Crime Mining: A Comprehensive Survey
|
|
|
- Jodie Cummings
- 9 years ago
- Views:
Transcription
1 , pp Crime Mining: A Comprehensive Survey Muhammad Arif 1,2, Khubaib Amjad Alam 1 and Mehdi Hussain 1,3 1 Faculty of Computer Science and Information Technology, University of Malaya Kuala Lumpur, Malaysia 2 Computer Science Department, Comsats Institute of Information and Technology Islamabad Pakistan 3 School of Electrical Engineering and Computer Science, National University of Sciences and Technology, Islamabad Pakistan [email protected] [email protected] [email protected] Abstract Data mining is vast field for mining knowledge in various fields of life. Crime mining is one of the applications focused here. Credit card and web based crime are increasingly as more technologies are rising high. To deal and overcome fraud and classification techniques are implemented. Framework and process models are designed that provide user results, graphs and trees that help user to find criminals without any complex computation. Keywords: crime mining, fraud detection, data mining application 1. Introduction Many law enforcement agencies are interested in crime detection. Different frameworks have been designed for crime detection. An integrated crime detection systems RECAP[1] allows user to search with respect to location, time and geography. PERPSEARCH has four components one of which is specified for geographical profiling[2]. Credit card crime is the one of the current issues. In [3] two algorithms communal detection and spike detection are introduced which work together for performance. A CLOPE algorithm is implemented for Viet Nam s banking industry[4]. Web based crime or cybercrime is also renowned field. C4.5 algorithm is implemented to find fraudsters using WEKA tool [5]. Trade partners can also find out by keeping in view history of crime. In [6] it is shown that agencies are concerned about blogs having information of crime incidents, events and so on. Document languages are also converted to extract crime information and then further processing is applied. In [7] and [8] Arabic documents and Chinese web pages are processed. Thus various classification, and outlier detection techniques are implemented. In[9] network security is exploited by creating bots for performing fraud. New classification algorithm can be developed for controlling peer to peer network traffic. 2. Application of Data Mining in Crime Detection This section analyzes different crime detection frameworks in detail. The Regional Crime Analysis Program (RECAP): Regional Crime Analysis Program (RECAP) utilizes data fusion and data mining techniques to gain ISSN: IJUNESST Copyright c 2015 SERSC
2 knowledge about crime activities[1]. RECAP provides significant information regarding crime activities and it alerts user if activity is unmanageable. It provides interface by utlizing map searching and charts with respect to time, day, week, location etc. kernel density estimation is used for crime determination in a location. K-Means and nearest neighbor algorithm is used for analysis. Crime Pattern Detection Using Data Mining This study utilizes K- Means algorithm to find crime patterns[10]. It is implemented on real time data acquired from sheriff s office. Semi-supervised learning is used for forecasting precision. Quality of data and attribute selection are important part of this technique. Every cluster has weight associated with it which is presented to expert for detection of further sub-clusters. On one hand it gives advantage of for large dataset, on the other hand it has disadvantaged that only detective can get help from pattern analysis. Data Mining in Criminal Career Analysis This paper introduces a new tool that auto generates the criminal profiles based on four parameters: crime nature, frequency, duration and severity[11]. Distance is measured and is performed on these profiles and similar cases are taken out which are used by police experts. There is lack of data updating in data which can lead to wrong results. After every two years data is updated. The future work can be done in computation process like Progressive Multi Dimension Scaling. Multivariate Time Series Clustering Approach for Crime Trends Prediction Traditional approaches do not provide optimal results when data is multi-dimensional. So there is a need of converting multi-dimensional data into a single dimension. For this purpose dynamic wrapping method has been used by [12]. DWT has drawback of managing multivariate data with different values. To overcome this problem parametric Minkowski model is added in finding distance matrix. Determining values Minkowski weights is challenging task. In the present paper it is decided by Indian National Crime Records Bureau. Mining Multi-Modal Crime Patterns Using Hierarchical Clustering Data of any field have different measuring attributes with different values. This paper emphasizes on crimes having different kinds of attribute e.g. type of crime. The main concern is with three modes i.e. weapons, offender demographics and location[13]. Growing self-organizing Maps have capability of dealing with multidimensional dataset. GraMode-CH is also introduced to deal with the matter of multi-modality. Vertical, horizontal and global concept hierarchy has been identified. The future work can be explored on targeted data fusion. Mining Top-k and Bottom-k Correlative Crime Patterns through Graph Representations The datasets are represented in the form of graphs in order to overcome the limitations of previous work[14]. Edges are first extracted and then correlation is measured. First normalization is performed to keep original density points. Then kruskal s algorithm is used to find minimum spanning tree. Third step is to find correlation between edges of graph using Pearson s correlation coefficient. Results are limited to top k or bottom k correlated datasets. Digital Forensic Application in Data Mining The proposed frame collects data through multiple devices[15]. Presence and authenticated utilization of devices is assured. Data is extracted and preprocessing is 358 Copyright c 2015 SERSC
