The book consists of three sections. The first, foundations, provides a tutorial overview of the PRInciples underlying data mining algorithms and their application. The presentation emphasizes intuition rather than rigor. The second section, data mining algorithms, shows how algorithms are constructed to solve specific problems in a PRIncipled manner. The algorithms covered include trees and rules for classification and regression, association rules, belief networks, classical statistical models, nonlinear models such as neural networks, and local memory-based models. The third section shows how all of the preceding analysis fits together when applied to real-world data mining problems. Topics include the role of metadata, how to handle missing data, and data preprocessing.
標簽:
foundations
The
consists
sections
上傳時間:
2017-06-22
上傳用戶:lps11188
The field of cyber security, or information security, or information
assurance, depending on your preference, is an interdisciplinary one.
It is part computer science, part statistics, part psychology, part law,
and a part of many other fields. Moreover, any cyber security practi-
tioner needs to know what he or she is protecting and where to PRI-
oritize. Just as someone should not spend $100 to protect something
worth $10, one cannot be blind to the other disciplines.
標簽:
Security
Smart
Grid
上傳時間:
2020-06-07
上傳用戶:shancjb