Results for 'data-mining'

966 found
Order:
  1. Data Mining in the Context of Legality, Privacy, and Ethics.Amos Okomayin, Tosin Ige & Abosede Kolade - 2023 - International Journal of Research and Innovation in Applied Science 10 (Vll):10-15.
    Data mining possess a significant threat to ethics, privacy, and legality, especially when we consider the fact that data mining makes it difficult for an individual or consumer (in the case of a company) to control accessibility and usage of his data. Individuals should be able to control how his/ her data in the data warehouse is being access and utilize while at the same time providing enabling environment which enforces legality, privacy and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  55
    Privacy preserving data mining using hiding maximum utility item first algorithm by means of grey wolf optimisation algorithm.Sugumar Rajendran - 2023 - Int. J. Business Intell. Data Mining 10 (2):1-20.
    In the privacy preserving data mining, the utility mining casts a very vital part. The objective of the suggested technique is performed by concealing the high sensitive item sets with the help of the hiding maximum utility item first (HMUIF) algorithm, which effectively evaluates the sensitive item sets by effectively exploiting the user defined utility threshold value. It successfully attempts to estimate the sensitive item sets by utilising optimal threshold value, by means of the grey wolf optimisation (...)
    Download  
     
    Export citation  
     
    Bookmark   58 citations  
  3. Retractions Data Mining #1.Quan-Hoang Vuong & Viet-Phuong La - 2019 - Open Science Framework 2019 (2):1-3.
    Motivation: • Breaking barriers in publishing demands a proactive attitude • Open data, open review and open dialogue in making social sciences plausible .
    Download  
     
    Export citation  
     
    Bookmark  
  4. Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Cesc - manuscript
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Data Mining the Brain to Decode the Mind.Daniel Weiskopf - 2020 - In Fabrizio Calzavarini & Marco Viola, Neural Mechanisms: New Challenges in the Philosophy of Neuroscience. Springer.
    In recent years, neuroscience has begun to transform itself into a “big data” enterprise with the importation of computational and statistical techniques from machine learning and informatics. In addition to their translational applications such as brain-computer interfaces and early diagnosis of neuropathology, these tools promise to advance new solutions to longstanding theoretical quandaries. Here I critically assess whether these promises will pay off, focusing on the application of multivariate pattern analysis (MVPA) to the problem of reverse inference. I argue (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  7. Data is the new gold, but efficiently mining it requires a philosophy of data.Data Thinkerr - 2023 - Data Thinking.
    Fixing the problem won’t be easy, but humans’ sharpened focus on an emerging philosophy of data might give us some clue about where we will be heading for.
    Download  
     
