Preface |
|
xvi | |
Acknowledgment |
|
xxiv | |
Section 1 Foundations of Intelligent Analytics |
|
|
Chapter 1 The Nature of Intelligent Analytics |
|
|
|
|
|
Intelligent analytics is an emerging paradigm in the age of big data, analytics, and artificial intelligence (AI). |
|
|
|
This chapter explores the nature of intelligent analytics. |
|
|
|
More specifically, this chapter identifies the foundations, cores, and applications of intelligent big data analytics based on the investigation into the state-of-the-art scholars' publications and market analysis of advanced analytics. |
|
|
|
Then it presents a workflow-based approach to big data analytics and technological foundations for intelligent big data analytics through examining intelligent big data analytics as an integration of AI and big data analytics. |
|
|
|
The chapter also presents a novel approach to extend intelligent big data analytics to intelligent analytics. |
|
|
|
The proposed approach in this chapter might facilitate research and development of intelligent analytics, big data analytics, business analytics, business intelligence, AI, and data science. |
|
|
|
Chapter 2 Hybrid Intelligence Framework for Augmented Analytics |
|
|
22 | (24) |
|
|
Analytics is a key success factor for any business in the competitive and fast-changing world we live in. |
|
|
|
Using analytics, people, business, social, and government organizations become capable of understanding the past, including lessons from faults and achievements; realize current strengths, weaknesses, opportunities, and threats; and predict the future. |
|
|
|
Intelligent analytics allow doing these more effectively and efficiently. |
|
|
|
Modern analytics uses many advanced techniques like big data, artificial intelligence, and many others. |
|
|
|
This chapter aims to introduce the hybrid intelligence approach by focusing on its unique analytical capabilities. |
|
|
|
The state-of-the-art in hybrid intelligence-symbiosis and cooperative interaction between human intelligence and artificial intelligence in solving a wide range of practical tasks-and one of the hybrid intelligence frameworks-a human-centered evaluation approach and monitoring of complex processes-have been considered in this chapter. |
|
|
|
The chapter could be interesting for analysts and researchers who desire to do analytics with more intelligence. |
|
|
|
Chapter 3 Only Can AI Understand Me? Big Data Analytics, Decision Making, and Reasoning |
|
|
46 | (21) |
|
|
|
This chapter addresses whether AI can understand me. |
|
|
|
A framework for regulating AI systems that draws on Strawson's moral philosophy and concepts drawn from jurisprudence and theories on regulation is used. |
|
|
|
This chapter proposes that, as AI algorithms increasingly draw inferences following repeated exposure to big datasets, they have become more sophisticated and rival human reasoning. |
|
|
|
Their regulation requires that AI systems have agency and are subject to the rulings of courts. |
|
|
|
Humans sponsor the AI systems for registration with regulatory agencies. |
|
|
|
This enables judges to make moral culpability decisions by taking the AI system's explanation into account along with the full social context of the misdemeanor. |
|
|
|
The proposed approach might facilitate the research and development of intelligent analytics, intelligent big data analytics, multiagent systems, artificial intelligence, and data science. |
|
|
|
Chapter 4 Data Science and Big Data Practice Using Apache Spark and Python |
|
|
67 | (30) |
|
|
|
Data science and big data analytics are still at the center of computer science and information technology. |
|
|
|
Students and researchers not in computer science often found difficulties in real data analytics using programming languages such as Python and Scala, especially when they attempt to use Apache-Spark in cloud computing environments-Spark Scala and PySpark. |
|
|
|
At the same time, students in information technology could find it difficult to deal with the mathematical background of data science algorithms. |
|
|
|
To overcome these difficulties, this chapter will provide a practical guideline to different users in this area. |
|
|
|
The authors cover the main algorithms for data science and machine learning including principal component analysis (PCA), support vector machine (SVM), k-means, k-nearest neighbors (kNN), regression, neural networks, and decision trees. |
|
|
|
