Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Skip header Section
Data Mining: Concepts, Models, Methods and AlgorithmsOctober 2002
Publisher:
  • John Wiley & Sons, Inc.
  • 605 Third Ave. New York, NY
  • United States
ISBN:978-0-471-22852-3
Published:01 October 2002
Pages:
360
Skip Bibliometrics Section
Reflects downloads up to 25 Oct 2024Bibliometrics
Abstract

No abstract available.

Cited By

  1. ACM
    Bailey M A Whirlwind Introduction to Computer Graphics for Complete Beginners ACM SIGGRAPH 2024 Courses, (1-59)
  2. Sajid F, Hassan M, Khan A, Rizwan M, Kryvinska N, Vincent K, Khan I and Zakarya M (2022). Secure and Efficient Data Storage Operations by Using Intelligent Classification Technique and RSA Algorithm in IoT-Based Cloud Computing, Scientific Programming, 2022, Online publication date: 1-Jan-2022.
  3. Çığşar B, Ünal D and Peña A (2019). Comparison of Data Mining Classification Algorithms Determining the Default Risk, Scientific Programming, 2019, Online publication date: 1-Jan-2019.
  4. ACM
    Utami N and Surjandari I Identifying Consumer Buying Behavior Differences through Market Basket Analysis in Multiple Outlet Types Proceedings of the International Conference on Business and Information Management, (82-86)
  5. (2016). Mining balance disorders' data for the development of diagnostic decision support systems, Computers in Biology and Medicine, 77:C, (240-248), Online publication date: 1-Oct-2016.
  6. Sakr N, ELdesouky A and Arafat H (2016). An efficient fast-response content-based image retrieval framework for big data, Computers and Electrical Engineering, 54:C, (522-538), Online publication date: 1-Aug-2016.
  7. Almadni D and Abhari A Comparative analysis of classification models in diagnosis of type 2 diabetes Proceedings of the Modeling and Simulation in Medicine Symposium, (1-5)
  8. Norouzi M, Souri A and Samad Zamini M (2016). A Data Mining Classification Approach for Behavioral Malware Detection, Journal of Computer Networks and Communications, 2016, (1), Online publication date: 1-Mar-2016.
  9. Ali F, Simoens P, Verbelen T, Demeester P and Dhoedt B (2016). Mobile device power models for energy efficient dynamic offloading at runtime, Journal of Systems and Software, 113:C, (173-187), Online publication date: 1-Mar-2016.
  10. Sajedi H (2016). Biometric verification by palmprint using contourlet transform, Intelligent Decision Technologies, 10:4, (443-451), Online publication date: 1-Jan-2016.
  11. ACM
    Bailey M Fundamentals seminar ACM SIGGRAPH 2015 Courses, (1-129)
  12. Hsu P, Shen Y and Xie X Predicting Movies User Ratings with Imdb Attributes Rough Sets and Knowledge Technology, (444-453)
  13. Pachidi S, Spruit M and Van De Weerd I (2014). Understanding users' behavior with software operation data mining, Computers in Human Behavior, 30, (583-594), Online publication date: 1-Jan-2014.
  14. ACM
    Cruz J, Bothorel C and Poulet F (2014). Community detection and visualization in social networks, ACM Transactions on Intelligent Systems and Technology, 5:1, (1-26), Online publication date: 1-Dec-2013.
  15. Di Noia T, Ostuni V, Pesce F, Binetti G, Naso D, Schena F and Di Sciascio E (2013). An end stage kidney disease predictor based on an artificial neural networks ensemble, Expert Systems with Applications: An International Journal, 40:11, (4438-4445), Online publication date: 1-Sep-2013.
  16. Delen D, Kuzey C and Uyar A (2013). Measuring firm performance using financial ratios, Expert Systems with Applications: An International Journal, 40:10, (3970-3983), Online publication date: 1-Aug-2013.
