Finding similar case subset and hotspot detection in felonious data set using data mining algorithms: Weighted Clustering and classification
|
|
|
- Russell Harris
- 9 years ago
- Views:
Transcription
1 Finding similar case subset and hotspot detection in felonious data set using data mining algorithms: Weighted Clustering and classification Ms. Apexa Joshi 1, Dr. Suresh M.B. 2 1 Research Scholar, School of Science, RK University, Rajkot, India. 1 Assistant Professor, JVIMS-MCA-GTU, Jamnagar, India. 2 Professor & Head, Dept. of ISE, East West Institute of Technology, Viswaneedam Post, Bangalore Abstract Felonious activities have been increased terrifically. So safety has become a key issue to the societies. The control activities should be taken by the Security agencies (like FBI, CBI, CID, police Department and other law enforcement agencies). The security agencies have to take corrective activities for reducing the Felonious activities. To analyze the Felonious data, clustering and classification techniques are used. These data will be stored in the Felonious database. Spatial clustering algorithm and structured crime classification are used to categorize the Felonious activities. These algorithms assistance to identify the hotspot of felonious activities. Felons will be recognized based on the eyewitness or hint at the crime spot. The credentials of hotspot of Felons activities will help the Security agencies to provide more safety to the particular territory, this assistances to prevent crimes in future. When we apply this concept to all areas at least we can reduce Felonious activities. Entirely the criminalities cannot be controlled. In this paper we find the hotspot of the felonious activities and finding the felons by using clustering and classification algorithms. It can not only provide multiple hints to solve crimes but also improve efficiency to catch the felons. Keywords: crime analysis and data mining, classification, K-Modes clustering, crime mapping, weighted attributes, GIS, information gain ratio, hotspot, spatial pattern. 1. INTRODUCTION Security and crime predicting events are most vital worries for both citizens and government. In Gujarat State of India, zillions of cases have been stored in felonious database of department of public security and this number increases in millions every year. Massive felon data have been gathered in law enforcement organizations in felonious databases. To classify the felonious activities and felons there are methods available to decrease it. Where number of felonious activities has occurred that place is recognized as hotspot. By recognizing the hotspot of the felonious activities, this will support the police department to avoid such kind of movement in future in the all locations. The data mining concept is very much useful to analyze the crimes and felons. Classification and clustering algorithms are realistic. First we have done the classification after that applying clustering algorithm. Based on the type of crime, the felonious activity will be classified, after the classification is done based on the classification outcome, the related type of felonious activities will be clustered together. By using GIS the hotspot of the felonious activities will be viewed. Searching subsets of related cases from huge felonious data is a key task for intelligence analysts in law-enforcement societies. If such subsets are originate and provided to crime investigators, multiple inklings can be obtained from diverse cases. For example, the offender in case A stole bicycles by cracking the lock and in case B the offender stole bicycles around shopping malls. If case A and case B were confirmed to be similar cases, investigators can conclude that the offender often stole bicycles around shopping malls by cracking the lock. This additional information may help to solve the two cases together. Once these two cases were solved, so did all cases in the same subset. This example demonstrates that finding similar cases subsets not only assists in the process of crime investigation but also greatly improves efficiency. However, the conventional approach of finding similar cases subsets is relatively inefficient. Not until a seed case, either a new happened case or an important case, needed to be investigated did the intelligence analysts begin to use the query system to find the similar case subsets. Analysts usually input one or more keywords of the seed case to query the database. Then they had to review the query results one by one to confirm whether they are similar cases. The reviewing process often takes one or two hours. If a lot of cases have to be queried, the process takes even longer. How to use computer aided approach to automatically find the similar case from a large number of cases without a seed case is a great demand. Another drawback of manually querying the database is that all attributes are treated equally and the importance of some specific attributes in different case categories is not reflected. We find that when intelligence analysts query databases, they often query some specific attributes, such as location, victim, tools used etc. These attributes play a critical role in finding the similar case subsets because offenders tend to act similarly as they did before, like choosing the same Volume 3, Issue 4, April 2014 Page 157
2 location or using the same tools. In addition, different behavioral attributes play the main part in different cases categories. For instance, according to trained analysts experience, burglary offenders tend to focus on ways to break in a house while fraud offenders tend to focus on choosing their targets, either a person or a company. Therefore these different focuses must been well utilized in the process of finding similar cases subsets to reflect the nature of each case category. The importance of weighing attributes was first addressed in [7]. In [7], the author adopted expert-based methodology. The weight of attributes is given by experienced experts. The fatal defect of this method lies in the fact that different experts will give distinct weights, making the result subjective and less convincing. An automatic way of weighing the attributes is required. In this paper, we propose a two-phase clustering algorithm called AK-Modes to find the similar case subsets: first we compute weights of behavioral attributes related to a given case category; then cases are put into different subsets using AK Modes algorithm, which takes attributes weights into consideration. The main contributions of our works are: Emphasize the importance of attribute weighing in crime investigation and propose the use of Information Gain Ratio (IGR) in classification domain for the calculation of attributes weights; Propose a two-phase clustering algorithm AK-Modes which combines the attribute-weighing phase and the clustering phase together; Experiments show AK-Modes is effective and can find significant results. The rest of the paper is organized as follows. Section 2 discusses crime analysis Section 3 contains crime mapping section 4 defines crime classification section 5 contains crime clustering ( problem of finding the similar case subsets as a clustering problem, two-phase algorithm AK-Modes for finding the similar case subset, experiment result) and finally section 6 offers the conclusion of our work. 2. CRIME MAPPING Crime mapping helps the police department to protect the people from the crime more effectively. An understanding of where and why crimes occur will help to fight against with the crime. Simple map shows where the crimes have been occurred. 