3 implemented. Before analysis procedure data is check for authenticity. After analysis reports are generated and finally data device is presented in court for evidence. Data in this paper is collected from flash drive and processing is done through ETL. Recuva is used for extraction; Oracle Express Edition is used for warehouse and KMO for loading. First is applied using k-means algorithm and further classification is implemented using C4.5 algorithm. In future other authenticated devices will be used. Detecting suspicious money laundering cases in an investment bank The framework proposed consists of three levels for anti-money laundering. Extraction and cleaning of data is done in data preprocessing[5]. Data quality is one of the challenging tasks. Data mining has supervised and unsupervised learning. Classification is done for supervised leaning and is done for unsupervised learning. Results obtained are stored for further analysis. In future work techniques for large datasets will be handled. Multiple-Phase Modeling to Identify Potential Fraudsters in Online Auctions This paper emphasizes on identification and forecasting of fraud in online auction stores[16]. Decision tree a classification technique is used. First single phased model is created and then multi phased model is created by attaining attributes from different accounts. Experiment is implemented on yahoo Taiwan data. Ratio of fraudsters is half to that of legitimate users.c4.5 algorithm is implemented using Weka. In future decision tress will be replaced by lazy learners. Online Auction Fraud Screening Mechanism for Choosing Trading Partners In real applications of life it is difficult to choose a reliable partner for trade[17]. An instance based approach is implemented. New instances can be frequently added in the model. Experiments have been conducted on yahoo Taiwan s data. K* algorithm is used. Two evaluation parameters are true positive rate and false positive rate are calculated. Results show method is helpful in decision making.new attributes can be analyzed by using new social algorithms. Using Self Organizing Map to Cluster Arabic Crime Documents In the paper two techniques information extraction and SOM has been implemented to identify crime related text from crime documents[3]. The framework has five stages. In normalization the words of the same form are translated into a single word. Second step is the information extraction of the grammar of crime related words. Stemming is put into action by removing suffix from words and assigning each word a distinctive number. Last step is the of information extracted documents. Thus system good performance is due to information extraction on syntactic principles. Event Ontology Construction for cybercrime In this study Event ontology and support vector machine have been utilized for web crime mining[7]. Text mining includes SVM learning and SVM classification. Event ontology is implemented in case of feature compression and SVM in case of feature expansion. Experiments are implemented by comparing SVM with ontology and simple SVM. AK-Modes: A Weighted Clustering Algorithm for Finding Similar Case Subsets An AK-Modes algorithm consisting of two parts is implemented to find out similar case subsets[18]. Firstly, attributes are selected and weights are calculated using information domain ratio. Secondly, the results of the first step are used in the Copyright c 2015 SERSC 359
4 second as input. Clustering is performed to find similar case subsets. Real crime datasets show considerable results. Selecting a threshold in algorithm is a difficult task. Semantic distance will be a good direction for future work. General crime matching framework The proposed framework[6] has three major components. First one is Entity Extraction as a branch of text mining which uses lexical lookup approach. Crime data is divided into two phase. In first phase a self-organizing neural network was used to mine the attribute map and then k-means algorithm group the output. Third component is Neural Network as an engine for crime matching process. Multi-Layer perceptron is used for crime matching process. This framework can be implemented as integrated enterprise software in future. Automatic Online Monitoring and Data Mining Internet Forums With the advancement in technology news is available more frequently on internet rather other media communication systems. To obtain issues and news related to crime law enforcement agencies are working. A framework[19] consisting of five components has proposed in this regard. Crawler continuously download posting and information is stored in database. Statistical engine forms metasummary of a specified time. Then technique is applied on obtained information. User interface is also available to show hot topics of crime. Money Laundering Detection Money laundering detection has been implemented using CLOPE algorithm for money transfer in banking[4]. The architecture consists of four steps. Data conversion takes place by converting the transaction data of accounts into dataset. In data fragmentation data is converted into different parts by converting number data type to nominal. Then data will be clustered by CLOPE algorithm. The system is implemented for Viet Nam s banking industry. Resilient Identity Crime Detection Credit fraud application falls under the category of identity crimes. This paper presents a multi layered detection system with two important detection layers: communal detection and spike detection[8]. Communal detection searches actual social affiliation which reduces the degree of fraud. Spike detection searches for the fraudsters thus increases the degree of fraud. Both algorithms perform well for large datasets of