Data Mining Approaches to Criminal Career Analysis
|
|
|
- Irma Blankenship
- 10 years ago
- Views:
Transcription
1 Data Mining Approaches to Criminal Career Analysis Jeroen S. de Bruin, Tim K. Cocx, Walter A. Kosters, Jeroen F. J. Laros and Joost N. Kok Leiden Institute of Advanced Computer Science (LIACS) Leiden University, The Netherlands Abstract Narrative reports and criminal records are stored digitally across individual police departments, enabling the collection of this data to compile a nation-wide database of criminals and the crimes they committed. The compilation of this data through the last years presents new possibilities of analyzing criminal activity through time. Augmenting the traditional, more socially oriented, approach of behavioral study of these criminals and traditional statistics, data mining methods like clustering and prediction enable police forces to get a clearer picture of criminal careers. This allows officers to recognize crucial spots in changing criminal behaviour and deploy resources to prevent these careers from unfolding. Four important factors play a role in the analysis of criminal careers: crime nature, frequency, duration and severity. We describe a tool that extracts these from the database and creates digital profiles for all offenders. It compares all individuals on these profiles by a new distance measure and clusters them accordingly. This method yields a visual clustering of these criminal careers and enables the identification of classes of criminals. The proposed method allows for several user-defined parameters. I. INTRODUCTION The amount of data being produced in modern society is growing at an accelerating pace. New problems and possibilities constantly arise from this so-called data explosion. One of the areas where information plays an important role is that of law enforcement. Obviously, the amount of criminal data gives rise to many problems in areas like data storage, data warehousing, data analysis and privacy. Already, numerous technological efforts are underway to gain insights into this information and to extract knowledge from it. This paper discusses a new tool that attempts to gain insights into the concept of criminal careers: the criminal activities that a single individual exhibits throughout his or her life. The national police annually extracts information from digital narrative reports stored throughout the individual departments and compiles this data into a large and reasonably clean database that contains all criminal records from the last decade. From this database, our tool extracts the four important factors (see Section II) in criminal careers and establishes a clear picture on the different existing types of criminal careers by automatic clustering. All four factors need to be taken into account and their relative relations need to be established in order to reach a reliable descriptive image. To this end we propose a way of representing the criminal profile of an individual in a single year. We then employ a specifically designed distance measure to combine this profile with the number of crimes committed and the crime severity, and compare all possible couples of criminals. When this data has been compared throughout the available years we use a human centered clustering tool to represent the outcome to the police analysts. We discuss the difficulties in career-comparison and the specific distance measure we designed to cope with this kind of information. The main contribution of this paper is in Section IV and V, where the criminal profiles are established and the distance measure is introduced. A prototype test case of this research was described in [8]. II. BACKGROUND The number of data mining projects in the law enforcement area is slowly increasing. Both inside and outside of the academic world large scale projects are underway. One of the larger academic projects is the COPLINK project, a policeuniversity collaboration in Arizona, where work has been done in the exploitation of data mining for cooperation purposes [4], the field of entity extraction from narrative reports [5], and social network analysis [6], [13]. The FLINTS project and FinCEN [9] aim at revealing links between crimes and criminals and to reveal money laundering networks by comparing financial transactions. Also, Oatly et al. [11] linked burglary cases in the OVER project. Clustering techniques are also widely used in the law enforcement arena, like for example by Adderly and Musgrove [1], who applied clustering techniques and Self Organizing Maps to model the behavior of sex-offenders, and by Cocx and Kosters [7] who made an attempt at clustering criminal investigations to reveal what offenses were committed by the same group of criminals. Our research aims to apply multi-dimensional clustering to criminal careers (rather than crimes or linking perpetrators) in order to constitute a visual representation of classes of these criminals. Criminal careers have always been modelled through the observation of specific groups of criminals. A more individually oriented approach was suggested by Blumstein et al. [2]: little definitive knowledge had been developed that could be applied to prevent crime or to develop efficient policies for reacting to crime until the development of the criminal career paradigm. A criminal career is the characterization of a longitudinal sequence of crimes committed by an individual offender.
2 LAYING PLANS 1. Sun Tzu said: The art of war is of vital importance to the State. 2. It is a matter of life and death, a road either to safety or to ruin. Hence it is a subject of inquiry which can on no account be neglected. 3. The art of war, then, is governed by five constant factors, to be taken into account in one's deliberations, when seeking to determine the conditions obtaining in the field. 4. These are:(1) The Moral Law; (2) Heaven; (3) Earth; (4) The Commander; (5) Method and discipline. 5,6. The Moral Law causes the people to be in complete accord with their ruler, so that they will follow him regardless of their lives, undismayed by any danger. John Doe Frequency Duration National Database of Criminal Records Factor Extraction Jane Doe The Duke [email protected] Violent P 1 Murder 1 P 8 Murder 9 C 3 Hazard 27 E 1 Murder 9 U 2 Starwars 1 Crime Nature, Frequency, Seriousness and Duration Profile Creation Criminal Profile per Offender per Year Profile Difference Distance Matrix in Profile per Year Distance Measure Distance Matrix including Frequency Clustering Distance per Year Graph Visual report to be used by police force Fig. 1. Analysis of Criminal Careers Participation in criminal activities is obviously restricted to a subset of the population, but by focussing on the subset of citizens who do become offenders, they looked at the frequency, seriousness and duration of their careers. We also focus our criminal career information on the nature of such a career and employ data mining techniques to feed this information back to police analysts and criminologists. III. APPROACH