首页 > 最新文献

2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering最新文献

英文 中文
Detection of sensitive items in market basket database using association rule mining for privacy preserving 基于关联规则挖掘的市场购物篮数据库敏感商品检测隐私保护
S. Kasthuri, T. Meyyappan
Data mining is an essential technology to extract patterns or knowledge from large repositories of data. Association rules in market basket database represent the shopping behavior of customers. The association information may reveal trade secrets. It must be hidden before publishing. Association rule hiding in privacy preserving data mining hides sensitive rules containing sensitive items. In this paper, a new method is proposed to detect the sensitive items for hiding sensitive association rules. This proposed method finds the frequent item sets and generates the association rules. It employs the concept of representative association rules to detect sensitive items.
数据挖掘是从大型数据存储库中提取模式或知识的基本技术。购物篮数据库中的关联规则代表顾客的购物行为。关联信息可能泄露商业秘密。在发布之前必须隐藏它。保护隐私数据挖掘中的关联规则隐藏隐藏了包含敏感项的敏感规则。本文提出了一种新的敏感项检测方法,用于隐藏敏感关联规则。该方法发现频繁项集并生成关联规则。它采用代表性关联规则的概念来检测敏感项。
{"title":"Detection of sensitive items in market basket database using association rule mining for privacy preserving","authors":"S. Kasthuri, T. Meyyappan","doi":"10.1109/ICPRIME.2013.6496472","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496472","url":null,"abstract":"Data mining is an essential technology to extract patterns or knowledge from large repositories of data. Association rules in market basket database represent the shopping behavior of customers. The association information may reveal trade secrets. It must be hidden before publishing. Association rule hiding in privacy preserving data mining hides sensitive rules containing sensitive items. In this paper, a new method is proposed to detect the sensitive items for hiding sensitive association rules. This proposed method finds the frequent item sets and generates the association rules. It employs the concept of representative association rules to detect sensitive items.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129800168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
An integrated approach to derive effective rules from association rule mining using genetic algorithm 基于遗传算法的关联规则挖掘有效规则的集成方法
M. Kannika Nirai Vaani, E. Ramaraj
Association rule mining is one of the most important and well-researched techniques of data mining, that aims to induce associations among sets of items in transaction databases or other data repositories. Currently Apriori algorithms play a major role in identifying frequent item set and deriving rule sets out of it. But it uses the conjunctive nature of association rules, and the single minimum support factor to generate the effective rules. However the above two factors are alone not adequate to derive useful rules effectively. Hence in the proposed algorithm we have taken Apriori Algorithm as a reference and included disjunctive rules and multiple minimum supports also to capture all possible useful rules. Although few algorithms [4] [5] are dealing the disjunctive rules and multiple minimum supports separately to some extent, the proposed concept is to integrate all into one that lead to a robust algorithm. And the salient feature of our work is introducing Genetic Algorithm (GA) in deriving possible Association Rules from the frequent item set in an optimized manner. Besides we have taken one more add-on factor `Lift Ratio' which is to validate the generated Association rules are strong enough to infer useful information. Hence this new approach aims to put together the above points to generate an efficient algorithm with appropriate modification in Apriori Algorithm so that to offer interesting/useful rules in an effective and optimized manner with the help of Genetic Algorithm.
