International Journal of Data Mining Techniques and Applications最新文献

筛选
英文 中文
Relevance of Reaction Surface Strategy and Artificial Neural Network Proposal in Representing and Development of Confession-Suction Procedure 反应面策略与人工神经网络方案在招供程序表现与发展中的相关性
International Journal of Data Mining Techniques and Applications Pub Date : 2018-03-15 DOI: 10.20894/ijdmta.102.007.001.002
M. Roberts, C. Vijayakumar, K. Sharmila
{"title":"Relevance of Reaction Surface Strategy and Artificial Neural Network Proposal in Representing and Development of Confession-Suction Procedure","authors":"M. Roberts, C. Vijayakumar, K. Sharmila","doi":"10.20894/ijdmta.102.007.001.002","DOIUrl":"https://doi.org/10.20894/ijdmta.102.007.001.002","url":null,"abstract":"","PeriodicalId":414709,"journal":{"name":"International Journal of Data Mining Techniques and Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131242505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Silhouette Threshold Based Text Clustering for Log Analysis 基于剪影阈值的日志文本聚类分析
International Journal of Data Mining Techniques and Applications Pub Date : 2017-06-26 DOI: 10.20894/IJDMTA.102.006.001.004
J. J
{"title":"Silhouette Threshold Based Text Clustering for Log Analysis","authors":"J. J","doi":"10.20894/IJDMTA.102.006.001.004","DOIUrl":"https://doi.org/10.20894/IJDMTA.102.006.001.004","url":null,"abstract":"- Automated log analysis has been a dominant subject area of interest to both industry and academics alike. The heterogeneous nature of system logs, the disparate sources of logs (Infrastructure, Networks, Databases and Applications) and their underlying structure & formats makes the challenge harder. In this paper I present the less frequently used document clustering techniques to dynamically organize real time log events (e.g. Errors, warnings) to specific categories that are pre-built from a corpus of log archives. This kind of syntactic log categorization can be exploited for automatic log monitoring, priority flagging and dynamic solution recommendation systems. I propose practical strategies to cluster and correlate high volume log archives and high velocity real time log events; both in terms of solution quality and computational efficiency. First I compare two traditional partitional document clustering approaches to categorize high dimensional log corpus. In order to select a suitable model for our problem, Entropy, Purity and Silhouette Index are used to evaluate these different learning approaches. Then I propose computationally efficient approaches to generate vector space model for the real time log events. Then to dynamically relate them to the categories from the corpus, I suggest the use of a combination of critical distance measure and least distance approach. In addition, I introduce and evaluate three different critical distance measures to ascertain if the real time event belongs to a totally new category that is unobserved in the corpus.","PeriodicalId":414709,"journal":{"name":"International Journal of Data Mining Techniques and Applications","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127359460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Survey on Multi Keyword Search Methods over Encrypted Data in Single Cloud Environment 单云环境下加密数据多关键字搜索方法研究
International Journal of Data Mining Techniques and Applications Pub Date : 2017-06-26 DOI: 10.20894/IJDMTA.102.006.001.002
S. Devi, V. Senthilkumar
{"title":"A Survey on Multi Keyword Search Methods over Encrypted Data in Single Cloud Environment","authors":"S. Devi, V. Senthilkumar","doi":"10.20894/IJDMTA.102.006.001.002","DOIUrl":"https://doi.org/10.20894/IJDMTA.102.006.001.002","url":null,"abstract":"- Cloud computing [11] is a tremendous growth in every years and it can be utility the computing and large storage capability to the public users. The data owner can store the data in the cloud server is called data outsourcing and then the cloud data access for public users through the cloud server. The outsourced data are contains sensitive privacy information and it can be encrypted before uploaded to the cloud server and then the search user can access to the data through the cloud server is some difficulty of searching over the encrypted data in cloud. In this paper address this problem by developed the fine-grained multi-keyword search scheme over encrypted data in the cloud. There are three contribution of this paper. First one is, to provided relevance scores and preference factors upon keywords which enabled the precise keyword search. Second one is, to developed a complicated logic search the mixed AND, OR and NO operations of multi-keyword search scheme. And finally, auxiliary employ the classified sub-dictionaries technique to accomplish the index building, trapdoor generating and query. By using this experiments to the real-world dataset, so easily retrieve the result from dataset.","PeriodicalId":414709,"journal":{"name":"International Journal of Data Mining Techniques and Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116327119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Grey Wolf Optimizer Based Web usage Data Clustering with Enhanced Fuzzy C Means Algorithm 基于灰狼优化器的Web使用数据聚类与增强模糊C均值算法