sliding window even are complements of each other. It has some restrictions of changeable and time constraints. Data Mining and Predictive Analytics in Public Safety and Security This process model consists of six phases[20] where initial phase is to specify the question which data mining could answer. Modus Operandi which is an important part of data is also collected with it. In data preprocessing phase data is cleaned, attributes are selected and data quality is checked in recoding. Data analyzing has two technique categories: supervised and unsupervised. Public safety and security evaluation answers to the question developed in the first state. The output is brought to a proper usable format. PerpSearch: An Integrated Crime Detection System PerpSearch is based on LETS. It has four main components as geographic profiling, social network analysis, crime patterns and physical matching[2]. Geographic profiling defines the location of the crime, while other components 360 Copyright c 2015 SERSC
5 answer for who. It has social networking analysis of COPLINK system which is called concept space. It provides GUI for input physical description data and crime type. After entering output, officers can mark the area they are interested in. Serial crimes link can be added in future to automate link between same crimes. Correlation analysis for Money Laundering Crimes In this paper a new technique for Link Discovery based on Correlation Analysis (LDCA) for money laundering has been introduced[22]. Automatic data community items are developed for MLC. LDCA components are Link hypothesis, Link generation and Link identification. In link hypothesis data is collected from individuals. Correlation is found out between individuals transaction record. Monetary vectors are determined by k-means. Histogram is generated and local and global correlation is discovered in Link generation phase. A new segmentation threshold is defined in Link identification. Data Mining for Security Applications: The aim of project is to develop a peer to peer botnet for network traffic[9]. A bot is an agent that performs certain actions on behalf of intruders. This paper utilizes mining techniques including, classification and outlier detection over concept-drifting data streams to detect peer-to-peer Botnet traffic. Table 1. Techniques to Handle Security Threats Reference Proposed Method Mining Mining technique Other Techniques Technique [1], [2] The Regional Crime Analysis Program (RECAP):a Framework for Mining Data to K means and nearest neighbor Kernel density estimation catch criminals algorithm [3] Using Self Organizing Map to Cluster Arabic Crime Documents Self-Organizing Map rule-based approach [4] Applying Data Mining in Money Laundering Clustering CLOPE algorithm Detection for the Vietnamese Banking Industry [5] A data mining-based solution for detecting suspicious money laundering cases in an investment bank centre-based algorithm neural network [6] Detecting and investigating crime by means of data mining: a general crime matching framework SOM, k-means MLP Neural Network [7] An Event Ontology Construction Approach To Classification Support Vector Machine Event Ontology Web Crime Mining [8] Resilient Identity Crime Detection communal detection (CD) and spike detection (SD). [10] Crime Pattern Detection Using Data Mining k-means technique [11] Data Mining Approaches Multi-dimensional to Criminal Career Analysis [12] A Multivariate Time Series Clustering Nearest neighbor Approach for Crime Trends Prediction [13] Mining Multi-Modal Crime Patterns At Different Levels of Granularity Using Hierarchical Clusterings [14] Mining Top-k and Bottom-k Correlative Crime Patterns through Graph Representations [15] A Novel Data Generation Approach for Digital Forensic Application in Data Mining Clustering Hierarchical - Growing Self Organizing Maps Semi supervised learning single linkage method and dynamic time wrapping and parametric M inkowski model Density based Kruskal algorithm, classification k-means algorithm, C4.5 decision tree model Recuva, Oracle Express Edition, Bartlett s test of sphericity and Kaiser-Meyer- Olkin Copyright c 2015 SERSC 361
6 [16] A Multiple-Phased Modeling Method to Identify Potential Fraudsters in Online Auctions [17] An Online Auction Fraud Screening Mechanism for Choosing Trading Partners [18] AK-Modes: A Weighted Clustering Algorithm for Finding Similar Case Subsets [19] Automatic OnLine Monitoring and Data Mining Internet Forums classification Clustering Clustering decision trees K* algorithm AK-Modes algorithm Text mining Sr. No Quality measuring attribute [1], [2] Automating spatial analysis Table 2. Techniques to Handle Security Threats Strength weakness comment Map-Oriented Searches, Control and Time Charting, Hot Spot analysis using Kernel Density Estimation [3] Arabia documents crime ability to extract keywords based on syntactic principles [4] Bank transactions Detecting money laundering system can t run standalone absolutely without analyst GIS expert requirement removal is good. New application gives new idea for Arabic documents [5] running time performance [6] Automatic insertion of data into database [7] cybercrime on Chinese websites [8] resilience (multilayer defence), adaptivity (accounts for changing fraud and legal behavior), and quality data (real-time removal of data errors) [10] Increase productivity of detectives [11] Crime Nature, Frequency, Seriousness and Duration simple and efficient data mining-based solution Crime data analysis Feasible and effective in Web crime mining. successful credit application fraud patterns Requires Time,crime type and area Selection Digital profile creation web pages in Chinese extreme imbalanced class, and time constraints crime pattern analysis can only help the detective, not Replace them. Lack of information of crime SOM is widely used for Event ontology increases performance rate Only good for credit card application