2.1 Visualizing the Crime Location Digital maps visualize the crime scenario in quicker manner. At which place the crimes have occurred that will be visualized. Instead of searching from the list of events, mapping is easy to visualize the crime hot spot. 2.2 Integrate the Community Characteristics Community characteristics mean the most possible places for occurring the crime activities. For example slums, schools, parks, colleges, alcohol permit location and etc. 2.3 Producing the Maps At any geographical level the maps can be produced. Where the crimes have occurred that particular place will be shaded darker. The number of crime incidents percentage change will be displayed by shading the area s location. 3. CRIME ANALYSIS Crime analysis is a set of systematic and analytical process for providing the information regarding crime patterns at the particular time. Crime investigation is an important activity for identifying the crime hotspot. It supports the number of department functions that includes patrol deployment, special operations, tactical units, investigations, planning and research, crime prevention and administrative services. Crime analysis can be divided into three categories, these are following as, 3.1 Tactical Tactical is an analytical process for providing the information to assist operations personnel (patrol and investigative officers) for identifying the crime trends, patterns, series and hotspot. It includes at which time crime is occurred and associating the criminal activities by crime method. 3.2 Strategic It includes the preparation of crime statistical summaries, resource acquisition and allocation studies. 3.3 Administrative It focuses on provisioning on economic, geographic or social information to administration. 3.4 Identification of clusters GIS identifies the areas that contain the more number of clusters (hotspot). The similar type of crime activities will be grouped together. Based on the clusters result, which cluster contains the more number of criminal activities that will be called as crime hotspot for the particular crime. 3.5 Comparison of location of crime hotspot The crime hotspot that have been identified over several months. 3.6 Comparison of hotspot with different crime types The identified crime hotspot will be compared with the other type of crime hotspot. For example burglary type of crime hotspot will be compared with the murder type of crime hotspot. Volume 3, Issue 4, April 2014 Page 158
3 4. CRIME CLASSIFICATION To classify the crime incidents based on the similarity between the crime objects stored in the class, structure crime classification is used. Classification is the hierarchy of these attributes. These attributes are represented by classification in three ways, 1) Classification of crime place 2) Classification crime types 3) Classification of crime time The structured crime classification algorithm is used to identify the more similar objects in the data sets. Algorithm, to find the hotspot and coldspot from the dataset. Input: Database DB Output: hotspot or coldspot 1. Assign S=DB 2. Apply purification attribute Ai by Cn] 3. Repeat a. Find the similarity of crime attribute objects (C.Ai, C.Ai+1) b. Find the probability of particular crime classification = Probability (C.Ai,Classification) c. Threshold T=(Cluster Area-Sparse Area) d. Find F(C) =classification U Pi (Ci) e. If F(C)>positive description Produce a hot spot Else Produce a cold spot 4. Go to step 3 Let S denotes a set of crime incidents. Ai is an attribute of crime incidents and Ci is a classification of each crime attribute Ai. For two elements x1, x2 in the tree of Ci, if there is a path from x1 to x2 is called the parent of x2. Furthermore, x1 is a generalization of x2. In the structure crime classification algorithm, the national dissipation between the events is similar and the events are more similar. Choose the crime attribute Ai in the crime class C. Find the similarity of each crime attribute of crime objects if both objects have the same similarity, join these two objects have the same crime attribute incident and put into the same class C. And finally find the F(C) based on the probability of crime incident occurring in the particular class to which it is merged. If F(C) is greater than the positive description, it produces a crime hot spot, and otherwise it produces a crime cold spot. 5. CRIME CLUSTERING Clustering is data mining technique for grouping the similar type of crimes will be grouped together. In this paper the burglary crime will be clustered, based on the clusters result the crime hotspot will be identified. 5.1 Problem Statement In this section, we will first introduce some terminologies used in AK-Modes and then define our problem as a clustering problem. Categorical attribute: A categorical attribute is the one whose values do not have a natural ordering. Some typical categorical attributes are: gender, education level, marriage status etc. In our crime databases, behavioral attributes are categorical attribute because they usually describe an offender s trait, such attributes include victim, modus operandi, and location and so on. Attribute weight: The weight of an attribute is a real value which indicates the importance of the attribute in different case categories. The larger the weight is, the more important the attribute is in that case category. Case: A case is a record in a database that consists of some numerical and categorical attributes. In our context, we only consider the categorical attributes since they contain the most useful information of a case. For example, two burglary cases and a fraud case are shown in table 1: TABLE1. Three Cases with Categorical Attributes Case No Case Category Burglary Fraud Burglary Time Location Category Dwelling House Hotel Dwelling House Modus Operandi Invade from Window Temptation of money Invade from window Victim/Target Old woman Middle-aged man Middle-aged woman Motivation For money For money For money Characteristic Individual Gang Individual Volume 3, Issue 4, April 2014 Page 159
4 Distance of two cases: The Distance of two cases A and B is calculated by summing all distances between respective attributes, that is: m is the number of attributes and d() is a distance measure for two attribute values ai and bi. Similar Cases: Two cases A and B are similar if and only if their distance is less than a predefined threshold α (0<α <1). That is, A and B are similar if and only if Dist(A, B) < α. In the example of table 1,case No and case No are similar cases. The finding similar case subset problem: Given a dataset containing n cases (D1.,Dn) with m categorical attributes (A 1,..., Am)find k similar case subset with centers C1,..., Ck, such that We assume that we do not have to assign every case into a subset, only those cases satisfying the similar case condition are assigned. 5.2 AK-Modes Algorithm The AK-Modes algorithm includes attribute-weighing phase and finding similar case subsets phase. Attributes are first weighted in the attribute-weighing phase. The weighted attributes are then integrated into clustering phase and finally the result is obtained. The process of the two-phase algorithm is shown in Fig Attribute Weighing Phase Attribute Weighing is a critical phase before finding the similar case subsets since different attributes play the main role in different case categories. The task we should do in this phase is: Given a list of attributes A1,...,Am, use a weighing function F to every attribute Ai (1 i m) and compute their F- values, find top-k ( 1 k < m ) attributes with larger F values. Having studied various techniques regarding on attribute selection and dimension reduction, we decided to adopt the concept of Information Gain (IG) to support our algorithm. IG is an important concept in information theory and has been widely used in classification, especially in Decision Tree classification. IG can reflect the amount of information that an attribute contains in classification. The attribute with larger IG implies that the root node of the decision tree should be split on this attribute first. Figure 1: The processes of AK-Modes Before computing IG we must know the class label that each record belongs to since IG is a concept in classification domain. In our work, we take the case category attribute as the class-label attribute because cases of different categories tend to favor different attributes. The results after taking case category as class-label attribute can reflect the nature of each case category. Now we introduce some concepts and formulas for computation of IG. The entropy for an attribute i A can be calculated as: Where a is the attribute value on Ai whose domain is Vi. p(a) is the probability that attribute Ai has the value a. Information Gain (IG): assume attribute Ai has m different values and the dataset X can be divided by i A into m different subsets X1,...,Xm, the IG of Ai is: Volume 3, Issue 4, April 2014 Page 160