    Export citation  
     
    Bookmark  
  8. Data Mining & Big Data: Strategic Anticipation & Decision-making support, SciencesPo, 24h, 2018.Marc-Olivier Boisset & Jean Langlois-Berthelot - unknown
    In the end of the course the student will be able to: • Understand the functioning of data mining tools and their contributions to managerial professions • Master the use of dynamic search tools on the open web and on the dark web. • Use the proper tools according to the objectives sought • Master the latest trends and innovations in Business Analytics • Analyze the opportunities offered in terms of data mining by artificial intelligence and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. A Comparative Analysis of Data Mining Techniques on Breast Cancer Diagnosis Data using WEKA Toolbox.Majdah Alshammari & Mohammad Mezher - 2020 - (IJACSA) International Journal of Advanced Computer Science and Applications 8:224-229.
    Abstract—Breast cancer is considered the second most common cancer in women compared to all other cancers. It is fatal in less than half of all cases and is the main cause of mortality in women. It accounts for 16% of all cancer mortalities worldwide. Early diagnosis of breast cancer increases the chance of recovery. Data mining techniques can be utilized in the early diagnosis of breast cancer. In this paper, an academic experimental breast cancer dataset is used to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Would you mind being watched by machines? Privacy concerns in data mining.Vincent C. Müller - 2009 - AI and Society 23 (4):529-544.
    "Data mining is not an invasion of privacy because access to data is only by machines, not by people": this is the argument that is investigated here. The current importance of this problem is developed in a case study of data mining in the USA for counterterrorism and other surveillance purposes. After a clarification of the relevant nature of privacy, it is argued that access by machines cannot warrant the access to further information, since the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  11. Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 4.
    Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advancement. With this also bring the problem of scalability, efficiency and security threat. This research paper focuses on how data can be dynamically mine in real time for pattern detection in a secure cloud computing environment using combination of decision tree algorithm and Random Forest (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  12. A Framework Proposal for Developing Historical Video Games Based on Player Review Data Mining to Support Historic Preservation.Sarvin Eshaghi, Sepehr Vaez Afshar & Mahyar Hadighi - 2023 - In Saif Haq, Adil Sharag-Eldin & Sepideh Niknia, ARCC 2023 CONFERENCE PROCEEDING: The Research Design Interface. Architectural Research Centers Consortium, Inc.. pp. 297-305.
    Historic preservation, which is a vital act for conveying people’s understanding of the past, such as events, ideas, and places to the future, allows people to preserve history for future generations. Additionally, since the historic properties are currently concentrated in urban areas, an urban-oriented approach will contribute to the issue. Hence, public awareness is a key factor that paves the way for this conservation. Public history, a history with a public audience and special methods of representation, can serve society in (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. Ontology-based knowledge representation of experiment metadata in biological data mining.Scheuermann Richard, Kong Megan, Dahlke Carl, Cai Jennifer, Lee Jamie, Qian Yu, Squires Burke, Dunn Patrick, Wiser Jeff, Hagler Herb, Herb Hagler, Barry Smith & David Karp - 2009 - In Chen Jake & Lonardi Stefano, Biological Data Mining. Chapman Hall / Taylor and Francis. pp. 529-559.
    According to the PubMed resource from the U.S. National Library of Medicine, over 750,000 scientific articles have been published in the ~5000 biomedical journals worldwide in the year 2007 alone. The vast majority of these publications include results from hypothesis-driven experimentation in overlapping biomedical research domains. Unfortunately, the sheer volume of information being generated by the biomedical research enterprise has made it virtually impossible for investigators to stay aware of the latest findings in their domain of interest, let alone to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. (1 other version)Ontology-assisted database integration to support natural language processing and biomedical data-mining.Jean-Luc Verschelde, Marianna C. Santos, Tom Deray, Barry Smith & Werner Ceusters - 2004 - Journal of Integrative Bioinformatics. Repr. In: Yearbook of Bioinformatics , 39–48 1:1-10.
    Successful biomedical data mining and information extraction require a complete picture of biological phenomena such as genes, biological processes, and diseases; as these exist on different levels of granularity. To realize this goal, several freely available heterogeneous databases as well as proprietary structured datasets have to be integrated into a single global customizable scheme. We will present a tool to integrate different biological data sources by mapping them to a proprietary biomedical ontology that has been developed for (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  15. A matter of trust: : Higher education institutions as information fiduciaries in an age of educational data mining and learning analytics.Kyle M. L. Jones, Alan Rubel & Ellen LeClere - forthcoming - JASIST: Journal of the Association for Information Science and Technology.