Our criminal career analyzer (see Figure 1) is a multiphase process that requires source files from the National Crime Record Database. From these files our tool extracts the four factors, mentioned in Section II, and establishes the criminal profile per offender. We then compare all individuals in the database and calculate a distance based upon this profile, crime severity and number of crimes. This information is summed over time and clustered using a human centered multi-dimensional clustering approach. Black boxed, our paradigm reads in the National Crime Database and provides a visual career comparison report to the end user. First, our tool normalises all careers to start on the same point in time, in order to better compare them. Second, we assign a profile to each individual. This is done for each year in the database. After this step, that is described in more detail in Section IV, we compare all possible pairs of offenders on their profiles for one year, while taking into account that seriousness is inherently linked to certain profiles. The resulting distance matrix is based upon only two of the four beforementioned criteria, crime nature and severity. We then employ a distance measure described in Section V to fairly incorporate the frequency of delinquent behaviour into our matrix which is then summed over the available years. In the last step we visualize our distance matrix in a 2-dimensional clustering image using the method described in [3]. The National Crime Record Database is an up-to-date source of information and therefore contains the current situation. This does, however, present us with the following problem: it also contains the criminal activities of people that started their career near the end of the database s range. Our approach suffers from a lack of information on these offenders and when translated, it could be falsely assumed that their criminal activities terminated however, they have just started. To cope with this problem we draw a semiarbitrary line after two years, which means we dot not take
3 criminals into account that have only been active for two years or less. In a later stage, it is presumably possible to predict in which direction the criminal careers of these offenders will unfold. More information about this prediction can be found in Section VII. IV. OBTAINING PROFILE DIFFERENCES In the National Database of Crime Records the crimes of an individual are split up into eight different types, varying from traffic and financial infringements to violent and sex crimes. All these crimes have got an intrinsic seriousness attached to them. Interpreting these types of crimes and compiling them into a criminal profile for individual offenders is done both by determining the percentage of crimes in one year that fall into each one of the categories and dealing with these crimes seriousness. The categories are then ordered on severity. Note that while all categories are considered to be different when determining profile, their respective severity can be the same. We distinguish three types of crime seriousness: minor crimes, intermediate crimes and severe crimes. Each crime type falls within one of these categories. A typical profile of a person looks like the profile described in Table I. Summing all the values in a row in the table will result in 1, representing 1% of the crimes across the categories. TABLE I A TYPICAL CRIMINAL PROFILE Crime Type Traffic Crimes Financial Crimes... Sex Crimes Severity minor minor... severe Percentage Now that we have established a way of representing the crime profile of an offender for a single year, it is possible to compare all individuals based upon this information and compile the profile distance matrix for each year. It is imperative that we take both the severity and nature of each profile into account. We employ the method described in Table II to accomplish this. Between all couples of offenders we calculate the Profile Distance as follows. First we take the absolute difference between the respective percentages in all categories and sum them to gain the difference between these two offenders in crime nature. This number varies between, if the nature of their crimes was exactly the same for the considered year, and 2 where both persons did not commit any crime in the same category. An example of this can be seen in the top panel of Table II, with.6 as difference. One of the problems that arise in this approach is how it should deal with people with no offenses in the considered year. In [8], it was assumed that setting all the percentages in the crime nature table to would provide a result that was true to reality. This does not seem to be the case; such an assumption would provide smaller distances between TABLE II CALCULATING THE DIFFERENCE BETWEEN INDIVIDUAL PROFILES Crime Nature Difference Ind Ind Summed Diff Crime Severity Difference Minor Intermediate Severe # Fac. # Fac. # Fac. Summed Ind Ind Diff..3 Total Profile Difference:.9 offenders and innocent people, than between different kinds of criminals for an arbitrary year. It would be desirable to assign a maximal distance in crime nature between innocence and guilt. Hence we propose to add to this table the innocence column. An individual without offences in the year under consideration would have a 1 in this field, while an actual offender will always have committed % of his or her crimes of the innocent nature. This ensures that the algorithm will assign the desired maximal distance between these different types of persons. Taking the severity of crimes into account is somewhat more complex. Not only the difference within each severity class needs to be calculated, but also the difference between classes. For example, an offender committing only minor crimes has a less similar career to a severe crime offender, than a perpetrator of the intermediate class would have to the same severe criminal. In compliance with this fact, our approach introduces a weighting factor for the three different categories. Minor offences get a weight of 1, intermediate crimes get multiplied by 2 and the most extreme cases are multiplied by 3. Of course, these values are somewhat arbitrary, but the fact that they are linear establishes a reasonably representative and understandable algorithm. This multiplication is done for each individual and is summed over all severity classes before the difference between couples is evaluated. Obviously this will yield a greater distance between a small time criminal and a murderer ( = 2, which is also the maximum) than between an intermediate perpetrator and that same killer ( = 1). Naturally, two individuals with the same behavior, still exhibit a distance of. An example of this calculation can be found in the bottom panel of Table II, with value.3. Naturally, the innocence category in crime nature will be assigned a severity factor of, stating that a minor criminal (for example: theft) will be more similar to an innocent person than a murderer would be, when looking at crime severity.