关联规则挖掘是数据挖掘中最重要和研究最充分的技术之一,旨在诱导事务数据库或其他数据存储库中的项目集之间的关联。目前,Apriori算法在识别频繁项集并从中导出规则集方面发挥着重要作用。它利用关联规则的合取性,利用单个最小支持因子生成有效规则。然而,仅凭上述两个因素不足以有效地推导出有用的规则。因此,在本文提出的算法中,我们以Apriori算法为参考,并加入析取规则和多个最小支持来捕获所有可能的有用规则。虽然很少有算法[4][5]在一定程度上分别处理析取规则和多个最小支持,但所提出的概念是将它们整合为一个,从而产生一个鲁棒算法。本文工作的显著特点是引入遗传算法,以优化的方式从频繁项集中推导出可能的关联规则。此外,我们还采用了一个附加因素“升力比”,这是为了验证生成的关联规则是否足够强大,可以推断出有用的信息。因此,这种新方法旨在将上述几点结合起来,在Apriori算法的基础上进行适当的修改,生成一种高效的算法,从而在遗传算法的帮助下以有效和优化的方式提供有趣/有用的规则。
{"title":"An integrated approach to derive effective rules from association rule mining using genetic algorithm","authors":"M. Kannika Nirai Vaani, E. Ramaraj","doi":"10.1109/ICPRIME.2013.6496453","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496453","url":null,"abstract":"Association rule mining is one of the most important and well-researched techniques of data mining, that aims to induce associations among sets of items in transaction databases or other data repositories. Currently Apriori algorithms play a major role in identifying frequent item set and deriving rule sets out of it. But it uses the conjunctive nature of association rules, and the single minimum support factor to generate the effective rules. However the above two factors are alone not adequate to derive useful rules effectively. Hence in the proposed algorithm we have taken Apriori Algorithm as a reference and included disjunctive rules and multiple minimum supports also to capture all possible useful rules. Although few algorithms [4] [5] are dealing the disjunctive rules and multiple minimum supports separately to some extent, the proposed concept is to integrate all into one that lead to a robust algorithm. And the salient feature of our work is introducing Genetic Algorithm (GA) in deriving possible Association Rules from the frequent item set in an optimized manner. Besides we have taken one more add-on factor `Lift Ratio' which is to validate the generated Association rules are strong enough to infer useful information. Hence this new approach aims to put together the above points to generate an efficient algorithm with appropriate modification in Apriori Algorithm so that to offer interesting/useful rules in an effective and optimized manner with the help of Genetic Algorithm.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116578116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Refined search enable (RSE) TCAM design used in network routing table 精细化搜索使能(RSE) TCAM设计用于网络路由表
K. Mathan, T. Ravichandran
This paper presents a low-power ternary content adressable memory (TCAM) design, in which we propose refined search enable (RSE scheme that aims to reduce the TCAM power dissipated in the search-line (SL) switching activity. By exploiting the vertically continuous “don't-care” feature, the DCG scheme can effectively reduce the average SL power consumption per switch. The refined search enables (RSE) technique to eliminate the unnecessary SL switching activity in the quiet pattern. By reducing both the SL switching activity and the average switching power, the proposed design can minimize the TCAM SL power consumption. For a 128 32 TCAM, the best configuration we examined shows that when the gating granularity is 16, with a 1.3% search performance improvement, The RSE technique can achieve 72% 79% SL energy reduction.
本文提出了一种低功耗三元内容可寻址存储器(TCAM)设计,其中我们提出了改进的搜索使能(RSE)方案,旨在降低TCAM在搜索线(SL)切换活动中的功耗。通过利用垂直连续的“不关心”特性,DCG方案可以有效地降低每台交换机的平均SL功耗。精细化的搜索使(RSE)技术能够在安静模式中消除不必要的SL切换活动。通过降低SL开关活动和平均开关功率,所提出的设计可以最小化TCAM SL功耗。对于12832 TCAM,我们测试的最佳配置表明,当门控粒度为16时,搜索性能提高1.3%,RSE技术可以实现72% 79%的SL能量降低。
{"title":"Refined search enable (RSE) TCAM design used in network routing table","authors":"K. Mathan, T. Ravichandran","doi":"10.1109/ICPRIME.2013.6496512","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496512","url":null,"abstract":"This paper presents a low-power ternary content adressable memory (TCAM) design, in which we propose refined search enable (RSE scheme that aims to reduce the TCAM power dissipated in the search-line (SL) switching activity. By exploiting the vertically continuous “don't-care” feature, the DCG scheme can effectively reduce the average SL power consumption per switch. The refined search enables (RSE) technique to eliminate the unnecessary SL switching activity in the quiet pattern. By reducing both the SL switching activity and the average switching power, the proposed design can minimize the TCAM SL power consumption. For a 128 32 TCAM, the best configuration we examined shows that when the gating granularity is 16, with a 1.3% search performance improvement, The RSE technique can achieve 72% 79% SL energy reduction.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131381441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A prevailing judicial package for clustering and sorting information extraction 一个流行的司法包聚类和排序信息提取
V. Annapoorani, A. Vijaya
Spontaneous sorting clock hoop around two significant concepts of sorting and summarizing data. While sorting is the primary concern of this tool, summarization is its secondary concern. As its name itself signifies, the primary concern sorting, the tool sorts the data simultaneously into various groups based on the title. It constructs an index in a clockwise manner, which makes it simpler and easier for the researches in searching for the required data. Since, the sorting is done in clock-based form, where the starting point collides with the ending point; likewise the earliest data meets the rearmost. So, the data search is performed in both forward and backward directions which in turn doubles up the speed of the same process done only in the forward direction.
