Time series classification research is important in datamining. However, the existing methods are not fast and accurate enough. Common classification algorithms cannot satisfy the requirements of time series classifi...
详细信息
datamining has established new applications in medicine over the last few years. Using mental disorders diagnostic systems, data possession, and data analysis has been of enormous succor for clinicians to recognize d...
详细信息
ISBN:
(纸本)9783319483085;9783319483078
datamining has established new applications in medicine over the last few years. Using mental disorders diagnostic systems, data possession, and data analysis has been of enormous succor for clinicians to recognize diseases more precisely, especially when dealing with overlapping mental symptoms. In this study, random forests used to predict a number of mental disorders and drug abuse. Two datasets were used, the first dataset consists of substances abuse patients derived from United States, and the second dataset consists of psychotic patients collected from Egypt. Random Forest classification technique was used to increase the accuracy rate of mental disorders prediction systems. The exploratory datamining analysis produced two models of the random forest algorithm with two groups of patients at different risks for substances abuse and psychotic diseases. This study presents a new datamining approach to enhance the diagnosis of mental disorders. This approach also serves therapeutic interventions.
In the bygone, the exploration in computing focused on cloud computing, big data, and the internet of things (IOT). Irrespective of what computing is used, there is always a requirement for storage. The challenge face...
详细信息
ISBN:
(纸本)9781509058884
In the bygone, the exploration in computing focused on cloud computing, big data, and the internet of things (IOT). Irrespective of what computing is used, there is always a requirement for storage. The challenge faced in this area is storing the massive amount of data and their integrity. In the cloud, computing resources and services are made available on demand the most significant among them is their data storage. In this article, the focus is on the literature by providing an edifice and comprehensive overview of different de-duplication techniques that are used in distributed storage. Deduplication (de-dupe) technique is progressively accepted as an effective technique to reduce the cost of storage, where the de-dupe has become a vital part of the storage infrastructure. This paper also reviews the context and key features of data de-dupe and systematize the technetronic research in data de-duplication rendering the dynamic process flow. The summary and cataloguing of the high-tech on deduplication help to improvise the furthermost design considerations for data deduplication techniques. Finally, we summarize the open problems and future exploration area in a deduplication based on storage systems.
Multivariate analysis (MV) and datamining (DM) techniques were applied to a small water quality dataset obtained from the surface waters at three water quality monitoring stations in the Petaquilla River Basin, Panam...
详细信息
In present world data is a valuable asset. The best utilization of this asset by means of technology gives an upper hand to an organization. Technologies like machine learning, datamining, and artificial intelligence...
详细信息
In present world data is a valuable asset. The best utilization of this asset by means of technology gives an upper hand to an organization. Technologies like machine learning, datamining, and artificial intelligence are no exception to this either. Celebrities influence common people behaviors through biological, psychological and social processes to a great extent. Simultaneously there is vast disparity amongst their demise over the cause, region, and age. Therefore, it is a challenging and interesting endorsement to work upon. The objective of this work is to come up with the comprehensive result to understand the celebrity deaths by investigating the incidence happened over the decade. The database for training is created from the public and open access databases for years 2006-2016 comprising of 11, 200 reported deaths over the globe. Findings of the work are year by year extraction of death, the cause behind it, age, gender, and place. Lazy and decision tree classifier model of datamining is being used for the analysis based on the profession as evaluation class.
Network traffic anomaly detection is an important research content in the field of network and security management. By analyzing network traffic, the health of the network environment can be intuitively evaluated. In ...