5 Where T is+ a class-label attribute. Although information gain is usually a good measure for deciding the relevance of an attribute, it is not perfect. A notable problem is that it bias attributes that can take on a large number of distinct values, for example, customer ID in a business database. To overcome this drawback, information gain ration (IGR) is introduced by Quinlan [12]. Information Gain Ratio (IGR): The IGR of an attribute Ai is: Where IV(Ai) is the gain ration that can be computed as: The value of IGR must be normalized so that it lies between 0 and Clustering Phase The problem of finding the similar case subsets can be solved with the clustering technique. Nowadays most of current clustering algorithms focus on numerical data since it is easier to calculate their similarity in geometric space, for example, Euclidean distance measure. However, in our work, we are processing the crime cases whose attributes are categorical. Thus how to cluster these cases becomes a challenge. Many algorithms have been proposed for clustering categorical data. Based on the classical K-Means clustering algorithm, a K-Modes algorithm is presented for categorical domain in [13], which introduces a simple similarity measure for categorical objects and sets modes instead of means for clusters. K-Modes are suitable for our problem since it has a good scalable capability for large datasets. The main differences between AK-Modes algorithm and the K-Modes algorithm is that it integrates the results of attribute-weighing into the clustering process. The steps in AK Modes algorithm is as follows: AK-Modes Algorithm Input: Dataset D, Weighted Attributes A, threshold α Output: clustering result Step 1: Using the result of attribute-weighing phase A, find the Decisive Attribute and the number of clusters k. Then find initial k objects as the initial mode of every cluster. Step 2: For every casec in D, calculate its distance to every mode M and find the distance d to its closet mode. If d >α, case C is abandoned. Otherwise, put case C into the cluster with the closest mode. Step 3: Update the mode of each cluster. Step 4: Terminate the algorithm till all the modes do not change. If not, go back to step 2. Here are some key points we must pay attention to in the AK-Modes algorithm The input setting of number of clusters k (in Step 1) When dealing with a large bunch of cases, the intelligence analysts have little prior knowledge on how many subsets exist in them. Thus it is difficult for the intelligence analysts to determine the value of k before running the K-Modes algorithm. To solve this problem, an automatic mechanism for deciding k is required. Here we utilize the result of attribute weighing phase. We define the attribute with the largest weight after the attribute-weighing phase as Decisive Attribute. Because of its largest weight, decisive attribute is the most important factor we must consider when finding similar case subsets. So we can let k be the number of subsets the data divided by decisive attribute The distance measure for computing distance between two cases (in Step 2) As stated in Section 3, the distance between two cases A and B is calculated by summing all distances between respective attributes. For categorical attributes, we adopt the original similarity measure in K-Modes algorithm to compute the distance of two categorical attribute values in respective attributes, that is: Where ai and bi are two categorical attribute values of A and B The threshold α for judging similar cases (in Step 2) α is a parameter to determine whether two cases are similar. If α is too large, many cases will be similar leading to a large number of cases in the result, which is either impractical or little knowledge can be found within the result. But a small value of α may cause some similar cases to be abandoned by AK-Modes thus result in an information-loss situation. Therefore, a careful setting of α must be studied. We will see it in the experiment section. Volume 3, Issue 4, April 2014 Page 161
6 5.3 Experiments In this session, we evaluate the effectiveness of our algorithm. First we test the necessity of attribute weighing using UCI datasets. Then we conduct experiments on the real crime data to see how significant result we can find Experiment on UCI data To show the necessity of attribute weighing, we conduct an experiment on datasets from the UCI Machine Learning Repository [14] to compare the accuracy of the K-Modes algorithm with and without weighted attributes Dataset The dataset used are the Mushroom dataset and the Wisconsin Breast Cancer (original) dataset. The descriptions of the two datasets are as follows: The Mushroom dataset: It has 22 attributes and 8124records. Each record represents physical characteristics of a single mushroom. A classification label of poisonous or edible is provided with each record. The numbers of edible and poisonous mushrooms in the dataset are 4208 and 3916, respectively. Wisconsin Breast Cancer (original) dataset: It has 699 instances with 9 attributes. Each record is labeled as benign (458% or 65.5%) or malignant (241% or 34.5%). In our literature, all attributes are considered categorical with values 1,2,..., Validation measure Since each record in dataset we used is labeled, the accuracy of the result can be computed as follows. Given the final number of clusters k, accuracy r was defined as:, Where n is the number of records in the dataset and ai is the number of instances occurring in both cluster i and its corresponding class, which had the maximal value Experiment result In the K-Modes algorithm with weighted attributes, we pick half of both datasets as training data for the calculation of attributes weight since true labels exist. The remaining data are tested for accuracy. After running the K-modes algorithm with and without weighted attributes, we get the results shown in Figure 2 and 3. Figure 2: Accuracy vs. different number of clusters in Mushroom dataset Figure 3: Accuracy vs. different number of clusters in Winsconsin Breast Cancer (original) dataset From Fig. 2 and Fig. 3, we can see that in the Mushroom data set, K-modes algorithm using weighted attributes gets higher accuracy than the version without weighted attributes. Volume 3, Issue 4, April 2014 Page 162
7 In the Wisconsin Breast Cancer (original) dataset, K-modes algorithm using weighted attributes has comparative accuracy to the version without weighted attributes. In a word, using weighted attributes in K-Modes algorithm can improve the accuracy Experiment on crime data Dataset The dataset used in the experiment was collected from the central database in Department of Public Security of Gujarat province of India. The database consists of all the cases occurring within 11 cities of the province since The crime data of one typical moderate-population city at year 2008 was provided as our data source. We especially put our effort to do experiments on burglary offences because of their larger volume and higher occurring frequency. The experiment data includes records of burglary cases with 16 behavioral attributes. Moreover, the original data was cleaned and integrated as a preprocessing step since a lot of missing values or typing errors existed Experiment design and results We partitioned the crime data into training data and test data. Training data is used as the source for attribute weighing and test data is used for the task of finding similar case subsets. Training data: we also took about half (9172 cases) of burglary cases of 2008 as the training data to evaluate the weight of attributes. However, not all 16 attributes are evaluated for their weights. According to intelligence analysts advice, we picked only 8 specific attributes: occurring area, location category, and victim/target, invade ways, modus operandi, crime motivation, crime characteristic and opportunities to commit a crime. After setting the class label attribute to case category, we got top-4 attributes shown in table 2 with larger IG values: TABLE 2: Result of Attribute Weighing Attribute Name Weight Victim/target Modus Operandi Location Category Characteristic Testing data: We used the remaining 9256 burglary cases as the testing data for finding similar case subsets The setting of threshold α The threshold α is an important parameter in the AK Modes algorithm. It determines the number of cases in the result. We ran the AK-Modes algorithm with different value of α from range 1 to 0.1 and record the number of cases in the result to see how α affects the number of cases in the result. Figure 4: Similarity threshold vs. number of cases in the result As shown in Fig. 4, the number of cases is decreased when the threshold changes from 1 to 0.1, which is accordance with the definition of similar cases. What s more, there are periods of dramatic decrease in the number of cases when the threshold changes from 0.7 to 0.6 and 0.5 to 0.3. This indicates that the threshold can effectively reduce the number of cases in the results if appropriately set The significant results of finding similar cases subsets Inspired by the results discovered in a), we set the threshold α to 0.3 because it can get a suitable number of cases in the result and see how significant our result is after running the AK-Modes algorithm. There are totally 489 cases in the result and these cases are divided into 10 groups. We asked two experienced intelligence analysts to validate the result and they found some interesting discoveries in 2 groups. In group 1 of 11 cases, the similarities of the behavior traits of the offenders are: Volume 3, Issue 4, April 2014 Page 163
8 Motorcycles were stolen in all cases. 100% offenders stole motorcycles by connecting the electric wires to start the engine. In 5 cases, offenders commit the crime at plazas or streets. In group 2 of 45 cases, the similarities of the behavior traits of the offenders are: 100% victims were young women. 16 burglary offences occurred at commercial places, such as supermarkets, retail shops and hair salons. By summarizing the similarities of cases in the same group, intelligence analysts can have a clearer clue of these crimes. Useful information obtained may help solving the cases or at least assist in the process of crime investigation. Also, the information can be provided to senior leaders for the prevention and prediction of crimes in the future. For instance, in the above results, the summing-up information tells people, especially young women, to be precautious to take care of their belongings/wallets at commercial places. 6. Conclusion This paper presents the method to identify the hotspot of crime. Based on the type of crime the police department can easily identify the hotspot of the burglary crime. GIS is used to visualize the hotspot of burglary crime. Data mining concept is used to prevent and identify the crimes. Classification technique is used to classify the different crimes. Clustering technique is used to cluster the similar type of crimes together, based on the clusters result the burglary type of crime hotspot will be identified. This result will help to reduce the burglary type crime. In future all type of crimes hotspot will be identified; through this the crime activities will be reduced. Finding similar cases subsets is an important task in crime investigation. Given a seed case, intelligence analysts often pay a lot of effort to review the results after querying the database based on their domain knowledge. In this paper, we proposed an AK-Modes algorithm to automatically find the similar case subsets without a given seed case. AK-Modes combine the attribute-weighing phase with the process of clustering. Attribute-weighing phase is necessary because it highlights the importance and priority of different attributes in various case categories. The advantage of attribute weighing is shown using the UCI datasets and significant results have been discovered on the real crime dataset. We believe that the application of our model in practice can effectively improve the efficiency compared with the traditional manually reviewing approaches and can assist in the decision-making process. In the future, there are still works to be done to improve our algorithm. First, the distance measure of two cases can be further studied. Semantic distance will be a good direction for this study. Second, by now the intelligence analysts have to set the threshold α in AK-Modes algorithm based on their experience. How to get a reasonable threshold automatically using some novel algorithm is still a challenging task for us. References [1] H. Chen, W. Chung, J. Xu, G. Wang, Y. Qin and M. Chau, Crime Data Mining: A General Framework and Some Examples, Computer, vol. 37, [2] H. Chen, W. Chung, Y. Qin, M. Chau, J. Xu, G. Wang, R. Zheng and H. Atabakhsh, Crime Data Mining: An Overview and Case Studies, in Proceedings of the annual national conference on Digital government research, Boston, pp.1-5, [3] M. Chau, J. Xu, and H. Chen, Extracting Meaningful Entities from Police Narrative Reports, in Procceedings of The National Conference on Digital Government Research, pp , [4] G. Wang, H. Chen, and H. Atabakhsh, Automatically Detecting Deceptive Criminal Identities, Comm.ACM, Mar.2004, pp.70-76, [5] H. Chen, H. Atabakhsh, T. Petersen, J. Schroeder, T. Buetow, L. Chaboya, C. O'Toole, M. Chau, T. Cushna, D. Casey, and Z. Huang, COPLINK: Visualization for crime analysis, in Proceedings of The National Conference on Digital Government Research, pp.1-6, [6] R. Adderley and P. B. Musgrove, Data mining case study: Modeling the behavior of offenders who commit serious sexual assaults, in Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, New York, pp , [7] S. V. Nath, Crime Pattern Detection Using Data Mining, in Proceedings of the 2006 IEEE/WIC/ACM Conference on Web Intelligence and Intelligent Agent Technology, pp , [8] Fatih Ozgul, Zeki Erdem and Chris Bowerman, Prediction of past unsolved terrorist attacks, in Proceedings of the IEEE international conference on Intelligence and security informatics, Richardson, Texas,USA, pp.37-42, [9] J. S. Bruin, T. K. Cocx, W. A. Kosters, J. F. J. Laros and J. N. Kok, Data Mining Approches to Criminal Career Analysis, in Proceedings of th Sixth International Conference on Data Mining, pp , [10] G. C. Oatley, J. Zeleznikow, and B. W. Ewart, Matching and predicting crimes, in Proceedings of the Twentyfourth SGAI International Conference on Knowledge Based Systems and Applications of Artificial Intelligence, pp , Volume 3, Issue 4, April 2014 Page 164
9 [11] L. Ding, D. Steil, M. Hudnall, B. Dixon, R. Smith, D. Brown and A. Parrish, PerpSearch: An Integrated Crime Detection System, in Proceedings of the 2009 IEEE international conference on Intelligence and security informatics, Richardson, Texas, USA, pp , [12] Quinlan, J. R, C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers, [13] Z. Huang, Extensions to the k-means algorithm for clustering large data sets with categorical values, Data Mining and Knowledge Discovery, vol. 2, pp , [14] C. J. Merz, P. Merphy, UCI Repository of Machine Learning Databases, [15] Sajendra Kumar, Ram Kumar Rana, Pawan Singh, A Semantic Query Transformation Approach Based on Ontology for Search Engine ISSN : Vol. 4 No. 05 May 2012, International Journal on Computer Science and Engineering (IJCSE). [16] Lizhen Li, Zhifeng Dong, Keming Xie, Ontology of general concept for Semantic Searching, Second International Conference on Computer Modeling and Simulation [17] Yuangui Lei, Victoria Uren, and Enrico Motta, SemSearch: A Search Engine for the Semantic Web: IEEE Transactions on knowledge and Data engineering, VOL.19, NO. 2, FEBRUARY [18] Thomas B. Passin, Explores Guide to the Semantic Web, Manning Publications Co. GreenWich [19] Ronen Feldman, James Sanger, The text mining handbook: Advanced approach in analyzing unstructured data, Cambridge University Press USA2007. [20] C.P.Johnson Crime Mapping and Analysis using GIS, Geomatics 2000, Conference on Geomatics in Electronic Governence, January 2000, Pune. AUTHOR Ms. Apexa Joshi received the B.C.A and M.C.A degrees in Computer Science and application from Saurashtra University in 2005 and 2008, respectively. She is pursuing Ph.D in Computer science. Her area of specialization is data mining. She is having 10+ publications in international and national journals. She is Assistant professor at Jayshuklal Vadhar Institute of Management studies GTU in MCA department from last 6 years. Dr. Suresh M. B. received the B.E, M.Tech. and Ph.D. degrees in Information Science and Engineering. His area of specialization is Digital Image Processing. He is having the 16 years wide experience in teaching industry. He is published 35 + number of papers in international and national journals. He is Professor & Head at East West Institute of Technology, Bangalore, Karnataka, India. Volume 3, Issue 4, April 2014 Page 165
AN INTELLIGENT ANALYSIS OF CRIME DATA USING DATA MINING & AUTO CORRELATION MODELS
AN INTELLIGENT ANALYSIS OF CRIME DATA USING DATA MINING & AUTO CORRELATION MODELS Uttam Mande Y.Srinivas J.V.R.Murthy Dept of CSE Dept of IT Dept of CSE GITAM University GITAM University J.N.T.University
A Proposed Data Mining Model to Enhance Counter- Criminal Systems with Application on National Security Crimes
A Proposed Data Mining Model to Enhance Counter- Criminal Systems with Application on National Security Crimes Dr. Nevine Makram Labib Department of Computer and Information Systems Faculty of Management
Crime Hotspots Analysis in South Korea: A User-Oriented Approach
, pp.81-85 http://dx.doi.org/10.14257/astl.2014.52.14 Crime Hotspots Analysis in South Korea: A User-Oriented Approach Aziz Nasridinov 1 and Young-Ho Park 2 * 1 School of Computer Engineering, Dongguk
Data Mining for Digital Forensics
Digital Forensics - CS489 Sep 15, 2006 Topical Paper Mayuri Shakamuri Data Mining for Digital Forensics Introduction "Data mining is the analysis of (often large) observational data sets to find unsuspected
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
Crime Mapping and Analysis Using GIS
Crime Mapping and Analysis Using GIS C.P. JOHNSON Geomatics Group, C-DAC, Pune University Campus, Pune 411007 [email protected] 1. Introduction The traditional and age-old system of intelligence and
SPATIAL DATA CLASSIFICATION AND DATA MINING
, pp.-40-44. Available online at http://www. bioinfo. in/contents. php?id=42 SPATIAL DATA CLASSIFICATION AND DATA MINING RATHI J.B. * AND PATIL A.D. Department of Computer Science & Engineering, Jawaharlal
Implementation of Data Mining Techniques to Perform Market Analysis
Implementation of Data Mining Techniques to Perform Market Analysis B.Sabitha 1, N.G.Bhuvaneswari Amma 2, G.Annapoorani 3, P.Balasubramanian 4 PG Scholar, Indian Institute of Information Technology, Srirangam,
Enhanced Boosted Trees Technique for Customer Churn Prediction Model
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 03 (March. 2014), V5 PP 41-45 www.iosrjen.org Enhanced Boosted Trees Technique for Customer Churn Prediction
Bisecting K-Means for Clustering Web Log data
Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining
Categorical Data Visualization and Clustering Using Subjective Factors
Categorical Data Visualization and Clustering Using Subjective Factors Chia-Hui Chang and Zhi-Kai Ding Department of Computer Science and Information Engineering, National Central University, Chung-Li,
Data Mining Approaches to Criminal Career Analysis
Data Mining Approaches to Criminal Career Analysis Jeroen S. de Bruin, Tim K. Cocx, Walter A. Kosters, Jeroen F. J. Laros and Joost N. Kok Leiden Institute of Advanced Computer Science (LIACS) Leiden University,
FEATURE SPECIFIC CRIMINAL MAPPING USING DATA MINING TECHNIQUES AND GENERALIZED GAUSSIUN MIXTURE MODEL
FEATURE SPECIFIC CRIMINAL MAPPING USING DATA MINING TECHNIQUES AND GENERALIZED GAUSSIUN MIXTURE MODEL Uttam Mande Y.Srinivas J.V.R.Murthy Dept of CSE Dept of IT Dept of CSE GITAM University GITAM University
Algorithmic Crime Prediction Model Based on the Analysis of Crime Clusters
Global Journal of Computer Science and Technology Volume 11 Issue 11 Version 1.0 July 2011 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN:
Introduction to Data Mining
Introduction to Data Mining Jay Urbain Credits: Nazli Goharian & David Grossman @ IIT Outline Introduction Data Pre-processing Data Mining Algorithms Naïve Bayes Decision Tree Neural Network Association
Data Mining Solutions for the Business Environment
Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania [email protected] Over
TOWARDS SIMPLE, EASY TO UNDERSTAND, AN INTERACTIVE DECISION TREE ALGORITHM
TOWARDS SIMPLE, EASY TO UNDERSTAND, AN INTERACTIVE DECISION TREE ALGORITHM Thanh-Nghi Do College of Information Technology, Cantho University 1 Ly Tu Trong Street, Ninh Kieu District Cantho City, Vietnam
EMPIRICAL STUDY ON SELECTION OF TEAM MEMBERS FOR SOFTWARE PROJECTS DATA MINING APPROACH
EMPIRICAL STUDY ON SELECTION OF TEAM MEMBERS FOR SOFTWARE PROJECTS DATA MINING APPROACH SANGITA GUPTA 1, SUMA. V. 2 1 Jain University, Bangalore 2 Dayanada Sagar Institute, Bangalore, India Abstract- One
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
Prediction of Heart Disease Using Naïve Bayes Algorithm
Prediction of Heart Disease Using Naïve Bayes Algorithm R.Karthiyayini 1, S.Chithaara 2 Assistant Professor, Department of computer Applications, Anna University, BIT campus, Tiruchirapalli, Tamilnadu,
DATA MINING AND EXPERT SYSTEMS IN LAW ENFORCEMENT AGENCIES
DATA MINING AND EXPERT SYSTEMS IN LAW ENFORCEMENT AGENCIES Monica C. Holmes, Central Michigan University, [email protected] Diane D. Comstock-Davidson, Central Michigan University, [email protected]
An intelligent Analysis of a City Crime Data Using Data Mining
2011 International Conference on Information and Electronics Engineering IPCSIT vol.6 (2011) (2011) IACSIT Press, Singapore An intelligent Analysis of a City Crime Data Using Data Mining Malathi. A 1,
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
Applied Mathematical Sciences, Vol. 7, 2013, no. 112, 5591-5597 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.