自发排序时钟围绕着两个重要的概念:排序和汇总数据。排序是该工具的主要关注点,摘要是次要关注点。正如其名称本身所表示的,主要关注排序,该工具根据标题将数据同时分类到不同的组中。它按顺时针方向构建索引,使研究人员更容易查找所需的数据。因为,排序是以基于时钟的形式完成的,其中起点与终点发生冲突;同样,最早的数据满足最晚的。因此,在向前和向后两个方向上都执行数据搜索,这反过来又使仅在向前方向上完成的相同过程的速度增加了一倍。
{"title":"A prevailing judicial package for clustering and sorting information extraction","authors":"V. Annapoorani, A. Vijaya","doi":"10.1109/ICPRIME.2013.6496480","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496480","url":null,"abstract":"Spontaneous sorting clock hoop around two significant concepts of sorting and summarizing data. While sorting is the primary concern of this tool, summarization is its secondary concern. As its name itself signifies, the primary concern sorting, the tool sorts the data simultaneously into various groups based on the title. It constructs an index in a clockwise manner, which makes it simpler and easier for the researches in searching for the required data. Since, the sorting is done in clock-based form, where the starting point collides with the ending point; likewise the earliest data meets the rearmost. So, the data search is performed in both forward and backward directions which in turn doubles up the speed of the same process done only in the forward direction.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132517798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An analysis of supervised tree based classifiers for intrusion detection system 入侵检测系统中基于监督树的分类器分析
Sumaiya Thaseen, C. Kumar
Due to increase in intrusion incidents over internet, many network intrusion detection systems are developed to prevent network attacks. Data mining, pattern recognition and classification methods are used to classify network events as a normal or anomalous one. This paper is aimed at evaluating different tree based classification algorithms that classify network events in intrusion detection systems. Experiments are conducted on NSL-KDD 99 dataset. Dimensionality of the attribute of the dataset is reduced. The results show that RandomTree model holds the highest degree of accuracy and reduced false alarm rate. RandomTree model is evaluated with other leading intrusion detection models to determine its better predictive accuracy.
随着网络入侵事件的不断增多,人们开发了许多网络入侵检测系统来防止网络攻击。使用数据挖掘、模式识别和分类方法对网络事件进行正常和异常分类。本文旨在评估入侵检测系统中不同的基于树的网络事件分类算法。实验在NSL-KDD 99数据集上进行。对数据集的属性进行降维处理。结果表明,随机树模型具有最高的准确率和较低的虚警率。随机树模型与其他主流入侵检测模型进行了比较,以确定其更好的预测精度。
{"title":"An analysis of supervised tree based classifiers for intrusion detection system","authors":"Sumaiya Thaseen, C. Kumar","doi":"10.1109/ICPRIME.2013.6496489","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496489","url":null,"abstract":"Due to increase in intrusion incidents over internet, many network intrusion detection systems are developed to prevent network attacks. Data mining, pattern recognition and classification methods are used to classify network events as a normal or anomalous one. This paper is aimed at evaluating different tree based classification algorithms that classify network events in intrusion detection systems. Experiments are conducted on NSL-KDD 99 dataset. Dimensionality of the attribute of the dataset is reduced. The results show that RandomTree model holds the highest degree of accuracy and reduced false alarm rate. RandomTree model is evaluated with other leading intrusion detection models to determine its better predictive accuracy.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133279659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 107
Simulation and analysis of RTS/CTS DoS attack variants in 802.11 networks 802.11网络中RTS/CTS DoS攻击变体的仿真与分析
P. Nagarjun, V. A. Kumar, C. Kumar, A. Ravi
Denial-of-Service attacks (DoS) have become a widespread problem on the Internet. These attacks are easy to execute. Low rate attacks are relatively new variants of DoS attacks. Low rate DoS attacks are difficult to detect since attacker sends attack stream with low volume and the countermeasures used to handle the high rate DoS attacks are not suitable for these types of attacks. RTS/CTS attack is one type of Low rate DoS attack. In this paper, we analyze RTS/CTS attack which exploits the medium reservation mechanism of 802.11 networks through duration field. We propose variants of RTS/CTS attacks in wireless networks. We simulate the attacks behaviour in ns2 simulation environment to demonstrate the attack feasibility as well as potential negative impact of these attacks on 802.11 based networks. We have created an application that has the capability to create test bed environment for the attacks, perform RTS/CTS attacks and generate suitable graphs to analyze the attack's behaviour. We also briefly discuss possible ways of detecting and mitigating such Low rate DoS attacks in wireless networks.
