text mining applications and theory wiley online library

Text Mining : Applications and Theory - Wiley Online Books

2010-3-4 · Text Mining: Applications and Theory presents the state-of-the-art algorithms for text mining from both the academic and industrial perspectives.

Wiley Text Mining: Applications and Theory 978-0-470

Text Mining: Applications and Theory Michael W. Berry (Editor), Jacob Kogan (Editor) E-Book 978-0-470-68965-3 February 2010 $91.00 Hardcover 978-0-470-74982-1 May 2010 $114.25 O-Book 978-0-470-68964-6 March 2010 Available on Wiley Online Library DESCRIPTION Text Mining: Applications and Theory presents the state-of-the-art algorithms for text ...

Index - Text Mining - Wiley Online Library

2010-3-4 · University of Tennessee, Min H. Kao Department of Electrical, Engineering and Computer Science, Knoxville, TN, USA. Search for more papers by this author

Text Mining and Cybercrime - Wiley Online Library

Summary Cyberbullying and internet predation frequently occur over an extended period of time and across several technological platforms. This chapter describes the current state of research in the...

Theory and applications of surface ... - Wiley Online Library

2017-6-5 · Theory and applications of surface micro-kinetics in the rational design of catalysts using density functional theory calculations Yu Mao , Key Laboratory for Advanced Materials, Research Institute of Industrial Catalysis and Centre for Computational Chemistry, East China University of Science and Technology, Shanghai, China

Polymerization Data Mining: A ... - Wiley Online Library

2018-12-20 · Polymerization data mining is the art of revealing insights and developing new knowledge from huge amounts of data routinely generated in polymerization systems and polymer characterization (polymerization processes and properties of polymer materials are the specific topic of this article).

e‐Research and learning theory ... - Wiley Online Library

2014-2-28 · Using methodological developments in research on self-regulated learning as an example, it argues that current applications of data-driven analytical techniques, such as educational data mining and its branch process mining, are deeply grounded in an event-focused, ontologically flat

Automatic Keyword Extraction from ... - Wiley Online Library

2010-3-4 · Keywords are widely used to define queries within information retrieval (IR) systems as they are easy to define, revise, remember, and share. This chapter describes the rapid automatic keyword extraction (RAKE), an unsupervised, domain-independent, and language-independent method for extracting keywords from individual documents.

The empirical valence bond model ... - Wiley Online Library

2011-1-21 · Recent years have seen an explosion in computer power, allowing for the examination of ever more challenging problems. For instance, a recent simulation study, which was the first of its kind, was able to actually explore the dynamical nature of enzyme catalysis on a millisecond timescale (Pisliakov AV, Cao J, Kamerlin SCL, Warshel A. Proc Natl Acad Sci U S A 2009, 106:17359.),

Knowledge discovery and semantic learning in the

2018-6-26 · Axiomatic fuzzy set (AFS) theory facilitates a way on how to transform data into fuzzy sets (membership functions) and implement their fuzzy logic operations, which provides a flexible and powerful tool for representing human knowledge and emulate human recognition process. In recent years, AFS theory has received increasing interest.

e‐Research and learning theory ... - Wiley Online Library

2014-2-28 · Using methodological developments in research on self-regulated learning as an example, it argues that current applications of data-driven analytical techniques, such as educational data mining and its branch process mining, are deeply grounded in an event-focused, ontologically flat

Development and application of the ... - Wiley Online Library

The results of this application were used to investigate the value of the rated ranking procedure including reliability, nature of the distributions, differences between groups and individuals, halo, construct validity and potential bias in the evaluations.

Digital humanities in the iSchool - Walsh - - Journal of ...

2021-6-21 · Text analysis/mining, which involves the computational analysis of textual data, is often used as an umbrella term for a range of strategies, including the application of natural language processing and machine learning tools, topic modeling, sentiment analysis, and document classification.

A theory of term importance in automatic text analysis ...

A new technique, known as discrimination value analysis, ranks the text words in accordance with how well they are able to discriminate the documents of a collection from each other; that is, the value of a term depends on how much the average separation between individual documents changes when the given term is assigned for content ...

Small-Angle Scattering: Theory ... - wiley

Small-Angle Scattering: Theory, Instrumentation, Data, and Applications is a valuable source of detailed information for researchers and postgraduate students in the field, as well as other researchers using X-ray and neutron scattering to investigate soft materials, other nanostructured materials and biomolecules such as proteins.

Calculations of magnetically induced current densities ...

2016-6-13 · Representative applications are reported illustrating the importance of careful current density studies for organic and inorganic chemistry. The applications include calculations of current densities and current strengths for aromatic, antiaromatic, and nonaromatic molecules of different kind.

Reflectarray Antennas: Theory, Designs, and Applications ...

