We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Clustering Via Decision Tree Construction

    Clustering is an exploratory data analysis task. It aims to find the intrinsic structure of data by organizing data objects into similarity groups or...
    B. Liu, Y. **a, P.S. Yu in Foundations and Advances in Data Mining
    Chapter
  2. A New Theoretical Framework for K-Means-Type Clustering

    One of the fundamental clustering problems is to assign n points into k clusters based on the minimal sum-of-squares(MSSC), which is known to be...
    Chapter
  3. The Mathematics of Learning: Dealing with Data *

    Learning is key to develo** systems tailored to a broad range of data analysis and information extraction tasks. We outline the mathematical...
    Chapter
  4. Web Page Classification*

    This chapter describes systems that automatically classify web pages into meaningful categories. It first defines two types of web page...
    Chapter
  5. Sequential Pattern Mining by Pattern-Growth: Principles and Extensions*

    Sequential pattern mining is an important data mining problem with broad applications. However, it is also a challenging problem since the mining may...
    J. Han, J. Pei, X. Yan in Foundations and Advances in Data Mining
    Chapter
  6. Incremental Mining on Association Rules

    The discovery of association rules has been known to be useful in selective marketing, decision analysis, and business management. An important...
    W.-G. Teng, M.-S. Chen in Foundations and Advances in Data Mining
    Chapter
  7. A Feature/Attribute Theory for Association Mining and Constructing the Complete Feature Set

    A correct selection of features (attributes) is vital in data mining. For this aim, the complete set of features is constructed. Here are some...
    Chapter
  8. Web Mining – Concepts, Applications and Research Directions

    From its very beginning, the potential of extracting valuable knowledge from the Web has been quite evident. Web mining, i.e. the application of data...
    T. Srivastava, P. Desikan, V. Kumar in Foundations and Advances in Data Mining
    Chapter
  9. Mining Association Rules from Tabular Data Guided by Maximal Frequent Itemsets

    We propose the use of maximal frequent itemsets (MFIs) to derive association rules from tabular datasets. We first present an efficient method to...
    Q. Zou, Y. Chen, ... X. Lu in Foundations and Advances in Data Mining
    Chapter
  10. Logical Regression Analysis: From Mathematical Formulas to Linguistic Rules

    Data mining means the discovery of knowledge from (a large amount of)data, and so data mining should provide not only predictions but also knowledge...
    Chapter
  11. Privacy-Preserving Data Mining

    The growth of data mining has raised concerns among privacy advocates. Some of this is based on a misunderstanding of what data mining does. The...
    C. Clifton, M. Kantarcıoğlu, J. Vaidya in Foundations and Advances in Data Mining
    Chapter
  12. Automatic identification of Malvani dialects from audio signal based on hybrid FFO-TSO with deep neural network

    Marathi language is originated from the geographical regions of Maharashtra, which include several different varieties of Malvani. The identification...

    Madhavi S. Pednekar, Kaustubh Bhattacharyya in Multimedia Tools and Applications
    Article 06 July 2024
  13. Ant lion optimization based inertia weight optimized KGMO for mobility Management in Heterogeneous LTE cellular networks

    This study proposes a hybrid optimization-based mobility management strategy employing Kinetic Gas Molecular Optimization (KGMO) and Ant Lion...

    G Venkata Narasimha Reddy, T Venkata Naga Jayudu, ... B Lakshmi Narayana Reddy in Multimedia Tools and Applications
    Article 06 July 2024
  14. Multi-layered access control based auto tuning relational key implications in enterprise-level multi-tenancy

    This article discusses the importance of cloud-based multi-tenancy in private–public-private secure cloud environments, which is achieved through the...

    Santosh Kumar Henge, R. Rajakumar, ... Wu-Lin Chen in Multimedia Tools and Applications
    Article 06 July 2024
  15. Encryption of medical data based on blockchain and multi-chaotic maps

    In this work, the SHA-256 mapper of the blockchain has been utilized to secure medical data from brute-force attacks. The uniform distribution and...

    Suvita Rani Sharma, Birmohan Singh, Manpreet Kaur in Multimedia Tools and Applications
    Article 06 July 2024
  16. Constructing a non-degenerate 2D chaotic map with application in irreversible PRNG

    To solve the weakness of reversibility that exited in some pseudo-random number generators (PRNGs), we designed an enhanced chaos-based irreversible...

    Article 06 July 2024
  17. Text classification based on optimization feature selection methods: a review and future directions

    A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a...

    Osamah Mohammed Alyasiri, Yu-N Cheah, ... Ammar Kamal Abasi in Multimedia Tools and Applications
    Article 06 July 2024
  18. Anomaly detection using deep learning approach for IoT smart city applications

    With the advancements of IoT devices, many smart applications start to rule this era. In particular, smart cities has been adapted and realized by...

    S. Shibu, S. Kirubakaran, ... Vineet Tirth in Multimedia Tools and Applications
    Article 06 July 2024
  19. Periodic and random incremental backup policies in reliability theory

    For a 24/7 database system, backups should be implemented right after a large volume of data has been updated, putting their backup windows in...

    Xufeng Zhao, Yilei Bu, ... Jiajia Cai in Software Quality Journal
    Article 05 July 2024
  20. Pothole detection in adverse weather: leveraging synthetic images and attention-based object detection methods

    Potholes are a pervasive road hazard with the potential to cause accidents and vehicle damage. Detecting potholes accurately is essential for timely...

    Maros Jakubec, Eva Lieskovska, ... Katarina Zabovska in Multimedia Tools and Applications
    Article Open access 05 July 2024
Did you find what you were looking for? Share feedback.