Atnaujinkite slapukų nuostatas

El. knyga: Trends and Applications in Knowledge Discovery and Data Mining: PAKDD 2018 Workshops, BDASC, BDM, ML4Cyber, PAISI, DaMEMO, Melbourne, VIC, Australia, June 3, 2018, Revised Selected Papers

Edited by , Edited by , Edited by , Edited by
Kitos knygos pagal šią temą:
Kitos knygos pagal šią temą:

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This book constitutes the thoroughly refereed post-workshop proceedings at PAKDD Workshops 2018, held in conjunction with the 22nd Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2018, in Melbourne, Australia, in June 2018.





The 32 revised papers presented were carefully reviewed and selected from 46 submissions. The workshops affiliated with PAKDD 2018 include: Workshop on Big Data Analytics for Social Computing, BDASC, Australasian Workshop on Machine Learning for Cyber-security, ML4Cyber, Workshop on Biologically-inspired Techniques for Knowledge Discovery and Data Mining, BDM, Pacific Asia Workshop on Intelligence and Security Informatics, PAISI, and Workshop on Data Mining for Energy Modeling and Optimization, DaMEMO.
Big Data Analytics for Social Computing (BDASC)
A Decision Tree Approach to Predicting Recidivism in Domestic Violence
3(13)
Senuri Wzjenayake
Timothy Graham
Peter Christen
Unsupervised Domain Adaptation Dictionary Learning for Visual Recognition
16(11)
Zhun Zhong
Zongmin Li
Runlin Li
Xiaoxia Sun
On the Large-Scale Transferability of Convolutional Neural Networks
27(13)
Liang Zheng
Yali Zhao
Shengjin Wang
Jingdong Wang
Yi Yang
Qi Tian
Call Attention to Rumors: Deep Attention Based Recurrent Neural Networks for Early Rumor Detection
40(13)
Tong Chen
Xue Li
Hongzhi Yin
Jun Zhang
Impact of Indirect Contacts in Emerging Infectious Disease on Social Networks
53(13)
Md Shahzamal
Raja Jurdak
Bernard Mans
Ahmad El Shoghri
Frank De Hoog
Interesting Recommendations Based on Hierarchical Visualizations of Medical Data
66(14)
Ibrahim A. Ibrahim
Abdulqader M. Almars
Suresh Pokharel
Xin Zhao
Xue Li
Efficient Top K Temporal Spatial Keyword Search
80(13)
Chengyuan Zhang
Lei Zhu
Weiren Yu
Jun Long
Fang Huang
Hongbo Zhao
HOC-Tree: A Novel Index for Efficient Spatio-Temporal Range Search
93(15)
Jun Long
Lei Zhu
Chengyuan Zhang
Shuangqiao Lin
Zhan Yang
Xinpan Yuan
A Hybrid Index Model for Efficient Spatio-Temporal Search in HBase
108(13)
Chengyuan Zhang
Lei Zhu
Jun Long
Shuangqiao Lin
Zhan Yang
Wenti Huang
Rumor Detection via Recurrent Neural Networks: A Case Study on Adaptivity with Varied Data Compositions
121(7)
Tong Chen
Hongxu Chen
Xue Li
TwiTracker: Detecting and Extracting Events from Twitter for Entity Tracking
128(9)
Meng Xu
Jiajun Cheng
Lixiang Guo
Pei Li
Xin Zhang
Hui Wang
Australasian Workshop on Machine Learning for Cyber-Security (ML4Cyber)
Rapid Anomaly Detection Using Integrated Prudence Analysis (IPA)
137(5)
Omaru Maruatona
Peter Vamplew
Richard Dazeley
Paul A. Watters
A Differentially Private Method for Crowdsourcing Data Submission
142(7)
Lefeng Zhang
Ping Xiong
Tianqing Zhu
