Outlier analysis (Record no. 53211)

MARC details
000 -LEADER
fixed length control field 02060 a2200277 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200731b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783319837727
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 519.52
Item number AGG
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Aggarwal, Charu C.
245 ## - TITLE STATEMENT
Title Outlier analysis
250 ## - EDITION STATEMENT
Edition statement 2nd
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc Springer,
Date of publication, distribution, etc 2017.
Place of publication, distribution, etc Cham, Switzerland:
300 ## - PHYSICAL DESCRIPTION
Extent xxi, 465 p.
Other physical details pb;
Dimensions 25 cm.
365 ## - TRADE PRICE
Price type code EURO
Price amount 66.99
520 ## - SUMMARY, ETC.
Summary, etc With the increasing advances in hardware technology for data collection, and advances in software technology (databases) for data organization, computer scientists have increasingly participated in the latest advancements of the outlier analysis field. Computer scientists, specifically, approach this field based on their practical experiences in managing large amounts of data, and with far fewer assumptions- the data can be of any type, structured or unstructured, and may be extremely large. Outlier Analysis is a comprehensive exposition, as understood by data mining experts, statisticians and computer scientists. The book has been organized carefully, and emphasis was placed on simplifying the content, so that students and practitioners can also benefit. Chapters will typically cover one of three areas: methods and techniques commonly used in outlier analysis, such as linear methods, proximity-based methods, subspace methods, and supervised methods; data domains, such as, text, categorical, mixed-attribute, time-series, streaming, discrete sequence, spatial and network data; and key applications of these methods as applied to diverse domains such as credit card fraud detection, intrusion detection, medical diagnosis, earth science, web log analytics, and social network analysis are covered.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Science
9 (RLIN) 3
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data Mining & Knowledge Discovery
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Outliners
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Satatistics
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Statistics & Computing
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Statistics Programs
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Artificial Intelligence
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Database Management
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Systems & Data Security
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Date last borrowed Copy number Cost, replacement price Koha item type
    Dewey Decimal Classification     General IIT Gandhinagar IIT Gandhinagar 30/07/2020 Himanshu Books 5835.50 1 519.52 AGG 029155 28/10/2021 21/09/2021 1 5835.50 Books


Copyright ©  2022 IIT Gandhinagar Library. All Rights Reserved.

Powered by Koha