{"title":"Web Mining and Business Intelligence: A Key Factor for Success","authors":"H. M, D. G","doi":"10.36647/ttidmkd/02.04.a004","DOIUrl":"https://doi.org/10.36647/ttidmkd/02.04.a004","url":null,"abstract":"The world is evolving with a robust pace which has been an increase the competition and implication of various technological and system-oriented practices and gadgets within business. Web mining and business intelligence are the key examples of the digital tools and practice which helps a business company to analyse data about phenomenon and go with most suited corporate strategy and decisions in business. A huge number of business companies have been already applied the usages of web mining and BI in their business to meet a higher business growth in the worldwide market. Hence, this particular study has been kept its concentration on evaluating role of web mining and BI in the performance and success rate of a company in global periphery. Various definition and concepts of BI and web manning have been discussed within the study. Inductive approach and qualitative data have been taken to perform the overall study while the secondary data collection method has been used to gather various qualitative data within the entire study. The entire study has been found BI and web mining mostly enhance the growth of a company and increase the success rate of a company in the global market. Lastly, the study has been evaluated with sheer amount of insights and all of the discussed extension have been summarized within a certain manner.","PeriodicalId":314032,"journal":{"name":"TechnoareteTransactions on Intelligent Data Mining and Knowledge Discovery","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121592944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Techniques and Softwares for Social Media Data Mining","authors":"D. G, Dr. Sanjiv Kumar Jain","doi":"10.36647/ttidmkd/02.03.a004","DOIUrl":"https://doi.org/10.36647/ttidmkd/02.03.a004","url":null,"abstract":"Data mining refers to a framework by which a company can easily enhance their performance. In this study, social media data mining process is critically evaluated with help of several types of data sets. Techniques and software’s are also mentioned in this study, by which a firm maintains this data mining process in a significant way. Importance of social media data mining is to attract more customers. Every company has a goal and objective in global market to enhance their performance. Social media data mining process helps a company to achieve those objectives and goals. Predictive analysis, improved revenue, lower costs and creating awareness are essential benefits of this particular process related to a company. Privacy and security related issues of data are faced by a firm with help of this data mining process. This process requires more amount of money initially, for this reason, small organisations cannot be able to maintain this social media data mining process. Association, clustering, classification, machine learning process, data cleaning and data visualisation are unique and relevant techniques of data mining. Usage of these techniques are briefly discussed in this study..","PeriodicalId":314032,"journal":{"name":"TechnoareteTransactions on Intelligent Data Mining and Knowledge Discovery","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132277090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predictive Data Mining in Clinical Medicine: Current Issues and Guidelines","authors":"Joey G. Fernando, Dr. Sanjiv Kumar Jain","doi":"10.36647/ttidmkd/02.03.a003","DOIUrl":"https://doi.org/10.36647/ttidmkd/02.03.a003","url":null,"abstract":"The following study is based on the predictive data mining in clinical medicine where all data have been selected by focusing on the following topic. At the first the brief introduction of data mining, predictive data mining and its usage on the clinical medicines have been shared. Then the required materials and methods have been furnished up next. After that, the usages of predictive data mining in clinical medicines have been elaborated. The usages have been depicted within several parts of, such the use of predictive data mining in the clinical medicines. Also, the uses of different models of predictive data mining have been illustrated within an extensive manner. Later on, the benefits of predictive data mining for the healthcare sector and its profit making and advantages for using predictive data mining for a medical practitioner have been represented by gathering valid insights. Furthermore, the challenges and issues related to healthcare sectors and clinical medicines have ben flaunted in the following study and the strategies to mitigate the problems by using predictive data mining has been depicted within sheer elaboration.","PeriodicalId":314032,"journal":{"name":"TechnoareteTransactions on Intelligent Data Mining and Knowledge Discovery","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132113117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Application of Decision Tree Method for Data Mining","authors":"D. G, Dr. T. Nadana Ravishankar","doi":"10.36647/ttidmkd/02.03.a005","DOIUrl":"https://doi.org/10.36647/ttidmkd/02.03.a005","url":null,"abstract":"The study showcases the impact of data mining considering the application of decision trees that helps to develop data from large number of datasets. Linear data set has been generated through the model of decision trees. Secondary data collection method has been selected in this study with inductive approach. Cross sectional research design has been used in this study to derived insight of the subject of the study. Themes are developed using the peer reviewed journals published after 2019 and secondary collected data has been interpreted in this study to meet the goal of the