An Anomaly Intrusion Detection System Using C5 Decision Tree Classifier
149(7)
Ansam Khraisat
Iqbal Gondal
Peter. Vamplew
Deep Learning for Classifying Malicious Network Traffic
156(6)
K. Millar
A. Cheng
H.G. Chew
C.C. Lim
A Server Side Solution for Detecting WebInject: A Machine Learning Approach
162(6)
Md. Moniruzzaman
Adil Bagirov
lqbal Gondal
Simon Brown
A Novel LSTM-Based Daily Airline Demand Forecasting Method Using Vertical and Horizontal Time Series
168(6)
Boxiao Pan
Dongfeng Yuan
Weiwei Sun
Cong Liang
Dongyang Li
A Transfer Metric Learning Method for Spammer Detection
174(7)
Hao Chen
Jun Liu
Yanzhang Lv
Dynamic Whitelisting Using Locality Sensitive Hashing
181(5)
Jayson Pryde
Nestle Angeles
Sheryl Kareen Carinan
Payload-Based Statistical Intrusion Detection for In-Vehicle Networks
186(9)
Takuya Kuwahara
Yukino Baba
Hisashi Kashima
Takeshi Kishikawa
Junichi Tsurumi
Tomoyuki Haga
Yoshihiro Ujiie
Takamitsu Sasaki
Hideki Matsushima
Biologically-Inspired Techniques for Knowledge Discovery and Data Mining (BDM)
Discovering Strong Meta Association Rules Using Bees Swarm Optimization
195(12)
Youcef Djenouri
Asma Belhadi
Philippe Fournier-Viger
Jerry Chun-Wei Lin
ParallelPC: An R Package for Efficient Causal Exploration in Genomic Data
207(12)
Thuc Duy Le
Taosheng Xu
Lin Liu
Hu Shu
Tao Hoang
Jiuyong Li
Citation Field Learning by RNN with Limited Training Data
219(14)
Yiqing Zhang
Yimeng Dai
Jianzhong Qi
Xinxing Xu
Rui Zhang
Affine Transformation Capsule Net
233(10)
Runkun Lu
Jianwei Liu
Siming Lian
Xin Zuo
A Novel Algorithm for Frequent Itemsets Mining in Transactional Databases
243(13)
Huan Phan
Bac Le
Rare-Events Classification: An Approach Based on Genetic Algorithm and Voronoi Tessellation
256(11)
Abdul Rauf Khan
Henrik Schioler
Mohamed Zaki
Murat Kulahci
Particle Swarm Optimization-Based Weighted-Nadaraya-Watson Estimator
267(16)
Jie Jiang
Yulin He
Joshua Zhexue Huang
Pacific Asia Workshop on Intelligence and Security Informatics (PAISI)
A Parallel Implementation of Information Gain Using Hive in Conjunction with MapReduce for Continuous Features
283(12)
Sikha Bagui
Sharon K. John
John P. Baggs
Subhash Bagui
Measuring Interpretability for Different Types of Machine Learning Models
295(14)
Qing Zhou
Fenglu Liao
Chao Mou
Ping Wang
In Search of Public Agenda with Text Mining: An Exploratory Study of Agenda Setting Dynamics Between the Traditional Media and Wikipedia
309(9)
Philip T.Y. Lee
Modelling the Efficacy of Auto-Internet Warnings to Reduce Demand for Child Exploitation Materials
318(15)
Paul A. Watters
Data Mining for Energy Modeling and Optimization (DaMEMO)
Comparison and Sensitivity Analysis of Methods for Solar PV Power Prediction
333(12)
Mashud Rana
Ashfaqur Rahman
Liwan Liyanage
Mohammed Nazim Uddin
An Improved MIL Algorithm for Optimal Coalition Structure Generation of Smart Grids
345(12)
Sean Hsin-Shyuan Lee
Jeremiah D. Deng
Martin K. Purvis
Maryam Purvis
Lizhi Peng
Dam Inflow Time Series Regression Models Minimising Loss of Hydropower Opportunities
357(12)
Yasuno Takato
Author Index 369