4 Both these concepts will ultimately culminate into the following formula: PD xy = ( 9 ) Perc ix Perc iy + 4 Fact j Sev jx j=1 4 Fact j Sev jy j=1 where the profile distance per year between person x and y is denoted as PD xy, the percentage of person x in crime category a is described as Perc ax, and Sev bx points to the severity class b of person x, with attached multiplication factor Fact b. This formula yields a maximum of 5 (the maxima of both concepts summed) and naturally a minimum of. In the example from Table II we would get =.9. As an example of our approach we look at the following situation for an arbitrary year: TABLE III FOUR PEOPLE S BEHAVIOR IN ONE YEAR Person No Crime Bicycle Theft... Murder Innocent Person Bicycle Thief Murderer Combined First we calculate the difference between all four offenders in both crime nature and crime severity. This provides the following table. TABLE IV CRIME NATURE AND SEVERITY DISTANCES Nature Severity I B M C I B M C I I B 2 1 B 2 1 M 1 M 1 We can now easily calculate the Profile Difference between the offenders. The result can be seen in Figure 2. We clearly observe from this figure that the innocent person from our list has a large distance from all offenders, varying from 3 to the bicycle thief to 5 to the murderer. As one would expect, the distances between respectively the thief and the thief-murderer and the murderer and the thief-murderer are rather small. The intermediate result we have calculated describes the difference in profile and crime seriousness between all individuals in the database. This distance matrix will be used as input for our main distance measure that will add crime frequency to the equation. Fig. 2. Murderer 2+3=5 Innocent Person 1+1=2 2+1=3 2+2=4 2+2=4 Combined 1+1=2 Bicycle Thief Example of Profile Difference between different criminals V. A NEW DISTANCE MEASURE The values the PD can get assigned are clearly bounded by and 5. This is, however, not the case with the crime frequency of the number of crimes per year. This can vary from to an undefined but possibly very large number of offences in a single year. To get a controlled range of possible distances between individual careers it is desirable to discretize this range into smaller categories. Intuitively, beyond a certain number of crimes, the difference that one single crime makes is almost insignificant. Therefore we propose to divide the number of crimes into categories. These categories will divide the crime frequency space and assign a discrete value FV (the frequency value) which will then be used as input for our distance measure. The categories we propose are described in Table V. Using this table the number of crimes value is bounded by and 4, while the categories maintain an intuitive treatment of both one-time offenders and career criminals. Naturally, the absolute difference FVD xy between two individuals x and y also ranges from to 4. TABLE V NUMBER OF CRIMES CATEGORIES Category Number of Crimes (#) Assigned Value (FV) # # >1 4 The sum of PD and FVD seems an obvious choice for a distance measure, but is not sufficient to fully describe the actual underlying principles. A large part of the National Crime Record Database contains one-time offenders. Their respective criminal careers are obviously reasonably similar, although their single crimes may differ largely in category or severity class. However, when looking into the careers of career criminals there are only minor differences to be ob-
5 served in crime frequency and therefore the descriptive value of profile becomes more important (cf. [2]). Consequently, the theoretical dependence of the PD on the crime frequency must become more apparent in our distance measure. To this end we will multiply the profile oriented part of our distance measure with the average frequency value and divide it by 4, to regain our original range between and 5. Hence, the distance measure that calculates the career difference per year CDPY xy for offenders x and y is as follows: 1 4 CDPY xy = ( PD xy 1 2 (FV x + FV y ) ) + FVD xy. 9 Dividing by 9, as is done above, will result in a distance between and 1 for all pairs of offenders, which is standard for a distance matrix. If one of PD xy or FVD xy is, the other establishes the distance as expected. Usage of this distance measure will result in a distance matrix that contains all distances per year for all couples of criminals. The final preparation step will consist of calculation of all these matrices for all available years and incorporating the duration of the careers. Now that we have defined a measure CDPY (i) xy to compare two persons x and y in a particular year i, we can combine this into a measure to compare full careers. The simplest option is to use dist1(x, y) = 1 years years CDPY (i) xy, where years is the total number of years. This option is further explored in [8]. The idea can be easily generalized to dist2(x, y) = years w(i) CDPY (i) xy, where the weights w(i) must satisfy years w(i) = 1. For instance, the first year might have a low weight. Of course, dist1 is retrieved when choosing w(i) = 1/years for all i. Two problems arise from this situation. The first is that careers may be the same, but stretched. Two criminals can commit the same crimes, in the same order, but in a different time period. This may or may not be viewed as a different career. On the one hand it is only the order of the crimes that counts, on the other hand the time in between also matters. The second is that if a criminal does not commit a crime in a given year, the distance to others (for that year) will be in some sense different from that between two active criminals. In order to address these remarks, we propose a stretch factor δ S, with δ S. This factor can be set or changed by the career analyst if he or she feels that the provided result does not fully represent reality. If δ S = we retrieve the original measure, if δ S is high many years can be contracted into a single one. To formally define our measure, we look at two careers, where for simplicity we use capitals A, B, C,... to indicate different crime types, and use multiset notation to specify the crimes in each year (so, e.g., {A, A, B} refers to a year where two A-crimes and one B-crime were committed). Suppose we have the following 7 year careers x and y of two criminals: x = ({A, A, B}, {C}, {A}, {B}, {D},, ), y = ({A, B},, {D},, {A}, {B, D}, ). The second career may be viewed as a somewhat stretched version of the first one, The differences are: x has two As in the first year, whereas y has only one; x has the singleton set {C} in year 2, whereas y has {D} in year 3; and year 6 from y is spread among year 4 and 5 of x. Evidently we are looking for some sort of edit distance. Now we take δ S {, 1, 2,...} and collapse at most δ S years, for both careers, where we add s to the right. Note that, when collapsing two sets, it is important to decide whether or not to use multisets. For instance, with δ S = 2, we might change y to y = ({A, B}, {D},, {A, B, D},,, ). If we have t years, there are ( ) ( ) t 1 t 1 t ways to change a single career; by the way, many of them give the same result. For the above example, with t = 7 and δ S = 2, this gives 22 possibilities, and therefore = 484 possible combinations of the two careers. We now take the smallest distance between two of these as the final distance. For the example this would be realized through x y δ S = ({A, A, B}, {C}, {A}, {B, D},,, ), = ({A, B}, {D}, {A}, {B, D},,, ). So finally the distance of x and y is determined by the distance between the singleton sets {C} and {D}, and the way how the multiset {A, A, B} compares to {A, B}. This last issue can be easily solved in the basic computation of PD, discussed in Section IV. Of course, there are other practical considerations. For instance, some (perhaps even many) crimes will go unnoticed by police forces, giving an incorrect view. Furthermore, in the current approach there is a clear, but maybe unwanted separation between crimes committed in December and in January of the next year. VI. CLUSTERING METHOD AND VISUALIZATION The standard construction of our distance matrix enabled our tool to employ existing techniques to create a 2-dimensional clustering image. The intermediate Euclidean distances in this image correspond as good as possible to the distances in the original matrix. Earlier research [7] showed that automated clustering methods with human intervention might get promising results. The method that we incorporated in our tool was described by Broekens et al. [3], who built upon the push and pull architecture described in [1], and allows data analysts to correct small mistakes made by naive clustering algorithms that result in local optima. The user is
6 assisted by coloring of the nodes that represent how much a single individual or a collection of individuals contribute to the total error made in the current clustering. The end result is a clickable 2-dimensional image of all possible careers. When the user clicks on an individual he or she is presented with the profile information for that particular offender. Minor career criminals Severe career criminals VII. PREDICTION It is very well possible to use the above mentioned method for prediction. Though we have not experimented with this yet, we would like to briefly mention some possibilities and problems. Once a (large) group of criminals has been analyzed, it is possible to predict future behavior of new individuals. To this end we can readily use the tool from [3]. Suppose that the given database has already been converted into a 2- dimensional clustering diagram, as described in Section VI. We can and will assume that the original database consists of full careers. For a new partially filled career, e.g., consisting of only two consecutive years with crimes, we can compute its distance to all original ones taking into account only the number of years of the new career. The system now takes care of finding the right spot for this individual, where it reaches a local minimum for the distances in the 2-dimensional space in comparison with the computed distances. The neighbouring individuals will then provide some information on the possible future behavior of the newly added career; this information is of a statistical nature. Of course, in practice it is not always clear when a career ends, not to speak of situations where a career ends or seems to end prematurely, e.g., because a criminal dies or is in prison for a substantial time period. VIII. EXPERIMENTAL RESULTS We tested our tool on the actual Dutch National Criminal Record Database. This database contains approximately one million offenders and the crimes they committed. Our tool analyzed the entire set of criminals and presented the user with a clear 2-dimensional clustering of criminal careers as can be seen in Figure 3. The confidential nature of the data used for criminal career analysis prevents us from disclosing more detailed experimental results reached in our research. The image in Figure 3 gives an impression of the output produced by our tool when analyzing the beforementioned database. This image shows what identification could easily be coupled to the appearing clusters after examination of its members. It appears to be describing reality very well. The large cloud in the left-middle of the image contains (most of the) one-time offenders. This seems to relate to the database very well since approximately 75 % of the people it contains has only one felony or misdemeanour on his or her record. The other apparent clusters also represent clear subsets of offenders. There is however a reasonably large group of un-clustered individuals. The clustering of these individual criminal careers might be influenced by the large cluster of one-timers. Getting more insights into the possible existence of One-time offenders Fig. 3. Clustering of Criminal Careers Multiple crimes per offender, varying in other categories subgroups in this non-cluster may prove even more interesting than the results currently provided by our approach. Future research will focus on getting this improvement realized (cf. Section IX). IX. CONCLUSION AND FUTURE DIRECTIONS In this paper we demonstrated the applicability of data mining in the field of criminal career analysis. The tool we described compiled a criminal profile out of the four important factors describing a criminal career for each individual offender: frequency, seriousness, duration and nature. These profiles were compared on similarity for all possible pairs of criminals using a new comparison method. We developed a specific distance measure to combine this profile difference with crime frequency and the change of criminal behavior over time to create a distance matrix that describes the amount of variation in criminal careers between all couples of perpetrators. This distance measure incorporates intuitive peculiarities about criminal careers. The end report consists of a visual 2-dimensional clustering of the results and is ready to be used by police experts. The enormous cloud of one-time offenders gave a somewhat unclear situational sketch of our distance space. This problem, however, can not be easily addressed since a large part of the National Criminal Record Database simply consists of this type of offenders. Its existence shows, however, that our approach easily creates an identifiable cluster of this special type of criminal career, which is promising. One possible solution to this problem would be to simply not take these individuals into account when compiling our distance matrices. The used method of clustering provided results that seem to represent reality well, and are clearly usable by police analysts, especially when the above is taken into account. However, the runtime of the chosen approach was not optimal yet. The clustering method was too intensive in a computational way, causing delays in the performance of the tool. In the future, an approach like Progressive Multi Dimensional Scaling [12]
7 could be more suited to the proposed task in a computative way, while maintaining the essence of career analysis. Future research will aim at solving both concerns mentioned above. After these issues have been properly addressed, research will mainly focus on the automatic comparison between the results provided by our tool and the results social studies reached on the same subject, in the hope that the best of both worlds will reach even better analyzing possibilities for the police experts in the field. Incorporation of this tool in a data mining framework for automatic police analysis of their data sources is also a future topic of interest. ACKNOWLEDGMENT This research is part of the DALE (Data Assistance for Law Enforcement) project as financed in the ToKeN program from the Netherlands Organization for Scientific Research (NWO) under grant number REFERENCES [1] R. Adderley and P. B. Musgrove. Data mining case study: Modeling the behavior of offenders who commit serious sexual assaults. In Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 1), pages , New York, 21. [2] A. Blumstein, J. Cohen, J. A. Roth, and C. A. Visher. Criminal Careers and Career Criminals. The National Academies Press, [3] J. Broekens, T. Cocx, and W.A. Kosters. Object-centered interactive multi-dimensional scaling: Ask the expert. In Proceedings of the Eighteenth Belgium-Netherlands Conference on Artificial Intelligence (BNAIC26), 26. [4] M. Chau, H. Atabakhsh, D. Zeng, and H. Chen. Building an infrastructure for law enforcement information sharing and collaboration: Design issues and challenges. In Proceedings of The National Conference on Digital Government Research, 21. [5] M. Chau, J. Xu, and H. Chen. Extracting meaningful entities from police narrative reports. In Proceedings of The National Conference on Digital Government Research, pages 1 5, 22. [6] H. Chen, H. Atabakhsh, T. Petersen, J. Schroeder, T. Buetow, L. Chaboya, C. O Toole, M. Chau, T. Cushna, D. Casey, and Z. Huang. COPLINK: Visualization for crime analysis. In Proceedings of The National Conference on Digital Government Research, pages 1 6, 23. [7] T.K. Cocx and W.A. Kosters. A distance measure for determining similarity between criminal investigations. In Proceedings of the Industrial Conference on Data Mining 26 (ICDM26), volume 465 of LNAI, pages Springer, 26. [8] J.S. de Bruin, T.K. Cocx, W.A. Kosters, J.F.J. Laros, and J.N. Kok. Onto clustering criminal careers. In Proceedings of the ECML/PKDD 26 Workshop on Practical Data Mining: Applications, Experiences and Challenges, pages 92 95, 26. [9] H.G. Goldberg and R.W.H. Wong. Restructuring transactional data for link analysis in the FinCEN AI system. In Papers from the AAAI Fall Symposium, pages 38 46, [1] W.A. Kosters and M.C. van Wezel. Competitive neural networks for customer choice models. In E-Commerce and Intelligent Methods, volume 15 of Studies in Fuzziness and Soft Computing, pages Physica-Verlag, Springer, 22. [11] G.C. Oatley, J. Zeleznikow, and B.W. Ewart. Matching and predicting crimes. In Proceedings of the Twenty-fourth SGAI International Conference on Knowledge Based Systems and Applications of Artificial Intelligence (AI24), pages 19 32, 24. [12] M. Williams and T. Muzner. Steerable, progressive multidimensional scaling. In Proceedings of the IEEE Symposium on Information Visualization (INFOVIS 4), pages IEEE, 24. [13] Y. Xiang, M. Chau, H. Atabakhsh, and H. Chen. Visualizing criminal relationships: Comparison of a hyperbolic tree and a hierarchical list. Decision Support Systems, 41(1):69 83, 25.