Applied Mathematical Sciences, Vol. 7, 2013, no. 112, 5591-5597 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.38457 Accuracy Rate of Predictive Models in Credit Screening Anirut Suebsing
Comparison of K-means and Backpropagation Data Mining Algorithms
Comparison of K-means and Backpropagation Data Mining Algorithms Nitu Mathuriya, Dr. Ashish Bansal Abstract Data mining has got more and more mature as a field of basic research in computer science and
Data quality in Accounting Information Systems
Data quality in Accounting Information Systems Comparing Several Data Mining Techniques Erjon Zoto Department of Statistics and Applied Informatics Faculty of Economy, University of Tirana Tirana, Albania
Method of Fault Detection in Cloud Computing Systems
, pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,
Predicting Students Final GPA Using Decision Trees: A Case Study
Predicting Students Final GPA Using Decision Trees: A Case Study Mashael A. Al-Barrak and Muna Al-Razgan Abstract Educational data mining is the process of applying data mining tools and techniques to
Data Mining Governance for Service Oriented Architecture
Data Mining Governance for Service Oriented Architecture Ali Beklen Software Group IBM Turkey Istanbul, TURKEY [email protected] Turgay Tugay Bilgin Dept. of Computer Engineering Maltepe University Istanbul,
Keywords cosine similarity, correlation, standard deviation, page count, Enron dataset
Volume 4, Issue 1, January 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cosine Similarity
Big Data with Rough Set Using Map- Reduce
Big Data with Rough Set Using Map- Reduce Mr.G.Lenin 1, Mr. A. Raj Ganesh 2, Mr. S. Vanarasan 3 Assistant Professor, Department of CSE, Podhigai College of Engineering & Technology, Tirupattur, Tamilnadu,
Analyzing Huge Data Sets in Forensic Investigations
Analyzing Huge Data Sets in Forensic Investigations Kasun De Zoysa Yasantha Hettiarachi Department of Communication and Media Technologies University of Colombo School of Computing Colombo, Sri Lanka Centre
International Journal of Advanced Engineering Research and Applications (IJAERA) ISSN: 2454-2377 Vol. 1, Issue 6, October 2015. Big Data and Hadoop
ISSN: 2454-2377, October 2015 Big Data and Hadoop Simmi Bagga 1 Satinder Kaur 2 1 Assistant Professor, Sant Hira Dass Kanya MahaVidyalaya, Kala Sanghian, Distt Kpt. INDIA E-mail: [email protected]
Data Mining and Knowledge Discovery in Databases (KDD) State of the Art. Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland
Data Mining and Knowledge Discovery in Databases (KDD) State of the Art Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland 1 Conference overview 1. Overview of KDD and data mining 2. Data
DECISION TREE INDUCTION FOR FINANCIAL FRAUD DETECTION USING ENSEMBLE LEARNING TECHNIQUES
DECISION TREE INDUCTION FOR FINANCIAL FRAUD DETECTION USING ENSEMBLE LEARNING TECHNIQUES Vijayalakshmi Mahanra Rao 1, Yashwant Prasad Singh 2 Multimedia University, Cyberjaya, MALAYSIA 1 [email protected]
NATIONAL SECURITY CRITICAL MISSION AREAS AND CASE STUDIES
43 Chapter 4 NATIONAL SECURITY CRITICAL MISSION AREAS AND CASE STUDIES Chapter Overview This chapter provides an overview for the next six chapters. Based on research conducted at the University of Arizona
How To Use Data Mining For Knowledge Management In Technology Enhanced Learning
Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, 2007 115 Data Mining for Knowledge Management in Technology Enhanced Learning
An Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015
An Introduction to Data Mining for Wind Power Management Spring 2015 Big Data World Every minute: Google receives over 4 million search queries Facebook users share almost 2.5 million pieces of content
Smart Security by Predicting Future Crime with GIS and LBS Technology on Mobile Device
Smart Security by Predicting Future Crime with GIS and LBS Technology on Mobile Device Gaurav Kumar 1, P. S. Game 2 1 Pune Institute of Computer Technology, Savitribai Phule Pune University, Pune, India
Extend Table Lens for High-Dimensional Data Visualization and Classification Mining
Extend Table Lens for High-Dimensional Data Visualization and Classification Mining CPSC 533c, Information Visualization Course Project, Term 2 2003 Fengdong Du [email protected] University of British Columbia
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree S.Florence 1, N.G.Bhuvaneswari Amma 2, G.Annapoorani 3, K.Malathi 4 PG Scholar, Indian Institute of Information Technology, Srirangam,
A Secured Approach to Credit Card Fraud Detection Using Hidden Markov Model
A Secured Approach to Credit Card Fraud Detection Using Hidden Markov Model Twinkle Patel, Ms. Ompriya Kale Abstract: - As the usage of credit card has increased the credit card fraud has also increased
ISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
Customer Classification And Prediction Based On Data Mining Technique
Customer Classification And Prediction Based On Data Mining Technique Ms. Neethu Baby 1, Mrs. Priyanka L.T 2 1 M.E CSE, Sri Shakthi Institute of Engineering and Technology, Coimbatore 2 Assistant Professor
Research on Clustering Analysis of Big Data Yuan Yuanming 1, 2, a, Wu Chanle 1, 2