    Higher education institutions are mining and analyzing student data to effect educational, political, and managerial outcomes. Done under the banner of “learning analytics,” this work can—and often does—surface sensitive data and information about, inter alia, a student’s demographics, academic performance, offline and online movements, physical fitness, mental wellbeing, and social network. With these data, institutions and third parties are able to describe student life, predict future behaviors, and intervene to address academic or other barriers to student (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  16.  20
    Mining Customer Sentiments from Financial Feedback and Reviews using Data Mining Algorithms.Gopinathan Vimal Raja - 2021 - International Journal of Innovative Research in Computer and Communication Engineering 9 (12):14705-14710.
    Customer feedback and reviews are rich sources of information that reflect the sentiments and experiences of consumers, especially in the financial sector. Mining customer sentiments from these textual data sources provides valuable insights for improving services, identifying emerging issues, and predicting customer satisfaction. This paper proposes a novel approach to mining customer sentiments from financial feedback and reviews, leveraging advanced natural language processing (NLP) techniques, sentiment analysis algorithms, and machine learning models. We discuss methods for preprocessing financial (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  17. Moral Implications of Data-Mining, Key-word Searches, and Targeted Electronic Surveillance.Michael Skerker - 2015 - In Bradley J. Strawser, Fritz Allhoff & Adam Henschke, Binary Bullets.
    This chapter addresses the morality of two types of national security electronic surveillance (SIGINT) programs: the analysis of communication “metadata” and dragnet searches for keywords in electronic communication. The chapter develops a standard for assessing coercive government action based on respect for the autonomy of inhabitants of liberal states and argues that both types of SIGINT can potentially meet this standard. That said, the collection of metadata creates opportunities for abuse of power, and so judgments about the trustworthiness and competence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  29
    Analysis and Processing of Climatic data using data mining techniques.K. K. Sharma G. Vimal Raja - 2014 - Envirogeochimica Acta 1 (8):460-467.
    Climate Change is a long-term change in the statistical distribution of weather patterns over periods of time that range from decades to millions of years. It may be a change in the average weather conditions or a change in the distribution of weather events with respect to an average, for example, greater or fewer extreme weather events. It is of keen interest to identify climatological behaviour to discover spatial relationships in climate variables, so that the trend of the climatic changes (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  19. Restful Web Services for Scalable Data Mining.Solar Cesc - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Identifying Virtues and Values Through Obituary Data-Mining.Mark Alfano, Andrew Higgins & Jacob Levernier - 2018 - Journal of Value Inquiry 52 (1).
    Because obituaries are succinct and explicitly intended to summarize their subjects’ lives, they may be expected to include only the features that the author finds most salient but also to signal to others in the community the socially-recognized aspects of the deceased’s character. We begin by reviewing studies 1 and 2, in which obituaries were carefully read and labeled. We then report study 3, which further develops these results with a semi-automated, large-scale semantic analysis of several thousand obituaries. Geography, gender, (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  21.  15
    Mining Customer Sentiments from Financial Feedback and Reviews using Data Mining Algorithms.Raja Gopinathan Vimal - 2021 - International Journal of Innovative Research in Computer and Communication Engineering 9 (12):14705-14710.
    Customer feedback and reviews are rich sources of information that reflect the sentiments and experiences of consumers, especially in the financial sector. Mining customer sentiments from these textual data sources provides valuable insights for improving services, identifying emerging issues, and predicting customer satisfaction. This paper proposes a novel approach to mining customer sentiments from financial feedback and reviews, leveraging advanced natural language processing (NLP) techniques, sentiment analysis algorithms, and machine learning models. We discuss methods for preprocessing financial (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Ethical issues of 'morality mining': When the moral identity of individuals becomes a focus of data-mining.Markus Christen, Mark Alfano, Endre Bangerter & Daniel Lapsley - 2013 - In Hakikur Rahman & Isabel Ramos, Ethical Data Mining Applications for Socio-Economic Development. IGI Global. pp. 1-21.
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  23. Ethical issues of 'morality mining': When the moral identity of individuals becomes a focus of data-mining.Markus Christen, Mark Alfano, Endre Bangerter & Daniel Lapsley - 2013 - In Hakikur Rahman & Isabel Ramos, Ethical Data Mining Applications for Socio-Economic Development. IGI Global. pp. 1-21.
    Download  
     