DATA MINING AND EXPERT SYSTEMS IN LAW ENFORCEMENT AGENCIES
DATA MINING AND EXPERT SYSTEMS IN LAW ENFORCEMENT AGENCIES Monica C. Holmes, Central Michigan University, [email protected] Diane D. Comstock-Davidson, Central Michigan University, [email protected]
Compact Representations and Approximations for Compuation in Games
Compact Representations and Approximations for Compuation in Games Kevin Swersky April 23, 2008 Abstract Compact representations have recently been developed as a way of both encoding the strategic interactions
Process Modelling from Insurance Event Log
Process Modelling from Insurance Event Log P.V. Kumaraguru Research scholar, Dr.M.G.R Educational and Research Institute University Chennai- 600 095 India Dr. S.P. Rajagopalan Professor Emeritus, Dr. M.G.R
Algorithmic Crime Prediction Model Based on the Analysis of Crime Clusters
Global Journal of Computer Science and Technology Volume 11 Issue 11 Version 1.0 July 2011 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN:
Data Mining for Digital Forensics
Digital Forensics - CS489 Sep 15, 2006 Topical Paper Mayuri Shakamuri Data Mining for Digital Forensics Introduction "Data mining is the analysis of (often large) observational data sets to find unsuspected
DECISION TREE ANALYSIS: PREDICTION OF SERIOUS TRAFFIC OFFENDING
DECISION TREE ANALYSIS: PREDICTION OF SERIOUS TRAFFIC OFFENDING ABSTRACT The objective was to predict whether an offender would commit a traffic offence involving death, using decision tree analysis. Four
Specific Usage of Visual Data Analysis Techniques
Specific Usage of Visual Data Analysis Techniques Snezana Savoska 1 and Suzana Loskovska 2 1 Faculty of Administration and Management of Information systems, Partizanska bb, 7000, Bitola, Republic of Macedonia
6.2.8 Neural networks for data mining
6.2.8 Neural networks for data mining Walter Kosters 1 In many application areas neural networks are known to be valuable tools. This also holds for data mining. In this chapter we discuss the use of neural
Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management
Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management Paper Jean-Louis Amat Abstract One of the main issues of operators
A Proposed Data Mining Model to Enhance Counter- Criminal Systems with Application on National Security Crimes
A Proposed Data Mining Model to Enhance Counter- Criminal Systems with Application on National Security Crimes Dr. Nevine Makram Labib Department of Computer and Information Systems Faculty of Management
TOWARDS SIMPLE, EASY TO UNDERSTAND, AN INTERACTIVE DECISION TREE ALGORITHM
TOWARDS SIMPLE, EASY TO UNDERSTAND, AN INTERACTIVE DECISION TREE ALGORITHM Thanh-Nghi Do College of Information Technology, Cantho University 1 Ly Tu Trong Street, Ninh Kieu District Cantho City, Vietnam
The Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
Gerard Mc Nulty Systems Optimisation Ltd [email protected]/0876697867 BA.,B.A.I.,C.Eng.,F.I.E.I
Gerard Mc Nulty Systems Optimisation Ltd [email protected]/0876697867 BA.,B.A.I.,C.Eng.,F.I.E.I Data is Important because it: Helps in Corporate Aims Basis of Business Decisions Engineering Decisions Energy
Strategic Online Advertising: Modeling Internet User Behavior with
2 Strategic Online Advertising: Modeling Internet User Behavior with Patrick Johnston, Nicholas Kristoff, Heather McGinness, Phuong Vu, Nathaniel Wong, Jason Wright with William T. Scherer and Matthew
Data quality in Accounting Information Systems
Data quality in Accounting Information Systems Comparing Several Data Mining Techniques Erjon Zoto Department of Statistics and Applied Informatics Faculty of Economy, University of Tirana Tirana, Albania
SPATIAL DATA CLASSIFICATION AND DATA MINING
, pp.-40-44. Available online at http://www. bioinfo. in/contents. php?id=42 SPATIAL DATA CLASSIFICATION AND DATA MINING RATHI J.B. * AND PATIL A.D. Department of Computer Science & Engineering, Jawaharlal
Understanding Web personalization with Web Usage Mining and its Application: Recommender System
Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,
FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM
International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT
Chapter 6. The stacking ensemble approach
82 This chapter proposes the stacking ensemble approach for combining different data mining classifiers to get better performance. Other combination techniques like voting, bagging etc are also described
15.062 Data Mining: Algorithms and Applications Matrix Math Review
.6 Data Mining: Algorithms and Applications Matrix Math Review The purpose of this document is to give a brief review of selected linear algebra concepts that will be useful for the course and to develop
Big Data with Rough Set Using Map- Reduce
Big Data with Rough Set Using Map- Reduce Mr.G.Lenin 1, Mr. A. Raj Ganesh 2, Mr. S. Vanarasan 3 Assistant Professor, Department of CSE, Podhigai College of Engineering & Technology, Tirupattur, Tamilnadu,
CHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION Exploration is a process of discovery. In the database exploration process, an analyst executes a sequence of transformations over a collection of data structures to discover useful
Orthogonal Projections
Orthogonal Projections and Reflections (with exercises) by D. Klain Version.. Corrections and comments are welcome! Orthogonal Projections Let X,..., X k be a family of linearly independent (column) vectors
Time series clustering and the analysis of film style
Time series clustering and the analysis of film style Nick Redfern Introduction Time series clustering provides a simple solution to the problem of searching a database containing time series data such
Self Organizing Maps for Visualization of Categories
Self Organizing Maps for Visualization of Categories Julian Szymański 1 and Włodzisław Duch 2,3 1 Department of Computer Systems Architecture, Gdańsk University of Technology, Poland, [email protected]
