03271oam 2200613I 450 991080984350332120230721022326.00-367-38555-40-429-11670-51-282-11123-X97866121112351-4200-4591-110.1201/9781420045918 (CKB)1000000000786659(EBL)1446804(SSID)ssj0000137153(PQKBManifestationID)11130039(PQKBTitleCode)TC0000137153(PQKBWorkID)10087974(PQKB)11606687(MiAaPQ)EBC1446804(Au-PeEL)EBL1446804(CaPaEBR)ebr11004070(CaONFJC)MIL211123(OCoLC)899156214(OCoLC)431939964(EXLCZ)99100000000078665920180331d2009 uy 0engur|n|---|||||txtccrDesign and implementation of data mining tools /M. Awad. [et al.]Boca Raton, Fla. :Auerbach Publications,2009.1 online resource (276 p.)"An Auerbach book."1-4665-2603-3 1-4200-4590-3 Includes bibliographical references and index.Front cover; Dedication; Contents; Preface; About the Authors; Acknowledgments; Chapter 1. Introduction; Chapter 2. Data Mining Techniques; Chapter 3. Data Mining Applications; Chapter 4. Data Mining for Security Applications; Chapter 5. Dynamic Growing Self-Organizing Tree Algorithm; Chapter 6. Data Reduction Using Hierarchical Clustering and Rocchio Bundling; Chapter 7. Intrusion Detection Results; Chapter 8. Web Data Management and Mining; Chapter 9. Effective Web Page Prediction Using Hybrid Model; Chapter 10. Multiple Evidence Combination for WWW PredictionChapter 11. WWW Prediction ResultsChapter 12. Multimedia Data Management and Mining; Chapter 13. Image Classification Models; Chapter 14. Subspace Clustering and Automatic Image Annotation; Chapter 15. Enhanced Weighted Feature Selection; Chapter 16. Image Classification and Performance Analysis; Chapter 17. Summary and Directions; APPENDIX A; Data Management Systems: Developments and Trends; Index; Back coverFocusing on three applications of data mining, Design and Implementation of Data Mining Tools explains how to create and employ systems and tools for intrusion detection, Web page surfing prediction, and image classification. Mainly based on the authors' own research work, the book takes a practical approach to the subject.The first part of the book reviews data mining techniques, such as artificial neural networks and support vector machines, as well as data mining applications. The second section covers the design and implementation of data mining tools for intrusion detection. It examines vData miningData mining.005.74Awad M(Mamoun)1707715MiAaPQMiAaPQMiAaPQBOOK9910809843503321Design and implementation of data mining tools4096166UNINA