VroniPlag Wiki

This Wiki is best viewed in Firefox with Adblock plus extension.

MEHR ERFAHREN

VroniPlag Wiki
Registrieren


Typus
Verschleierung
Bearbeiter
Hindemith
Gesichtet
Yes
Untersuchte Arbeit:
Seite: 414, Zeilen: 20-25
Quelle: Han_Kamber_2006
Seite(n): 560, 561, Zeilen: 560: last lines; 561: 1ff
How can we mine terrorist networks? Traditional methods of machine learning and data mining, taking a random sample of homogeneous objects from a single relation as input, may not be appropriate. The data comprising terrorist networks tend to be heterogeneous, multi-relational, and semi-structured. IDM embodies descriptive and predictive modeling. By considering links (relationships between the entities), more information is made available to the mining process. “How can we mine social networks?” Traditional methods of machine learning and data mining, taking, as input, a random sample of homogenous [sic] objects from a single

[page 561]

relation, may not be appropriate here. The data comprising social networks tend to be heterogeneous, multirelational, and semi-structured.[...] It embodies descriptive and predictive modeling. By considering links (the relationships between objects), more information is made available to the mining process.

Anmerkungen

The source is not mentioned anywhere in the paper.

Also the formatting with italics is parallel.

Sichter
(Hindemith), WiseWoman