  17. Yaakub M, Li Y, Algarni A and Peng B Integration of Opinion into Customer Analysis Model Proceedings of the The 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology - Volume 03, (164-168)
  18. ACM
    Madhavi K, Babu A, Rao A, Raju S and Rau C Graphical method to find optimal cluster centroid for two-variable linear functions of concept-drift categorical data Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology, (269-274)
  19. Ozgul F and Erdem Z Detecting Criminal Networks Using Social Similarity Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), (581-585)
  20. ACM
    Bailey M and Cunningham S Introduction to computer graphics SIGGRAPH Asia 2011 Courses, (1-58)
  21. ACM
    Doctor M, Moreno Á, Muñoz P, Díaz D and R-Moreno M Intelligent social networks Proceedings of the International Conference on Web Intelligence, Mining and Semantics, (1-8)
  22. Jaramillo-Vacio R, Ochoa-Zezzatti A, Jöns S, Ledezma-Orozco S and Chira C Diagnosis of partial discharge using self organizing maps and hierarchical clustering Proceedings of the 6th international conference on Hybrid artificial intelligent systems - Volume Part I, (91-98)
  23. Kołodziej M, Majkowski A and Rak R A new method of EEG classification for BCI with feature extraction based on higher order statistics of wavelet components and selection with genetic algorithms Proceedings of the 10th international conference on Adaptive and natural computing algorithms - Volume Part I, (280-289)
  24. ACM
    Bailey M and Cunningham S Introduction to computer graphics ACM SIGGRAPH ASIA 2010 Courses, (1-100)
  25. Aburrous M, Hossain M, Dahal K and Thabtah F (2010). Intelligent phishing detection system for e-banking using fuzzy data mining, Expert Systems with Applications: An International Journal, 37:12, (7913-7921), Online publication date: 1-Dec-2010.
  26. Monedero I, Biscarri F, León C, Guerrero J, Biscarri J and Millán R Using regression analysis to identify patterns of non-technical losses on power utilities Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part I, (410-419)
  27. Ozgul F, Erdem Z, Bowerman C and Bondy J Combined detection model for criminal network detection Proceedings of the 2010 Pacific Asia conference on Intelligence and Security Informatics, (1-14)
  28. Zafra A and Ventura S Web usage mining for improving students performance in learning management systems Proceedings of the 23rd international conference on Industrial engineering and other applications of applied intelligent systems - Volume Part III, (439-449)
  29. Huang P and Lai Y (2010). Effective segmentation and classification for HCC biopsy images, Pattern Recognition, 43:4, (1550-1563), Online publication date: 1-Apr-2010.
  30. Wong T and Liu K (2010). A Probabilistic mechanism based on clustering analysis and distance measure for subset gene selection, Expert Systems with Applications: An International Journal, 37:3, (2144-2149), Online publication date: 1-Mar-2010.
  31. Tsai C and Chen M (2010). Variable selection by association rules for customer churn prediction of multimedia on demand, Expert Systems with Applications: An International Journal, 37:3, (2006-2015), Online publication date: 1-Mar-2010.
  32. ACM
    Gul N, Barki I and Akhtar N MFP Proceedings of the 7th International Conference on Frontiers of Information Technology, (1-7)
  33. HajAbedi Z and Kangavari M A fuzzy-GA wrapper-based constructive induction model Proceedings of the Intelligent computing 5th international conference on Emerging intelligent computing technology and applications, (440-449)
  34. Tzallas A, Tsipouras M and Fotiadis D (2009). Epileptic seizure detection in EEGs using time-frequency analysis, IEEE Transactions on Information Technology in Biomedicine, 13:5, (703-710), Online publication date: 1-Sep-2009.
  35. Lev B (2009). Book Reviews, Interfaces, 39:4, (375-379), Online publication date: 1-Aug-2009.
  36. Lev B (2009). Book Reviews, Interfaces, 39:4, (375-379), Online publication date: 1-Aug-2009.
  37. Zhang Z, Shi Y and Gao G (2009). A rough set-based multiple criteria linear programming approach for the medical diagnosis and prognosis, Expert Systems with Applications: An International Journal, 36:5, (8932-8937), Online publication date: 1-Jul-2009.
  38. Ozgul F, Erdem Z and Bowerman C Prediction of past unsolved terrorist attacks Proceedings of the 2009 IEEE international conference on Intelligence and security informatics, (37-42)
  39. HajAbedi Z A real-coded genetic algorithm for constructive induction Proceedings of the Eleventh conference on Congress on Evolutionary Computation, (2036-2042)
  40. Xie Y and Yu S (2009). A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors, IEEE/ACM Transactions on Networking, 17:1, (54-65), Online publication date: 1-Feb-2009.
  41. Nassiri-Mofakham F, Nematbakhsh M, Baraani-Dastjerdi A and Ghasem-Aghaee N (2009). Electronic promotion to new customers using mkNN learning, Information Sciences: an International Journal, 179:3, (248-266), Online publication date: 15-Jan-2009.
