Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data Mining in Finance: Advances in Relational and Hybrid Methods

Buy

Data Mining in Finance presents a comprehensive overview of major algorithmic approaches to predictive data mining, including statistical, neural networks, ruled-based, decision-tree, and fuzzy-logic methods, and then examines the suitability of these approaches to financial data mining. The book focuses specifically on relational data mining (RDM), which is a learning method able to learn more expressive rules than other symbolic approaches. RDM is thus better suited for financial mining, because it is able to make greater use of underlying domain knowledge. Relational data mining also has a better ability to explain the discovered rules -- an ability critical for avoiding spurious patterns which inevitably arise when the number of variables examined is very large. The earlier algorithms for relational data mining, also known as inductive logic programming (ILP), suffer from a relative computational inefficiency and have rather limited tools for processing numerical data. Data Mining in Finance introduces a new approach, combining relational data mining with the analysis of statistical significance of discovered rules. This reduces the search space and speeds up the algorithms. The book also presents interactive and fuzzy-logic tools for `mining' the knowledge from the experts, further reducing the search space. Data Mining in Finance contains a number of practical examples of forecasting S&P 500, exchange rates, stock directions, and rating stocks for portfolio, allowing interested readers to start building their own models. This book is an excellent reference for researchers and professionals in the fields of artificial intelligence, machine learning, data mining, knowledge discovery, and applied mathematics.

(HTML tags aren't allowed.)

Medical Response to Terrorism: Preparedness and Clinical Practice
Medical Response to Terrorism: Preparedness and Clinical Practice
Even two decades ago, few would have imagined that terrorism would be planned and carried out on such an enormous scale as it is today. Terrorist attacks rely on horror and surprise, invoking different times, places, victims, and methods. Their purpose is to cause widespread confusion, fear, injury, and death. They disrupt security,...
Closed-Loop Control of Blood Glucose (Lecture Notes in Control and Information Sciences)
Closed-Loop Control of Blood Glucose (Lecture Notes in Control and Information Sciences)

This book presents closed-loop blood glucose control in a simple manner, which includes the hardware and "software" components that make up the control system. It provides examples on how mathematical models are formulated as well as the control algorithms that stem from mathematical exercises. The book also describes the basic...

Frommer's Ecuador and the Galapagos Islands (Frommer's Complete)
Frommer's Ecuador and the Galapagos Islands (Frommer's Complete)

Researched by a veteran travel writer who lives in Latin America, Frommer's Ecuador & the Galapagos Islands takes you through this fast-changing country, to visit rugged wilderness preserves, sleepy beach towns, the bustling, colonial captital, and, of course, the spectacular Galapagos Islands. Ecuador offers an opportunity for...


Multi-Agent Systems for Traffic and Transportation Engineering (Premier Reference Source)
Multi-Agent Systems for Traffic and Transportation Engineering (Premier Reference Source)
Our increasing societal demand for mobility now challenges researchers to devise more efficient traffic and transportation systems.

The Handbook of Research on Multi-Agent Systems for Traffic and Transportation Engineering provides a unique compendium of research covering topics such as transportation system designs, control...

Network Coding Theory (Foundations and Trends(R) in Communications and Information Theory)
Network Coding Theory (Foundations and Trends(R) in Communications and Information Theory)
Network Coding Theory provides a tutorial on the basic of network coding theory. It presents the material in a transparent manner without unnecessarily presenting all the results in their full generality. Store-and-forward had been the predominant technique for transmitting information through a network until its optimality was refuted by network...
Practical Django Projects (Pratical Projects)
Practical Django Projects (Pratical Projects)
Build a django content management system, blog, and social networking site with James Bennett as he introduces the popular Django framework. You’ll work through the development of each project, implementing and running the applications while learning new features along the way.

Web frameworks are playing a major role in...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy