Detecting Human Behavior Patterns from Mobile Phone

Size: px
Start display at page:

Download "Detecting Human Behavior Patterns from Mobile Phone"

Transcription

1 Journal of Computational Information Systems 8: 6 (2012) Available at Detecting Human Behavior Patterns from Mobile Phone Anqin ZHANG 1,2,, Wenjun YE 2, Yuan PENG 1,2 1 School of Computer Science and Technology, Fudan University, Shanghai , China 2 School of Computer and Information Engineering, Shanghai University of Electric Power, Shanghai , China Abstract Bluetooth integrated into the mobile phone in daily life usage has created new ways to analyze and model the behavior of individuals. In this paper, we use Bluetooth location data from Reality Mining to determine what kinds of repeated behaviors can be detected, determine when a large change occurs in a user s typical routine over time, discovery groups of users that follow certain trends and study the differences and similarities among individuals. Based on the view locations, the human raw movement trajectories can be transformed into binary sequences and human behavior patterns are detected with the proposed BXOR (Binary XOR). Experiments on reality mining cell base data show that the proposed method is effective and reliable. Keywords: Mobile Phone Sensors; View Locations; Xor; Human Behavior Patterns 1 Introduction The mobile phone is a very unique device continuously capturing our location, interaction, communication, and motion traces continuously left behind in our daily lives [1]. Researchers are just beginning to understand the implications of such data collections for fields ranging from epidemiology, dynamical network analysis to human behavior modeling. Human behaviors are complex in nature and it is indeed a challenging task to learn from the daily life activities. Modeling human behavior and individual routines from proximity data and daily life activity patterns is an emerging realm in ubiquitous computing [2]. The recent analysis of data from mobile phone service providers have led researchers to increased insight into human behavior patterns [3]. By far, various works have been done. The work of Eagle et al. [4] on the Reality Mining dataset, marks an early and important contribution. They use principle component analysis (PCA) to visualize temporal patterns in This work is supported by 973 Program (grant No. 2010CB731401), Major Program of NSFC (grant No ), NSFC (grant No ), Ministry of Industry and Information Technology of China (grant No. 2010ZX ), and Science and Technology Commission of Shanghai Municipality (grant No. 09JC ). Corresponding author. address: aqz612@sina.com (Anqin ZHANG) / Copyright 2012 Binary Information Press March 2012

2 2672 A. Zhang et al. /Journal of Computational Information Systems 8: 6 (2012) daily life. The stability of these temporal patterns was confirmed by Farrahi et al. [5] in the same dataset using unsupervised topic models. In [6], periodic behavior patterns were analyzed and used to identify social communities. Algorithms that learn routes between important locations and predict the next location when the user is moving were introduced in [7]. Human mobility patterns have been modeled from location data obtained whenever phone calls were made in [8], to find that human trajectories are highly regular in terms of both temporal and spatial characteristics. In [9], phone call data has been used to study the mean collective behavior of human at large scales, focusing on the occurrence of anomalous events. The authors also investigate patterns of calling activity at the individual level and model the individual calling patterns (time between phone calls) as heavy tailed. Daily activity patterns of individuals are analyzed using large collections of mobile phone data in [10], these patterns reveal that activity patterns within a given area of work strongly resemble each other. In this study we consider one month Bluetooth proximity data of four users taken from reality mining dataset [3] in order to show that the repeated behaviors can be detected using daily Bluetooth proximities. Our goal is to find a person s dominant routines on certain days, determine when a large change occurs in a user s typical routine over time, and discovery groups of users that follow certain trends and study the differences and similarities among individuals and this goal can help us in determining the complex and unusual routines of human behavior. The major contributions of this paper are as follows: (1) We introduce the existing methods related to our discussed problem. (2) We give the idea of the view locations and the method to find the view locations. (3) We define the similarity between two binary sequences and propose an algorithm to detect human behavior patterns. The rest of this paper is organized as follows. In section 2, our approach is proposed. Section 3 presents an experimental evaluation and we conclude in section 4. 2 The Proposed Method In this article, we present a new method to find a person s dominant routines on certain days, determine when a large change occurs in a user s typical routine over time, and discovery groups of users that follow certain trends and study the differences and similarities among individuals. Firstly, find the view locations from the human movement trajectories. Then, for each view location, human s movement data for a certain period of time is transformed from a spatial sequence to a binary sequence according to human s status. Specifically, 1 represents the person stay at the view location and 0 when he does not. Lastly, the proposed BXOR (Binary XOR) algorithm is used on the binary sequence generated by the view locations to detect human behavior patterns. 2.1 Finding the view locations In this section, we will discuss how to find view locations [11]. First of all, we want to show why the idea of view locations is essential to study human behavior.

3 A. Zhang et al. /Journal of Computational Information Systems 8: 6 (2012) Fig. 1: Raw trajectories Fig. 2: Binary sequence viewed from view locations We generate a movement dataset simulating a person s daily activities. Figure. 1 shows his trajectories. From the raw trajectories, we can not find any routine of the person. If we view the data from a certain place, we can find the person s life routine: stay at the certain place or not stay at the certain place. In figure. 2, we transform the movement into a binary sequence, where 1 represents the person is at the certain place and 0 when it goes away. It is easy to see the regularity in this binary sequence. Our idea is to find some place, namely view locations, to view the movement. Furthermore, transforming the raw trajectories into a binary sequence, the spatial noise can be filtered and turn the human daily behaviors detection from a 2-dimensional space (spatial) to a 1-dimensional space (binary sequence). As shown in figure. 2, we do not care where the person goes when he is not at the view locations. Our aim is to find his arriving and leaving pattern. Let D = {(x 1, y 1, t 1 ), (x 2, y 2, t 2 ),...} be the original movement database for a moving person. If we only consider the spatial information of the movement, view locations are frequently visited in the movement. So the view locations are those dense regions containing more points than the other regions. As computing the density for each location in a continuous space is computationally