Advanced Engineering Forum Vols. 6-7 (2012) pp 82-87 Online: 2012-09-26 (2012) Trans Tech Publications, Switzerland doi:10.4028/www.scientific.net/aef.6-7.82 Research on Clustering Analysis of Big Data
IJCSES Vol.7 No.4 October 2013 pp.165-168 Serials Publications BEHAVIOR PERDITION VIA MINING SOCIAL DIMENSIONS
IJCSES Vol.7 No.4 October 2013 pp.165-168 Serials Publications BEHAVIOR PERDITION VIA MINING SOCIAL DIMENSIONS V.Sudhakar 1 and G. Draksha 2 Abstract:- Collective behavior refers to the behaviors of individuals
Internet of Things for Smart Crime Detection
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 749-754 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4685 Internet of Things for Smart Crime Detection Jeong-Yong Byun, Aziz
Classification and Prediction
Classification and Prediction Slides for Data Mining: Concepts and Techniques Chapter 7 Jiawei Han and Micheline Kamber Intelligent Database Systems Research Lab School of Computing Science Simon Fraser
Decision Support System For A Customer Relationship Management Case Study
61 Decision Support System For A Customer Relationship Management Case Study Ozge Kart 1, Alp Kut 1, and Vladimir Radevski 2 1 Dokuz Eylul University, Izmir, Turkey {ozge, alp}@cs.deu.edu.tr 2 SEE University,
DATA MINING USING INTEGRATION OF CLUSTERING AND DECISION TREE
DATA MINING USING INTEGRATION OF CLUSTERING AND DECISION TREE 1 K.Murugan, 2 P.Varalakshmi, 3 R.Nandha Kumar, 4 S.Boobalan 1 Teaching Fellow, Department of Computer Technology, Anna University 2 Assistant
Data Mining Framework for Direct Marketing: A Case Study of Bank Marketing
www.ijcsi.org 198 Data Mining Framework for Direct Marketing: A Case Study of Bank Marketing Lilian Sing oei 1 and Jiayang Wang 2 1 School of Information Science and Engineering, Central South University
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE Kasra Madadipouya 1 1 Department of Computing and Science, Asia Pacific University of Technology & Innovation ABSTRACT Today, enormous amount of data
International Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 11, November 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
ANALYSIS OF FEATURE SELECTION WITH CLASSFICATION: BREAST CANCER DATASETS
ANALYSIS OF FEATURE SELECTION WITH CLASSFICATION: BREAST CANCER DATASETS Abstract D.Lavanya * Department of Computer Science, Sri Padmavathi Mahila University Tirupati, Andhra Pradesh, 517501, India [email protected]
ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL
International Journal Of Advanced Technology In Engineering And Science Www.Ijates.Com Volume No 03, Special Issue No. 01, February 2015 ISSN (Online): 2348 7550 ASSOCIATION RULE MINING ON WEB LOGS FOR
An Analysis of Missing Data Treatment Methods and Their Application to Health Care Dataset
P P P Health An Analysis of Missing Data Treatment Methods and Their Application to Health Care Dataset Peng Liu 1, Elia El-Darzi 2, Lei Lei 1, Christos Vasilakis 2, Panagiotis Chountas 2, and Wei Huang
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS Mrs. Jyoti Nawade 1, Dr. Balaji D 2, Mr. Pravin Nawade 3 1 Lecturer, JSPM S Bhivrabai Sawant Polytechnic, Pune (India) 2 Assistant
AnalysisofData MiningClassificationwithDecisiontreeTechnique
Global Journal of omputer Science and Technology Software & Data Engineering Volume 13 Issue 13 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification
Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification Tina R. Patil, Mrs. S. S. Sherekar Sant Gadgebaba Amravati University, Amravati [email protected], [email protected]
Distributed forests for MapReduce-based machine learning
Distributed forests for MapReduce-based machine learning Ryoji Wakayama, Ryuei Murata, Akisato Kimura, Takayoshi Yamashita, Yuji Yamauchi, Hironobu Fujiyoshi Chubu University, Japan. NTT Communication
Social Media Mining. Data Mining Essentials
Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers
Efficient Integration of Data Mining Techniques in Database Management Systems
Efficient Integration of Data Mining Techniques in Database Management Systems Fadila Bentayeb Jérôme Darmont Cédric Udréa ERIC, University of Lyon 2 5 avenue Pierre Mendès-France 69676 Bron Cedex France
An Empirical Study of Application of Data Mining Techniques in Library System
An Empirical Study of Application of Data Mining Techniques in Library System Veepu Uppal Department of Computer Science and Engineering, Manav Rachna College of Engineering, Faridabad, India Gunjan Chindwani
PREDICTIVE ANALYTICS vs HOT SPOTTING
PREDICTIVE ANALYTICS vs HOT SPOTTING A STUDY OF CRIME PREVENTION ACCURACY AND EFFICIENCY 2014 EXECUTIVE SUMMARY For the last 20 years, Hot Spots have become law enforcement s predominant tool for crime
Indirect Positive and Negative Association Rules in Web Usage Mining
Indirect Positive and Negative Association Rules in Web Usage Mining Dhaval Patel Department of Computer Engineering, Dharamsinh Desai University Nadiad, Gujarat, India Malay Bhatt Department of Computer
2.1. Data Mining for Biomedical and DNA data analysis
Applications of Data Mining Simmi Bagga Assistant Professor Sant Hira Dass Kanya Maha Vidyalaya, Kala Sanghian, Distt Kpt, India (Email: [email protected]) Dr. G.N. Singh Department of Physics and
In this presentation, you will be introduced to data mining and the relationship with meaningful use.
