SEMANTICS OF DATA MINING SERVICES IN CLOUD COMPUTING

 The recent incorporation of new Data Mining and Machine Learning services within Cloud Computing providers is empowering users with extremely comprehensive data analysis tools including all the advantages of this type of environment. Providers of Cloud Computing services for Data Mining publish the descriptions and definitions in many formats and o...

Hash-Based Conditional Privacy Preserving Authentication and Key Exchange Protocol Suitable for Industrial Internet of Things

 Wireless sensor networks (WSN) are integral part of Industrial Internet of Things (IIOT), the said networks comprise of elements possessing low power processors. WSNs are used for gathering data in the monitoring region, using which vital information about the sensor and the monitoring region can be attained (placement of the sensor node is critica...

Tv show popularity analysis using data mining

 Television group of onlookers rating is a vital pointer as to prevalence of projects and it is likewise a factor to impact the income of communicate stations through promotions. Albeit higher evaluations for a given program are gainful for the two supporters and promoters, little is thought about the components that make programs increasingly allur...

A Study on E-commerce Recommender System Based on Big Data

 Recommender system algorithms are widely used in e-commerce to provide personalized and more accurate recommendations to online users and enhance the sales and user stickiness of e-commerce. This paper discusses several recommendation algorithms and the challenge of tradition recommender system in big data situation, and then proposes a framework o...

Utilizing Players’ Playtime Records for Churn Prediction Mining Playtime Regularity

 Churn prediction is an important topic in the freeonline game industry. Reducing the churn rate of a game signifi-cantly helps with the success of the game. Churn prediction helpsa game operator identify possible churning players and keep them engaged in the game via appropriate operational strategies, marketing strategies, and/or incentives. Play...

Toward Mining Capricious Data Streams A Generative Approach

 Learning with streaming data has received extensiveattention during the past few years. Existing approaches assumethat the feature space is fixed or changes by following explicitregularities, limiting their applicability in real-time applications.For example, in a smart healthcare platform, the feature space ofthe patient data varies when different...

Tailoring the Engineering Design Process Through Data and Process Mining

 Engineering changes (ECs) are new product devel-opment activities addressing external or internal challenges, suchas market demand, governmental regulations, and competitivereasons. The corresponding EC processes, although perceived asstandard, can be very complex and inefficient. There seem to besignificant differences between what is the “officia...

Survey of Network Intrusion Detection Methods from the Perspective of the Knowledge Discovery in Databases Process

 The identification of network attacks which target information and communication systems has been a focus of the research community for years. Network intrusion detection is a complex problem which presents a diverse number of challenges. Many attacks currently remain undetected, while newer ones emerge due to the proliferation of connected devices...

Semantics of Data Mining Services in Cloud Computing

 The recent incorporation of new Data Mining and Machine Learning services within Cloud Computing providers is empowering users with extremely comprehensive data analysis tools including all the advantages of this type of environment. Providers of Cloud Computing services for Data Mining publish the descriptions and definitions in many formats and o...

Secret sharing based reversible data hiding in encrypted images with multiple data-hiders

 The existing models of reversible data hiding in encrypted images (RDH-EI) are based on single data-hider, where the original image cannot be reconstructed when the data-hider is damaged. To address this issue, this paper proposes a novel model with multiple data-hiders for RDH-EI based on secret sharing. It divides the original image into multiple...

Schema Theory Based Data Engineering in Gene Expression Programming for Big Data Analytics

 Gene expression programming (GEP) is a data driven evolutionary technique that well suits for correlation mining. Parallel GEPs are proposed to speed up the evolution process using a cluster of computers or a computer with multiple CPU cores. However, the generation structure of chromosomes and the size of input data are two issues that tend to be ...

Research on Intrusion Data Mining Algorithm Based on Multiple Minimum Support

 The traditional single minimum support data mining algorithm has some problems, such as too much space occupied by data, resulting in insufficient accuracy of the algorithm, which is difficult to meet the needs of the development of the times. Therefore, an intrusion data mining algorithm based on multiple minimum support is proposed. First, the fe...

Representation Learning from Limited Educational Data with Crowd sourced Labels

 Representation learning has been proven to play an important role in the unprecedented success of machine learning models in numerous tasks, such as machine translation, face recognition and recommendation.The majority of existing representation learning approaches often require large amounts of consistent and noise-free labels. However, due to var...

Periodic Communities Mining in Temporal Networks Concepts and Algorithms

 Periodicity is a frequently happening phenomenon for social interactions in temporal networks. Mining periodic communities are essential to understanding periodic group behaviors in temporal networks. Unfortunately, most previous studies for community mining in temporal networks ignore the periodic patterns of communities.In this paper, we study th...