拒绝服务攻击(DoS)已经成为互联网上一个普遍存在的问题。这些攻击很容易执行。低速率攻击是DoS攻击相对较新的变种。低速率DoS攻击由于攻击者发送的攻击流容量小,难以被检测到,而对付高速率DoS攻击的对策也不适合这种类型的攻击。RTS/CTS攻击是低速率DoS攻击的一种。本文通过持续时间字段分析了利用802.11网络介质保留机制的RTS/CTS攻击。我们提出了无线网络中RTS/CTS攻击的变体。我们在ns2模拟环境中模拟攻击行为,以证明攻击的可行性以及这些攻击对基于802.11的网络的潜在负面影响。我们已经创建了一个应用程序,它有能力为攻击创建测试平台环境,执行RTS/CTS攻击,并生成合适的图形来分析攻击的行为。我们还简要讨论了在无线网络中检测和减轻这种低速率DoS攻击的可能方法。
{"title":"Simulation and analysis of RTS/CTS DoS attack variants in 802.11 networks","authors":"P. Nagarjun, V. A. Kumar, C. Kumar, A. Ravi","doi":"10.1109/ICPRIME.2013.6496483","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496483","url":null,"abstract":"Denial-of-Service attacks (DoS) have become a widespread problem on the Internet. These attacks are easy to execute. Low rate attacks are relatively new variants of DoS attacks. Low rate DoS attacks are difficult to detect since attacker sends attack stream with low volume and the countermeasures used to handle the high rate DoS attacks are not suitable for these types of attacks. RTS/CTS attack is one type of Low rate DoS attack. In this paper, we analyze RTS/CTS attack which exploits the medium reservation mechanism of 802.11 networks through duration field. We propose variants of RTS/CTS attacks in wireless networks. We simulate the attacks behaviour in ns2 simulation environment to demonstrate the attack feasibility as well as potential negative impact of these attacks on 802.11 based networks. We have created an application that has the capability to create test bed environment for the attacks, perform RTS/CTS attacks and generate suitable graphs to analyze the attack's behaviour. We also briefly discuss possible ways of detecting and mitigating such Low rate DoS attacks in wireless networks.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133830364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Web 2.0 social bookmark selection for tag clustering 用于标记聚类的Web 2.0社交书签选择
S. S. Kumar, H. Inbarani
Tagging is a popular way to annotate web 2.0 web sites. A tag is any user-generated word or phrase that helps to organize web 2.0 content. The current hype around web 2.0 applications, poses several important challenges for future data and web mining methods. An important challenge of Web 2.0 is the fact that a large amount of data has been generated over a short period. Clustering the tag data is very tedious since the tag space is very large in several social book marking web sites. So, instead of clustering the whole tag space of Web 2.0 data, some tags frequent enough in the tag space can be selected for clustering by applying feature selection techniques. The goal of feature selection is to determine a marginal bookmarked URL subset from a Web 2.0 data while retaining a suitably high accuracy in representing the original bookmarks. Tag clustering is the process of grouping similar tags into the same cluster and is important for the success of collaborative tagging services. In this paper, Unsupervised Quick Reduct feature selection algorithm is applied to find a set of most commonly tagged bookmarks and then clustering techniques such as Soft rough fuzzy clustering and Rough K-Means algorithms are applied for clustering of user generated tags and the performance of these clustering approaches are illustrated in this paper.