  42. ACM
    Bailey M and Cunningham S Introduction to computer graphics ACM SIGGRAPH ASIA 2008 courses, (1-103)
  43. Ilic V Interactive Environment Based on Internet Technologies for Psychometric Diagnostics, Psychotherapy and Collaboration Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 03, (248-251)
  44. Dzitac I and Moisil I Advanced AI techniques for web mining Proceedings of the 10th WSEAS international conference on Mathematical methods, computational techniques and intelligent systems, (343-346)
  45. ACM
    Alzate Gaitán G, Useche D and Rodríguez J Prototype of software to support diagnosis for illness through blood samples results Proceedings of the 2008 Euro American Conference on Telematics and Information Systems, (1-4)
  46. ACM
    Bailey M Introduction to SIGGRAPH and interactive computer graphics ACM SIGGRAPH 2008 classes, (1-85)
  47. Zhou X, Zhang D and Jiang Y A new credit scoring method based on rough sets and decision tree Proceedings of the 12th Pacific-Asia conference on Advances in knowledge discovery and data mining, (1081-1089)
  48. Badawy S, Elragal A and Gabr M Multivariate similarity-based conformity measure (MSCM) Proceedings of the 26th IASTED International Conference on Artificial Intelligence and Applications, (314-320)
  49. Kalita P, Podolak I, Roman A and Bierkowski B Algorithm for intelligent prediction of requests in business systems Proceedings of the 34th conference on Current trends in theory and practice of computer science, (696-707)
  50. Li Y, Yeh J and Chang C (2008). Isolated items discarding strategy for discovering high utility itemsets, Data & Knowledge Engineering, 64:1, (198-217), Online publication date: 1-Jan-2008.
  51. Huang Y, McCullagh P, Black N and Harper R (2007). Feature selection and classification model construction on type 2 diabetic patients' data, Artificial Intelligence in Medicine, 41:3, (251-262), Online publication date: 1-Nov-2007.
  52. Hsu C, Chen C and Su Y (2007). Hierarchical clustering of mixed data based on distance hierarchy, Information Sciences: an International Journal, 177:20, (4474-4492), Online publication date: 1-Oct-2007.
  53. Wang M, Hsu P, Lin K and Chen S Clustering transactions with an unbalanced hierarchical product structure Proceedings of the 9th international conference on Data Warehousing and Knowledge Discovery, (251-361)
  54. ACM
    Bailey M and Glassner A Introduction to SIGGRAPH and computer graphics ACM SIGGRAPH 2007 courses, (1-es)
  55. Arkadan A, Abou-Samra Y and Ramadan Z Radial basis networks for the simulation of stand alone AC generators during no-break power transfer Proceedings of the 2007 Summer Computer Simulation Conference, (237-243)
  56. Stuart K and Majewski M Selected Problems of Knowledge Discovery Using Artificial Neural Networks Proceedings of the 4th international symposium on Neural Networks: Advances in Neural Networks, Part III, (1049-1057)
  57. Ni J and Zhang C A Human-Friendly MAS for Mining Stock Data Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology, (19-22)
  58. Ai D, Zhang Y, Zuo H and Wang Q Web content mining for market intelligence acquiring from b2c websites Proceedings of the 7th international conference on Web Information Systems, (159-170)
  59. Guo Q, Chen W, Zhang X, Li Z and Guan D Signal sorting based on SVC & K-means clustering in ESM systems Proceedings of the 13th international conference on Neural Information Processing - Volume Part II, (596-603)
  60. Liu P, Wu N, Zhu J, Yin J and Zhang W A unified strategy of feature selection Proceedings of the Second international conference on Advanced Data Mining and Applications, (457-464)
  61. Amasaki S, Hamano Y, Mizuno O and Kikuno T Characterization of runaway software projects using association rule mining Proceedings of the 7th international conference on Product-Focused Software Process Improvement, (402-407)
  62. Monedero Í, Biscarri F, León C, Biscarri J and Millán R MIDAS Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V, (725-734)
  63. Wang T and Lee H Constructing a fuzzy decision tree by integrating fuzzy sets and entropy Proceedings of the 5th WSEAS international conference on Applied computer science, (306-311)
  64. Yamout F, Oakes M and Tait J Relevance feedback using weight propagation Proceedings of the 28th European conference on Advances in Information Retrieval, (575-578)
  65. Chen P, Chang K, Hsing T and Chou S Mining criminal databases to finding investigation clues—by example of stolen automobiles database Proceedings of the 2006 international conference on Intelligence and Security Informatics, (91-102)
  66. Li Y, Yeh J and Chang C Direct candidates generation Proceedings of the Second international conference on Fuzzy Systems and Knowledge Discovery - Volume Part II, (551-560)
  67. ACM
    Bailey M Introduction to SIGGRAPH and computer graphics ACM SIGGRAPH 2005 Courses, (1-es)
  68. Yang H, Zhang M and Shi Z Association-rule based information source selection Proceedings of the 8th Pacific Rim International Conference on Trends in Artificial Intelligence, (563-574)
  69. ACM