Behavioral Segmentation
Behavioral Segmentation TM Contents 1. The Importance of Segmentation in Contemporary Marketing... 2 2. Traditional Methods of Segmentation and their Limitations... 2 2.1 Lack of Homogeneity... 3 2.2 Determining
α = u v. In other words, Orthogonal Projection
Orthogonal Projection Given any nonzero vector v, it is possible to decompose an arbitrary vector u into a component that points in the direction of v and one that points in a direction orthogonal to v
Crime Pattern Analysis
Crime Pattern Analysis Megaputer Case Study in Text Mining Vijay Kollepara Sergei Ananyan www.megaputer.com Megaputer Intelligence 120 West Seventh Street, Suite 310 Bloomington, IN 47404 USA +1 812-330-01
Approximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
CONTENTS PREFACE 1 INTRODUCTION 1 2 DATA VISUALIZATION 19
PREFACE xi 1 INTRODUCTION 1 1.1 Overview 1 1.2 Definition 1 1.3 Preparation 2 1.3.1 Overview 2 1.3.2 Accessing Tabular Data 3 1.3.3 Accessing Unstructured Data 3 1.3.4 Understanding the Variables and Observations
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
An intelligent Analysis of a City Crime Data Using Data Mining
2011 International Conference on Information and Electronics Engineering IPCSIT vol.6 (2011) (2011) IACSIT Press, Singapore An intelligent Analysis of a City Crime Data Using Data Mining Malathi. A 1,
Text Mining Approach for Big Data Analysis Using Clustering and Classification Methodologies
Text Mining Approach for Big Data Analysis Using Clustering and Classification Methodologies Somesh S Chavadi 1, Dr. Asha T 2 1 PG Student, 2 Professor, Department of Computer Science and Engineering,
Role of Neural network in data mining
Role of Neural network in data mining Chitranjanjit kaur Associate Prof Guru Nanak College, Sukhchainana Phagwara,(GNDU) Punjab, India Pooja kapoor Associate Prof Swami Sarvanand Group Of Institutes Dinanagar(PTU)
In this presentation, you will be introduced to data mining and the relationship with meaningful use.
In this presentation, you will be introduced to data mining and the relationship with meaningful use. Data mining refers to the art and science of intelligent data analysis. It is the application of machine
Nine Common Types of Data Mining Techniques Used in Predictive Analytics
1 Nine Common Types of Data Mining Techniques Used in Predictive Analytics By Laura Patterson, President, VisionEdge Marketing Predictive analytics enable you to develop mathematical models to help better
Text Analytics. A business guide
Text Analytics A business guide February 2014 Contents 3 The Business Value of Text Analytics 4 What is Text Analytics? 6 Text Analytics Methods 8 Unstructured Meets Structured Data 9 Business Application
Data Quality Mining: Employing Classifiers for Assuring consistent Datasets
Data Quality Mining: Employing Classifiers for Assuring consistent Datasets Fabian Grüning Carl von Ossietzky Universität Oldenburg, Germany, [email protected] Abstract: Independent
Interactive Exploration of Decision Tree Results
Interactive Exploration of Decision Tree Results 1 IRISA Campus de Beaulieu F35042 Rennes Cedex, France (email: pnguyenk,[email protected]) 2 INRIA Futurs L.R.I., University Paris-Sud F91405 ORSAY Cedex,
Healthcare Measurement Analysis Using Data mining Techniques
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 03 Issue 07 July, 2014 Page No. 7058-7064 Healthcare Measurement Analysis Using Data mining Techniques 1 Dr.A.Shaik
Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization
Turban, Aronson, and Liang Decision Support Systems and Intelligent Systems, Seventh Edition Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization
Investigating Clinical Care Pathways Correlated with Outcomes
Investigating Clinical Care Pathways Correlated with Outcomes Geetika T. Lakshmanan, Szabolcs Rozsnyai, Fei Wang IBM T. J. Watson Research Center, NY, USA August 2013 Outline Care Pathways Typical Challenges
Analysis of Bayesian Dynamic Linear Models
Analysis of Bayesian Dynamic Linear Models Emily M. Casleton December 17, 2010 1 Introduction The main purpose of this project is to explore the Bayesian analysis of Dynamic Linear Models (DLMs). The main
Sanjeev Kumar. contribute
RESEARCH ISSUES IN DATAA MINING Sanjeev Kumar I.A.S.R.I., Library Avenue, Pusa, New Delhi-110012 [email protected] 1. Introduction The field of data mining and knowledgee discovery is emerging as a
How To Find Influence Between Two Concepts In A Network
2014 UKSim-AMSS 16th International Conference on Computer Modelling and Simulation Influence Discovery in Semantic Networks: An Initial Approach Marcello Trovati and Ovidiu Bagdasar School of Computing
Parallel Computing for Option Pricing Based on the Backward Stochastic Differential Equation
Parallel Computing for Option Pricing Based on the Backward Stochastic Differential Equation Ying Peng, Bin Gong, Hui Liu, and Yanxin Zhang School of Computer Science and Technology, Shandong University,
Course 803401 DSS. Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization
Oman College of Management and Technology Course 803401 DSS Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization CS/MIS Department Information Sharing
Clustering Data Streams
Clustering Data Streams Mohamed Elasmar Prashant Thiruvengadachari Javier Salinas Martin [email protected] [email protected] [email protected] Introduction: Data mining is the science of extracting
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
Clustering. Adrian Groza. Department of Computer Science Technical University of Cluj-Napoca
Clustering Adrian Groza Department of Computer Science Technical University of Cluj-Napoca Outline 1 Cluster Analysis What is Datamining? Cluster Analysis 2 K-means 3 Hierarchical Clustering What is Datamining?