This book provides engineers with a comprehensive review of the state-of-the-art in reflectarray antenna research and development. The authors describe, in detail, design procedures for a wide range of applications, including broadband, multi-band, multi-beam, contour-beam, beam-scanning, and conformal reflectarray antennas. They provide sufficient coverage of basic reflectarray theory to ...

Fuzzy observer‐based tracking ... - Wiley Online Library

2020-3-1 · 1 Introduction. In recent years, autonomous underwater vehicles (AUVs), have undertaken important roles in oceanographic research and geoscience studies [1, 2], plume tracing [], oil spills and pipeline monitoring [4, 5], underwater archaeological surveying [], mapping flow fields [], inspection [], sampling [] and tracking marine life [] etc.In light of these autonomous applications, in this ...

Enabling cyber‐physical ... - Wiley Online Library

2017-4-1 · 1 Introduction. With the world expecting over 50 billion sensors to be connected to the Internet by 2020 [], whose wide deployments are made easier by the technological advancements in micro-electromechanical systems, along with the efficient low-cost designs of hardware architectures and components, the amount of data to be sensed, collected, and transmitted is expected to be growing at

A quarter century of system ... - Wiley Online Library

2018-11-28 · A theory of system justification was proposed 25 years ago by Jost and Banaji (1994, Br. J. Soc. Psychol., 33, 1) in the British Journal of Social Psychology to explain ‘the participation by disadvantaged individuals and groups in negative stereotypes of themselves' and the phenomenon of outgroup favouritism. The scope of the theory was subsequently expanded to account for a much

Development and application of the ... - Wiley Online Library

The results of this application were used to investigate the value of the rated ranking procedure including reliability, nature of the distributions, differences between groups and individuals, halo, construct validity and potential bias in the evaluations.

A theory of term importance in automatic text analysis ...

A new technique, known as discrimination value analysis, ranks the text words in accordance with how well they are able to discriminate the documents of a collection from each other; that is, the value of a term depends on how much the average separation between individual documents changes when the given term is assigned for content ...

DATE analysis: A general theory of ... - Wiley Online Library

2009-10-12 · In contrast to conventional data mining, which searches for specific subsets of genes (extensive variables) to correlate with specific phenotypes, DATE analysis correlates intensive state

Small-Angle Scattering: Theory ... - wiley

Small-Angle Scattering: Theory, Instrumentation, Data, and Applications is a valuable source of detailed information for researchers and postgraduate students in the field, as well as other researchers using X-ray and neutron scattering to investigate soft materials, other nanostructured materials and biomolecules such as proteins.

TAM and stages of adoption of ... - Wiley Online Library

2019-6-24 · The purpose of the study is to analyse and identify the stages of adoption of the blended learning (BL or b-learning) methodology in higher education contexts, and to assess the relationship of these stages with a set of variables related to personal and professional characteristics, attributes perceived on BL and contextual variables.

Reflectarray Antennas: Theory, Designs, and Applications ...

This book provides engineers with a comprehensive review of the state-of-the-art in reflectarray antenna research and development. The authors describe, in detail, design procedures for a wide range of applications, including broadband, multi-band, multi-beam, contour-beam, beam-scanning, and conformal reflectarray antennas. They provide sufficient coverage of basic reflectarray theory to ...

An application of media and network multiplexity theory

2021-1-27 · Understanding how information use contributes to uncertainties surrounding evacuation decisions is crucial during disasters. While literature increasingly establishes that people consult multiple information sources in disaster situations, little is known about the patterns in which multiple media and personal network sources are combined simultaneously and sequentially across decision-making ...

Trends in ecology and conservation ... - Wiley Online Library

2021-4-1 · The fields of ecology and conservation have undergone rapid growth since the discipline-specific journal Ecology was first published over a century ago (eg Reiners et al. 2017; Kim et al. 2018).Today, hundreds of ecology journals represent

Enabling cyber‐physical ... - Wiley Online Library

2017-4-1 · 1 Introduction. With the world expecting over 50 billion sensors to be connected to the Internet by 2020 [], whose wide deployments are made easier by the technological advancements in micro-electromechanical systems, along with the efficient low-cost designs of hardware architectures and components, the amount of data to be sensed, collected, and transmitted is expected to be growing at

A quarter century of system ... - Wiley Online Library

2018-11-28 · A theory of system justification was proposed 25 years ago by Jost and Banaji (1994, Br. J. Soc. Psychol., 33, 1) in the British Journal of Social Psychology to explain ‘the participation by disadvantaged individuals and groups in negative stereotypes of themselves' and the phenomenon of outgroup favouritism. The scope of the theory was subsequently expanded to account for a much

Copyright © 2020.Company name All rights reserved.SiteMap