Data quality and attributes are important factors. behavior of criminal can be predicted [12] Reducing data dimensions Suitable for sequences of differed lengths Difficult to find appropriate weights for M inkowski model Other techniques can be used for reducing dimensions. [13] Pattern recognition at different levels of granularity [14] Correlation analysis among datasets [15] generating, storing and analyzing data, retrieved from digital devices [16] legitimacy of users before a fraud occurs necessity and significance of mining patterns Efficient calculation economic preprocessing rules are generated by the legitimate accounts extracted features cannot restore files if Windows OS is being used decision trees detect the minority of fraudsters, of which results are not as accurate as the majority of instances [17] Instance based learning Helpful in decision making Lesser capability of inducing general rules Weapon example clears the idea of multimodality Real crime datasets are provided for approach. open source tools but complex processing. User can be altered before fraud [18] finding the similar case improve the efficiency reasonable threshold Still needs more 362 Copyright c 2015 SERSC
7 subsets compared with the traditional approaches, Assists in the decision-making process. [19] Finding news witness helps investigators to control internet forums improvement. No specific technique 3. Conclusion and Future Work With different searching methods of crimes it can be concluded that Clustering is more widely used than classification. Data quality can be one the challenging issue. Cyber mining is the one of main concern as agent are developed to perform fraud thus exploiting network security. Criminal network analysis is one important for police to track criminal via location, vehicle etc. Credit card fraudster is also revolutionary to be solved by different mining methods. For money laundering techniques for large datasets will be handled. Semantic distance will be a good direction for future work in ontology. Credit application fraud detection can be extended References [1] D. E. Brown, The Regional Crime Analysis Program (ReCAP): a framework for mining data to catch criminals, SMC 98 Conf. Proceedings IEEE Int. Conf. Syst. Man, Cybern. (Cat. No.98CH36218), vol. 3, pp , [2] L. Ding, D. Steil, M. Hudnall, B. Dixon, R. Smith, D. Brown, and A. Parrish, PerpSearch: An integrated crime detection system, 2009 IEEE Int. Conf. Intell. Secur. Informatics, pp , [3] M. Alruily, A. Ayesh, and A. Al-Marghilani, Using Self Organizing Map to cluster Arabic crime documents, Proc. Int. Multiconference Comput. Sci. Inf. Technol., pp , Oct [4] D. K. Cao and P. Do, Applying Data Mining in Money Laundering Detection, pp , [5] N. A. Le Khac, S. Markos, and M.-T. Kechadi, A Data Mining-Based Solution for Detecting Suspicious Money Laundering Cases in an Investment Bank, 2010 Second Int. Conf. Adv. Databases, Knowledge, Data Appl., pp , [6] M. R. Keyvanpour, M. Javideh, and M. R. Ebrahimi, Detecting and investigating crime by means of data mining: a general crime matching framework, Procedia Comput. Sci., vol. 3, pp , [7] C. Li, Y. Hu, and Z. Zhong, An event ontology construction approach to web crime mining, 2010 Seventh Int. Conf. Fuzzy Syst. Knowl. Discov., no. Fskd, pp , Aug [8] C. Phua, K. Smith-miles, S. Member, V. C. Lee, and R. Gayler, Resilient Identity Crime Detection, vol. 24, no. 3, pp , [9] B. Thuraisingham, IEEE ISI 2008 Invited Talk ( I ) Data Mining for Security Applications : Mining Concept-Drifting Data Streams to Detect Peer to Peer Botnet Traffic, no. I, [10] S. V. Nath, Crime Pattern Detection Using Data Mining Florida Atlantic University / Oracle Corporation, vol. 1, no. 954, pp. 1 4, [11] J. De Bruin, T. Cocx, W. Kosters, J. J. Laros, and J. Kok, Data Mining Approaches to Criminal Career Analysis, Sixth Int. Conf. Data Min., pp , Dec [12] B. Chandra, M. Gupta, and M. P. Gupta, A multivariate time series approach for crime trends prediction, 2008 IEEE Int. Conf. Syst. Man Cybern., pp , Oct [13] Y. L. Boo and D. Alahakoon, Mining Multi-modal Crime Patterns at Different Levels of Granularity Using Hierarchical Clustering, 2008 Int. Conf. Comput. Intell. Model. Control Autom., pp , [14] P. Phillips, E. Peterphillipsjcueduau, and I. Lee, Mining Top- k and Bottom- k Correlative Crime Patterns through Graph Representations, pp , [15] V. H. Bhat, P. G. Rao, A. R.V., P. D. Shenoy, V. K.R., and L. M. Patnaik, A Novel Data Generation Approach for Digital Forensic Application in Data Mining, 2010 Second Int. Conf. Mach. Learn. Comput., pp , [16] W.-H. Chang and J.-S. Chang, A Multiple-Phased Modeling Method to Identify Potential Fraudsters in Online Auctions, 2010 Second Int. Conf. Comput. Res. Dev., pp , [17] I. Conforence and E. Technology, nd International Conforence on Education Technology and Computer (ICETC), pp , [18] L. Ma, Y. Chen, and H. Huang, AK-Modes: A weighted algorithm for finding similar case subsets, 2010 IEEE Int. Conf. Intell. Syst. Knowl. Eng., pp , Nov [19] Y. M. Lai, X. Zheng, K. P. Chow, L. C. K. Hui, and S. M. Yiu, Automatic Online Monitoring and Data-Mining Internet Forums, 2011 Seventh Int. Conf. Intell. Inf. Hiding Multimed. Signal Process., pp , Oct [20] C. Mccue, and Security, no. August, Copyright c 2015 SERSC 363