    Export citation  
     
    Bookmark  
  24. (1 other version)Mapping Human Values: Enhancing Social Marketing through Obituary Data-Mining.Mark Alfano, Andrew Higgins & Jacob Levernier - forthcoming - In Lynn Kahle & Eda Atay, Social and Cultural Values in a Global and Digital Age.
    Download  
     
    Export citation  
     
    Bookmark  
  25. Neutrosophic Association Rule Mining Algorithm for Big Data Analysis.Mohamed Abdel-Basset, Mai Mohamed, Florentin Smarandache & Victor Chang - 2018 - Symmetry 10 (4):1-19.
    Big Data is a large-sized and complex dataset, which cannot be managed using traditional data processing tools. Mining process of big data is the ability to extract valuable information from these large datasets. Association rule mining is a type of data mining process, which is indented to determine interesting associations between items and to establish a set of association rules whose support is greater than a specific threshold. The classical association rules can only (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  26. Experiences in Mining Educational Data to Analyze Teacher's Performance: A Case Study with High Educational Teachers.Abdelbaset Almasri - 2017 - International Journal of Hybrid Information Technology 10 (12):1-12.
    Educational Data Mining (EDM) is a new paradigm aiming to mine and extract knowledge necessary to optimize the effectiveness of teaching process. With normal educational system work it’s often unlikely to accomplish fine system optimizing due to large amount of data being collected and tangled throughout the system. EDM resolves this problem by its capability to mine and explore these raw data and as a consequence of extracting knowledge. This paper describes several experiments on real educational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Mineness without Minimal Selves.M. V. P. Slors & F. Jongepier - 2014 - Journal of Consciousness Studies 21 (7-8):193-219.
    In this paper we focus on what is referred to as the ‘mineness’ of experience, that is, the intimate familiarity we have with our own thoughts, perceptions, and emotions. Most accounts characterize mineness in terms of an experiential dimension, the first-person givenness of experience, that is subsumed under the notion of minimal self-consciousness or a ‘minimal self’. We argue that this account faces problems and develop an alternative account of mineness in terms of the coherence of experiences with what we (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  28. NEUTROSOPHIC THEORY AND SENTIMENT ANALYSIS TECHNIQUE FOR MINING AND RANKING BIG DATA FROM ONLINE EVALUATION.C. Manju Priya - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):124-142.
    A huge amount of data is being generated everyday through different transactions in industries, social networking, communication systems etc. Big data is a term that represents vast volumes of high speed, complex and variable data that require advanced procedures and technologies to enable the capture, storage, management, and analysis of the data. Big data analysis is the capacity of representing useful information from these large datasets. Due to characteristics like volume, veracity, and velocity, big (...) analysis is becoming one of the most challenging research problems. Semantic analysis is method to better understand the implied or practical meaning of the input dataset. It is mostly applied with ontology to analyze content mainly in web resources. This field of research combines text analysis and Semantic Web technologies. The use semantic knowledge is to aid sentiment analysis of queries like emotion mining, popularity analysis, recommendation systems, user profiling, etc. A new method has been proposed to extract semantic relationships between different data attributes of big data which can be applied to a decision system. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  29.  22
    Predicting Default Rates in Credit Scoring Models using Advanced Mining Algorithms.Gopinathan Vimal Raja - 2017 - International Journal of Innovative Research in Science, Engineering and Technology 6 (12):23188-23193.
    Credit scoring is vital for assessing borrowers' creditworthiness and managing risks in financial systems. Traditional credit scoring models often fail to capture non-linear relationships and handle high-dimensional data, leading to less accurate predictions. This research explores the application of advanced data mining algorithms, such as ensemble learning methods, neural networks, and hybrid models, for predicting default rates. Empirical findings reveal significant improvements in predictive accuracy and interpretability. Key takeaways emphasize the importance of effective preprocessing and feature engineering (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30.  19
    Predicting Default Rates in Credit Scoring Models using Advanced Mining Algorithms.Raja Gopinathan Vimal - 2017 - International Journal of Innovative Research in Science, Engineering and Technology 6 (12):23188-23193.
