Index
A
- A-Priori algorithm
- AdaBoost algorithm
- affinity propagation (AP) clustering
- agglomerative clustering
- algorithm, for association rule generation
- association rules
- associations
- associative classification
- attribute
- Auto Regressive Integrated Moving Average (ARIMA) algorithm
B
- bagging algorithm
- basket
- Bayes classification
- Bayesian hierarchical clustering algorithm
- BBN algorithm
- big data
- binning
- BIRCH algorithm
- Bonferroni's Principle
- Bonferroni correction
- boosting algorithm
- BP algorithm
- brute-force algorithm
C
- C4.5 algorithm
- CART algorithm
- categorical attributes
- CF-Tree
- chameleon algorithm
- Charm algorithm
- CLARA algorithm
- CLARANS algorithm
- classification
- classification, with frequent patterns
- classification-based methods
- Classification Based on Association (CBA)
- Classification Based on Multiple Association Rules (CMAR)
- CLIQUE algorithm
- closed frequent itemsets
- clustering-based methods
- collective outliers
- Comprehensive R Archive Network (CRAN)
- conditional anomaly detection (CAD) algorithm
- conditional probability tables (CPT)
- constraint-based frequent pattern mining
- contextual outliers
- continuous, numeric attributes
- correlation rules
- credit card fraud detection
- credit card transaction flow
- CRISP-DM
- CRM (Customer Relation Management)
- Cubic Clustering Criterion
- CUR decomposition
- customer purchase data analysis
D
- DASL
- data attributes
- data attributes, views
- data classification
- data cleaning
- data description
- data dimension reduction
- data discretization
- data integration
- data measuring
- data mining
- Data Quality (DQ)
- dataset
- data smoothing
- data source
- data transformation
- DBSCAN algorithm
- decision tree
- decision tree induction
- decision tree induction, attribute selection measures
- DENCLUE algorithm
- density-based cluster
- density-based methods
- directed graphs
- discrete, numeric attributes
- discriminative frequent pattern-based classification
- disjunctive normal form (DNF)
- distance-based outlier detection algorithm
- divisive clustering
- document retrieval
- document text
- Dolphin algorithm
E
- e-commerce
- Eclat algorithm
- eigenvalues
- eigenvectors
- EM methods
- escription length (DL)
- Expectation Maximization (EM) algorithm
F
- FCA-based association rule mining algorithm
- feature extraction, examples
- FindAllOutsD algorithm
- FindAllOutsM algorithm
- FP-growth algorithm
- frequent itemset
- Frequent Itemset Mining Dataset Repository
- frequent patterns
- frequent subgraph patterns mining algorithm
- frequent subsequence
- frequent substructures
- future prices
G
- GenMax algorithm
- genre categorization
- graph
- Graph-Based Sub-topic Partition Algorithm (GSPSummary) algorithm
- graph and network data
- graph mining
- GSP algorithm
H
- hError algorithm
- hierarchical clustering
- hierarchical clustering algorithm
- high-dimensional data
- high-performance algorithms
- high-value credit card customers
- High Contrast Subspace (HiCS) algorithm
- HilOut algorithm
- horizontal format
- hybrid association rules mining
I
- ID3 algorithm
- interval-scaled
- intrusion detection
- Intrusion Detection System (IDS)
- IR
- iterative classification algorithms
K
- k-itemset
- k-means algorithm
- k-medoids algorithm
- kNN algorithm
L
- likelihood-based outlier detection algorithm
- Local Outlier Factor (LOF)
- Local Reachability Density (LRD)
M
- machine learning
- machine learning (ML)
- machine learning (ML), classes
- MAFIA algorithm
- MapReduce
- market basket analysis
- market basket model
- maximal frequent itemset (MFI)
- Maximal Marginal Relevance (MMR) algorithm
- Maximum Likelihood Estimation (MLE)
- missing values
- mobile fraud detection
- multidocument summarization algorithm
- multilevel and multidimensional association rules mining
N
- 1NN classifier algorithm
- N-gram-based text-categorization algorithm
- Naïve Bayes classification
- news categorization
- NL algorithm
- nominal attributes
- normalization methods, data transformation
- numeric attributes
- numeric attributes, types
O
- OCSVM (One Class SVM) algorithm
- ODIN algorithm
- one-class nearest neighbor algorithm
- opinion-orientation algorithm
- opinion mining
- OPTICS-OF algorithm
- OPTICS algorithm
- ordinal attributes
- outlier detection
P
- PAM algorithm
- partition-based clustering
- patterns
- PCA
- PrefixSpan algorithm
- probabilistic hierarchical clustering algorithm
- process, data mining
- proximity-based methods
Q
- queries
- question answering (QA) system
R
- R
- Random forests algorithm
- recommendation systems
- Relative Closeness (RC), chameleon algorithm
- Relative Interconnectivity (RI), chameleon algorithm
- RHadoop
- RIPPER algorithm
- route outlier detection (ROD) algorithm
- rule-based classification
- rules
S
- search engine
- SEMMA
- sentential frequent itemsets
- sequence dataset
- sequence patterns
- sequential covering algorithm
- sequential patterns
- shingling algorithm
- single-pass-any-time clustering algorithm
- social network
- social networking service (SNS)
- social network mining
- SPADE algorithm
- spam e-mail
- spectral clustering algorithm
- squared error-based clustering algorithm
- statistical method
- statistics
- STING algorithm
- stock market data
- STREAM algorithm
- stream data
- Structural Clustering Algorithm for Network (SCAN) algorithm
- summarization
- SURFING algorithm
- SVD
- SVM algorithm
- symbolic sequences
T
- Term Frequency-Inverse Document Frequency (TF-IDF)
- text classification
- text mining
- Text Retrieval Conference (TREC)
- text summarization
- time-series data
- Time To Live (TTL)
- topic detection
- topic representation
- topic signature
- Tracking Evolving Clusters in NOisy Streams (TECNO-STREAMS) algorithm
- tree pruning
- Trojan horse
- Trojan traffic identification
U
- UCI Machine Learning Repository
- undirected graphs
- unsupervised image categorization
- user search intent
V
- vector-space model
- vertical format
- visitor analysis, in browser cache
- visualization
- visualization, features
W
- WAVE clustering algorithm
- web attack
- web click streams
- web data mining
- web data mining, tasks
- web key resource page judgment
- web logs
- web page clustering
- web pages
- web sentiment analysis
- web server
- web spam
- web usage mining
- WordNet
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.