Exploratory analysis of textual data streams
نویسندگان
چکیده
منابع مشابه
Exploratory analysis of textual data streams
In this paper, we address exploratory analysis of textual data streams and we propose a bootstrapping process based on a combination of keyword similarity and clustering techniques to: i) classify documents into fine-grained similarity clusters, based on keyword commonalities; ii) aggregate similar clusters into larger document collections sharing a richer, more user-prominent keyword set that ...
متن کاملExploratory Visualization of Data Pattern Changes in Multivariate Data Streams
More and more researchers are focusing on the management, querying and pattern mining of streaming data. The visualization of streaming data, however, is still a very new topic. Streaming data is very similar to time-series data since each datapoint has a time dimension. Although the latter has been well studied in the area of information visualization, a key characteristic of streaming data, u...
متن کاملRobust Textual Data Streams Mining Based on Continuous Transfer Learning
In textual data stream environment, concept drift can occur at any time, existing approaches partitioning streams into chunks can have problem if the chunk boundary does not coincide with the change point which is impossible to predict. Since concept drift can occur at any point of the streams, it will certainly occur within chunks, which is called random concept drift. The paper proposed an ap...
متن کاملGeographical Analysis of COVID-19 Epidemiology in Iran with Exploratory Spatial Data Analysis Approach (ESDA)
Background and Aim: The use of geophysical analysis of the epidemiology to identify geographical factors affecting the prevalence of the disease can be effective on community health policies to control the prevalence of the virus. Therefore, the present study is a geographical analysis of the COVID-19 epidemiology in Iran. Therefore, the purpose of this study is the geographical analysis of co...
متن کاملCombining Exploratory Analysis and Automated Analysis for Anomaly Detection in Real-Time Data Streams
Security analysts can easily become overwhelmed with information, which can lead them to neglect critical alerts. This problem is exemplified in the 2013 Target data breach, which is one of the largest security breaches in history: it exposed 40 million credit card accounts and 70 million of the retailer’s customer profiles (Krebs, 2013). A forensic analysis of the attack (US Senate, 2014) foun...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Future Generation Computer Systems
سال: 2017
ISSN: 0167-739X
DOI: 10.1016/j.future.2016.07.005