    Credit scoring is vital for assessing borrowers' creditworthiness and managing risks in financial systems. Traditional credit scoring models often fail to capture non-linear relationships and handle high-dimensional data, leading to less accurate predictions. This research explores the application of advanced data mining algorithms, such as ensemble learning methods, neural networks, and hybrid models, for predicting default rates. Empirical findings reveal significant improvements in predictive accuracy and interpretability. Key takeaways emphasize the importance of effective preprocessing and feature engineering (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Mining Meaning from Wikipedia.David Milne, Catherine Legg, Medelyan Olena & Witten Ian - 2009 - International Journal of Human-Computer Interactions 67 (9):716-754.
    Wikipedia is a goldmine of information; not just for its many readers, but also for the growing community of researchers who recognize it as a resource of exceptional scale and utility. It represents a vast investment of manual effort and judgment: a huge, constantly evolving tapestry of concepts and relations that is being applied to a host of tasks. This article provides a comprehensive description of this work. It focuses on research that extracts and makes use of the concepts, relations, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Ethical Issues in Text Mining for Mental Health.Joshua Skorburg & Phoebe Friesen - forthcoming - In Morteza Dehghani & Ryan Boyd, The Atlas of Language Analysis in Psychology. Guilford Press.
    A recent systematic review of Machine Learning (ML) approaches to health data, containing over 100 studies, found that the most investigated problem was mental health (Yin et al., 2019). Relatedly, recent estimates suggest that between 165,000 and 325,000 health and wellness apps are now commercially available, with over 10,000 of those designed specifically for mental health (Carlo et al., 2019). In light of these trends, the present chapter has three aims: (1) provide an informative overview of some of the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  33. Are publicly available (personal) data “up for grabs”? Three privacy arguments.Elisa Orrù - 2024 - In Paul De Hert, Hideyuki Matsumi, Dara Hallinan, Diana Dimitrova & Eleni Kosta, Data Protection and Privacy, Volume 16: Ideas That Drive Our Digital World. London: Hart. pp. 105-123.
    The re-use of publicly available (personal) data for originally unanticipated purposes has become common practice. Without such secondary uses, the development of many AI systems like large language models (LLMs) and ChatGPT would not even have been possible. This chapter addresses the ethical implications of such secondary processing, with a particular focus on data protection and privacy issues. Legal and ethical evaluations of secondary processing of publicly available personal data diverge considerably both among scholars and the general (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Questões Epistemológicas em Mineração de Dados Educacionais.Esdras L. Bispo Jr - 2019 - Brazilian Symposium on Computers in Education.
    Educational Data Mining (EDM) shows interesting scientific results lately. However, little has been discussed about philosophical questions regarding the type of knowledge produced in this area. This paper aims to present two epistemological issues in EDM: (i) a question of ontological nature about the content of the knowledge obtained; and (ii) a question of deontological nature, about the guidelines and principles adopted by the researcher in education, to the detriment of the results of his own research. In the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  35. Using Linguistics Corpus Data Analysis to Combat PRC's Cognitive Infiltration.Jr-Jiun Lian - 2024 - 2024 Annual Conference of the Communication Association: International Academic Conference on Communication and Democratic Resilience.
    In light of Taiwan's extensive exposure to the Chinese Communist Party's "cognitive domain infiltration warfare," this paper proposes new response mechanisms and strategies for cybersecurity and national defense. The focus is primarily on assessing the CCP's cognitive infiltration tactics to develop policy recommendations in cybersecurity linguistics. These recommendations are intended to serve as a reference for future national defense and information security policies. Within the constraints of limited resources, this study attempts to provide an integrated analysis method combining qualitative and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. RAINFALL DETECTION USING DEEP LEARNING TECHNIQUE.M. Arul Selvan & S. Miruna Joe Amali - 2024 - Journal of Science Technology and Research 5 (1):37-42.
    Rainfall prediction is one of the challenging tasks in weather forecasting. Accurate and timely rainfall prediction can be very helpful to take effective security measures in dvance regarding: on-going construction projects, transportation activities, agricultural tasks, flight operations and flood situation, etc. Data mining techniques can effectively predict the rainfall by extracting the hidden patterns among available features of past weather data. This research contributes by providing a critical analysis and review of latest data mining techniques, (...)
    Download  
     
