter 7. Cognitive mining for exploratory data analytics using clustering based on particle swarm optimization: cognitive mining for exploratory data analytics -- Chapter 8. A review of artificial intelligence technologies to achieve machining objectives -- Chapter 9. Data mining for social network analysis using a CLIQUE algorithm -- Chapter 10. Privacy information leakage prevention in cognitive social mining applications: causes and prevention measures -- Chapter 11. Study of efficient hybrid wireless networks using qos-oriented distributed routing protocol: qos-oriented distributed routing protocol -- Chapter 12. Machine learning techniques for healthcare applications: early autism detection using ensemble approach and breast cancer prediction using SMO and IBK -- Chapter 13. A detailed study on security concerns of VANET and cognitive radio vanets -- Chapter 14. Application of cognitive computing in healthcare -- Chapter 15. Cognitive social exchange: a case study. |
ctrlnum | (CaBNVSL)slc20552015 (OCoLC)1076773899 |
dewey-full | 006.3/12 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.3/12 |
dewey-search | 006.3/12 |
dewey-sort | 16.3 212 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03641nam a2200457 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00207834</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20181127155936.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">181128s2019 pau fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2018029253</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522575238</subfield><subfield code="q">eISBN</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781522575221</subfield><subfield code="q">h/c</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-7522-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc20552015</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1076773899</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.D343</subfield><subfield code="b">C477 2019e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">006.3/12</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Cognitive social mining applications in data analytics and forensics </subfield><subfield code="c">Anandakumar Haldorai and Arulmurugan Ramu, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">25 PDFs (xxi, 326 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. The potential of cognitive social mining applications in data analytics for protecting social media users for national and international security -- Chapter 2. Data mining techniques for social network analysis -- Chapter 3. Semantic-based indexing approaches for medical document clustering using cognitive search -- Chapter 4. Efficient space communication and management (SCOAM) using cognitive radio networks based on deep learning techniques: cognitive radio in space communication -- Chapter 5. Side channel attacks in cloud computing -- Chapter 6. Cognitive social mining analysis using data mining techniques -- Chapter 7. Cognitive mining for exploratory data analytics using clustering based on particle swarm optimization: cognitive mining for exploratory data analytics -- Chapter 8. A review of artificial intelligence technologies to achieve machining objectives -- Chapter 9. Data mining for social network analysis using a CLIQUE algorithm -- Chapter 10. Privacy information leakage prevention in cognitive social mining applications: causes and prevention measures -- Chapter 11. Study of efficient hybrid wireless networks using qos-oriented distributed routing protocol: qos-oriented distributed routing protocol -- Chapter 12. Machine learning techniques for healthcare applications: early autism detection using ensemble approach and breast cancer prediction using SMO and IBK -- Chapter 13. A detailed study on security concerns of VANET and cognitive radio vanets -- Chapter 14. Application of cognitive computing in healthcare -- Chapter 15. Cognitive social exchange: a case study.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book presents the most recent challenges and developments in 'machine learning in data analytics and forensics for cognitive social mining' from the perspective of providing awareness and its best practices for the real world"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 11/28/2018).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data mining.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Online social networks</subfield><subfield code="x">Data processing.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Haldorai, Anandakumar</subfield><subfield code="d">1983-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ramu, Arulmurugan</subfield><subfield code="d">1985-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2018029253</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1522575227</subfield><subfield code="z">9781522575221</subfield><subfield code="w">(DLC) 2018029253</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7522-1</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00207834 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:51:54Z |
institution | BVB |
isbn | 9781522575238 |
language | English |
oclc_num | 1076773899 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 25 PDFs (xxi, 326 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | IGI Global, |
record_format | marc |