标记是注释web 2.0网站的一种流行方法。标签是任何用户生成的有助于组织web 2.0内容的单词或短语。当前围绕web 2.0应用程序的炒作,对未来的数据和web挖掘方法提出了几个重要的挑战。Web 2.0的一个重要挑战是在短时间内生成了大量数据。在一些社会化书签网站中,由于标签空间非常大,因此标签数据聚类是非常繁琐的。因此,不必对Web 2.0数据的整个标记空间进行聚类,而是可以通过应用特征选择技术选择标记空间中足够频繁的一些标记进行聚类。特性选择的目标是从Web 2.0数据中确定边缘书签URL子集,同时在表示原始书签方面保持适当的高精度。标签聚类是将相似的标签分组到同一集群中的过程,对于协作标记服务的成功至关重要。本文采用无监督快速约简特征选择算法寻找一组最常标记的书签,然后采用软粗糙模糊聚类和粗糙K-Means算法等聚类技术对用户生成的标签进行聚类,并对这些聚类方法的性能进行了说明。
{"title":"Web 2.0 social bookmark selection for tag clustering","authors":"S. S. Kumar, H. Inbarani","doi":"10.1109/ICPRIME.2013.6496724","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496724","url":null,"abstract":"Tagging is a popular way to annotate web 2.0 web sites. A tag is any user-generated word or phrase that helps to organize web 2.0 content. The current hype around web 2.0 applications, poses several important challenges for future data and web mining methods. An important challenge of Web 2.0 is the fact that a large amount of data has been generated over a short period. Clustering the tag data is very tedious since the tag space is very large in several social book marking web sites. So, instead of clustering the whole tag space of Web 2.0 data, some tags frequent enough in the tag space can be selected for clustering by applying feature selection techniques. The goal of feature selection is to determine a marginal bookmarked URL subset from a Web 2.0 data while retaining a suitably high accuracy in representing the original bookmarks. Tag clustering is the process of grouping similar tags into the same cluster and is important for the success of collaborative tagging services. In this paper, Unsupervised Quick Reduct feature selection algorithm is applied to find a set of most commonly tagged bookmarks and then clustering techniques such as Soft rough fuzzy clustering and Rough K-Means algorithms are applied for clustering of user generated tags and the performance of these clustering approaches are illustrated in this paper.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133738504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Extracting knowledge using probabilistic classifier for text mining 基于概率分类器的文本挖掘知识提取
S. Subbaiah
Text mining is a process of extracting knowledge from large text documents. A new probabilistic classifier for text mining is proposed in this paper. It uses ODP taxonomy and domain ontology and datasets to cluster and identify the category of the given text document. The proposed work has three steps, namely, preprocessing, rule generation and probability calculation. At the stage of preprocessing the input document is split into paragraphs and statements. In rule generation, the documents from the training set are read. In probability calculation, positive and negative weight factor is calculated. The proposed algorithm calculates the positive probability value and negative probability value for each term set or pattern identified from the document. Based on the calculated probability value the probabilistic classifier indexes the document to the concern group of the cluster.
文本挖掘是一种从大型文本文档中提取知识的过程。提出了一种新的用于文本挖掘的概率分类器。它使用ODP分类法、领域本体和数据集对给定文本文档进行聚类和分类。本文的工作分为预处理、规则生成和概率计算三个步骤。在预处理阶段,输入文档被分成段落和语句。在规则生成中,从训练集中读取文档。在概率计算中,计算正负权因子。所提出的算法计算从文档中识别的每个术语集或模式的正概率值和负概率值。根据计算出的概率值,概率分类器将文档索引到聚类的关注组中。
{"title":"Extracting knowledge using probabilistic classifier for text mining","authors":"S. Subbaiah","doi":"10.1109/ICPRIME.2013.6496517","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496517","url":null,"abstract":"Text mining is a process of extracting knowledge from large text documents. A new probabilistic classifier for text mining is proposed in this paper. It uses ODP taxonomy and domain ontology and datasets to cluster and identify the category of the given text document. The proposed work has three steps, namely, preprocessing, rule generation and probability calculation. At the stage of preprocessing the input document is split into paragraphs and statements. In rule generation, the documents from the training set are read. In probability calculation, positive and negative weight factor is calculated. The proposed algorithm calculates the positive probability value and negative probability value for each term set or pattern identified from the document. Based on the calculated probability value the probabilistic classifier indexes the document to the concern group of the cluster.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127093417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A reconfigurable on-chip multichannel data acquisition and processing (DAQP) system for multichannel signal processing 用于多通道信号处理的可重构片上多通道数据采集和处理(DAQP)系统
S. Velmurugan, C. Rajasekaran
The data acquisition and processing architecture covers the most demanding applications in continuous patient monitoring for chronic diseases in medical field. The multichannel data acquisition is essential for acquiring and monitoring the various biomedical signals from biomedical sensors or signals from industrial sensors. The problem is that the data storage and hardware size, so the multichannel data obtained is processed at runtime and stored in an external storage for future reference. The method of implementing the proposed design is the system on-chip via field programmable gate array (SoC-FPGA) to reduce the hardware size and for memory size. The Soc-FPGA attains high resolution and real time processing of data acquisition and signal processing. A four channel data acquisition and processing (DAQP) was designed, developed using the Lab VIEW graphical programming. NI DAQ and NI FPGA module is used to test and implement the design for real time. The module was designed inorder to provide high accuracy, storage and portability.