8 [21] S. Wang, A Comprehensive Survey of Data Mining-Based Accounting-Fraud Detection Research, 2010 Int. Conf. Intell. Comput. Technol. Autom., pp , May [22] Z. M. Zhang, J. J. Salerno, and P. S. Yu, Applying Data Mining in Investigating Money Laundering Crimes, no. Mlc, pp , Authors Muhammad Arif is a PhD student at Faculty of CS and IT, University of Malaya. Currently he is working on Medical image Processing. His research interests include image processing, E learning, Artificial intelligence and data mining. He joined UM as a Bright Spark Scholar in September 2013 for the period of 3 years. Before this he completed masters and bachelor degrees in Pakistan. He received his BS degree in Computer Science from University of Sargodha, Pakistan in He obtained his MS degree in Computer Science from COMSATS Islamabad 2013 Pakistan. Khubaib Amjad Alam is a Ph.D. candidate at Department of Software Engineering, Faculty of Computer Science and Information Technology, University of Malaya, under the prestigious Bright Spark Fellowship. He received Master of Computer Science degree in 2013 from Comsats Institute of Information Technology, Pakistan. His current research interests are Business Process Management (BPM); Service oriented architecture (SOA), Web services, distributed systems, Change management, Maintenance and Evolution issues of Enterprise level software systems and engineering applications of soft methodologies. Mehdi Hussain received his BS degree in Computer Science from The Islamia University Bahawalpur, Pakistan in He obtained his MS degree in Computer Science from SZABIST Islamabad 2011 Pakistan. He has 8 years working experience in a renewed Software House (Streaming Networks (private)). He recently selected as funded scholar at National University of Science and Technology (NUST) under faculty development program Presently he is research scholar at University of Malaya, Malaysia. Research interests are multimedia security, steganography, data mining. He can be reached at [email protected]. 364 Copyright c 2015 SERSC
A Framework for Data Warehouse Using Data Mining and Knowledge Discovery for a Network of Hospitals in Pakistan
, pp.217-222 http://dx.doi.org/10.14257/ijbsbt.2015.7.3.23 A Framework for Data Warehouse Using Data Mining and Knowledge Discovery for a Network of Hospitals in Pakistan Muhammad Arif 1,2, Asad Khatak
Credit Card Fraud Detection Using Self Organised Map
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1343-1348 International Research Publications House http://www. irphouse.com Credit Card Fraud
Crime Hotspots Analysis in South Korea: A User-Oriented Approach
, pp.81-85 http://dx.doi.org/10.14257/astl.2014.52.14 Crime Hotspots Analysis in South Korea: A User-Oriented Approach Aziz Nasridinov 1 and Young-Ho Park 2 * 1 School of Computer Engineering, Dongguk
A Dynamic Approach to Extract Texts and Captions from Videos
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
Survey on Fraud Detection Techniques Using Data Mining
, pp.163-170 http://dx.doi.org/10.14257/ijunesst.2015.8.3.15 Survey on Fraud Detection Techniques Using Data Mining 1,2 Muhammad Arif and 2 Amil Roohani Dar 1 Faculty of Computer Science and Information
AUTO CLAIM FRAUD DETECTION USING MULTI CLASSIFIER SYSTEM
AUTO CLAIM FRAUD DETECTION USING MULTI CLASSIFIER SYSTEM ABSTRACT Luis Alexandre Rodrigues and Nizam Omar Department of Electrical Engineering, Mackenzie Presbiterian University, Brazil, São Paulo [email protected],[email protected]
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
FRAUD DETECTION IN ELECTRIC POWER DISTRIBUTION NETWORKS USING AN ANN-BASED KNOWLEDGE-DISCOVERY PROCESS
FRAUD DETECTION IN ELECTRIC POWER DISTRIBUTION NETWORKS USING AN ANN-BASED KNOWLEDGE-DISCOVERY PROCESS Breno C. Costa, Bruno. L. A. Alberto, André M. Portela, W. Maduro, Esdras O. Eler PDITec, Belo Horizonte,
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
Using Data Mining for Mobile Communication Clustering and Characterization
Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer
ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL
International Journal Of Advanced Technology In Engineering And Science Www.Ijates.Com Volume No 03, Special Issue No. 01, February 2015 ISSN (Online): 2348 7550 ASSOCIATION RULE MINING ON WEB LOGS FOR
DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM.
DATA MINING TECHNOLOGY Georgiana Marin 1 Abstract In terms of data processing, classical statistical models are restrictive; it requires hypotheses, the knowledge and experience of specialists, equations,
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
Introduction to Data Mining
Introduction to Data Mining Jay Urbain Credits: Nazli Goharian & David Grossman @ IIT Outline Introduction Data Pre-processing Data Mining Algorithms Naïve Bayes Decision Tree Neural Network Association
Mobile Phone APP Software Browsing Behavior using Clustering Analysis
Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 Mobile Phone APP Software Browsing Behavior using Clustering Analysis
DATA MINING TECHNIQUES AND APPLICATIONS
DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,
Data Mining for Digital Forensics
Digital Forensics - CS489 Sep 15, 2006 Topical Paper Mayuri Shakamuri Data Mining for Digital Forensics Introduction "Data mining is the analysis of (often large) observational data sets to find unsuspected
Introduction. A. Bellaachia Page: 1
Introduction 1. Objectives... 3 2. What is Data Mining?... 4 3. Knowledge Discovery Process... 5 4. KD Process Example... 7 5. Typical Data Mining Architecture... 8 6. Database vs. Data Mining... 9 7.
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS Mrs. Jyoti Nawade 1, Dr. Balaji D 2, Mr. Pravin Nawade 3 1 Lecturer, JSPM S Bhivrabai Sawant Polytechnic, Pune (India) 2 Assistant
Enhanced Boosted Trees Technique for Customer Churn Prediction Model
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 03 (March. 2014), V5 PP 41-45 www.iosrjen.org Enhanced Boosted Trees Technique for Customer Churn Prediction
AN INTELLIGENT ANALYSIS OF CRIME DATA USING DATA MINING & AUTO CORRELATION MODELS
AN INTELLIGENT ANALYSIS OF CRIME DATA USING DATA MINING & AUTO CORRELATION MODELS Uttam Mande Y.Srinivas J.V.R.Murthy Dept of CSE Dept of IT Dept of CSE GITAM University GITAM University J.N.T.University
Index Contents Page No. Introduction . Data Mining & Knowledge Discovery
Index Contents Page No. 1. Introduction 1 1.1 Related Research 2 1.2 Objective of Research Work 3 1.3 Why Data Mining is Important 3 1.4 Research Methodology 4 1.5 Research Hypothesis 4 1.6 Scope 5 2.