In this presentation, you will be introduced to data mining and the relationship with meaningful use. Data mining refers to the art and science of intelligent data analysis. It is the application of machine
How To Solve The Kd Cup 2010 Challenge
A Lightweight Solution to the Educational Data Mining Challenge Kun Liu Yan Xing Faculty of Automation Guangdong University of Technology Guangzhou, 510090, China [email protected] [email protected]
EFFICIENCY OF DECISION TREES IN PREDICTING STUDENT S ACADEMIC PERFORMANCE
EFFICIENCY OF DECISION TREES IN PREDICTING STUDENT S ACADEMIC PERFORMANCE S. Anupama Kumar 1 and Dr. Vijayalakshmi M.N 2 1 Research Scholar, PRIST University, 1 Assistant Professor, Dept of M.C.A. 2 Associate
Impelling Heart Attack Prediction System using Data Mining and Artificial Neural Network
General Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Impelling
A Survey on Association Rule Mining in Market Basket Analysis
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 409-414 International Research Publications House http://www. irphouse.com /ijict.htm A Survey
Associate Professor, Department of CSE, Shri Vishnu Engineering College for Women, Andhra Pradesh, India 2
Volume 6, Issue 3, March 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue
Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration
Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration 1 Harish H G, 2 Dr. R Girisha 1 PG Student, 2 Professor, Department of CSE, PESCE Mandya (An Autonomous Institution under
Data Mining Applications in Higher Education
Executive report Data Mining Applications in Higher Education Jing Luan, PhD Chief Planning and Research Officer, Cabrillo College Founder, Knowledge Discovery Laboratories Table of contents Introduction..............................................................2
DATA MINING TECHNIQUES AND APPLICATIONS
DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,
CRIME MAPPING FROM AN INTELLIGENCE PERSPECTIVE. James Saywell and Peter Bawden Intelligence Analysts State Intelligence Branch South Australia Police
CRIME MAPPING FROM AN INTELLIGENCE PERSPECTIVE James Saywell and Peter Bawden Intelligence Analysts State Intelligence Branch South Australia Police Submitted to the Australian Institute of Criminology
Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392. Research Article. E-commerce recommendation system on cloud computing
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 E-commerce recommendation system on cloud computing
Clustering Technique in Data Mining for Text Documents
Clustering Technique in Data Mining for Text Documents Ms.J.Sathya Priya Assistant Professor Dept Of Information Technology. Velammal Engineering College. Chennai. Ms.S.Priyadharshini Assistant Professor
Feature Selection using Integer and Binary coded Genetic Algorithm to improve the performance of SVM Classifier
Feature Selection using Integer and Binary coded Genetic Algorithm to improve the performance of SVM Classifier D.Nithya a, *, V.Suganya b,1, R.Saranya Irudaya Mary c,1 Abstract - This paper presents,
A UPS Framework for Providing Privacy Protection in Personalized Web Search
A UPS Framework for Providing Privacy Protection in Personalized Web Search V. Sai kumar 1, P.N.V.S. Pavan Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,
Classification On The Clouds Using MapReduce
Classification On The Clouds Using MapReduce Simão Martins Instituto Superior Técnico Lisbon, Portugal [email protected] Cláudia Antunes Instituto Superior Técnico Lisbon, Portugal [email protected]
International Journal of Innovative Research in Computer and Communication Engineering
FP Tree Algorithm and Approaches in Big Data T.Rathika 1, J.Senthil Murugan 2 Assistant Professor, Department of CSE, SRM University, Ramapuram Campus, Chennai, Tamil Nadu,India 1 Assistant Professor,
Prediction of Stock Performance Using Analytical Techniques
136 JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE, VOL. 5, NO. 2, MAY 2013 Prediction of Stock Performance Using Analytical Techniques Carol Hargreaves Institute of Systems Science National University
Manjeet Kaur Bhullar, Kiranbir Kaur Department of CSE, GNDU, Amritsar, Punjab, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Multiple Pheromone
Pentaho Data Mining Last Modified on January 22, 2007
Pentaho Data Mining Copyright 2007 Pentaho Corporation. Redistribution permitted. All trademarks are the property of their respective owners. For the latest information, please visit our web site at www.pentaho.org
Use of Data Mining Techniques to Improve the Effectiveness of Sales and Marketing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 4, April 2015,
Using Data Mining for Mobile Communication Clustering and Characterization
Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer
K-means Clustering Technique on Search Engine Dataset using Data Mining Tool
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 505-510 International Research Publications House http://www. irphouse.com /ijict.htm K-means
ENSEMBLE DECISION TREE CLASSIFIER FOR BREAST CANCER DATA
ENSEMBLE DECISION TREE CLASSIFIER FOR BREAST CANCER DATA D.Lavanya 1 and Dr.K.Usha Rani 2 1 Research Scholar, Department of Computer Science, Sree Padmavathi Mahila Visvavidyalayam, Tirupati, Andhra Pradesh,
SEARCH ENGINE WITH PARALLEL PROCESSING AND INCREMENTAL K-MEANS FOR FAST SEARCH AND RETRIEVAL
SEARCH ENGINE WITH PARALLEL PROCESSING AND INCREMENTAL K-MEANS FOR FAST SEARCH AND RETRIEVAL Krishna Kiran Kattamuri 1 and Rupa Chiramdasu 2 Department of Computer Science Engineering, VVIT, Guntur, India
Dynamic Data in terms of Data Mining Streams
International Journal of Computer Science and Software Engineering Volume 2, Number 1 (2015), pp. 1-6 International Research Publication House http://www.irphouse.com Dynamic Data in terms of Data Mining
An Analysis on Density Based Clustering of Multi Dimensional Spatial Data
An Analysis on Density Based Clustering of Multi Dimensional Spatial Data K. Mumtaz 1 Assistant Professor, Department of MCA Vivekanandha Institute of Information and Management Studies, Tiruchengode,
A Review of Data Mining Techniques
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
COMP3420: Advanced Databases and Data Mining. Classification and prediction: Introduction and Decision Tree Induction
COMP3420: Advanced Databases and Data Mining Classification and prediction: Introduction and Decision Tree Induction Lecture outline Classification versus prediction Classification A two step process Supervised
MISSING DATA IMPUTATION IN CARDIAC DATA SET (SURVIVAL PROGNOSIS)
MISSING DATA IMPUTATION IN CARDIAC DATA SET (SURVIVAL PROGNOSIS) R.KAVITHA KUMAR Department of Computer Science and Engineering Pondicherry Engineering College, Pudhucherry, India DR. R.M.CHADRASEKAR Professor,