spelling | Cognitive social mining applications in data analytics and forensics Anandakumar Haldorai and Arulmurugan Ramu, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, [2019] 25 PDFs (xxi, 326 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. The potential of cognitive social mining applications in data analytics for protecting social media users for national and international security -- Chapter 2. Data mining techniques for social network analysis -- Chapter 3. Semantic-based indexing approaches for medical document clustering using cognitive search -- Chapter 4. Efficient space communication and management (SCOAM) using cognitive radio networks based on deep learning techniques: cognitive radio in space communication -- Chapter 5. Side channel attacks in cloud computing -- Chapter 6. Cognitive social mining analysis using data mining techniques -- Chapter 7. Cognitive mining for exploratory data analytics using clustering based on particle swarm optimization: cognitive mining for exploratory data analytics -- Chapter 8. A review of artificial intelligence technologies to achieve machining objectives -- Chapter 9. Data mining for social network analysis using a CLIQUE algorithm -- Chapter 10. Privacy information leakage prevention in cognitive social mining applications: causes and prevention measures -- Chapter 11. Study of efficient hybrid wireless networks using qos-oriented distributed routing protocol: qos-oriented distributed routing protocol -- Chapter 12. Machine learning techniques for healthcare applications: early autism detection using ensemble approach and breast cancer prediction using SMO and IBK -- Chapter 13. A detailed study on security concerns of VANET and cognitive radio vanets -- Chapter 14. Application of cognitive computing in healthcare -- Chapter 15. Cognitive social exchange: a case study. Restricted to subscribers or individual electronic text purchasers. "This book presents the most recent challenges and developments in 'machine learning in data analytics and forensics for cognitive social mining' from the perspective of providing awareness and its best practices for the real world"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 11/28/2018). Data mining. Online social networks Data processing. Haldorai, Anandakumar 1983- editor. Ramu, Arulmurugan 1985- editor. IGI Global, publisher. (Original) (DLC)2018029253 Print version: 1522575227 9781522575221 (DLC) 2018029253 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7522-1 Volltext |
spellingShingle | Cognitive social mining applications in data analytics and forensics Chapter 1. The potential of cognitive social mining applications in data analytics for protecting social media users for national and international security -- Chapter 2. Data mining techniques for social network analysis -- Chapter 3. Semantic-based indexing approaches for medical document clustering using cognitive search -- Chapter 4. Efficient space communication and management (SCOAM) using cognitive radio networks based on deep learning techniques: cognitive radio in space communication -- Chapter 5. Side channel attacks in cloud computing -- Chapter 6. Cognitive social mining analysis using data mining techniques -- Chapter 7. Cognitive mining for exploratory data analytics using clustering based on particle swarm optimization: cognitive mining for exploratory data analytics -- Chapter 8. A review of artificial intelligence technologies to achieve machining objectives -- Chapter 9. Data mining for social network analysis using a CLIQUE algorithm -- Chapter 10. Privacy information leakage prevention in cognitive social mining applications: causes and prevention measures -- Chapter 11. Study of efficient hybrid wireless networks using qos-oriented distributed routing protocol: qos-oriented distributed routing protocol -- Chapter 12. Machine learning techniques for healthcare applications: early autism detection using ensemble approach and breast cancer prediction using SMO and IBK -- Chapter 13. A detailed study on security concerns of VANET and cognitive radio vanets -- Chapter 14. Application of cognitive computing in healthcare -- Chapter 15. Cognitive social exchange: a case study. Data mining. Online social networks Data processing. |
title | Cognitive social mining applications in data analytics and forensics |
title_auth | Cognitive social mining applications in data analytics and forensics |
title_exact_search | Cognitive social mining applications in data analytics and forensics |
title_full | Cognitive social mining applications in data analytics and forensics Anandakumar Haldorai and Arulmurugan Ramu, editors. |
title_fullStr | Cognitive social mining applications in data analytics and forensics Anandakumar Haldorai and Arulmurugan Ramu, editors. |
title_full_unstemmed | Cognitive social mining applications in data analytics and forensics Anandakumar Haldorai and Arulmurugan Ramu, editors. |
title_short | Cognitive social mining applications in data analytics and forensics |
title_sort | cognitive social mining applications in data analytics and forensics |
topic | Data mining. Online social networks Data processing. |
topic_facet | Data mining. Online social networks Data processing. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7522-1 |
work_keys_str_mv | AT haldoraianandakumar cognitivesocialminingapplicationsindataanalyticsandforensics AT ramuarulmurugan cognitivesocialminingapplicationsindataanalyticsandforensics AT igiglobal cognitivesocialminingapplicationsindataanalyticsandforensics |