Algorithmic Crime Prediction Model Based on the Analysis of Crime Clusters
Global Journal of Computer Science and Technology Volume 11 Issue 11 Version 1.0 July 2011 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN:
Research Article Traffic Analyzing and Controlling using Supervised Parametric Clustering in Heterogeneous Network. Coimbatore, Tamil Nadu, India
Research Journal of Applied Sciences, Engineering and Technology 11(5): 473-479, 215 ISSN: 24-7459; e-issn: 24-7467 215, Maxwell Scientific Publication Corp. Submitted: March 14, 215 Accepted: April 1,
A Proposed Data Mining Model to Enhance Counter- Criminal Systems with Application on National Security Crimes
A Proposed Data Mining Model to Enhance Counter- Criminal Systems with Application on National Security Crimes Dr. Nevine Makram Labib Department of Computer and Information Systems Faculty of Management
Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization
Turban, Aronson, and Liang Decision Support Systems and Intelligent Systems, Seventh Edition Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization
How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode
Course 803401 DSS. Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization
Oman College of Management and Technology Course 803401 DSS Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization CS/MIS Department Information Sharing
Data Mining Solutions for the Business Environment
Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania [email protected] Over
Data Mining for Customer Service Support. Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin
Data Mining for Customer Service Support Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin Traditional Hotline Services Problem Traditional Customer Service Support (manufacturing)
Data Mining for Manufacturing: Preventive Maintenance, Failure Prediction, Quality Control
Data Mining for Manufacturing: Preventive Maintenance, Failure Prediction, Quality Control Andre BERGMANN Salzgitter Mannesmann Forschung GmbH; Duisburg, Germany Phone: +49 203 9993154, Fax: +49 203 9993234;
SPATIAL DATA CLASSIFICATION AND DATA MINING
, pp.-40-44. Available online at http://www. bioinfo. in/contents. php?id=42 SPATIAL DATA CLASSIFICATION AND DATA MINING RATHI J.B. * AND PATIL A.D. Department of Computer Science & Engineering, Jawaharlal
Chapter 5. Warehousing, Data Acquisition, Data. Visualization
Decision Support Systems and Intelligent Systems, Seventh Edition Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization 5-1 Learning Objectives
How To Predict Web Site Visits
Web Site Visit Forecasting Using Data Mining Techniques Chandana Napagoda Abstract: Data mining is a technique which is used for identifying relationships between various large amounts of data in many
Online Credit Card Application and Identity Crime Detection
Online Credit Card Application and Identity Crime Detection Ramkumar.E & Mrs Kavitha.P School of Computing Science, Hindustan University, Chennai ABSTRACT The credit cards have found widespread usage due
The University of Jordan
The University of Jordan Master in Web Intelligence Non Thesis Department of Business Information Technology King Abdullah II School for Information Technology The University of Jordan 1 STUDY PLAN MASTER'S
Grid Density Clustering Algorithm
Grid Density Clustering Algorithm Amandeep Kaur Mann 1, Navneet Kaur 2, Scholar, M.Tech (CSE), RIMT, Mandi Gobindgarh, Punjab, India 1 Assistant Professor (CSE), RIMT, Mandi Gobindgarh, Punjab, India 2
A Survey on Outlier Detection Techniques for Credit Card Fraud Detection
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. VI (Mar-Apr. 2014), PP 44-48 A Survey on Outlier Detection Techniques for Credit Card Fraud
An investigation into Data Mining approaches for Anti Money Laundering
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore An investigation into Data Mining approaches for Anti Money Laundering Nhien An
Tracking System for GPS Devices and Mining of Spatial Data
Tracking System for GPS Devices and Mining of Spatial Data AIDA ALISPAHIC, DZENANA DONKO Department for Computer Science and Informatics Faculty of Electrical Engineering, University of Sarajevo Zmaja
Unsupervised Data Mining (Clustering)
Unsupervised Data Mining (Clustering) Javier Béjar KEMLG December 01 Javier Béjar (KEMLG) Unsupervised Data Mining (Clustering) December 01 1 / 51 Introduction Clustering in KDD One of the main tasks in
A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique
A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique Aida Parbaleh 1, Dr. Heirsh Soltanpanah 2* 1 Department of Computer Engineering, Islamic Azad University, Sanandaj
An Analysis on Density Based Clustering of Multi Dimensional Spatial Data
An Analysis on Density Based Clustering of Multi Dimensional Spatial Data K. Mumtaz 1 Assistant Professor, Department of MCA Vivekanandha Institute of Information and Management Studies, Tiruchengode,
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
Neural Network based Vehicle Classification for Intelligent Traffic Control
Neural Network based Vehicle Classification for Intelligent Traffic Control Saeid Fazli 1, Shahram Mohammadi 2, Morteza Rahmani 3 1,2,3 Electrical Engineering Department, Zanjan University, Zanjan, IRAN
International Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS
PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS First A. Dr. D. Aruna Kumari, Ph.d, ; Second B. Ch.Mounika, Student, Department Of ECM, K L University, [email protected]; Third C.