A brief description of these algorithms will be explained, and the related code will be selected to fit simple data sets and real data sets. |
|
|
|
Some visualization methods including 2D and 3D displays will be also presented in this chapter. |
|
|
Section 2 Technologies for Intelligent Analytics |
|
|
Chapter 5 On the Similarity Search With Hamming Space Sketches |
|
|
97 | (31) |
|
|
|
This chapter focuses on data searching, which is nowadays mostly based on similarity. |
|
|
|
The similarity search is challenging due to its computational complexity, and also the fact that similarity is subjective and context dependent. |
|
|
|
The authors assume the metric space model of similarity, defined by the domain of objects and the metric function that measures the dissimilarity of object pairs. |
|
|
|
The volume of contemporary data is large, and the time efficiency of similarity query executions is essential. |
|
|
|
This chapter investigates transformations of metric space to Hamming space to decrease the memory and computational complexity of the search. |
|
|
|
Various challenges of the similarity search with sketches in the Hamming space are addressed, including the definition of sketching transformation and efficient search algorithms that exploit sketches to speed-up searching. |
|
|
|
The indexing of Hamming space and a heuristic to facilitate the selection of a suitable sketching technique for any given application are also considered. |
|
|
|
Chapter 6 Connectivity Management in Drone Networks: Models, Algorithms, and Methods |
|
|
128 | (29) |
|
|
|
|
|
Drone technologies have attracted the attention of many researchers in recent years due to their potential opportunities. |
|
|
|
Fleets of drones integrated with widely available relatively short-range communication technologies have various application areas such as wildlife monitoring, disaster relief, and military surveillance. |
|
|
|
One of the major problems in this manner is maintaining the connectivity of the drone network. |
|
|
|
In this chapter, the authors study the connectivity management issues in drone networks. |
|
|
|
Firstly, movement, communication, and channel models are described by the authors, along with the problem definition. |
|
|
|
The hardness of the problem is investigated by proving its NP-Hardness. |
|
|
|
Various algorithms proposed to solve the connectivity management problem and their variants are evaluated in detail. |
|
|
|
Lastly, for future directions, the authors present mathematical methods to solve the emerging problem in drone networks. |
|
|
|
Chapter 7 Exploring Cryptocurrency Sentiments With Clustering Text Mining on Social Media |
|
|
157 | (15) |
|
|
|
|
Social media has become a popular communication platform and aggregated mass information for sentimental analysis. |
|
|
|
As cryptocurrency has become a hot topic worldwide in recent years, this chapter explores individuals' behavior in sharing Bitcoin information. |
|
|
|
First, Python was used for extracting around one month's set of Tweet data to obtain a dataset of 11,674 comments during a month of a substantial increase in Bitcoin price. |
|
|
|
The dataset was cleansed and analyzed by the process documents operator of RapidMiner. |
|
|
|
A word-cloud visualization for the Tweet dataset was generated. |
|
|
|
Next, the clustering operator of RapidMiner was used to analyze the similarity of words and the underlying meaning of the comments in different clusters. |
|
|
|
The clustering results show 85% positive comments on investment and 15% negative ones to Bitcoin-related tweets concerning security. |
|
|
|
The results represent the generally bullish environment of the cryptocurrency market and general user satisfaction during the period concerned. |
|
|
|
Chapter 8 AI-Driven Big Healthcare Analytics: Contributions and Challenges |
|
|
172 | (13) |
|
|
|
With the increased development of technology in healthcare, a huge amount of data is collected from healthcare organizations and stored in distributed medical data centers. |
|
|
|
In this context, such data quantities, called medical big data, which include different types of digital contents such as text, image, and video, have become an interesting topic tending to change the way we describe, manage, process, analyze, and visualize data in healthcare industry. |
|
|
|
Artificial intelligence (AI) is one of the sub-fields of computer science enabling us to analyze and solve more complex problems in many areas, including healthcare. |
|
|
|