4 2674 A. Zhang et al. /Journal of Computational Information Systems 8: 6 (2012) Fig. 3: The view locations expensive, we discrete the space into a regular grid and compute the density for each cell. The grid size is determined by the desired resolution to view the spatial data. Algorithm 1: Find the view locations Input: A movement sequence (x1, y1), (x2, y2) (xn, yn) and the grid size l. Output: The view locations. The steps of the algorithm: 1) Discrete the space into a regular grid, there are cells. Each cell has a counter. 2) For each point in the movement sequence (x1, y1), (x2, y2) (xn, yn), judge which cell it lies in, and corresponding cell counter increase 1; 3) Compute the maximum for all cell counters. 4) The points which lie in the maximum cell are the view locations. In figure. 3 the points with the red asterisk are the view locations. 2.2 Similarity measure Identifying the similarity between two sequences is essential for human behavior patterns detection. Computing the average Euclidean distance of two geometric trajectories is a simple and useful approach. Nevertheless, the geometric coordinates are expensive and not always available. Other approaches, such as LCSS, and DTW, are widely used to compute the similarity of symbolic sequences [12]. However, the above approaches suffer from scalability problem. Now in our question, human s movement sequences have been transformed into binary sequences. In the binary sequence, there are only two symbols 1 and 0, Thus, it is convenient to measure the similarity between two binary sequences. If a person stay at the view locations at different period of time, then the corresponding position of the two binary sequences are 1 and if a person not stay at the view locations at different period of time, then the corresponding position of the two binary sequences are 0. For different persons,

5 A. Zhang et al. /Journal of Computational Information Systems 8: 6 (2012) if they stay at the view locations at the same period of time, then the corresponding position of the two binary sequences are 1 and if not stay at the view locations at the same period of time, then the corresponding position of the two binary sequences are 0. So the same symbol 1 or 0 at the same position in the two binary sequences can show the same behavior pattern and the different symbol 1 or 0 at the same position in the two binary sequences can show the different behavior pattern. According to the above fact, we use XOR operation to decide whether it is the same symbol or the different symbol in two binary sequences. Besides, the contrast of the symbol 1 s number and the length gap between two binary sequences can all show the dissimilarity. The difference value of the symbol 1 s number between two binary sequences can be defined as: dif one(b1, B2) = abs(numone(b1)/length(b1) numone(b2)/length(b2)) (1) Where B1 and B2 are two binary sequences, length (B) is a function to count the number of symbol 1 in binary sequence B and length (B) is a function to get the length of the sequence B. The length gap value between two binary sequences is computed via: dif length(b1, B2) = abs(length(b1) length(b2))/min(length(b1), length(b2)) (2) The different symbol 1 or 0 at the same position in the two binary sequences is computed via: dif XOR(B1, B2) = numone(xor(b1, B2))/min(length(B1), length(b2)) (3) So the dissimilarity can be defined as: dissim = difone(b1, B2) + diflength(b1, B2) + difxor(b1, B2) (4) Thus, the similarity can be defined as: sim = 1 dissim (5) 2.3 BXOR (Binary XOR) algorithm Many phenomena show that human often exhibit some degree of regularity in their movements. For a person, he may repeatedly visit some specific places and lives a similar life for different period of time. For different persons, they may have similar life for the same period of time and they can be regarded as similar people to some degree. But it is difficult to mine the person s regularity on the original movements. Viewed from the view locations, the movement sequence can be transformed into a binary sequence B=b1b2...bn, where bi =1 when this person is within the view locations at timestamp i and 0 otherwise. For a person, we can find the view locations using algorithm 1 on his movement sequence, and then transform his movement sequence into a binary sequence viewed from view locations. Thus, we can mine his movement regularity on the binary sequence according to algorithm 2. Algorithm 2: human behavior patterns detection Input: view locations of one person and different persons

6 2676 A. Zhang et al. /Journal of Computational Information Systems 8: 6 (2012) Output: the similarity between different periods of time of one person and between different persons at the same period of time. The steps of the algorithm: (1) According to view locations, the movement sequences are transformed into one person s binary sequences at different period of time and different person s binary sequences at the same period of time. Where 1 represents the person is at the view locations and 0 when it goes away (see figure 2). (2) Compute the difone, the diflength, the difxor via equations (1), (2), (3). (3) Compute the dissimilarity between two binary sequences according to equation (4), and then compute the similarity via equation (5). 3 Experiments and Results In order to ensure repeatability, we carry out our experiments on the publicly available Reality Mining dataset [4]. Although focused on academic mobile phone users, this remarkable resource has served as a basis for a large body of work and is one of the most studied mobile phone datasets. It was recorded over the course of nine months by 97 mobile phone users from the MIT Media Lab and Sloan Business School (students and staff members). Every time a user changed cell tower, the identifier of his new serving cell tower was recorded. We experimented with 4 persons of the 97 individuals in the dataset and days ranging from to This subset of days was chosen randomly. 3.1 One person at different periods of time Fig. 4: No29 person stay at the celltower and the view locations (with red asterisk) from to For person No29, We use the data in the table cellspan from to The table cellspan has recorded start time, end time and the serial number of the person and the serial

7 A. Zhang et al. /Journal of Computational Information Systems 8: 6 (2012) number of the celltower. According to algorithm 1, we can find the view locations in the figure. 4. Fig. 5: NO29 person s movement regularities at 4 periods of time From the figure 5, we can learn directly that the movement regularity of the person 29 at the period of to is some similar with the movement regularity at the period of to 08-29, while the person 29 movement regularity at the period of to is some not similar with the movement regularity at the period of to Using our algorithm 2, we can get the movement regularity similarity between the period of to and the period of to is 0.6 and the similarity between the period of to and the period of to is 0.4. The result shows that the movement regularity at the period of to is more likely similar with the movement regularity at the period of to which tally with the facts. 3.2 Different persons at the same period of time Fig. 6: 4 different persons movement regularities at the same period of time

8 2678 A. Zhang et al. /Journal of Computational Information Systems 8: 6 (2012) In this experiment, we choose 4 persons (No78, No29, No57 and No6) and one week period of time (8-20 to 8-26) randomly. For view locations, here we use home based on the belief that most people will spend much time at home every day. From figure 6, we can learn directly for the same period from 8-20 to 8-26, person No78 and person No29 has the very similar movement regularities, person No29 and person No57 has the dissimilar movement regularities. Using our algorithm 2, we can get the movement regularity similarities at the same period from 8-20 to 8-26, between the person No78 and No29 and between the person No29 and No57 are 0.9 and 0.3. The result shows that the movement regularity similarities got from our algorithm 2 between different persons at the same period from 8-20 to 8-26 is tally with the facts. 4 Conclusion and Future Works In this paper, we give the idea of the view locations and the method to find the view locations and based on the view locations, the human raw movement trajectories can be transformed into a binary sequence and human behavior patterns are detected with the proposed algorithm BXOR. These detected human behavior patterns can help us in determining the abnormal change or an accident in human movement and predicting the future movement. Experiments on Reality Mining Bluetooth proximity data show promising results. In the future, we will develop the methods to detect abnormal change or an accident in human movement and predict the future movement, which obviously needs a great deal of effort and time. There are still other problems such as privacy protection, commercial secrets, and so on need to be considered in our future work. Acknowledgement This work is supported by 973 Program (grant No. 2010CB731401), Major Program of NSFC (grant No ), NSFC (grant No ), Ministry of Industry and Information Technology of China (grant No. 2010ZX ), and Science and Technology Commission of Shanghai Municipality (grant No. 09JC ). References [1] D. Lazer, A. Pentland, L. Adamic, S. Aral, A. L. Barabasi, D. Brewer, N. Christakis, N. Contractor, J. Fowler, M. Gutmann, T. Jebara, G. King, M. Macy, D. Roy, and M. Van Alstyne. Computational Social Science, Science, Feb [2] K. Farrahi, Daniel Gatica-Perez, Daily Routine Classification from Mobile Phone Data. IDIAP Research Institute, Martigny, Switzerland. [3] M. Gonzalez, C. Hidalgo, and L.A. Barabasi, Understanding individual human mobility patterns, Nature 453, pp , [4] Eagle, N., (Sandy) Pentland, A.: Reality mining: sensing complex social systems.personal and Ubiquitous Computing 10 (4), pp , 2006.

9 A. Zhang et al. /Journal of Computational Information Systems 8: 6 (2012) [5] Farrahi, K., Gatica-Perez, D.: Discovering human routines from cell phone data with topic models th IEEE International Symposium on Wearable Computers pp , [6] N. Eagle and A. Pentland. Eigenbehaviors: Identifying structure in routine. Behav Ecol Sociobiol 63, pp , [7] K. Laasonen. Clustering and prediction of mobile user routes from cellular data. In PKDD, pp , [8] M. Gonzalez, C. Hidalgo, and L. A. Barabasi, Understanding individual human mobility patterns, Nature 453, pp , [9] J. Candia, M. Gonzalez, P. Wang, T. Schoenharl, G. Madey, A. Barabasi, Uncovering individual and collective human dynamics from mobile phone records, Journal of Physics A: Mathematical and Theoretical, Vol. 41, No. 22, [10] S. Phithakkitnukoon, T. Horanont, G. Di Lorenzo, R. Shibasaki, C. Ratti: Activity-aware map: Identifying human daily activity pattern using mobile phone data. In: Inter. Conf. on Pattern Recognition (ICPR 2010), Workshop on Human Behavior Understanding (HBU), Istanbul, Turkey (2010). [11] Zhenhui Li, Jiawei Han, Ming Ji, Luan Tang, Yintao Yu, and Bolin Ding, MoveMine: Mining Moving Object Data for Discovery of Animal Movement Patterns, ACM Transactions on Intelligent Systems and Technology, Vol. 2, No. 4, Article 37, Publication date: July [12] L. Chen, M. Tamer Ozsu, and V. Oria, Robust and Fast Similarity Search for Moving Object Trajectories, Proc. ACM SIGMOD, pp , 2005.

Discovery of User Groups within Mobile Data

Discovery of User Groups within Mobile Data Discovery of User Groups within Mobile Data Syed Agha Muhammad Technical University Darmstadt muhammad@ess.tu-darmstadt.de Kristof Van Laerhoven Darmstadt, Germany kristof@ess.tu-darmstadt.de ABSTRACT

More information

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia kirill.krinkin@fruct.org Eugene Kalishenko Saint Petersburg

More information

Towards rich mobile phone datasets: Lausanne data collection campaign

Towards rich mobile phone datasets: Lausanne data collection campaign Towards rich mobile phone datasets: Lausanne data collection campaign Niko Kiukkonen, Jan Blom, Olivier Dousse, Daniel Gatica-Perez and Juha Laurila Nokia Research Center, PSE-C, 1015 Lausanne EPFL, Switzerland

More information

Robust Outlier Detection Technique in Data Mining: A Univariate Approach

Robust Outlier Detection Technique in Data Mining: A Univariate Approach Robust Outlier Detection Technique in Data Mining: A Univariate Approach Singh Vijendra and Pathak Shivani Faculty of Engineering and Technology Mody Institute of Technology and Science Lakshmangarh, Sikar,

More information

Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information

Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information Eric Hsueh-Chan Lu Chi-Wei Huang Vincent S. Tseng Institute of Computer Science and Information Engineering

More information

Grid Density Clustering Algorithm

Grid Density Clustering Algorithm Grid Density Clustering Algorithm Amandeep Kaur Mann 1, Navneet Kaur 2, Scholar, M.Tech (CSE), RIMT, Mandi Gobindgarh, Punjab, India 1 Assistant Professor (CSE), RIMT, Mandi Gobindgarh, Punjab, India 2

More information

Applied Mathematical Sciences, Vol. 7, 2013, no. 112, 5591-5597 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.

Applied Mathematical Sciences, Vol. 7, 2013, no. 112, 5591-5597 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013. Applied Mathematical Sciences, Vol. 7, 2013, no. 112, 5591-5597 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.38457 Accuracy Rate of Predictive Models in Credit Screening Anirut Suebsing

More information

Large-Area Wireless Sensor System for Ambient Assisted Living

Large-Area Wireless Sensor System for Ambient Assisted Living DOI 10.516/sensor013/C4. Large-Area Wireless Sensor System for Ambient Assisted Living A. Steinhage, C. Lauterbach, A. Techmer Future-Shape GmbH, Höhenkirchen-Siegertsbrunn, Germany axel.steinhage@future-shape.com

More information

Estimation of Human Mobility Patterns and Attributes Analyzing Anonymized Mobile Phone CDR:

Estimation of Human Mobility Patterns and Attributes Analyzing Anonymized Mobile Phone CDR: Estimation of Human Mobility Patterns and Attributes Analyzing Anonymized Mobile Phone CDR: Developing Real-time Census from Crowds of Greater Dhaka Ayumi Arai 1 and Ryosuke Shibasaki 1,2 1 Department

More information

Data Mining for Manufacturing: Preventive Maintenance, Failure Prediction, Quality Control

Data Mining for Manufacturing: Preventive Maintenance, Failure Prediction, Quality Control Data Mining for Manufacturing: Preventive Maintenance, Failure Prediction, Quality Control Andre BERGMANN Salzgitter Mannesmann Forschung GmbH; Duisburg, Germany Phone: +49 203 9993154, Fax: +49 203 9993234;

More information

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers , pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang

More information

Behavioral Entropy of a Cellular Phone User

Behavioral Entropy of a Cellular Phone User Behavioral Entropy of a Cellular Phone User Santi Phithakkitnukoon 1, Husain Husna, and Ram Dantu 3 1 santi@unt.edu, Department of Comp. Sci. & Eng., University of North Texas hjh36@unt.edu, Department

More information

An Analysis on Density Based Clustering of Multi Dimensional Spatial Data

An Analysis on Density Based Clustering of Multi Dimensional Spatial Data An Analysis on Density Based Clustering of Multi Dimensional Spatial Data K. Mumtaz 1 Assistant Professor, Department of MCA Vivekanandha Institute of Information and Management Studies, Tiruchengode,

More information

Static Data Mining Algorithm with Progressive Approach for Mining Knowledge

Static Data Mining Algorithm with Progressive Approach for Mining Knowledge Global Journal of Business Management and Information Technology. Volume 1, Number 2 (2011), pp. 85-93 Research India Publications http://www.ripublication.com Static Data Mining Algorithm with Progressive

More information

EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set

EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set Amhmed A. Bhih School of Electrical and Electronic Engineering Princy Johnson School of Electrical and Electronic Engineering Martin

More information

Comparative Analysis of EM Clustering Algorithm and Density Based Clustering Algorithm Using WEKA tool.

Comparative Analysis of EM Clustering Algorithm and Density Based Clustering Algorithm Using WEKA tool. International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 9, Issue 8 (January 2014), PP. 19-24 Comparative Analysis of EM Clustering Algorithm

More information

A method of generating free-route walk-through animation using vehicle-borne video image

A method of generating free-route walk-through animation using vehicle-borne video image A method of generating free-route walk-through animation using vehicle-borne video image Jun KUMAGAI* Ryosuke SHIBASAKI* *Graduate School of Frontier Sciences, Shibasaki lab. University of Tokyo 4-6-1

More information

Clustering Data Streams

Clustering Data Streams Clustering Data Streams Mohamed Elasmar Prashant Thiruvengadachari Javier Salinas Martin gtg091e@mail.gatech.edu tprashant@gmail.com javisal1@gatech.edu Introduction: Data mining is the science of extracting

More information

Classifying Manipulation Primitives from Visual Data

Classifying Manipulation Primitives from Visual Data Classifying Manipulation Primitives from Visual Data Sandy Huang and Dylan Hadfield-Menell Abstract One approach to learning from demonstrations in robotics is to make use of a classifier to predict if

More information

Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm

Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm , pp. 99-108 http://dx.doi.org/10.1457/ijfgcn.015.8.1.11 Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm Wang DaWei and Wang Changliang Zhejiang Industry Polytechnic College

More information

Proposed Advance Taxi Recommender System Based On a Spatiotemporal Factor Analysis Model

Proposed Advance Taxi Recommender System Based On a Spatiotemporal Factor Analysis Model Proposed Advance Taxi Recommender System Based On a Spatiotemporal Factor Analysis Model Santosh Thakkar, Supriya Bhosale, Namrata Gawade, Prof. Sonia Mehta Department of Computer Engineering, Alard College

More information

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM Mohammad Badruzzama Khan 1, Ayesha Romana 2, Akheel Mohammed

More information

Daily Routine Classification from Mobile Phone Data

Daily Routine Classification from Mobile Phone Data Daily Routine Classification from Mobile Phone Data Katayoun Farrahi and Daniel Gatica-Perez IDIAP Research Institute, Martigny, Switzerland Ecole Polytechnique Fédérale de Lausanne (EPFL), Lausanne, Switzerland

More information

Efficient Node Discovery in Mobile Wireless Sensor Networks

Efficient Node Discovery in Mobile Wireless Sensor Networks Efficient Node Discovery in Mobile Wireless Sensor Networks Vladimir Dyo, Cecilia Mascolo 1 Department of Computer Science, University College London Gower Street, London WC1E 6BT, UK v.dyo@cs.ucl.ac.uk

More information

Context-aware taxi demand hotspots prediction

Context-aware taxi demand hotspots prediction Int. J. Business Intelligence and Data Mining, Vol. 5, No. 1, 2010 3 Context-aware taxi demand hotspots prediction Han-wen Chang, Yu-chin Tai and Jane Yung-jen Hsu* Department of Computer Science and Information

More information

Intrusion Detection via Machine Learning for SCADA System Protection

Intrusion Detection via Machine Learning for SCADA System Protection Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. s.l.yasakethu@surrey.ac.uk J. Jiang Department

More information

Keywords: Mobility Prediction, Location Prediction, Data Mining etc

Keywords: Mobility Prediction, Location Prediction, Data Mining etc Volume 4, Issue 4, April 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Data Mining Approach

More information

Meeting Scheduling with Multi Agent Systems: Design and Implementation

Meeting Scheduling with Multi Agent Systems: Design and Implementation Proceedings of the 6th WSEAS Int. Conf. on Software Engineering, Parallel and Distributed Systems, Corfu Island, Greece, February 16-19, 2007 92 Meeting Scheduling with Multi Agent Systems: Design and

More information

A Survey on Association Rule Mining in Market Basket Analysis

A Survey on Association Rule Mining in Market Basket Analysis International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 409-414 International Research Publications House http://www. irphouse.com /ijict.htm A Survey

More information

Database Modeling and Visualization Simulation technology Based on Java3D Hongxia Liu

Database Modeling and Visualization Simulation technology Based on Java3D Hongxia Liu International Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 05) Database Modeling and Visualization Simulation technology Based on Java3D Hongxia Liu Department of Electronic

More information

Data, Measurements, Features

Data, Measurements, Features Data, Measurements, Features Middle East Technical University Dep. of Computer Engineering 2009 compiled by V. Atalay What do you think of when someone says Data? We might abstract the idea that data are

More information

Density Map Visualization for Overlapping Bicycle Trajectories

Density Map Visualization for Overlapping Bicycle Trajectories , pp.327-332 http://dx.doi.org/10.14257/ijca.2014.7.3.31 Density Map Visualization for Overlapping Bicycle Trajectories Dongwook Lee 1, Jinsul Kim 2 and Minsoo Hahn 1 1 Digital Media Lab., Korea Advanced

More information

An Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015

An Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015 An Introduction to Data Mining for Wind Power Management Spring 2015 Big Data World Every minute: Google receives over 4 million search queries Facebook users share almost 2.5 million pieces of content

More information

Enhancing Spontaneous Interaction in Opportunistic Mobile Social Networks

Enhancing Spontaneous Interaction in Opportunistic Mobile Social Networks Enhancing Spontaneous Interaction in Opportunistic Mobile Social Networks Bin Guo 1* Daqing Zhang 1,2 Zhiwen Yu 1 Xingshe Zhou 1 Zhangbing Zhou 2,3 1. Northwestern Polytechnical University, China 2. Institut

More information

Public Transportation BigData Clustering

Public Transportation BigData Clustering Public Transportation BigData Clustering Preliminary Communication Tomislav Galba J.J. Strossmayer University of Osijek Faculty of Electrical Engineering Cara Hadriana 10b, 31000 Osijek, Croatia tomislav.galba@etfos.hr

More information

International Journal of Advanced Engineering Research and Applications (IJAERA) ISSN: 2454-2377 Vol. 1, Issue 6, October 2015. Big Data and Hadoop

International Journal of Advanced Engineering Research and Applications (IJAERA) ISSN: 2454-2377 Vol. 1, Issue 6, October 2015. Big Data and Hadoop ISSN: 2454-2377, October 2015 Big Data and Hadoop Simmi Bagga 1 Satinder Kaur 2 1 Assistant Professor, Sant Hira Dass Kanya MahaVidyalaya, Kala Sanghian, Distt Kpt. INDIA E-mail: simmibagga12@gmail.com

More information

Dr. Shih-Lung Shaw s Research on Space-Time GIS, Human Dynamics and Big Data

Dr. Shih-Lung Shaw s Research on Space-Time GIS, Human Dynamics and Big Data Dr. Shih-Lung Shaw s Research on Space-Time GIS, Human Dynamics and Big Data for Geography Department s Faculty Research Highlight October 12, 2014 Shih-Lung Shaw, Ph.D. Alvin and Sally Beaman Professor

More information

Extend Table Lens for High-Dimensional Data Visualization and Classification Mining

Extend Table Lens for High-Dimensional Data Visualization and Classification Mining Extend Table Lens for High-Dimensional Data Visualization and Classification Mining CPSC 533c, Information Visualization Course Project, Term 2 2003 Fengdong Du fdu@cs.ubc.ca University of British Columbia

More information

Information Management course

Information Management course Università degli Studi di Milano Master Degree in Computer Science Information Management course Teacher: Alberto Ceselli Lecture 01 : 06/10/2015 Practical informations: Teacher: Alberto Ceselli (alberto.ceselli@unimi.it)

More information

An Order-Invariant Time Series Distance Measure [Position on Recent Developments in Time Series Analysis]

An Order-Invariant Time Series Distance Measure [Position on Recent Developments in Time Series Analysis] An Order-Invariant Time Series Distance Measure [Position on Recent Developments in Time Series Analysis] Stephan Spiegel and Sahin Albayrak DAI-Lab, Technische Universität Berlin, Ernst-Reuter-Platz 7,

More information

Crime Hotspots Analysis in South Korea: A User-Oriented Approach

Crime Hotspots Analysis in South Korea: A User-Oriented Approach , pp.81-85 http://dx.doi.org/10.14257/astl.2014.52.14 Crime Hotspots Analysis in South Korea: A User-Oriented Approach Aziz Nasridinov 1 and Young-Ho Park 2 * 1 School of Computer Engineering, Dongguk

More information

Research on the UHF RFID Channel Coding Technology based on Simulink

Research on the UHF RFID Channel Coding Technology based on Simulink Vol. 6, No. 7, 015 Research on the UHF RFID Channel Coding Technology based on Simulink Changzhi Wang Shanghai 0160, China Zhicai Shi* Shanghai 0160, China Dai Jian Shanghai 0160, China Li Meng Shanghai

More information

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,

More information

Exploring spatial decay effect in mass media and social media: a case study of China

Exploring spatial decay effect in mass media and social media: a case study of China Exploring spatial decay effect in mass media and social media: a case study of China Yihong Yuan Department of Geography, Texas State University, San Marcos, TX, USA, 78666. Tel: +1(512)-245-3208 Email:yuan@txtate.edu

More information

International Journal of World Research, Vol: I Issue XIII, December 2008, Print ISSN: 2347-937X DATA MINING TECHNIQUES AND STOCK MARKET

International Journal of World Research, Vol: I Issue XIII, December 2008, Print ISSN: 2347-937X DATA MINING TECHNIQUES AND STOCK MARKET DATA MINING TECHNIQUES AND STOCK MARKET Mr. Rahul Thakkar, Lecturer and HOD, Naran Lala College of Professional & Applied Sciences, Navsari ABSTRACT Without trading in a stock market we can t understand

More information

Predicting the Risk of Heart Attacks using Neural Network and Decision Tree

Predicting the Risk of Heart Attacks using Neural Network and Decision Tree Predicting the Risk of Heart Attacks using Neural Network and Decision Tree S.Florence 1, N.G.Bhuvaneswari Amma 2, G.Annapoorani 3, K.Malathi 4 PG Scholar, Indian Institute of Information Technology, Srirangam,