数据采集和处理体系结构涵盖了医疗领域中对慢性病患者持续监测要求最高的应用。多通道数据采集对于采集和监测来自生物医学传感器或工业传感器的各种生物医学信号至关重要。问题在于数据存储和硬件大小,因此获得的多通道数据在运行时处理并存储在外部存储器中以供将来参考。该设计的实现方法是通过现场可编程门阵列(SoC-FPGA)实现片上系统,以减小硬件尺寸和内存大小。该Soc-FPGA实现了数据采集和信号处理的高分辨率和实时性。设计了一个四通道数据采集与处理系统(DAQP),并利用Lab VIEW图形化编程进行了开发。采用NI DAQ和NI FPGA模块对设计进行实时测试和实现。该模块的设计是为了提供高精度,存储和便携性。
{"title":"A reconfigurable on-chip multichannel data acquisition and processing (DAQP) system for multichannel signal processing","authors":"S. Velmurugan, C. Rajasekaran","doi":"10.1109/ICPRIME.2013.6496456","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496456","url":null,"abstract":"The data acquisition and processing architecture covers the most demanding applications in continuous patient monitoring for chronic diseases in medical field. The multichannel data acquisition is essential for acquiring and monitoring the various biomedical signals from biomedical sensors or signals from industrial sensors. The problem is that the data storage and hardware size, so the multichannel data obtained is processed at runtime and stored in an external storage for future reference. The method of implementing the proposed design is the system on-chip via field programmable gate array (SoC-FPGA) to reduce the hardware size and for memory size. The Soc-FPGA attains high resolution and real time processing of data acquisition and signal processing. A four channel data acquisition and processing (DAQP) was designed, developed using the Lab VIEW graphical programming. NI DAQ and NI FPGA module is used to test and implement the design for real time. The module was designed inorder to provide high accuracy, storage and portability.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133438511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An ubiquitous domain Driven Data Mining approach for performance monitoring in virtual organizations using 360 Degree data mining & opinion mining 一种无处不在的领域驱动数据挖掘方法,用于使用360度数据挖掘和意见挖掘在虚拟组织中进行性能监控
V. Suriyakumari, A. V. Kathiravan
Performance evaluation in virtual organizations is one of the most important issues that have been considered due to the transition from industrial age to knowledge era. Virtual organizations, as one of the challenges of third millennium, which came to existence for enhancing organization's performance through outsourcing, are not excluding. A virtual organization and its smaller variant, the virtual team, is an organizational network that is structured and managed to function as an identifiable and complete organization. Determining what meanings virtual team members attach to performance evaluation system in IT Companies is a vital precursor to understand the effectiveness of the management practice, rendering this study a preliminary investigation. The literature confirms that perceptions of management practices in IT Industries can influence employee loyalty and role-related behaviors. Perceptions of unfairness can be more detrimental for geographically distributed workers in MNCs than for collocated teams. Although businesses continue to drive demands for virtual organizations, most contemporary studies of performance evaluation system are limited to traditional organizational settings. An interpretive, phenomenological domain Driven Data Mining (D3M) approach utilizing 360 Degree data mining for objective measurement and opinion mining for subjective measurement enabled a hermeneutic analysis process. The main objective of this research is to investigate the main factors that affect the performance of employees in virtual organization especially IT Companies and to show how these factors can be used for performance evaluation in virtual organization. Based on the review of literature, this study provides a unified domain Driven Data Mining (d3m) approach for evaluating data intelligence, domain intelligence, human intelligence, network intelligence, social intelligence, and meta synthesis of ubiquitous intelligence for performance appraisal in virtual organizations like IT Industries. This study examined opinion mining of virtual team members as subjective measure for their performance evaluation system. A phenomenological approach using support vector machine was used to Meta synthesize as ubiquitous intelligence. This D3M approach gives a valuable insight into the performance of employees in virtual organization and can give a useful help to practitioners to evaluate the performance of employees in virtual organizations.