AI-driven big healthcare analytics have the potential to predict patients at risk, spread of viruses like SARS-CoV-2, spread of new coronavirus, diseases, and new potential drugs. |
|
|
|
This chapter presents the AI-driven big healthcare analytics as well as discusses the benefits and the challenges. |
|
|
|
It is expected that the chapter helps researchers and practitioners to apply AI and big data to improve healthcare. |
|
|
|
Chapter 9 Face Recognition and Face Detection Using Open Computer Vision Classifiers and Python |
|
|
185 | (24) |
|
|
|
|
Identification of a person by looking at the image is really a topic of interest in this modern world. |
|
|
|
There are many different ways by which this can be achieved. |
|
|
|
This research work describes various technologies available in the open-computer-vision (OpenCV) library and methodology to implement them using Python. |
|
|
|
To detect the face Haar Cascade are used, and for the recognition of face eigenfaces, fisherfaces, and local binary pattern, histograms has been used. |
|
|
|
Also, the results shown are followed by a discussion of encountered challenges and also the solution of the challenges. |
|
|
Section 3 Applications of Intelligent Analytics |
|
|
Chapter 10 Big Data Analytics for Smart Airport Management |
|
|
209 | (23) |
|
|
|
Smart airport management has drawn increasing attention worldwide for improving airport operational efficiency. |
|
|
|
Big data analytics is an emerging computing paradigm and enabler for smart airport management in the age of big data, analytics, and artificial intelligence (AI). |
|
|
|
This chapter will explore big data analytics for smart airport management from a perspective of PNG Jackson's International Airport. |
|
|
|
More specifically, this chapter first provides an overview of big data analytics and smart airport management and then looks at the impact of big data analytics on smart airport management. |
|
|
|
The chapter discusses how to apply big data analytics and smart airport management to upgrade PNG Jackson's International Airport in terms of safety and security, optimizing operational effectiveness, service enhancements, and customer experience. |
|
|
|
The approach proposed in this chapter might facilitate research and development of intelligent big data analytics, smart airport management, and customer relationship management. |
|
|
|
Chapter 11 A Big Data Analysis of the Factors Influencing Movie Box Office in China |
|
|
232 | (18) |
|
|
|
|
|
A movie's economic revenue comes mainly from the movie box office, while the influencing factors of the movie box office are complex and numerous. |
|
|
|
This research explores the influencing factors of China's commercial movie box office by analyzing the top 100 box office movies released in Mainland China between 2013-2016, with a total of 400 movies. |
|
|
|
The authors analyzed the data collected using correlation analysis and decision tree analysis using RapidMiner, respectively. |
|
|
|
Based on the analysis results, they put forward suggestions for improving the box office of the movie industry. |
|
|
|
Chapter 12 Evaluation of Hotel Web Pages According to User Suitability |
|
|
250 | (14) |
|
|
|
In recent years, with the development of the internet, there has been an increase in interest in the internet thanks to other technological developments. |
|
|
|
In the face of increased user demand, hotel webpages have to maintain high quality of service for a sustainable success. |
|
|
|
The authors present the Pythagorean fuzzy TOPSIS method to evaluate the hotel webpages. |
|
|
|
In this study, the most suitable hotel web page has been selected among the five hotel web page alternatives based on 13 criteria according to three experts' opinions. |
|
|
|
In contrast to precise numbers in TOPSIS method, the merit of fuzzy TOPSIS method is to handle the fuzzy numbers to evaluate the alternatives. |
|
|
|
Experts cannot express certain evaluations explicitly when using precise values during making decisions. |
|
|
|
However, the use of linguistic variables provides great success in decision making under uncertain environments. |
|
|
|
Pythagorean fuzzy number is used to define the weights of the criteria according to three experts' opinions. |
|
|
|
Five alternative hotel web pages are ranked by using Pythagorean fuzzy number. |
|
|
|
Chapter 13 The Impact of News on Public-Private Partnership Stock Price in China via Text Mining Method |
|
|
264 | (23) |
|
|
|