More information

Big Data Analytics in Mobile Environments

Big Data Analytics in Mobile Environments 1 Big Data Analytics in Mobile Environments 熊 辉 教 授 罗 格 斯 - 新 泽 西 州 立 大 学 2012-10-2 Rutgers, the State University of New Jersey Why big data: historical view? Productivity versus Complexity (interrelatedness,

More information

The Role of Visualization in Effective Data Cleaning

The Role of Visualization in Effective Data Cleaning The Role of Visualization in Effective Data Cleaning Yu Qian Dept. of Computer Science The University of Texas at Dallas Richardson, TX 75083-0688, USA qianyu@student.utdallas.edu Kang Zhang Dept. of Computer

More information

Quality Assessment in Spatial Clustering of Data Mining

Quality Assessment in Spatial Clustering of Data Mining Quality Assessment in Spatial Clustering of Data Mining Azimi, A. and M.R. Delavar Centre of Excellence in Geomatics Engineering and Disaster Management, Dept. of Surveying and Geomatics Engineering, Engineering

More information

Map-Reduce Algorithm for Mining Outliers in the Large Data Sets using Twister Programming Model

Map-Reduce Algorithm for Mining Outliers in the Large Data Sets using Twister Programming Model Map-Reduce Algorithm for Mining Outliers in the Large Data Sets using Twister Programming Model Subramanyam. RBV, Sonam. Gupta Abstract An important problem that appears often when analyzing data involves

More information

Junghyun Ahn Changho Sung Tag Gon Kim. Korea Advanced Institute of Science and Technology (KAIST) 373-1 Kuseong-dong, Yuseong-gu Daejoen, Korea

Junghyun Ahn Changho Sung Tag Gon Kim. Korea Advanced Institute of Science and Technology (KAIST) 373-1 Kuseong-dong, Yuseong-gu Daejoen, Korea Proceedings of the 211 Winter Simulation Conference S. Jain, R. R. Creasey, J. Himmelspach, K. P. White, and M. Fu, eds. A BINARY PARTITION-BASED MATCHING ALGORITHM FOR DATA DISTRIBUTION MANAGEMENT Junghyun

More information

An Overview of Knowledge Discovery Database and Data mining Techniques

An Overview of Knowledge Discovery Database and Data mining Techniques An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,

More information

International Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6

International Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6 International Journal of Engineering Research ISSN: 2348-4039 & Management Technology Email: editor@ijermt.org November-2015 Volume 2, Issue-6 www.ijermt.org Modeling Big Data Characteristics for Discovering

More information

Large-Scale Data Sets Clustering Based on MapReduce and Hadoop

Large-Scale Data Sets Clustering Based on MapReduce and Hadoop Journal of Computational Information Systems 7: 16 (2011) 5956-5963 Available at http://www.jofcis.com Large-Scale Data Sets Clustering Based on MapReduce and Hadoop Ping ZHOU, Jingsheng LEI, Wenjun YE

More information

Specific Usage of Visual Data Analysis Techniques

Specific Usage of Visual Data Analysis Techniques Specific Usage of Visual Data Analysis Techniques Snezana Savoska 1 and Suzana Loskovska 2 1 Faculty of Administration and Management of Information systems, Partizanska bb, 7000, Bitola, Republic of Macedonia

More information

Email Spam Detection Using Customized SimHash Function

Email Spam Detection Using Customized SimHash Function International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 35-40 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Email

More information

Traffic mining in a road-network: How does the

Traffic mining in a road-network: How does the 82 Int. J. Business Intelligence and Data Mining, Vol. 3, No. 1, 2008 Traffic mining in a road-network: How does the traffic flow? Irene Ntoutsi Department of Informatics, University of Piraeus, Greece

More information

A Way to Understand Various Patterns of Data Mining Techniques for Selected Domains

A Way to Understand Various Patterns of Data Mining Techniques for Selected Domains A Way to Understand Various Patterns of Data Mining Techniques for Selected Domains Dr. Kanak Saxena Professor & Head, Computer Application SATI, Vidisha, kanak.saxena@gmail.com D.S. Rajpoot Registrar,

More information

Supply chain management by means of FLM-rules

Supply chain management by means of FLM-rules Supply chain management by means of FLM-rules Nicolas Le Normand, Julien Boissière, Nicolas Méger, Lionel Valet LISTIC Laboratory - Polytech Savoie Université de Savoie B.P. 80439 F-74944 Annecy-Le-Vieux,

More information

AN INTELLIGENT ANALYSIS OF CRIME DATA USING DATA MINING & AUTO CORRELATION MODELS

AN INTELLIGENT ANALYSIS OF CRIME DATA USING DATA MINING & AUTO CORRELATION MODELS AN INTELLIGENT ANALYSIS OF CRIME DATA USING DATA MINING & AUTO CORRELATION MODELS Uttam Mande Y.Srinivas J.V.R.Murthy Dept of CSE Dept of IT Dept of CSE GITAM University GITAM University J.N.T.University

More information

A Survey on Outlier Detection Techniques for Credit Card Fraud Detection

A Survey on Outlier Detection Techniques for Credit Card Fraud Detection IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. VI (Mar-Apr. 2014), PP 44-48 A Survey on Outlier Detection Techniques for Credit Card Fraud

More information

College information system research based on data mining

College information system research based on data mining 2009 International Conference on Machine Learning and Computing IPCSIT vol.3 (2011) (2011) IACSIT Press, Singapore College information system research based on data mining An-yi Lan 1, Jie Li 2 1 Hebei

More information

Research on Anomaly Detection of RFID Supply Chain Data Based on EPC

Research on Anomaly Detection of RFID Supply Chain Data Based on EPC , pp.62-66 http://dx.doi.org/10.14257/astl.2014.50.10 Research on Anomaly Detection of RFID Supply Chain Data Based on EPC Chunfeng Wang 1 Shuiming Zhong 2 Jin Wang 2 1 Modern Education Technology Center,

More information

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental

More information

WAITER: A Wearable Personal Healthcare and Emergency Aid System

WAITER: A Wearable Personal Healthcare and Emergency Aid System Sixth Annual IEEE International Conference on Pervasive Computing and Communications WAITER: A Wearable Personal Healthcare and Emergency Aid System Wanhong Wu 1, Jiannong Cao 1, Yuan Zheng 1, Yong-Ping