虚拟组织的绩效评价是随着工业时代向知识时代的过渡而受到重视的重要问题之一。虚拟组织作为第三个千年的挑战之一,是为了通过外包来提高组织绩效而出现的。虚拟组织及其较小的变体,即虚拟团队,是一个组织网络,其结构和管理使其作为一个可识别的完整组织发挥作用。确定虚拟团队成员对IT公司绩效评估系统的意义是了解管理实践有效性的重要前提,使本研究成为初步调查。文献证实了IT行业管理实践的感知可以影响员工忠诚度和角色相关行为。对于跨国公司中地理位置分散的员工来说,不公平的感觉可能比分布在同一地点的团队更有害。虽然企业不断推动虚拟组织的需求,但大多数当代绩效评估系统的研究仅限于传统的组织设置。一种解释性、现象学领域驱动的数据挖掘(D3M)方法利用360度数据挖掘进行客观测量,意见挖掘进行主观测量,从而实现了解释性分析过程。本研究的主要目的是调查影响虚拟组织特别是IT公司员工绩效的主要因素,并展示如何将这些因素用于虚拟组织中的绩效评估。本研究在文献综述的基础上,为IT行业等虚拟组织的绩效评估提供了一种统一的领域驱动数据挖掘(d3m)方法,用于评估数据智能、领域智能、人类智能、网络智能、社会智能和泛在智能的元合成。本研究将虚拟团队成员的意见挖掘作为其绩效评估系统的主观衡量标准。采用支持向量机现象学方法对泛在智能进行元合成。这种D3M方法对虚拟组织中的员工绩效提供了有价值的洞察,可以为从业者评估虚拟组织中的员工绩效提供有用的帮助。
{"title":"An ubiquitous domain Driven Data Mining approach for performance monitoring in virtual organizations using 360 Degree data mining & opinion mining","authors":"V. Suriyakumari, A. V. Kathiravan","doi":"10.1109/ICPRIME.2013.6496491","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496491","url":null,"abstract":"Performance evaluation in virtual organizations is one of the most important issues that have been considered due to the transition from industrial age to knowledge era. Virtual organizations, as one of the challenges of third millennium, which came to existence for enhancing organization's performance through outsourcing, are not excluding. A virtual organization and its smaller variant, the virtual team, is an organizational network that is structured and managed to function as an identifiable and complete organization. Determining what meanings virtual team members attach to performance evaluation system in IT Companies is a vital precursor to understand the effectiveness of the management practice, rendering this study a preliminary investigation. The literature confirms that perceptions of management practices in IT Industries can influence employee loyalty and role-related behaviors. Perceptions of unfairness can be more detrimental for geographically distributed workers in MNCs than for collocated teams. Although businesses continue to drive demands for virtual organizations, most contemporary studies of performance evaluation system are limited to traditional organizational settings. An interpretive, phenomenological domain Driven Data Mining (D3M) approach utilizing 360 Degree data mining for objective measurement and opinion mining for subjective measurement enabled a hermeneutic analysis process. The main objective of this research is to investigate the main factors that affect the performance of employees in virtual organization especially IT Companies and to show how these factors can be used for performance evaluation in virtual organization. Based on the review of literature, this study provides a unified domain Driven Data Mining (d3m) approach for evaluating data intelligence, domain intelligence, human intelligence, network intelligence, social intelligence, and meta synthesis of ubiquitous intelligence for performance appraisal in virtual organizations like IT Industries. This study examined opinion mining of virtual team members as subjective measure for their performance evaluation system. A phenomenological approach using support vector machine was used to Meta synthesize as ubiquitous intelligence. This D3M approach gives a valuable insight into the performance of employees in virtual organization and can give a useful help to practitioners to evaluate the performance of employees in virtual organizations.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115659268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1