详细信息
ISBN:
(纸本)9781538658864
Network traffic anomaly detection is an important research content in the field of network and security management. By analyzing network traffic, the health of the network environment can be intuitively evaluated. In particular, analyzing network traffic provides practical and effective guidance for identification and classification of anomaly. This paper proposes a network traffic anomaly detection method based on wavelet analysis for pcap files contain two different delay injections. The wavelet analysis can effectively extract information from the signal and is suitable for the detection of anomaly. Firstly, wavelet analysis is used to extract the waveform features, and then the support vector machine is used for classification. In particular, packet lengths in the pcap files is parsed out to form a sequence of packet lengths in chronological order. Then followed by the wavelet analysis based packet length sequence feature extraction and feature selection methods, the resulting eigenvectors are used as input features to support vector machine for training the classifier. Thus to differentiate the two types of anomaly in the mixed traffic with both normal and abnormal traffic. The qualitative and quantitative experimental results show that our approach achieves good classification results.
The proceedings contain 32 papers. The special focus in this conference is on Information and Communication Technology. The topics include: Preface;automation of railway engine pilot security system using multimodal b...
ISBN:
(纸本)9789811055072
The proceedings contain 32 papers. The special focus in this conference is on Information and Communication Technology. The topics include: Preface;automation of railway engine pilot security system using multimodal biometric identification;restricted turn model fault tolerant routing techniques for 3D mesh network-on-chip: An evaluation;power issues of MANET;social media for enhanced e-education at Namibian schools;fifth-level second-generation wavelet-based image fusion algorithm for visual quality enhancement of digital image data;advanced teaching materials of inverted pendulum system by the PLC sequence method;intelligent locker system;precision agriculture system design using wireless sensor network;optimal tree search by a swarm of mobile robots;achieving guaranteed service with fault-tolerant resources in grid;a smart air pollution analytics framework;extracting hidden patterns within road accident data using machine learning techniques;an investigation of the classifiers to detect android malicious apps;a case-based reasoning framework for prediction of stroke;cognitive radio: A network structure perspective;comparative study of N-tier and cloud-based web application using automated load testing tool;the design of ultra-high frequency (UHF) radio frequency identification (RFID) reader antenna;provisioning of healthcare service in cloud;academic analytics implemented for students performance in terms of canonical correlation analysis and chi-square analysis;a pairwise alignment algorithm for long sequences of high similarity;information extraction approaches: A survey;the role of IoT-based devices for the better world;implementation of smart job first dynamic round robin (SJFDRR) scheduling algorithm with smart time quantum in multi-core processing system;feature extraction of protein contact maps from protein 3D-coordinates.
With the advent of technology the past few years have seen the rise in the field of datamining. datamining generally considered as the process of extracting the useful information by finding the hidden and the non-t...
详细信息
ISBN:
(数字)9789811033254
ISBN:
(纸本)9789811033254;9789811033247
With the advent of technology the past few years have seen the rise in the field of datamining. datamining generally considered as the process of extracting the useful information by finding the hidden and the non-trivial information out of large chunks of dataset. Now here comes the role of association rule mining which forms a crucial component of datamining. Many recent applications like market basket analysis, text mining etc. are done using this approach. In this paper we have discussed the novel approach to implement the FP Growth method using the trie data structure. Tries provide a special feature of merging the shared sets of data with the number of occurrences that were already registered as count. So this paper widely gives an idea about how the interesting patterns are generated from the large databases using association rule mining methodologies.
In modern architecture, advanced building automation system is widely used for automatic monitoring and control of all kinds of building systems, but the actual operation data of the building which is stored in the sy...
详细信息
ISBN:
(纸本)9781509060610
In modern architecture, advanced building automation system is widely used for automatic monitoring and control of all kinds of building systems, but the actual operation data of the building which is stored in the system is not fully utilized. Firstly, this paper analyzed the characteristics of datamining technology and its application in the field of architecture, and then according to the selection of 82 buildings each functional area and the typical day energy consumption data as a sample, and by using multiple regression analysis datamining method, a new method of building energy saving potential was designed, finally by fitting the sample data, the results show that the proposed method can provide a powerful tool and method for the construction of energy saving potential.
Anonymous authentication is designed to hide the user’s identity from any verifiers during an authentication session. Since passwords prevail in many authentication systems, anonymous password-authenticated key excha...
详细信息
暂无评论