More information

THREE DIMENSIONAL REPRESENTATION OF AMINO ACID CHARAC- TERISTICS

THREE DIMENSIONAL REPRESENTATION OF AMINO ACID CHARAC- TERISTICS THREE DIMENSIONAL REPRESENTATION OF AMINO ACID CHARAC- TERISTICS O.U. Sezerman 1, R. Islamaj 2, E. Alpaydin 2 1 Laborotory of Computational Biology, Sabancı University, Istanbul, Turkey. 2 Computer Engineering

More information

PASSENGER/PEDESTRIAN ANALYSIS BY NEUROMORPHIC VISUAL INFORMATION PROCESSING

PASSENGER/PEDESTRIAN ANALYSIS BY NEUROMORPHIC VISUAL INFORMATION PROCESSING PASSENGER/PEDESTRIAN ANALYSIS BY NEUROMORPHIC VISUAL INFORMATION PROCESSING Woo Joon Han Il Song Han Korea Advanced Science and Technology Republic of Korea Paper Number 13-0407 ABSTRACT The physiological

More information

HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER

HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER Gholamreza Anbarjafari icv Group, IMS Lab, Institute of Technology, University of Tartu, Tartu 50411, Estonia sjafari@ut.ee

More information

An Analysis of Agricultural Risk and Intelligent Monitoring Technology Fantao Kong 1, a, Shiwei Xu 2,b, Shengwei Wang 3,c and Haipeng Yu 4,d

An Analysis of Agricultural Risk and Intelligent Monitoring Technology Fantao Kong 1, a, Shiwei Xu 2,b, Shengwei Wang 3,c and Haipeng Yu 4,d Advanced Materials Research Vol. 628 (2013) pp 265-269 Online available since 2012/Dec/27 at www.scientific.net (2013) Trans Tech Publications, Switzerland doi:10.4028/www.scientific.net/amr.628.265 An

More information

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai

More information

Florida International University - University of Miami TRECVID 2014

Florida International University - University of Miami TRECVID 2014 Florida International University - University of Miami TRECVID 2014 Miguel Gavidia 3, Tarek Sayed 1, Yilin Yan 1, Quisha Zhu 1, Mei-Ling Shyu 1, Shu-Ching Chen 2, Hsin-Yu Ha 2, Ming Ma 1, Winnie Chen 4,

More information

A Robustness Simulation Method of Project Schedule based on the Monte Carlo Method

A Robustness Simulation Method of Project Schedule based on the Monte Carlo Method Send Orders for Reprints to reprints@benthamscience.ae 254 The Open Cybernetics & Systemics Journal, 2014, 8, 254-258 Open Access A Robustness Simulation Method of Project Schedule based on the Monte Carlo

More information

ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL

ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL International Journal Of Advanced Technology In Engineering And Science Www.Ijates.Com Volume No 03, Special Issue No. 01, February 2015 ISSN (Online): 2348 7550 ASSOCIATION RULE MINING ON WEB LOGS FOR

More information

Data Mining Project Report. Document Clustering. Meryem Uzun-Per

Data Mining Project Report. Document Clustering. Meryem Uzun-Per Data Mining Project Report Document Clustering Meryem Uzun-Per 504112506 Table of Content Table of Content... 2 1. Project Definition... 3 2. Literature Survey... 3 3. Methods... 4 3.1. K-means algorithm...

More information

Example application (1) Telecommunication. Lecture 1: Data Mining Overview and Process. Example application (2) Health

Example application (1) Telecommunication. Lecture 1: Data Mining Overview and Process. Example application (2) Health Lecture 1: Data Mining Overview and Process What is data mining? Example applications Definitions Multi disciplinary Techniques Major challenges The data mining process History of data mining Data mining

More information

Modeling and Design of Intelligent Agent System

Modeling and Design of Intelligent Agent System International Journal of Control, Automation, and Systems Vol. 1, No. 2, June 2003 257 Modeling and Design of Intelligent Agent System Dae Su Kim, Chang Suk Kim, and Kee Wook Rim Abstract: In this study,

More information

An Empirical Study of Application of Data Mining Techniques in Library System

An Empirical Study of Application of Data Mining Techniques in Library System An Empirical Study of Application of Data Mining Techniques in Library System Veepu Uppal Department of Computer Science and Engineering, Manav Rachna College of Engineering, Faridabad, India Gunjan Chindwani

More information

Visualization of Breast Cancer Data by SOM Component Planes

Visualization of Breast Cancer Data by SOM Component Planes International Journal of Science and Technology Volume 3 No. 2, February, 2014 Visualization of Breast Cancer Data by SOM Component Planes P.Venkatesan. 1, M.Mullai 2 1 Department of Statistics,NIRT(Indian

More information

FPGA Implementation of Human Behavior Analysis Using Facial Image

FPGA Implementation of Human Behavior Analysis Using Facial Image RESEARCH ARTICLE OPEN ACCESS FPGA Implementation of Human Behavior Analysis Using Facial Image A.J Ezhil, K. Adalarasu Department of Electronics & Communication Engineering PSNA College of Engineering

More information

Circle Object Recognition Based on Monocular Vision for Home Security Robot

Circle Object Recognition Based on Monocular Vision for Home Security Robot Journal of Applied Science and Engineering, Vol. 16, No. 3, pp. 261 268 (2013) DOI: 10.6180/jase.2013.16.3.05 Circle Object Recognition Based on Monocular Vision for Home Security Robot Shih-An Li, Ching-Chang

More information

Predict the Popularity of YouTube Videos Using Early View Data

Predict the Popularity of YouTube Videos Using Early View Data 000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050

More information

Process Mining in Big Data Scenario

Process Mining in Big Data Scenario Process Mining in Big Data Scenario Antonia Azzini, Ernesto Damiani SESAR Lab - Dipartimento di Informatica Università degli Studi di Milano, Italy antonia.azzini,ernesto.damiani@unimi.it Abstract. In

More information

ENERGY SAVING SYSTEM FOR ANDROID SMARTPHONE APPLICATION DEVELOPMENT

ENERGY SAVING SYSTEM FOR ANDROID SMARTPHONE APPLICATION DEVELOPMENT ENERGY SAVING SYSTEM FOR ANDROID SMARTPHONE APPLICATION DEVELOPMENT Dipika K. Nimbokar 1, Ranjit M. Shende 2 1 B.E.,IT,J.D.I.E.T.,Yavatmal,Maharashtra,India,dipika23nimbokar@gmail.com 2 Assistant Prof,