International Journal of Data Mining Techniques and Applications Pub Date : 2017-06-26 DOI: 10.20894/IJDMTA.102.006.001.003
P. Selvaraju, B. Kalaavathi
{"title":"Grey Wolf Optimizer Based Web usage Data Clustering with Enhanced Fuzzy C Means Algorithm","authors":"P. Selvaraju, B. Kalaavathi","doi":"10.20894/IJDMTA.102.006.001.003","DOIUrl":"https://doi.org/10.20894/IJDMTA.102.006.001.003","url":null,"abstract":"Recommendation system plays a major role in web mining and it is applied to many applications such as ecommerce, e-government and e-library. The key challenges of recommendation system is to recommend the users based on their interest among more visitors and huge information. To make this challenge effective, there is a need for clustering algorithm to handle the data. Hence, this research focused on designing effective clustering algorithm to apply it in ecommerce applications. The grey wolf optimization based clustering is proposed to make an efficient clustering method for grouping the users based on their interest. To find the effective clustering, proposed a grey wolf optimization based fuzzy clustering algorithm, and made a comparison on Fuzzy C Means (FCM) based Genetic Algorithm (GA), Entropy based FCM and Improved Genetic FCM (FCM-GA). The experimental results proves that it performs better than traditional algorithms, at the same time the quality is improved.","PeriodicalId":414709,"journal":{"name":"International Journal of Data Mining Techniques and Applications","volume":"648 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122701300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fuzzy Quasi Regular Ring 模糊拟正则环
International Journal of Data Mining Techniques and Applications Pub Date : 2017-06-26 DOI: 10.20894/IJDMTA.102.006.001.007
Shrooq Bahjat Smeein
{"title":"Fuzzy Quasi Regular Ring","authors":"Shrooq Bahjat Smeein","doi":"10.20894/IJDMTA.102.006.001.007","DOIUrl":"https://doi.org/10.20894/IJDMTA.102.006.001.007","url":null,"abstract":"- Let R be a commutative ring with unity. In this paper we introduce and study Fuzzy Quasi regular ring as generalizations of (ordinary) Quasi regular ring. We give some basic properties about these concepts.","PeriodicalId":414709,"journal":{"name":"International Journal of Data Mining Techniques and Applications","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127145977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Cryptographic Approach for Privacy Preserving in Big Data Analysis for Sensitive Data 敏感数据大数据分析中隐私保护的一种新的加密方法
International Journal of Data Mining Techniques and Applications Pub Date : 2017-06-26 DOI: 10.20894/IJDMTA.102.006.001.006
K. Sujatha, N. Rajesh, Udayarani
{"title":"A Novel Cryptographic Approach for Privacy Preserving in Big Data Analysis for Sensitive Data","authors":"K. Sujatha, N. Rajesh, Udayarani","doi":"10.20894/IJDMTA.102.006.001.006","DOIUrl":"https://doi.org/10.20894/IJDMTA.102.006.001.006","url":null,"abstract":"","PeriodicalId":414709,"journal":{"name":"International Journal of Data Mining Techniques and Applications","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124706999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Functions and Cyclic Group in Calculated Questions Moodle 3.2 在计算题中使用函数和循环群
International Journal of Data Mining Techniques and Applications Pub Date : 2017-06-26 DOI: 10.20894/IJDMTA.102.006.001.008
R. RanjithKumarK, A. NaseerAhmed
{"title":"Using Functions and Cyclic Group in Calculated Questions Moodle 3.2","authors":"R. RanjithKumarK, A. NaseerAhmed","doi":"10.20894/IJDMTA.102.006.001.008","DOIUrl":"https://doi.org/10.20894/IJDMTA.102.006.001.008","url":null,"abstract":"— In modern days, assessment methods are designed in online to enhance its effectiveness among students as well as staff members of the institution. The Learning Management System (LMS) plays a vital role of conducting the assessments through online. This paper discusses the need to have an efficient and systematic usage of LMS, in particular Moodle, for improving the existing assessment methods of mathematics curriculum. Also, various question types which are used to overcome the disadvantages of classical assessment methods, are highlighted and described in detail. The working methodology of such question types in Moodle is explained by using the properties of functions and cyclic groups.","PeriodicalId":414709,"journal":{"name":"International Journal of Data Mining Techniques and Applications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114920128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on E-Learning System with Data Mining 基于数据挖掘的电子学习系统研究
International Journal of Data Mining Techniques and Applications Pub Date : 2017-06-24 DOI: 10.20894/IJDMTA.102.006.001.001