    Export citation  
     
    Bookmark   190 citations  
  37. Small-scale mining in South Africa: an assessment of the success factors and support structures for entrepreneurs.Zandisile Mkubukeli & Robertson K. Tengeh - 2015 - Environmental Economics 6 (4):15-24.
    One of the negative legacies of the apartheid era is a markedly skewed mining sector that favours the established companies, and almost completely neglects small-scale mining enterprises. Though a major source of revenue for South Africa(SA), the current state of the mining sector does not directly benefit the previously disadvantaged who dominate small-scale mining. The aim of this study is to explore the support structures and success factors relevant to small scale mining entrepreneurs in South (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  38. A Survey on Idea Mining: Techniques and Application.Nicholaus J. Gati & Lusekelo Kibona - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 2 (3):1-4.
    Abstract: Idea mining is an interesting field in the area of information retrieval and it is increasingly becoming important asset for decision makers. Huge volumes of high quality data from various sources such as scanners, mobile phones, loyalty cards, the web, and social media platforms presents enormous opportunity for organization to achieve success in their businesses. It is possible to achieve this by properly analysing data to reveal feature patterns; hence decision makers can capitalize upon the resulting (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Data Analysis, Analytics in Internet of Things and BigData.Mohammad Nezhad Hossein Shourkaei, Damghani Hamidreza, D. Leila & Hosseinian Heliasadat - 2019 - 4th International Conference on Combinatorics, Cryptography, Computer Science and Computation 4.
    The Internet-of-Things (IoT) is gradually being established as the new computing paradigm, which is bound to change the ways of our everyday working and living. IoT emphasizes the interconnection of virtually all types of physical objects (e.g., cell phones, wearables, smart meters, sensors, coffee machines and more) towards enabling them to exchange data and services among themselves, while also interacting with humans as well. Few years following the introduction of the IoT concept, significant hype was generated as a result (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40.  44
    Optimal knowledge extraction technique based on hybridisation of improved artificial bee colony algorithm and cuckoo search algorithm.Sugumar R. - 2024 - Int. J. Business Intelligence and Data Mining (Y):1-19.
    We present a framework that we are currently developing, that allows one to extract knowledge from the knowledge discovery in database (KDD) dataset. Data mining is a very active and space growing research area. Knowledge discovery in databases (KDD) is very useful in scientific domains. In simple terms, association rule mining is one of the most well-known methods for such knowledge discovery. Initially, database are divided into training and testing for the aid of fuzzy generating the rules (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  41. Prospects and Challenges for Small-Scale Mining Entrepreneurs in South Africa.Zandisile Mkubukeli & Robertson K. Tengeh - 2016 - Journal of Entrepreneurship and Organization Management 5 (4):2-10.
    Small-scale mining entrepreneurs are confronted with a variety of challenges during both the start-up and growth phase of their businesses not only in South Africa, but all over the world. Therefore, losing prospects available to them. The aim of this paper was to explore prospects and challenges faced by small scale mining entrepreneurs in South Africa (SA). To attain this end, a qualitative research paradigm was instituted for both data collection and analysis. The findings of this study (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. How Archaeological Evidence Bites Back: Strategies for Putting Old Data to Work in New Ways.Alison Wylie - 2017 - Science, Technology, and Human Values 42 (2):203-225.
    Archaeological data are shadowy in a number of senses. Not only are they notoriously fragmentary but the conceptual and technical scaffolding on which archaeologists rely to constitute these data as evidence can be as constraining as it is enabling. A recurrent theme in internal archaeological debate is that reliance on sedimented layers of interpretative scaffolding carries the risk that “preunderstandings” configure what archaeologists recognize and record as primary data, and how they interpret it as evidence. The selective (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  43.  20
    Applying Clustering technique on Climatic Data.K. K. Sharma G. Vimal Raja - 2015 - Envirogeochimica Acta 2 (1):21-27.
    Climate data analysis performed in order to understand climate change process and effect of different environmental factors in that change, has been focus of interest of researches for many years. Climate change disturbs natural balance, leading to endangerment of many species and their habitats. Data mining techniques provide better and faster analysis of large amounts of data in climatology. Data Mining is a technology that blends traditional data analysis methods with sophisticated algorithms for (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  44.  54
    Stock Market Prediction using Artificial Neural Network & Text Mining.Sahoo Amiya Kumar - 2020 - International Journal of Recent Technology and Engineering (IJRTE) 8 (5):4040 - 4043.
    The art of prediction of stock market volatility has always been a most challenged interdisciplinary research problem among scientist due to its highly non- linear nature of market flow. This paper tries to analysis the historical data of BSE Sensex using extreme volatilities estimators, GARCH, ANN and new proposed Text Mining approach for stock market predictions. Finally experimental results illustrates that the new proposed Text model can able to predict the volatilities of the stock price better than other (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. On the application of formal principles to life science data: A case study in the Gene Ontology.Jacob Köhler, Anand Kumar & Barry Smith - 2004 - In Köhler Jacob, Kumar Anand & Smith Barry, Proceedings of DILS 2004 (Data Integration in the Life Sciences), (Lecture Notes in Bioinformatics 2994). Springer. pp. 79-94.
    Formal principles governing best practices in classification and definition have for too long been neglected in the construction of biomedical ontologies, in ways which have important negative consequences for data integration and ontology alignment. We argue that the use of such principles in ontology construction can serve as a valuable tool in error-detection and also in supporting reliable manual curation. We argue also that such principles are a prerequisite for the successful application of advanced data integration techniques such (...)
    Download  
     