On the Security of Reversible Data Hiding in Encrypted Images by MSB Prediction

 The reversible data hiding in encrypted images by MSB prediction of P. Puteaux and W. Puesch not only provides high embedding bit-rates, but also entails a very low mathematical complexity.This correspondence investigates its security and shows flaws in embedding imperceptibility, unauthorized detection/removal of embedded data and unauthorized a...

Object Discovery From a Single Unlabeled Image by Mining Frequent Itemset With Multi-scale Features

 The goal of our work is to discover dominant objects in a very general setting where only a single un labeled image is given. This is far more challenge than typical co-localization or weakly-supervised localization tasks. To tackle this problem, we propose a simple but effective pattern mining-based method, called Object Location Mining (OLM), whi...

Making Frequent-Pattern Mining Scalable, Efficient, and Compact on Nonvolatile Memories

 Frequent-pattern mining is a common means to reveal the hidden trends behind data. However, most frequent-pattern mining algorithms are designed for DRAM, instead of nonvolatile memories (NVMs) which are preferred by energy-limited systems.Due to the huge differences between the characteristics of NVMs and those of DRAM, existing frequent-pattern m...

Integration and Querying of Genomic and Proteomic Semantic Annotations for Biomedical Knowledge Extraction

 Understanding complex biological phenomena involves answering complex biomedical questions on multiple biomolecular information simultaneously, which are expressed through multiple genomic and proteomic semantic annotations scattered in many distributed and heterogeneous data sources; such heterogeneity and dispersion hamper the biologists’ ability...

Integrating an Ensemble Surrogate Model’s Estimation into Test data Generation

 For the path coverage testing of a Message-Passing Interface (MPI) program, test data generation based on an evolutionary optimization algorithm (EOA) has been widely known. However, during the use of the above technique, it is necessary to evaluate the fitness of each evolutionary individual by executing the program, which is generally computation...

Innovative Approach for PMM Data Processing and Analytics

 ALTEC defined and developed a framework with the main aim to process a big amount of data allowing a seamless connection between the collected information and the analyses performed by end users.This is the ASDP environment, that allows to organize data in the most adapt domain data store in order to have data ready for complex analyses. In particu...

Evaluation of Fault Level of Sensitive Equipment Caused by Voltage Sag via Data Mining

  So far, there is no literature to evaluate the fault level of sensitive equipment(FLSE) caused by voltage sag from the perspective of the power grid. In practice, although the FLSE are dominated by the voltage sag of node, the voltage sag of the node is associated with whole power grid, including the voltage grade and location of the node, the di...

Evaluation Goals for Online Process Mining : a Concept Drift Perspective

 Online process mining refers to a class of techniques for analyzing in real-time event streams generated by the execution of business processes. These techniques are crucial in the reactive monitoring of business processes, timely resource allocation and detection/prevention of dysfunctional behavior. This paper fills the gap by identifying a set o...

Efficient Mining Cluster Selection for Block chain-Based Cellular V2X Communications

 Cellular vehicle-to-everything (V2X) communication is expected to herald the age of autonomous vehicles in the coming years.With the integration of block chain in such networks, information of all granularity levels, from complete blocks to individual transactions, would be accessible to vehicle sat any time.Specifically, the block chain technology...

Effective Similarity Search on Heterogeneous Networks A Meta-path Free Approach

 Heterogeneous information networks (HINs) are usually used to model information systems with multi-type objects and relations. In contrast, graphs that have a single type of nodes and edges, are often called homogeneous graphs. Measuring similarities among objects is an important task in data mining applications, such as web search, link prediction...

Deep Learning for Spatio-Temporal Data Mining: A Survey

 With the fast development of various positioning techniques such as Global Position System (GPS), mobile devices and remote sensing, spatio -temporal data has become increasingly available nowadays.Mining valuable knowledge from spatio - temporal data is critically important to many real-world applications including human mobility understanding, sm...

Deep Correlation Mining Based on Hierarchical Hybrid Networks for Heterogeneous BigData Recommendations

 The advancement of several significant technologies, such as artificial intelligence, cyber intelligence, and machine learning, has made big data penetrate not only into the industry and academic field but also our daily life along with a variety of cyber-enabled applications. In this article, we focus on a deep correlation mining method in heterog...

Data Representation by Joint Hyper graph Embedding and Sparse Coding

 Matrix factorization (MF), a popular unsupervised learning technique for data representation, has been widely applied in data mining and machine learning. According to different application scenarios, one can impose different constraintson the factorization to find the desired basis, which captures high-level semantics for the given data, and lea...

Data Mining Based Model Simplification and Optimization of An Electrical Power Generation System

 To assess the performance of electrification in an aircraft, multi-physics modeling becomes a good choice for the design of more-electric equipment. The high computational cost and huge design space of this complex model lead to difficulties in the optimal design of the electrical power system, thus, model simplification is mandatory. This paper f...