Bhagyalakshmi Aechham, P. Govindarajulu
{"title":"A Survey on E-Learning System with Data Mining","authors":"Bhagyalakshmi Aechham, P. Govindarajulu","doi":"10.20894/IJDMTA.102.006.001.001","DOIUrl":"https://doi.org/10.20894/IJDMTA.102.006.001.001","url":null,"abstract":"E-learning process has been widely used in university campus and educational institutions are playing vital role to enhance the skill set of students. Modern E-learning done by many electronic devices, such as smartphones, Tabs, and so on, on existing E-learning tools is insufficient to achieve the purpose of online training of education. This paper presents a survey of online e-Learning authoring tools for creating and integrating reusable e-learning tool for generation and enhancing existing learning resources with them. The work concentrates on evaluation of the existing e-learning tools a, and authoring tools that have shown good performance in the past for online learners. This survey work takes more than 20 online tools that deal with the educational sector mechanism, for the purpose of observations, and the outcome were analyzed. The findings of this paper are the main reason for developing a new tool, and it shows that educators can enhance existing learning resources by adding","PeriodicalId":414709,"journal":{"name":"International Journal of Data Mining Techniques and Applications","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116847898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Mining @ Information Age 信息时代的数据挖掘
International Journal of Data Mining Techniques and Applications Pub Date : 2016-12-15 DOI: 10.20894/IJDMTA.102.005.002.012
M. Arunmozhi, R. Usha
{"title":"Data Mining @ Information Age","authors":"M. Arunmozhi, R. Usha","doi":"10.20894/IJDMTA.102.005.002.012","DOIUrl":"https://doi.org/10.20894/IJDMTA.102.005.002.012","url":null,"abstract":"In the information age, data turns to be the vital. Hence it is important to understand the data in order to face the future information challenges. This paper deals with the importance of data mining while explaining the concepts and life cycle involved. It extracts the basic gist of the topic presented in a user-friendly way. Further, in developing different stages of data mining followed by its extended application usage in practical business platform.","PeriodicalId":414709,"journal":{"name":"International Journal of Data Mining Techniques and Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127595206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Finding influential healthcare interventions of different socio-economically and educationally segmented regions by using data mining techniques: case study on nine high focus states of India 通过使用数据挖掘技术寻找不同社会经济和教育分割区域的有影响力的医疗保健干预措施:对印度九个高度关注的州的案例研究
International Journal of Data Mining Techniques and Applications Pub Date : 2016-12-15 DOI: 10.20894/IJDMTA.102.005.002.013
P. Saha, U. K. Banerjee
{"title":"Finding influential healthcare interventions of different socio-economically and educationally segmented regions by using data mining techniques: case study on nine high focus states of India","authors":"P. Saha, U. K. Banerjee","doi":"10.20894/IJDMTA.102.005.002.013","DOIUrl":"https://doi.org/10.20894/IJDMTA.102.005.002.013","url":null,"abstract":"- United Nations at Millennium Summit 2000 made targets on Under-five Mortality Ratio (U5MR) and Maternal Mortality Ratio (MMR) for improving health condition of mothers and children. Though India did not be able to achieve those targets but have improved significantly. Aim of the study is to find out influential healthcare interventions of socio-economically and educationally different regions which have high impact on their HIs. At resource constrained condition, strategic evidence based planning will help healthcare department to reduce inequity in HIs among different regions. Data of different HIs has been collected from Family Welfare Statistics of India 2012 and healthcare interventions have been collected from District Level Household Survey 3. 192 districts from ‘Nine High Focus States of India’ have been used as case study area in this research work. Both hierarchical and k-means, clustering techniques have been used for segmenting 192 districts based on their socio-economic and educational status and decision tree classification technique has been used for building relationship model for each segment. Total six decision tree classifiers have been developed for identifying most influential interventions on Infant Mortality Rate (IMR) and U5MR. From this work it has become clear that impact of healthcare interventions on healthcare indicators varies from region to region. In hilly regions, adolescent interventions had more impact on U5MR and IMR than child age interventions.","PeriodicalId":414709,"journal":{"name":"International Journal of Data Mining Techniques and Applications","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115614030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信