    Export citation  
     
    Bookmark   31 citations  
  46. A Review Paper on Scope of Big Data Analysis in Heath Informatics.Kazi Md Shahiduzzaman, Lusekelo Kibona & Hassana Ganame - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (5):1-8.
    Abstract— The term Health Informatics represent a huge volume of data that is collected from different source of health sector. Because of its’ diversity in nature, quite a big number of attributes, numerous amount data, health informatics can be considered as Big Data. Therefore, different techniques used for analyzing Big Data will also fit for Health Informatics. In recent years, implementation of Data Mining on Health Informatics brings a lot of fruitful outcomes that improve (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Beyond categorical definitions of life: a data-driven approach to assessing lifeness.Christophe Malaterre & Jean-François Chartier - 2019 - Synthese 198 (5):4543-4572.
    The concept of “life” certainly is of some use to distinguish birds and beavers from water and stones. This pragmatic usefulness has led to its construal as a categorical predicate that can sift out living entities from non-living ones depending on their possessing specific properties—reproduction, metabolism, evolvability etc. In this paper, we argue against this binary construal of life. Using text-mining methods across over 30,000 scientific articles, we defend instead a degrees-of-life view and show how these methods can contribute (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  48. PREDICTION OF EDUCATIONAL DATA USING DEEP CONVOLUTIONAL NEURAL NETWORK.K. Vijayalakshmi - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):93-111.
    : One of the most active study fields in natural language processing, web mining, and text mining is sentiment analysis. Big data is an important research component in education that is used to advance the value of education by watching students' performance and understanding their learning habits. Real-time student feedback will enable teachers and students to understand teaching and learning challenges in the most user-friendly manner for students. By linking learning analytics to grounded theory, the proposed Deep (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Jacques Lacan’s Registers of the Psychoanalytic Field, Applied using Geometric Data Analysis to Edgar Allan Poe’s “The Purloined Letter”.Fionn Murtagh & Giuseppe Iurato - manuscript
    In a first investigation, a Lacan-motivated template of the Poe story is fitted to the data. A segmentation of the storyline is used in order to map out the diachrony. Based on this, it will be shown how synchronous aspects, potentially related to Lacanian registers, can be sought. This demonstrates the effectiveness of an approach based on a model template of the storyline narrative. In a second and more Comprehensive investigation, we develop an approach for revealing, that is, uncovering, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50.  6
    Analysis of Log Data and Statistics Report Generation Using Hadoop.Nikhil Ankam Siddharth Adhikari, Devesh Saraf, Mahesh Revanwar - 2014 - International Journal of Innovative Research in Computer and Communication Engineering 2 (4):4054-4058.
    Web Log analyser is a tool used for finding the statics of web sites. Through Web Log analyzer the web log files are uploaded into the Hadoop Distributed Framework where parallel procession on log files is carried in the form of master and slave structure. Pig scripts are written on the classified log files to satisfy certain query. The log files are maintained by the web servers. By analysing these log files gives an idea about the user in the way (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 966