DATA MINING AND WAREHOUSING CONCEPTS
CHAPTER 1 DATA MINING AND WAREHOUSING CONCEPTS 1.1 INTRODUCTION The past couple of decades have seen a dramatic increase in the amount of information or data being stored in electronic format. This accumulation
A Review of Data Mining Techniques
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
How To Use A Polyanalyst
Accident Data Analysis with PolyAnalyst Pavel Anashenko Sergei Ananyan www.megaputer.com Megaputer Intelligence, Inc. 120 West Seventh Street, Suite 310 Bloomington, IN 47404, USA +1 812-330-0110 Accident
A Data Mining Analysis to evaluate the additional workloads caused by welding distortions
A Data Mining Analysis to evaluate the additional workloads caused by welding distortions Losseau N., Caprace J.D., Aracil Fernandez F., Rigo P. ABSTRACT: This paper presents a way to minimize cost in
Business Intelligence and Decision Support Systems
Chapter 12 Business Intelligence and Decision Support Systems Information Technology For Management 7 th Edition Turban & Volonino Based on lecture slides by L. Beaubien, Providence College John Wiley
Dataset Preparation and Indexing for Data Mining Analysis Using Horizontal Aggregations
Dataset Preparation and Indexing for Data Mining Analysis Using Horizontal Aggregations Binomol George, Ambily Balaram Abstract To analyze data efficiently, data mining systems are widely using datasets
Keywords cosine similarity, correlation, standard deviation, page count, Enron dataset
Volume 4, Issue 1, January 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cosine Similarity
High School Algebra Reasoning with Equations and Inequalities Solve equations and inequalities in one variable.
Performance Assessment Task Quadratic (2009) Grade 9 The task challenges a student to demonstrate an understanding of quadratic functions in various forms. A student must make sense of the meaning of relations
STATISTICA. Clustering Techniques. Case Study: Defining Clusters of Shopping Center Patrons. and
Clustering Techniques and STATISTICA Case Study: Defining Clusters of Shopping Center Patrons STATISTICA Solutions for Business Intelligence, Data Mining, Quality Control, and Web-based Analytics Table
Data Warehousing and Data Mining in Business Applications
133 Data Warehousing and Data Mining in Business Applications Eesha Goel CSE Deptt. GZS-PTU Campus, Bathinda. Abstract Information technology is now required in all aspect of our lives that helps in business
Clustering & Visualization
Chapter 5 Clustering & Visualization Clustering in high-dimensional databases is an important problem and there are a number of different clustering paradigms which are applicable to high-dimensional data.
Finding similar case subset and hotspot detection in felonious data set using data mining algorithms: Weighted Clustering and classification
Finding similar case subset and hotspot detection in felonious data set using data mining algorithms: Weighted Clustering and classification Ms. Apexa Joshi 1, Dr. Suresh M.B. 2 1 Research Scholar, School
Recommendation Tool Using Collaborative Filtering
Recommendation Tool Using Collaborative Filtering Aditya Mandhare 1, Soniya Nemade 2, M.Kiruthika 3 Student, Computer Engineering Department, FCRIT, Vashi, India 1 Student, Computer Engineering Department,
Chapter 5. Warehousing, Data Acquisition, Data. Visualization
Decision Support Systems and Intelligent Systems, Seventh Edition Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization 5-1 Learning Objectives
Operation Count; Numerical Linear Algebra
10 Operation Count; Numerical Linear Algebra 10.1 Introduction Many computations are limited simply by the sheer number of required additions, multiplications, or function evaluations. If floating-point
Natural Language to Relational Query by Using Parsing Compiler
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
Visual Data Mining with Pixel-oriented Visualization Techniques
Visual Data Mining with Pixel-oriented Visualization Techniques Mihael Ankerst The Boeing Company P.O. Box 3707 MC 7L-70, Seattle, WA 98124 [email protected] Abstract Pixel-oriented visualization
Lluis Belanche + Alfredo Vellido. Intelligent Data Analysis and Data Mining
Lluis Belanche + Alfredo Vellido Intelligent Data Analysis and Data Mining a.k.a. Data Mining II Office 319, Omega, BCN EET, office 107, TR 2, Terrassa [email protected] skype, gtalk: avellido Tels.:
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT
MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT 1 SARIKA K B, 2 S SUBASREE 1 Department of Computer Science, Nehru College of Engineering and Research Centre, Thrissur, Kerala 2 Professor and Head,
1. Classification problems
Neural and Evolutionary Computing. Lab 1: Classification problems Machine Learning test data repository Weka data mining platform Introduction Scilab 1. Classification problems The main aim of a classification
Private Record Linkage with Bloom Filters
To appear in: Proceedings of Statistics Canada Symposium 2010 Social Statistics: The Interplay among Censuses, Surveys and Administrative Data Private Record Linkage with Bloom Filters Rainer Schnell,
An Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015
