𝔖 Bobbio Scriptorium
✦   LIBER   ✦

[Advanced Information and Knowledge Processing] Optimization Based Data Mining: Theory and Applications || Health Insurance Fraud Detection

✍ Scribed by Shi, Yong; Tian, Yingjie; Kou, Gang; Peng, Yi; Li, Jianping


Book ID
120310047
Publisher
Springer London
Year
2011
Tongue
English
Weight
91 KB
Edition
2011
Category
Article
ISBN
0857295047

No coin nor oath required. For personal study only.

✦ Synopsis


Optimization techniques have been widely adopted to implement various data mining algorithms. In addition to well-known Support Vector Machines (SVMs) (which are based on quadratic programming), different versions of Multiple Criteria Programming (MCP) have been extensively used in data separations. Since optimization based data mining methods differ from statistics, decision tree induction, and neural networks, their theoretical inspiration has attracted many researchers who are interested in algorithm development of data mining. Optimization based Data Mining: Theory and Applications, mainly focuses on MCP and SVM especially their recent theoretical progress and real-life applications in various fields. These include finance, web services, bio-informatics and petroleum engineering, which has triggered the interest of practitioners who look for new methods to improve the results of data mining for knowledge discovery. Most of the material in this book is directly from the research and application activities that the authors’ research group has conducted over the last ten years. Aimed at practitioners and graduates who have a fundamental knowledge in data mining, it demonstrates the basic concepts and foundations on how to use optimization techniques to deal with data mining problems.


πŸ“œ SIMILAR VOLUMES


[Advanced Information and Knowledge Proc
✍ Maloof, Marcus A. πŸ“‚ Article πŸ“… 2006 πŸ› Springer-Verlag 🌐 English βš– 181 KB

Machine Learning and Data Mining for Computer Security provides an overview of the current state of research in machine learning and data mining as it applies to problems in computer security. This book has a strong focus on information processing and combines and extends results from computer secur