Converting Between SMOS and SMAP Level-1Brightness Temperature Observations Over Non frozen Land

 The Soil Moisture and Ocean Salinity (SMOS) andSoil Moisture Active Passive (SMAP) missions provide Level-1brightness temperature (Tb) observations that are used for global soil moisture estimation.The nature of these Tb data differs: the SMOS Tb observations contain atmospheric and select reflected extraterrestrial (“Sky”) radiation, whereas the S...

Classifying User Experience Based on the Intention to Communicate

 Experience mining is considered a substantial extension of opinion mining. Experience mining covers the description of all events that are related to the user's perception in the interaction with the object. There is information about the user`s experience that cannot be obtained with polarity analysis or sentiment analysis. The information obtai...

Bitcoin Transaction Forecasting with DeepNetwork Representation Learning

 Bitcoin and its decentralized computing paradigm for digital currency trading are one of the most disruptive technology in the 21st century. This paper presents a novel approach to developing a Bitcoin transaction forecast model, DL Forecast, by leveraging deep neural networks for learning Bitcoin transaction network representations. DL Forecast ...

Attract Rank District Attraction Ranking Analysis Based on Taxi Big Data

 The city’s district attraction ranking plays an essential role in the city’s government because it can be used to reveal the city’s district attraction and thus help government make decisions for urban planning in terms of the smart city . The traditional methods for urban planning mainly rely on the district’s GDP, employment rate, population de...

An Evolutionary Model to Mine High Expected Utility Patterns From Uncertain Databases

 In recent decades, mobile or the Internet of Thing(IoT) devices are dramatically increasing in many domains and applications. Thus, a massive amount of data is generated and produced. Those collected data contain a large amount of in-teresting information (i.e., interestingness, weight, frequency, or uncertainty), and most of the existing and gen...

A Unified Framework for User Identification across Online and Offline Data

 User identification across multiple datasets has a wide range of applications and there has been an increasing set of research works on this topic during recent years.However, most of existing works focus on user identification with a single input data type, e.g., (I) identifying a user across multiple social networks with online data and (II) dete...

A General Approach For Supporting Time Series Matching using Multiple-Warped Distances

 ? Time series are generated at an unprecedented rate in domains ranging from finance, medicine to education. ? Collections composed of heterogeneous, variable-length and misaligned times series are best explored using a plethora of dynamic time warping distances. However, the computational costs of using such elastic distances result in unaccepta...

A fuzzy mining approach for energy efficiency in a Big Data framework

 The discovery and exploitation of hidden informa-tion in collected data has gained attention in many areas, particularly in the energy field due to their economic and environmental impact.Data mining techniques have then emerged as a suitable toolbox for analysing the data collected in modern network management systems in order to obtain a meaning...

A Block chain-based Framework for Lightweight Data Sharing and Energy Trading in V2G Network

 The Vehicle-to-Grid (V2G) network is, where the battery-powered vehicles provide energy to the power grid, is highly emerging. A robust, scalable, and cost-optimal mechanism that can support the increasing number of transactions in a V2Gnetwork is required. Existing studies use traditional block chain as to achieve this requirement. Block chain-en...

Economic performance of a grid-interactive system with storage under a dynamic electricity pricing environment

 This paper aims to evaluate the economic performance of a grid-connected system with storage under a dynamic electricity pricing environment with time-of-use (TOU) and feed-in electricity tariffs. The storage can assist in the demand side management as well as to reduce the electricity bill of the consumers. In this case, consumers would purchase e...

E-Learning Management System And Timetable Management System

 The rapid development of e-learning and the use of LMS (moodle) have triggered some universities and schools in Indonesia to develop e-learning. However, most of their e-learning materials or contents still underuse the powerful features available in the LMS. The powerful features of the LMS are described and discussed along with their educational ...

RsRS: Ridesharing Recommendation System Based on Social Networks to Improve the User’s QoE

 Ridesharing is a mobility concept in which a trip is shared by a vehicle’s driver and one or more passengers called riders. Ridesharing is considered as a more environmentally friendly alternative to single driver commutes in pollution-creating vehicles on overcrowded streets. In this paper, we present the core of a new strategy of the ridesharing ...

Hostel Management System

 Hostel Management is an application developed to manage the various activities in hostel. The particular project is deal with the problems on managing the a hostel and avoids the problem occurs when carried out manually. Identification of the drawbacks of the existing system leads to the designing of computerized system that will be compatible t...

A Proposed Solution for Sentiment Analysis on Tweets to Extract Emotions from Ambiguous Statements

 With the advancementofweb technology and its growth, there is huge volume of data present in the web for internet users and a lot of data is generated too. Internet has become a platform for online learning, exchanging ideasandsharing opinions. Social networkingsiteslike Twitter, Face book, Google are rapidly gaining popularity as they allow people...

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Mail us : info@nibode.com