subject. Implications of data mining including decision trees and decision rules in different field have been discussed over here with positive perspective approach. Customization of data mining in creativity also has been focused here. Different types of decision trees methods have been depicted here with comparison vision. Advantages and disadvantages of decision trees also have been discussed over here to evaluate the actual impact of application of decision trees in data mining. Interpretation of results also has been depicted here to analyse the consequences of decision trees in data mining to conclude the study with informative justification.","PeriodicalId":314032,"journal":{"name":"TechnoareteTransactions on Intelligent Data Mining and Knowledge Discovery","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134389591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Role of Data Mining in Education Sector","authors":"Sunil Mp, Gernel S. Lumacad","doi":"10.36647/ttidmkd/02.03.a002","DOIUrl":"https://doi.org/10.36647/ttidmkd/02.03.a002","url":null,"abstract":"Abstract : Data mining is a method used for categorizing and predicting the performance of a student and a teacher as well. It helps both student and teacher in developing the teaching method and the entire system. Every student who uses this method get a huge favor from this. This helps students to choose the right career option. Currently, the tendency of providing immense importance to data mining techniques in the educational sector is increasing as these procedures have a huge necessity in bringing efficiency in both learning and teaching procedures. Each and every person is gathering a large amount of data every day, in case these data are not further examined; only the large amount of data will remain. With the latest systems and technologies, people can utilise these data and examine those and benefit from it. The best technique for this issue is the data mining process. Data mining is a method of bringing out the useful and disclosed data and information from big data sets. Educational data mining is a process from which teachers and students get a lot of help. Teachers are able to observe every student’s performance. On the other hand, students can choose a perfect and accurate career option by this process. This process utilises several techniques and methods such as statistics, machine learning, data analysis and data mining. Educational data mining is a method of raw information converting from a huge educational database to meaningful and effective information.","PeriodicalId":314032,"journal":{"name":"TechnoareteTransactions on Intelligent Data Mining and Knowledge Discovery","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129219786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vyshnavi Ankam, N. M. Reddy, Mohammed Mutahar Mujahid
{"title":"Implementation of Blockchain Based Data Storage and Verification for Access","authors":"Vyshnavi Ankam, N. M. Reddy, Mohammed Mutahar Mujahid","doi":"10.36647/ttidmkd/02.03.a001","DOIUrl":"https://doi.org/10.36647/ttidmkd/02.03.a001","url":null,"abstract":"Verification for access is used in software to secure information of the user. There are some kinds of verification process, however, as per the secondary information; major users prefer the biometric verification process. On the other hand, block chain based data storage is used in businesses, banking sectors, and other sectors. In this case, this process helps to store confidential information with proper security. This research is focused on the implementation process of block chain based data storage and verification access control. The aim of this research is to demonstrate the importance of block chain data storage and verification access control in various sectors to store and secure information of the users. This research has used the quantitative research data collection method to collect information on block chain and verification access. As per the information, it can be stated that the user has increased demand for block chain due to its verification ability, and it’s other benefits such as increased speed of work, traceability, track of confidential data, and others. In this research, the implementation process of block chain has been discussed with an algorithm flowchart. As per the flowchart, there is a node that helps to store the information of the user and increase the value of block chain data storage. As per the result of this research, there are few steps to implement data storage and those are increasing knowledge on block chain and verification, and strategizing block chain, and plan to implement that. After that, the simulation process needs to be entered in this process to check the progress of implementation. In this research work, the FMS model is discussed to focus on the implementation of verification for access. Keyword : Blockchain, data storage, verification access control, technology, CSE","PeriodicalId":314032,"journal":{"name":"TechnoareteTransactions on Intelligent Data Mining and Knowledge Discovery","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123173870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Importance of Data Biometric in the Organisational Culture","authors":"Geraldin B. Dela Cruz, Rayner Alfred","doi":"10.36647/ttidmkd/02.02.a001","DOIUrl":"https://doi.org/10.36647/ttidmkd/02.02.a001","url":null,"abstract":"Biometric data is a technology that users or workers use and saves a lot of time. This technology helps people to keep things, data, and information more safe. There are several types of biometric such as fingerprints scan, iris scan, palm scan, face scans and many more. Users no longer need to remember passwords or pin codes because of this technology. Users just have to scan their fingers or palm, face or eyes