More information

A QoS-driven Resource Allocation Algorithm with Load balancing for

A QoS-driven Resource Allocation Algorithm with Load balancing for A QoS-driven Resource Allocation Algorithm with Load balancing for Device Management 1 Lanlan Rui, 2 Yi Zhou, 3 Shaoyong Guo State Key Laboratory of Networking and Switching Technology, Beijing University

More information

A Prediction-Based Transcoding System for Video Conference in Cloud Computing

A Prediction-Based Transcoding System for Video Conference in Cloud Computing A Prediction-Based Transcoding System for Video Conference in Cloud Computing Yongquan Chen 1 Abstract. We design a transcoding system that can provide dynamic transcoding services for various types of

More information

Interactive information visualization in a conference location

Interactive information visualization in a conference location Interactive information visualization in a conference location Maria Chiara Caschera, Fernando Ferri, Patrizia Grifoni Istituto di Ricerche sulla Popolazione e Politiche Sociali, CNR, Via Nizza 128, 00198

More information

A Two-Step Method for Clustering Mixed Categroical and Numeric Data

A Two-Step Method for Clustering Mixed Categroical and Numeric Data Tamkang Journal of Science and Engineering, Vol. 13, No. 1, pp. 11 19 (2010) 11 A Two-Step Method for Clustering Mixed Categroical and Numeric Data Ming-Yi Shih*, Jar-Wen Jheng and Lien-Fu Lai Department

More information

HIGH DIMENSIONAL UNSUPERVISED CLUSTERING BASED FEATURE SELECTION ALGORITHM

HIGH DIMENSIONAL UNSUPERVISED CLUSTERING BASED FEATURE SELECTION ALGORITHM HIGH DIMENSIONAL UNSUPERVISED CLUSTERING BASED FEATURE SELECTION ALGORITHM Ms.Barkha Malay Joshi M.E. Computer Science and Engineering, Parul Institute Of Engineering & Technology, Waghodia. India Email:

More information

Colour Image Segmentation Technique for Screen Printing

Colour Image Segmentation Technique for Screen Printing 60 R.U. Hewage and D.U.J. Sonnadara Department of Physics, University of Colombo, Sri Lanka ABSTRACT Screen-printing is an industry with a large number of applications ranging from printing mobile phone

More information

OUTLIER ANALYSIS. Data Mining 1

OUTLIER ANALYSIS. Data Mining 1 OUTLIER ANALYSIS Data Mining 1 What Are Outliers? Outlier: A data object that deviates significantly from the normal objects as if it were generated by a different mechanism Ex.: Unusual credit card purchase,

More information

Context-aware Library Management System using Augmented Reality

Context-aware Library Management System using Augmented Reality International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 9 (2014), pp. 923-929 International Research Publication House http://www.irphouse.com Context-aware Library

More information

Application of Data Mining Techniques in Intrusion Detection

Application of Data Mining Techniques in Intrusion Detection Application of Data Mining Techniques in Intrusion Detection LI Min An Yang Institute of Technology leiminxuan@sohu.com Abstract: The article introduced the importance of intrusion detection, as well as

More information

How To Use Neural Networks In Data Mining

How To Use Neural Networks In Data Mining International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and

More information

Categorical Data Visualization and Clustering Using Subjective Factors

Categorical Data Visualization and Clustering Using Subjective Factors Categorical Data Visualization and Clustering Using Subjective Factors Chia-Hui Chang and Zhi-Kai Ding Department of Computer Science and Information Engineering, National Central University, Chung-Li,

More information

An Energy-Based Vehicle Tracking System using Principal Component Analysis and Unsupervised ART Network

An Energy-Based Vehicle Tracking System using Principal Component Analysis and Unsupervised ART Network Proceedings of the 8th WSEAS Int. Conf. on ARTIFICIAL INTELLIGENCE, KNOWLEDGE ENGINEERING & DATA BASES (AIKED '9) ISSN: 179-519 435 ISBN: 978-96-474-51-2 An Energy-Based Vehicle Tracking System using Principal

More information

IJCSES Vol.7 No.4 October 2013 pp.165-168 Serials Publications BEHAVIOR PERDITION VIA MINING SOCIAL DIMENSIONS

IJCSES Vol.7 No.4 October 2013 pp.165-168 Serials Publications BEHAVIOR PERDITION VIA MINING SOCIAL DIMENSIONS IJCSES Vol.7 No.4 October 2013 pp.165-168 Serials Publications BEHAVIOR PERDITION VIA MINING SOCIAL DIMENSIONS V.Sudhakar 1 and G. Draksha 2 Abstract:- Collective behavior refers to the behaviors of individuals

More information

A Time Efficient Algorithm for Web Log Analysis

A Time Efficient Algorithm for Web Log Analysis A Time Efficient Algorithm for Web Log Analysis Santosh Shakya Anju Singh Divakar Singh Student [M.Tech.6 th sem (CSE)] Asst.Proff, Dept. of CSE BU HOD (CSE), BUIT, BUIT,BU Bhopal Barkatullah University,

More information

A Distributed Render Farm System for Animation Production

A Distributed Render Farm System for Animation Production A Distributed Render Farm System for Animation Production Jiali Yao, Zhigeng Pan *, Hongxin Zhang State Key Lab of CAD&CG, Zhejiang University, Hangzhou, 310058, China {yaojiali, zgpan, zhx}@cad.zju.edu.cn

More information

NEW TECHNIQUE TO DEAL WITH DYNAMIC DATA MINING IN THE DATABASE

NEW TECHNIQUE TO DEAL WITH DYNAMIC DATA MINING IN THE DATABASE www.arpapress.com/volumes/vol13issue3/ijrras_13_3_18.pdf NEW TECHNIQUE TO DEAL WITH DYNAMIC DATA MINING IN THE DATABASE Hebah H. O. Nasereddin Middle East University, P.O. Box: 144378, Code 11814, Amman-Jordan

More information

Using Data Mining for Mobile Communication Clustering and Characterization

Using Data Mining for Mobile Communication Clustering and Characterization Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer

More information