logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Mining Imperfect Data Dealing With Contamination And Incomplete Records Ronald K Pearson

  • SKU: BELL-1375558
Mining Imperfect Data Dealing With Contamination And Incomplete Records Ronald K Pearson
$ 31.00 $ 45.00 (-31%)

5.0

90 reviews

Mining Imperfect Data Dealing With Contamination And Incomplete Records Ronald K Pearson instant download after payment.

Publisher: SIAM: Society for Industrial and Applied Mathematics
File Extension: PDF
File size: 35.75 MB
Pages: 316
Author: Ronald K. Pearson
ISBN: 9780898715828, 0898715822
Language: English
Year: 2005

Product desciption

Mining Imperfect Data Dealing With Contamination And Incomplete Records Ronald K Pearson by Ronald K. Pearson 9780898715828, 0898715822 instant download after payment.

Data mining is concerned with the analysis of databases large enough that various anomalies, including outliers, incomplete data records, and more subtle phenomena such as misalignment errors, are virtually certain to be present. Mining Imperfect Data: Dealing with Contamination and Incomplete Records describes in detail a number of these problems, as well as their sources, their consequences, their detection, and their treatment. Specific strategies for data pretreatment and analytical validation that are broadly applicable are described, making them useful in conjunction with most data mining analysis methods. Examples are presented to illustrate the performance of the pretreatment and validation methods in a variety of situations; these include simulation-based examples in which "correct" results are known unambiguously as well as real data examples that illustrate typical cases met in practice.

Mining Imperfect Data, which deals with a wider range of data anomalies than are usually treated in one book, includes a discussion of detecting anomalies through generalized sensitivity analysis (GSA), a process of identifying inconsistencies using systematic and extensive comparisons of results obtained by analysis of exchangeable datasets or subsets. The book makes extensive use of real data, both in the form of a detailed analysis of a few real datasets and various published examples. Also included is a succinct introduction to functional equations that illustrates their utility in describing various forms of qualitative behavior for useful data characterizations.

Related Products