    Wang H, Chen H and Parrish A Automated selection of auto crash causes Proceedings of the 42nd annual ACM Southeast Conference, (375-378)
  70. Bunke H Graph-based tools for data mining and machine learning Proceedings of the 3rd international conference on Machine learning and data mining in pattern recognition, (7-19)
Contributors
  • University of Louisville

Reviews

Charles William Bash

Allouche and Shallit present the theory and generalization of automatic sequences by combining work encompassing pure mathematics and theoretical computer science. They have succeeded in presenting the material in an integrated framework. The presentation of each topic is systematic, and the authors present results from first principles in order to maintain the suitability to a large audience of scientists wishing to explore this subject. They also discuss applications relating to mathematics, physics, computer graphics, and music. The authors have demonstrated great insight into the subject. The book is divided into 17 chapters. Each chapter ends with exercises, open problems (where unsolved research problems are given), and notes (given for further study and research). Additionally, an appendix is provided, with hints and solutions to selected exercises given in each of the chapters. Finally, the bibliography section consists of over 1600 references related to the subject. In chapter 1, "Stringology," the authors discuss the basic definitions and properties of finite and infinite words, as well as the definition of a language, which is a set of words. Then they define morphism, which is a way of transforming words. Additionally, they describe the mathematical foundation for repetitions in a word and the overlap-free binary words. Chapter 2 introduces the basic mathematical results on algebra and number theory, such as divisibility and valuations, rational and irrational numbers, algebraic and transcendental numbers, continued fractions, Diophantine approximation, algebraic structures, vector spaces, fields, polynomials rational functions and formal power series, p-adic numbers, and asymptotic notation. Chapter 3 presents the numeration systems, and, in particular, how numbers can be represented by strings over a finite alphabet with the classical k-base representation, Fibonacci representation, and the complex base representation. In chapter 4, the authors discuss models of computations, in particular, finite automata and its variants and Turing machines. In chapter 5, the authors introduce the basic concepts of automatic sequences. Chapter 6 covers the concepts of fixed points of uniform morphisms and the closure properties of automatic sequences. In chapter 7, the authors present the uniform morphism, as well as the general case where the morphism is not uniform. In chapter 8, the authors prove the theorems about the frequency of letters in automatic and morphic sequences. Chapter 9 covers the definitions and basic properties of a special class of infinite words, called the characteristic words. In chapter 10, the authors introduce the basic properties of subword complexity of automatic sequence, as well as morphic words. They also study recurrence and appearance. In chapter 11, the proof of Cobham's Theorem is presented. In chapter 12, the authors study the algebraicity and transcendence of formal power series and their relation with finite automata. Chapter 13 introduces the concepts of automatic real numbers and investigates their properties. In chapter 14, the authors present the generalization of automatic sequences to the multidimensional case. Chapter 15 covers the automaticity of languages and their generalization, namely the automaticity of sequences. Chapter 16 deals with the generalization of a k-automatic sequence by the k-regular sequence. In chapter 17, the authors show the applicability of automatic and morphic sequences in physics. The material presented in this book is well balanced, and is presented in a consistent framework. The authors refer to automatic sequences that are generated by finite automata; they have discussed in detail the close relation of automatic sequences with number theory. The presentation of the material and the proofs of the theorems stated are thought provoking and of high quality. Fortunately, a list of errata is available on one of the author's Web sites. Whenever there is a need for an algorithmic description, it is given in a pseudocode notation similar to a C language, which is familiar to most scientists these days. Since the subject incorporates results from mathematics and computer science, the authors have presented the material in a self-contained way, using consistent notation. They have also gathered material that was spread among different sources, and sometimes not accessible at large. I highly recommend this book to interested readers, from advanced undergraduates to experts in the field of formal languages and number theory. The reader must have a certain level of mathematical knowledge to understand the concepts presented in the book.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Recommendations