Design and Implementation of Data Mining Tools
Auteurs : Thuraisingham Bhavani, Khan Latifur, Awad Mamoun, Wang Lei
Focusing on three applications of data mining, Design and Implementation of Data Mining Tools explains how to create and employ systems and tools for intrusion detection, Web page surfing prediction, and image classification. Mainly based on the authors? own research work, the book takes a practical approach to the subject.
The first part of the book reviews data mining techniques, such as artificial neural networks and support vector machines, as well as data mining applications. The second section covers the design and implementation of data mining tools for intrusion detection. It examines various designs and performance results, along with the strengths and weaknesses of the approaches. The third part presents techniques to solve the WWW prediction problem. The final part describes models that the authors have developed for image classification.
Showing step by step how data mining tools are developed, this hands-on guide discusses the performance results, limitations, and unique contributions of data mining systems. It provides essential information for technologists to decide on the tools to select for a particular application, for developers to focus on alternative designs if an approach is unsuitable, and for managers to choose whether to proceed with a data mining project.
Data Mining Techniques and Applications. Data Mining Tool for Intrusion Detection. Data Mining Tool for Web Page Surfing Prediction. Data Mining Tool for Image Classification. Appendix. Index.
Date de parution : 09-2019
15.6x23.4 cm
Disponible chez l'éditeur (délai d'approvisionnement : 14 jours).
Prix indicatif 71,13 €
Ajouter au panierDate de parution : 06-2009
Ouvrage de 272 p.
15.6x23.4 cm
Thèmes de Design and Implementation of Data Mining Tools :
Mots-clés :
Automatic Image Annotation; Www Prediction; Data Mining Tool; Markov Model; Mine Multimedia Data; Data Mining; Intrusion Detection; Image Classification; Association Rule Mining; SVM; Dempster’s Rule; Subspace Clustering; Data Mining Techniques; Web Data Mining; Image Annotation; Botnet Detection; Web Data Management; Subspace Clustering Algorithm; MIT Lincoln Lab; Multimedia Data; SVM Training; Web Usage Mining; RBF Kernel; KNN Classifier; Malicious Code Detection