Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cognitive social mining applications...
~
Haldorai, Anandakumar, (1983-)
Linked to FindBook
Google Book
Amazon
博客來
Cognitive social mining applications in data analytics and forensics
Record Type:
Electronic resources : Monograph/item
Title/Author:
Cognitive social mining applications in data analytics and forensics/ Anandakumar Haldorai and Arulmurugan Ramu, editors.
other author:
Haldorai, Anandakumar,
Published:
Hershey, Pennsylvania :IGI Global, : [2019],
Description:
1 online resource (xxi, 326 p.)
[NT 15003449]:
Chapter 1. The potential of cognitive social mining applications in data analytics for protecting social media users for national and international security -- Chapter 2. Data mining techniques for social network analysis -- Chapter 3. Semantic-based indexing approaches for medical document clustering using cognitive search -- Chapter 4. Efficient space communication and management (SCOAM) using cognitive radio networks based on deep learning techniques: cognitive radio in space communication -- Chapter 5. Side channel attacks in cloud computing -- Chapter 6. Cognitive social mining analysis using data mining techniques -- Chapter 7. Cognitive mining for exploratory data analytics using clustering based on particle swarm optimization: cognitive mining for exploratory data analytics -- Chapter 8. A review of artificial intelligence technologies to achieve machining objectives -- Chapter 9. Data mining for social network analysis using a CLIQUE algorithm -- Chapter 10. Privacy information leakage prevention in cognitive social mining applications: causes and prevention measures -- Chapter 11. Study of efficient hybrid wireless networks using qos-oriented distributed routing protocol: qos-oriented distributed routing protocol -- Chapter 12. Machine learning techniques for healthcare applications: early autism detection using ensemble approach and breast cancer prediction using SMO and IBK -- Chapter 13. A detailed study on security concerns of VANET and cognitive radio vanets -- Chapter 14. Application of cognitive computing in healthcare -- Chapter 15. Cognitive social exchange: a case study.
Subject:
Data mining. -
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7522-1
ISBN:
9781522575238 (ebk.)
Cognitive social mining applications in data analytics and forensics
Cognitive social mining applications in data analytics and forensics
[electronic resource] /Anandakumar Haldorai and Arulmurugan Ramu, editors. - Hershey, Pennsylvania :IGI Global,[2019] - 1 online resource (xxi, 326 p.)
Includes bibliographical references and index.
Chapter 1. The potential of cognitive social mining applications in data analytics for protecting social media users for national and international security -- Chapter 2. Data mining techniques for social network analysis -- Chapter 3. Semantic-based indexing approaches for medical document clustering using cognitive search -- Chapter 4. Efficient space communication and management (SCOAM) using cognitive radio networks based on deep learning techniques: cognitive radio in space communication -- Chapter 5. Side channel attacks in cloud computing -- Chapter 6. Cognitive social mining analysis using data mining techniques -- Chapter 7. Cognitive mining for exploratory data analytics using clustering based on particle swarm optimization: cognitive mining for exploratory data analytics -- Chapter 8. A review of artificial intelligence technologies to achieve machining objectives -- Chapter 9. Data mining for social network analysis using a CLIQUE algorithm -- Chapter 10. Privacy information leakage prevention in cognitive social mining applications: causes and prevention measures -- Chapter 11. Study of efficient hybrid wireless networks using qos-oriented distributed routing protocol: qos-oriented distributed routing protocol -- Chapter 12. Machine learning techniques for healthcare applications: early autism detection using ensemble approach and breast cancer prediction using SMO and IBK -- Chapter 13. A detailed study on security concerns of VANET and cognitive radio vanets -- Chapter 14. Application of cognitive computing in healthcare -- Chapter 15. Cognitive social exchange: a case study.
Restricted to subscribers or individual electronic text purchasers.
"This book presents the most recent challenges and developments in 'machine learning in data analytics and forensics for cognitive social mining' from the perspective of providing awareness and its best practices for the real world"--Provided by publisher.
ISBN: 9781522575238 (ebk.)Subjects--Topical Terms:
562972
Data mining.
LC Class. No.: QA76.9.D343 / C477 2019e
Dewey Class. No.: 006.3/12
Cognitive social mining applications in data analytics and forensics
LDR
:02819nmm a2200253 a 4500
001
2188833
003
IGIG
005
20191224095057.0
008
200316s2019 pau fob 001 0 eng d
010
$z
2018029253
020
$a
9781522575238 (ebk.)
020
$a
9781522575221 (hbk.)
035
$a
(OCoLC)1076773899
035
$a
1081210177
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
QA76.9.D343
$b
C477 2019e
082
0 0
$a
006.3/12
$2
23
245
0 0
$a
Cognitive social mining applications in data analytics and forensics
$h
[electronic resource] /
$c
Anandakumar Haldorai and Arulmurugan Ramu, editors.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
[2019]
300
$a
1 online resource (xxi, 326 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Chapter 1. The potential of cognitive social mining applications in data analytics for protecting social media users for national and international security -- Chapter 2. Data mining techniques for social network analysis -- Chapter 3. Semantic-based indexing approaches for medical document clustering using cognitive search -- Chapter 4. Efficient space communication and management (SCOAM) using cognitive radio networks based on deep learning techniques: cognitive radio in space communication -- Chapter 5. Side channel attacks in cloud computing -- Chapter 6. Cognitive social mining analysis using data mining techniques -- Chapter 7. Cognitive mining for exploratory data analytics using clustering based on particle swarm optimization: cognitive mining for exploratory data analytics -- Chapter 8. A review of artificial intelligence technologies to achieve machining objectives -- Chapter 9. Data mining for social network analysis using a CLIQUE algorithm -- Chapter 10. Privacy information leakage prevention in cognitive social mining applications: causes and prevention measures -- Chapter 11. Study of efficient hybrid wireless networks using qos-oriented distributed routing protocol: qos-oriented distributed routing protocol -- Chapter 12. Machine learning techniques for healthcare applications: early autism detection using ensemble approach and breast cancer prediction using SMO and IBK -- Chapter 13. A detailed study on security concerns of VANET and cognitive radio vanets -- Chapter 14. Application of cognitive computing in healthcare -- Chapter 15. Cognitive social exchange: a case study.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book presents the most recent challenges and developments in 'machine learning in data analytics and forensics for cognitive social mining' from the perspective of providing awareness and its best practices for the real world"--Provided by publisher.
650
0
$a
Data mining.
$3
562972
650
0
$a
Online social networks
$x
Data processing.
$3
3226542
700
1
$a
Haldorai, Anandakumar,
$d
1983-
$e
editor.
$3
3404120
700
1
$a
Ramu, Arulmurugan,
$d
1985-
$e
editor.
$3
3404121
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7522-1
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9373030
電子資源
11.線上閱覽_V
電子書
EB QA76.9.D343 C477 2019e
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login