Robust Outlier Detection Technique in Data Mining: A Univariate Approach
Robust Outlier Detection Technique in Data Mining: A Univariate Approach Singh Vijendra and Pathak Shivani Faculty of Engineering and Technology Mody Institute of Technology and Science Lakshmangarh, Sikar,
An Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015
An Introduction to Data Mining for Wind Power Management Spring 2015 Big Data World Every minute: Google receives over 4 million search queries Facebook users share almost 2.5 million pieces of content
Impelling Heart Attack Prediction System using Data Mining and Artificial Neural Network
General Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Impelling
Application of Data Mining Techniques in Intrusion Detection
Application of Data Mining Techniques in Intrusion Detection LI Min An Yang Institute of Technology [email protected] Abstract: The article introduced the importance of intrusion detection, as well as
IT services for analyses of various data samples
IT services for analyses of various data samples Ján Paralič, František Babič, Martin Sarnovský, Peter Butka, Cecília Havrilová, Miroslava Muchová, Michal Puheim, Martin Mikula, Gabriel Tutoky Technical
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
PRACTICAL DATA MINING IN A LARGE UTILITY COMPANY
QÜESTIIÓ, vol. 25, 3, p. 509-520, 2001 PRACTICAL DATA MINING IN A LARGE UTILITY COMPANY GEORGES HÉBRAIL We present in this paper the main applications of data mining techniques at Electricité de France,
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA Professor Yang Xiang Network Security and Computing Laboratory (NSCLab) School of Information Technology Deakin University, Melbourne, Australia http://anss.org.au/nsclab
Role of Neural network in data mining
Role of Neural network in data mining Chitranjanjit kaur Associate Prof Guru Nanak College, Sukhchainana Phagwara,(GNDU) Punjab, India Pooja kapoor Associate Prof Swami Sarvanand Group Of Institutes Dinanagar(PTU)
A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks
A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks Text Analytics World, Boston, 2013 Lars Hard, CTO Agenda Difficult text analytics tasks Feature extraction Bio-inspired
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Data Quality Mining: Employing Classifiers for Assuring consistent Datasets
Data Quality Mining: Employing Classifiers for Assuring consistent Datasets Fabian Grüning Carl von Ossietzky Universität Oldenburg, Germany, [email protected] Abstract: Independent
In this presentation, you will be introduced to data mining and the relationship with meaningful use.
In this presentation, you will be introduced to data mining and the relationship with meaningful use. Data mining refers to the art and science of intelligent data analysis. It is the application of machine
ELEVATING FORENSIC INVESTIGATION SYSTEM FOR FILE CLUSTERING
ELEVATING FORENSIC INVESTIGATION SYSTEM FOR FILE CLUSTERING Prashant D. Abhonkar 1, Preeti Sharma 2 1 Department of Computer Engineering, University of Pune SKN Sinhgad Institute of Technology & Sciences,
The Combination Forecasting Model of Auto Sales Based on Seasonal Index and RBF Neural Network
, pp.67-76 http://dx.doi.org/10.14257/ijdta.2016.9.1.06 The Combination Forecasting Model of Auto Sales Based on Seasonal Index and RBF Neural Network Lihua Yang and Baolin Li* School of Economics and
Final Project Report
CPSC545 by Introduction to Data Mining Prof. Martin Schultz & Prof. Mark Gerstein Student Name: Yu Kor Hugo Lam Student ID : 904907866 Due Date : May 7, 2007 Introduction Final Project Report Pseudogenes
Information Management course
Università degli Studi di Milano Master Degree in Computer Science Information Management course Teacher: Alberto Ceselli Lecture 01 : 06/10/2015 Practical informations: Teacher: Alberto Ceselli ([email protected])
NAVIGATING SCIENTIFIC LITERATURE A HOLISTIC PERSPECTIVE. Venu Govindaraju
NAVIGATING SCIENTIFIC LITERATURE A HOLISTIC PERSPECTIVE Venu Govindaraju BIOMETRICS DOCUMENT ANALYSIS PATTERN RECOGNITION 8/24/2015 ICDAR- 2015 2 Towards a Globally Optimal Approach for Learning Deep Unsupervised
Recognizing The Theft of Identity Using Data Mining
Recognizing The Theft of Identity Using Data Mining Aniruddha Kshirsagar 1, Lalit Dole 2 1,2 CSE Department, GHRCE, Nagpur, Maharashtra, India Abstract Identity fraud is the great matter of concern in
Big Data Text Mining and Visualization. Anton Heijs
Copyright 2007 by Treparel Information Solutions BV. This report nor any part of it may be copied, circulated, quoted without prior written approval from Treparel7 Treparel Information Solutions BV Delftechpark
Keywords: Information Retrieval, Vector Space Model, Database, Similarity Measure, Genetic Algorithm.
Volume 3, Issue 8, August 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Effective Information
IMPROVING DATA INTEGRATION FOR DATA WAREHOUSE: A DATA MINING APPROACH
IMPROVING DATA INTEGRATION FOR DATA WAREHOUSE: A DATA MINING APPROACH Kalinka Mihaylova Kaloyanova St. Kliment Ohridski University of Sofia, Faculty of Mathematics and Informatics Sofia 1164, Bulgaria
01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours.