to unlock devices and this system is way more secure than any other systems. Though it is a high cost system, organisations can trust on this system because no one can easily hack this technology as every person has different characteristics. Passwords, pin codes, pattern locks can be easily hacked but hacking someone’s fingerprints or iris scan is quite impossible. Still hackers can hack this technology sometimes. Mainly voice commands get hacked easily because anyone can record a user's voice without consent. In that case, users have to be more careful about personal things and should not share single information with anyone","PeriodicalId":314032,"journal":{"name":"TechnoareteTransactions on Intelligent Data Mining and Knowledge Discovery","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124835271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Analysis about Different Steps that Play an Indispensable Role in Developing Enterprise Data Protection Framework","authors":"D. G, B. Mahesh","doi":"10.36647/ttidmkd/02.02.a004","DOIUrl":"https://doi.org/10.36647/ttidmkd/02.02.a004","url":null,"abstract":"Enterprise data framework is the way of protecting various data or information in a systematic way. This is depicted strategic application in the way of major ethical practices in the company. The EDM structure of the company and this maintain data protection with various steps like, data identification, assigned compliance, tackling of different limitations, creation f report and sensitive data description. Researcher uses “interpretivism” research philosophy and “inductive” research approach to maintain proper strategy and process of work. Secondary data are collected by researcher with help of this qualitative research type. Several types of strategies related to data privacy protection are mentioned in this study. Financial and organisational losses are managed with help of this data protection framework. Authorisation and authentication are two types of data privacy processes globally. Data protection framework is also managed with the help of this privacy framework. 4 P’s of data privacy is also mentioned in this study. Security and compliance strategy is also mentioned here. Security threats and privacy threats are mentioned in this study.","PeriodicalId":314032,"journal":{"name":"TechnoareteTransactions on Intelligent Data Mining and Knowledge Discovery","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129726378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developing Conception about Differences between OLAP And Data Mining","authors":"Dr. Ajay B Gadicha, Dr. V. Gokula Krishnan","doi":"10.36647/ttidmkd/02.02.a005","DOIUrl":"https://doi.org/10.36647/ttidmkd/02.02.a005","url":null,"abstract":"The following study has been based on the concept of data mining and OLAP and the differences between these aspects. At the beginning, the procedures of data mining an OLAP have been served with a brief introduction. The discussion have focused on the section namely the introductory section, the methodology section, results section, discussion and the conclusion part. The results part has given a detailed account about in ways the data mining is different from the OLAP. Both the technology has been emplaced separates atha tthe finally into result section key difference has been analysis thoroughly. Data is a emerging technological tool that was going o be a revolutionary in the future technology sector but into the current the use of data mining is complex and it is difficult to make the most as the technology is costly as well sales expertise is available in the market. Due to this it can be said that the technology is at a developing stage and it needs further improvement. OLAP is the type of technological tool that is often used to make the process more and more convenient with the analysis of past data. Bothe the technology has its own significance and differences that has been given in the research study.","PeriodicalId":314032,"journal":{"name":"TechnoareteTransactions on Intelligent Data Mining and Knowledge Discovery","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128777386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decision Support System: Overview, Different Types and Elements","authors":"Joey G. Fernando, Myelinda A. Baldelovar","doi":"10.36647/ttidmkd/02.02.a003","DOIUrl":"https://doi.org/10.36647/ttidmkd/02.02.a003","url":null,"abstract":"Decision support system is especially conducts with computing elements which mainly depicts successful report of a company. This system allow to the application of technological development and software application to maintain ethical ways of business practices. The major types of DSS are document driven DSS, model driven DSS, communication driven DSS, data driven DSS and knowledge driven DSS. These types are mainly impact on business practices which finally creates systematic effect on advance production. Graphical interfaces and artificial intelligence are major aspects in this decision making procedure. In the following part of the study, the challenges of using a decision support system in a business has been illustrated in an extensive manner. There are several types of challenges which are crucial before using DSS in a business. For a decision maker, that individual should follow and be aware of technology implementation within a business for a certain manner. Also, required elements of the decision support system have been discussed with the help of proper insights. Also, the study has served with discussion and conclusion to the following topic.","PeriodicalId":314032,"journal":{"name":"TechnoareteTransactions on Intelligent Data Mining and Knowledge Discovery","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122965369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}