In data analytics, the application of text analysis is always challenging, in particular, when performing the text mining of Chinese characters. |
|
|
|
This study aims to use the micro-blog data created by the users to conduct text mining and analysis of the impact of stock market performances in China. |
|
|
|
Based upon Li's instance labeling method, this chapter examines the correlation between social media information and a public-private partnership (PPP)-related company stock prices. |
|
|
|
The authors crawled the data from EastMoney platform via a web crawler and obtained a total of 79,874 language data from 10 January 2017 to 28 November 2019. |
|
|
|
The total material data obtained is 79,616, which the authors use for specific training in the financial corpus. |
|
|
|
The findings of this chapter indicate that the investor investment sentiment has a certain impact on the stock price movement of selected stocks in the PPP sector. |
|
|
|
Chapter 14 Ergonomic Criteria Based Material Handling Equipment Selection |
|
|
287 | (17) |
|
|
Material handling refers to the processes of loading materials onto a material handling equipment, moving from one location to another location with the help of material handling equipment, and unloading the material from the transportation equipment to the relevant location. |
|
|
|
Non-ergonomic material handling equipment for the employee causes the increment of cycle time that does not add value to the product during transportation within the enterprise. |
|
|
|
The increase in cycle time causes an increase in fatigue and inefficiency in the employee. |
|
|
|
This study evaluates five material handling equipment based on eight ergonomic criteria by using interval type-2 fuzzy TOPSIS method. |
|
|
|
Interval type-2 fuzzy number provides to examine the fuzziness and the uncertainty more accurately than type-1 fuzzy number, which handles only one crisp membership degree. |
|
|
|
The opinions of experts are aggregated by employing interval type-2 fuzzy number operators. |
|
|
|
Chapter 15 A Preliminary Framework to Fight Tax Evasion in the Home Renovation Market |
|
|
304 | (22) |
|
|
|
|
This chapter presents a preliminary framework to tackle tax evasion in the field of residential renovation. |
|
|
|
This industry plays a major role in economic development and employment growth. |
|
|
|
Tax evasion and fraud are extremely difficult to combat in the industry since it is characterized by a large number of stakeholders (manufacturers, retailers, tradesmen, and households) generating complex transactional dynamics that often defy attempts to deploy transactional analytics to detect anomalies, fraud, and tax evasion. |
|
|
|
This chapter proposes a framework to apply transactional analytics and data mining to develop standard measures and predictive models to detect fraud and tax evasion. |
|
|
|
Combining big data sets, cross-referencing, and predictive modeling (i.e., anomaly detection, artificial neural network support vector machines, Bayesian network, and association rules) can assist government agencies to combat highly stealth tax evasion and fraud in the residential renovation. |
|
|
|
Chapter 16 Development and Analysis of Virtual Laboratory as an Assistive Tool for Teaching Grade 8 Physical Science Classes |
|
|
326 | (24) |
|
|
|
|
This chapter discusses the development of a virtual laboratory (VL) named "EduPhysics," an assistive software tailored around the Namibian Physical Science textbook for Grade 8 learners, and examines the viability of implementing VL in education. |
|
|
|
It further presented reviews on the role of computer simulations in science education and teachers' perspective on the use of EduPhysics in physical science classrooms. |
|
|
|
The chapter adopted a mixed method with an experimental research design and used questionnaires and interviews as data collection tools in high school physical science classes. |
|
|
|
The analysis found that there are limited resources in most physical science laboratories. |
|
|
|
Computer laboratories, however, are well equipped and have computing capacities to support the implementation of VL. |
|
|
|
It was concluded that virtual laboratories could be an alternative approach to hands-on practical work that is currently undertaken in resource-constrained physical science labs. |
|
|
|
For future work, augmented reality and logs will be incorporated within EduPhysics. |
|
|
Compilation of References |
|
350 | (34) |
About the Contributors |
|
384 | (6) |
Index |
|
390 | |