Search
Search Results
-
Clustering Via Decision Tree Construction
Clustering is an exploratory data analysis task. It aims to find the intrinsic structure of data by organizing data objects into similarity groups or... -
A New Theoretical Framework for K-Means-Type Clustering
One of the fundamental clustering problems is to assign n points into k clusters based on the minimal sum-of-squares(MSSC), which is known to be... -
The Mathematics of Learning: Dealing with Data *
Learning is key to develo** systems tailored to a broad range of data analysis and information extraction tasks. We outline the mathematical... -
Web Page Classification*
This chapter describes systems that automatically classify web pages into meaningful categories. It first defines two types of web page... -
Sequential Pattern Mining by Pattern-Growth: Principles and Extensions*
Sequential pattern mining is an important data mining problem with broad applications. However, it is also a challenging problem since the mining may... -
Incremental Mining on Association Rules
The discovery of association rules has been known to be useful in selective marketing, decision analysis, and business management. An important... -
A Feature/Attribute Theory for Association Mining and Constructing the Complete Feature Set
A correct selection of features (attributes) is vital in data mining. For this aim, the complete set of features is constructed. Here are some... -
Web Mining – Concepts, Applications and Research Directions
From its very beginning, the potential of extracting valuable knowledge from the Web has been quite evident. Web mining, i.e. the application of data... -
Mining Association Rules from Tabular Data Guided by Maximal Frequent Itemsets
We propose the use of maximal frequent itemsets (MFIs) to derive association rules from tabular datasets. We first present an efficient method to... -
Logical Regression Analysis: From Mathematical Formulas to Linguistic Rules
Data mining means the discovery of knowledge from (a large amount of)data, and so data mining should provide not only predictions but also knowledge... -
Privacy-Preserving Data Mining
The growth of data mining has raised concerns among privacy advocates. Some of this is based on a misunderstanding of what data mining does. The... -
Automatic identification of Malvani dialects from audio signal based on hybrid FFO-TSO with deep neural network
Marathi language is originated from the geographical regions of Maharashtra, which include several different varieties of Malvani. The identification...
-
Ant lion optimization based inertia weight optimized KGMO for mobility Management in Heterogeneous LTE cellular networks
This study proposes a hybrid optimization-based mobility management strategy employing Kinetic Gas Molecular Optimization (KGMO) and Ant Lion...
-
Multi-layered access control based auto tuning relational key implications in enterprise-level multi-tenancy
This article discusses the importance of cloud-based multi-tenancy in private–public-private secure cloud environments, which is achieved through the...
-
Encryption of medical data based on blockchain and multi-chaotic maps
In this work, the SHA-256 mapper of the blockchain has been utilized to secure medical data from brute-force attacks. The uniform distribution and...
-
Constructing a non-degenerate 2D chaotic map with application in irreversible PRNG
To solve the weakness of reversibility that exited in some pseudo-random number generators (PRNGs), we designed an enhanced chaos-based irreversible...
-
Text classification based on optimization feature selection methods: a review and future directions
A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a...
-
Anomaly detection using deep learning approach for IoT smart city applications
With the advancements of IoT devices, many smart applications start to rule this era. In particular, smart cities has been adapted and realized by...
-
Periodic and random incremental backup policies in reliability theory
For a 24/7 database system, backups should be implemented right after a large volume of data has been updated, putting their backup windows in...
-
Pothole detection in adverse weather: leveraging synthetic images and attention-based object detection methods
Potholes are a pervasive road hazard with the potential to cause accidents and vehicle damage. Detecting potholes accurately is essential for timely...