(International Program) 01219141 Object-Oriented Modeling and Programming 3 (3-0) Object concepts, object-oriented design and analysis, object-oriented analysis relating to developing conceptual models
A Survey on Intrusion Detection System with Data Mining Techniques
A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,
Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management
Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management Paper Jean-Louis Amat Abstract One of the main issues of operators
Quality Assessment in Spatial Clustering of Data Mining
Quality Assessment in Spatial Clustering of Data Mining Azimi, A. and M.R. Delavar Centre of Excellence in Geomatics Engineering and Disaster Management, Dept. of Surveying and Geomatics Engineering, Engineering
How To Use Data Mining For Knowledge Management In Technology Enhanced Learning
Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, 2007 115 Data Mining for Knowledge Management in Technology Enhanced Learning
Manjeet Kaur Bhullar, Kiranbir Kaur Department of CSE, GNDU, Amritsar, Punjab, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Multiple Pheromone
Knowledge Discovery from patents using KMX Text Analytics
Knowledge Discovery from patents using KMX Text Analytics Dr. Anton Heijs [email protected] Treparel Abstract In this white paper we discuss how the KMX technology of Treparel can help searchers
Pattern Recognition Using Feature Based Die-Map Clusteringin the Semiconductor Manufacturing Process
Pattern Recognition Using Feature Based Die-Map Clusteringin the Semiconductor Manufacturing Process Seung Hwan Park, Cheng-Sool Park, Jun Seok Kim, Youngji Yoo, Daewoong An, Jun-Geol Baek Abstract Depending
A Fast Fraud Detection Approach using Clustering Based Method
pp. 33-37 Krishi Sanskriti Publications http://www.krishisanskriti.org/jbaer.html A Fast Detection Approach using Clustering Based Method Surbhi Agarwal 1, Santosh Upadhyay 2 1 M.tech Student, Mewar University,
Planning Workforce Management for Bank Operation Centers with Neural Networks
Plaing Workforce Management for Bank Operation Centers with Neural Networks SEFIK ILKIN SERENGIL Research and Development Center SoftTech A.S. Tuzla Teknoloji ve Operasyon Merkezi, Tuzla 34947, Istanbul
Active Learning SVM for Blogs recommendation
Active Learning SVM for Blogs recommendation Xin Guan Computer Science, George Mason University Ⅰ.Introduction In the DH Now website, they try to review a big amount of blogs and articles and find the
Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.
International Journal of Computer Application and Engineering Technology Volume 3-Issue2, Apr 2014.Pp. 188-192 www.ijcaet.net OFFLINE SIGNATURE VERIFICATION SYSTEM -A REVIEW Pooja Department of Computer
A Review of Data Mining Techniques
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
Data Mining and Analysis of Online Social Networks
Data Mining and Analysis of Online Social Networks R.Sathya 1, A.Aruna devi 2, S.Divya 2 Assistant Professor 1, M.Tech I Year 2, Department of Information Technology, Ganadipathy Tulsi s Jain Engineering
The Data Mining Process
Sequence for Determining Necessary Data. Wrong: Catalog everything you have, and decide what data is important. Right: Work backward from the solution, define the problem explicitly, and map out the data
Data Mining Applications in Higher Education
Executive report Data Mining Applications in Higher Education Jing Luan, PhD Chief Planning and Research Officer, Cabrillo College Founder, Knowledge Discovery Laboratories Table of contents Introduction..............................................................2
IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD
Journal homepage: www.mjret.in ISSN:2348-6953 IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD Deepak Ramchandara Lad 1, Soumitra S. Das 2 Computer Dept. 12 Dr. D. Y. Patil School of Engineering,(Affiliated
Chapter 12 Discovering New Knowledge Data Mining
Chapter 12 Discovering New Knowledge Data Mining Becerra-Fernandez, et al. -- Knowledge Management 1/e -- 2004 Prentice Hall Additional material 2007 Dekai Wu Chapter Objectives Introduce the student to
How To Use Neural Networks In Data Mining
International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and
2. IMPLEMENTATION. International Journal of Computer Applications (0975 8887) Volume 70 No.18, May 2013
Prediction of Market Capital for Trading Firms through Data Mining Techniques Aditya Nawani Department of Computer Science, Bharati Vidyapeeth s College of Engineering, New Delhi, India Himanshu Gupta
Data Warehousing and Data Mining in Business Applications
133 Data Warehousing and Data Mining in Business Applications Eesha Goel CSE Deptt. GZS-PTU Campus, Bathinda. Abstract Information technology is now required in all aspect of our lives that helps in business
A Statistical Text Mining Method for Patent Analysis
A Statistical Text Mining Method for Patent Analysis Department of Statistics Cheongju University, [email protected] Abstract Most text data from diverse document databases are unsuitable for analytical
Digital image processing
746A27 Remote Sensing and GIS Lecture 4 Digital image processing Chandan Roy Guest Lecturer Department of Computer and Information Science Linköping University Digital Image Processing Most of the common
TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING
TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING Sunghae Jun 1 1 Professor, Department of Statistics, Cheongju University, Chungbuk, Korea Abstract The internet of things (IoT) is an
Applied Mathematical Sciences, Vol. 7, 2013, no. 112, 5591-5597 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.
Applied Mathematical Sciences, Vol. 7, 2013, no. 112, 5591-5597 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.38457 Accuracy Rate of Predictive Models in Credit Screening Anirut Suebsing
Web Usage Mining: Identification of Trends Followed by the user through Neural Network
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 617-624 International Research Publications House http://www. irphouse.com /ijict.htm Web
International Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 11, November 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