An Introduction to Data Mining for Wind Power Management Spring 2015 Big Data World Every minute: Google receives over 4 million search queries Facebook users share almost 2.5 million pieces of content
The Goldberg Rao Algorithm for the Maximum Flow Problem
The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }
The Trip Scheduling Problem
The Trip Scheduling Problem Claudia Archetti Department of Quantitative Methods, University of Brescia Contrada Santa Chiara 50, 25122 Brescia, Italy Martin Savelsbergh School of Industrial and Systems
FEATURE SPECIFIC CRIMINAL MAPPING USING DATA MINING TECHNIQUES AND GENERALIZED GAUSSIUN MIXTURE MODEL
FEATURE SPECIFIC CRIMINAL MAPPING USING DATA MINING TECHNIQUES AND GENERALIZED GAUSSIUN MIXTURE MODEL Uttam Mande Y.Srinivas J.V.R.Murthy Dept of CSE Dept of IT Dept of CSE GITAM University GITAM University
A Business Process Services Portal
A Business Process Services Portal IBM Research Report RZ 3782 Cédric Favre 1, Zohar Feldman 3, Beat Gfeller 1, Thomas Gschwind 1, Jana Koehler 1, Jochen M. Küster 1, Oleksandr Maistrenko 1, Alexandru
A GENERAL TAXONOMY FOR VISUALIZATION OF PREDICTIVE SOCIAL MEDIA ANALYTICS
A GENERAL TAXONOMY FOR VISUALIZATION OF PREDICTIVE SOCIAL MEDIA ANALYTICS Stacey Franklin Jones, D.Sc. ProTech Global Solutions Annapolis, MD Abstract The use of Social Media as a resource to characterize
STATISTICA. Financial Institutions. Case Study: Credit Scoring. and
Financial Institutions and STATISTICA Case Study: Credit Scoring STATISTICA Solutions for Business Intelligence, Data Mining, Quality Control, and Web-based Analytics Table of Contents INTRODUCTION: WHAT
Notes on Factoring. MA 206 Kurt Bryan
The General Approach Notes on Factoring MA 26 Kurt Bryan Suppose I hand you n, a 2 digit integer and tell you that n is composite, with smallest prime factor around 5 digits. Finding a nontrivial factor
Enterprise Organization and Communication Network
Enterprise Organization and Communication Network Hideyuki Mizuta IBM Tokyo Research Laboratory 1623-14, Shimotsuruma, Yamato-shi Kanagawa-ken 242-8502, Japan E-mail: [email protected] Fusashi Nakamura
Data Mining and Database Systems: Where is the Intersection?
Data Mining and Database Systems: Where is the Intersection? Surajit Chaudhuri Microsoft Research Email: [email protected] 1 Introduction The promise of decision support systems is to exploit enterprise
Master of Science in Health Information Technology Degree Curriculum
Master of Science in Health Information Technology Degree Curriculum Core courses: 8 courses Total Credit from Core Courses = 24 Core Courses Course Name HRS Pre-Req Choose MIS 525 or CIS 564: 1 MIS 525
DATA ANALYSIS II. Matrix Algorithms
DATA ANALYSIS II Matrix Algorithms Similarity Matrix Given a dataset D = {x i }, i=1,..,n consisting of n points in R d, let A denote the n n symmetric similarity matrix between the points, given as where
Using Data Mining for Mobile Communication Clustering and Characterization
Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer
Dotted Chart and Control-Flow Analysis for a Loan Application Process
Dotted Chart and Control-Flow Analysis for a Loan Application Process Thomas Molka 1,2, Wasif Gilani 1 and Xiao-Jun Zeng 2 Business Intelligence Practice, SAP Research, Belfast, UK The University of Manchester,
The Science and Art of Market Segmentation Using PROC FASTCLUS Mark E. Thompson, Forefront Economics Inc, Beaverton, Oregon
The Science and Art of Market Segmentation Using PROC FASTCLUS Mark E. Thompson, Forefront Economics Inc, Beaverton, Oregon ABSTRACT Effective business development strategies often begin with market segmentation,
Course Syllabus For Operations Management. Management Information Systems
For Operations Management and Management Information Systems Department School Year First Year First Year First Year Second year Second year Second year Third year Third year Third year Third year Third
Big Data: Rethinking Text Visualization
Big Data: Rethinking Text Visualization Dr. Anton Heijs [email protected] Treparel April 8, 2013 Abstract In this white paper we discuss text visualization approaches and how these are important
Data Mining: Overview. What is Data Mining?
Data Mining: Overview What is Data Mining? Recently * coined term for confluence of ideas from statistics and computer science (machine learning and database methods) applied to large databases in science,
AP Physics 1 and 2 Lab Investigations
AP Physics 1 and 2 Lab Investigations Student Guide to Data Analysis New York, NY. College Board, Advanced Placement, Advanced Placement Program, AP, AP Central, and the acorn logo are registered trademarks
Introduction to Data Mining
Introduction to Data Mining Jay Urbain Credits: Nazli Goharian & David Grossman @ IIT Outline Introduction Data Pre-processing Data Mining Algorithms Naïve Bayes Decision Tree Neural Network Association
A STUDY OF DATA MINING ACTIVITIES FOR MARKET RESEARCH
205 A STUDY OF DATA MINING ACTIVITIES FOR MARKET RESEARCH ABSTRACT MR. HEMANT KUMAR*; DR. SARMISTHA SARMA** *Assistant Professor, Department of Information Technology (IT), Institute of Innovation in Technology
IEEE IoT IoT Scenario & Use Cases: Social Sensors
IEEE IoT IoT Scenario & Use Cases: Social Sensors Service Description More and more, people have the possibility to monitor important parameters in their home or in their surrounding environment. As an
