首页 > 最新文献

2014 International Conference on Data Mining and Intelligent Computing (ICDMIC)最新文献

英文 中文
Fuse sort algorithm a proposal of divide & conquer based sorting approach with O(nloglogn) time and linear space complexity 融合排序算法是一种分而治之的排序方法,具有0 (nloglog)的时间复杂度和线性空间复杂度
Pub Date : 2014-11-13 DOI: 10.1109/ICDMIC.2014.6954240
Yashwant Singh Patel, N. Singh, Lalit Kumar Vashishtha
Computational Complexity is a fundamental research area in the field of computer science. It has attracted lots of interest of various researchers. In past, vast number of sorting algorithms has been proposed by various researchers. To efficiently optimize any sorting problem having large number of elements requires O(nlogn) time in average case by existing sorting techniques. This paper presents a new sorting technique based on divide & conquer approach, named as Fuse sort algorithm, an approach of comparison based sorting with O(nloglogn) time and linear space. The priory and mathematical analysis of proposed sorting algorithm is given and a case study with merge sort is performed based on several factors.
计算复杂性是计算机科学领域的一个基础研究领域。它引起了许多研究者的兴趣。过去,各种研究人员提出了大量的排序算法。要有效地优化任何具有大量元素的排序问题,现有的排序技术平均需要O(nlogn)时间。本文提出了一种基于分治法的新的排序技术,称为融合排序算法,这是一种在0 (nloglog)时间和线性空间上基于比较的排序方法。对所提出的排序算法进行了先验分析和数学分析,并以合并排序为例进行了考虑多种因素的分析。
{"title":"Fuse sort algorithm a proposal of divide & conquer based sorting approach with O(nloglogn) time and linear space complexity","authors":"Yashwant Singh Patel, N. Singh, Lalit Kumar Vashishtha","doi":"10.1109/ICDMIC.2014.6954240","DOIUrl":"https://doi.org/10.1109/ICDMIC.2014.6954240","url":null,"abstract":"Computational Complexity is a fundamental research area in the field of computer science. It has attracted lots of interest of various researchers. In past, vast number of sorting algorithms has been proposed by various researchers. To efficiently optimize any sorting problem having large number of elements requires O(nlogn) time in average case by existing sorting techniques. This paper presents a new sorting technique based on divide & conquer approach, named as Fuse sort algorithm, an approach of comparison based sorting with O(nloglogn) time and linear space. The priory and mathematical analysis of proposed sorting algorithm is given and a case study with merge sort is performed based on several factors.","PeriodicalId":138199,"journal":{"name":"2014 International Conference on Data Mining and Intelligent Computing (ICDMIC)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125916434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Path planning for unmanned aerial vehicle based on genetic algorithm & artificial neural network in 3D 基于遗传算法和人工神经网络的无人机三维路径规划
Pub Date : 2014-11-13 DOI: 10.1109/ICDMIC.2014.6954257
S Aditya Gautam, N. Verma
The planning of path for Unmanned Aerial Vehicle (UAV) is always considered to be a vital task. Path planning for UAV for avoiding the obstacle in its path can be accomplished by finding the solution for an optimization problem. Genetic Algorithm which is a global optimization tool can be of great use to solve the optimization problem for path planning of UAV. Artificial Neural Network (ANN) works well for function fitting quickly and can be used to approximate almost any function. The Genetic Algorithms are good at converging to the globally optimum solution generation by generation. Each generation is expected to be better than its previous generation. Neural Networks work faster than Genetic Algorithms for finding the solution to a given problem but may get converged to local optimum instead of global optimum. In this paper a new method for path planning for UAV to avoid obstacle coming in its path based on the combination of Genetic Algorithms and Artificial Neural Networks has been proposed in which the output generated from the Genetic Algorithms is used to train the network of Artificial Neural Networks. The model for path planning is based on 3D digital map.
无人机的路径规划一直被认为是一项至关重要的任务。无人机避障路径规划可以通过寻找优化问题的解来实现。遗传算法作为一种全局优化工具,可以很好地解决无人机路径规划的优化问题。人工神经网络(ANN)具有快速拟合函数的优点,几乎可以逼近任何函数。遗传算法具有逐代收敛到全局最优解的优点。每一代人都被期望比上一代更好。神经网络在寻找给定问题的解时比遗传算法更快,但可能会收敛到局部最优而不是全局最优。本文提出了一种基于遗传算法和人工神经网络相结合的无人机避障路径规划新方法,利用遗传算法产生的输出对人工神经网络进行训练。路径规划模型基于三维数字地图。
{"title":"Path planning for unmanned aerial vehicle based on genetic algorithm & artificial neural network in 3D","authors":"S Aditya Gautam, N. Verma","doi":"10.1109/ICDMIC.2014.6954257","DOIUrl":"https://doi.org/10.1109/ICDMIC.2014.6954257","url":null,"abstract":"The planning of path for Unmanned Aerial Vehicle (UAV) is always considered to be a vital task. Path planning for UAV for avoiding the obstacle in its path can be accomplished by finding the solution for an optimization problem. Genetic Algorithm which is a global optimization tool can be of great use to solve the optimization problem for path planning of UAV. Artificial Neural Network (ANN) works well for function fitting quickly and can be used to approximate almost any function. The Genetic Algorithms are good at converging to the globally optimum solution generation by generation. Each generation is expected to be better than its previous generation. Neural Networks work faster than Genetic Algorithms for finding the solution to a given problem but may get converged to local optimum instead of global optimum. In this paper a new method for path planning for UAV to avoid obstacle coming in its path based on the combination of Genetic Algorithms and Artificial Neural Networks has been proposed in which the output generated from the Genetic Algorithms is used to train the network of Artificial Neural Networks. The model for path planning is based on 3D digital map.","PeriodicalId":138199,"journal":{"name":"2014 International Conference on Data Mining and Intelligent Computing (ICDMIC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116416375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
An effective way to achieve excellence in research based learning using association rules 一种利用关联规则实现研究型学习的有效方法
Pub Date : 2014-11-13 DOI: 10.1109/ICDMIC.2014.6954226
Tribikram Pradhan, S. R. Mishra, V. K. Jain
Now-a-days the storage of a huge amount of data is very easy due to use of modern technologies, but the useful information that remains inside that storage media is unknown to us. The data mining provides us different techniques and rules that can be used to analyze and extract unknown rules, hidden patterns and associations from the previously stored data. Data mining technology is well implemented in the field of marketing, finance but not so familiar in education field. In this paper we are applying Apriori algorithm to find the hidden interest of a student, while selecting a subject from a group of elective subjects, the system will suggest some elective subjects according to student's interest, and the research paper related to that subjects or domain. The implemented Association rules and algorithms guide the students in an effective way to achieve excellence in their research based learning.
如今,由于现代技术的使用,存储大量数据非常容易,但存储介质中保留的有用信息对我们来说是未知的。数据挖掘为我们提供了不同的技术和规则,可用于从先前存储的数据中分析和提取未知规则、隐藏模式和关联。数据挖掘技术在市场营销、金融等领域得到了很好的应用,但在教育领域还不太熟悉。在本文中,我们使用Apriori算法来发现学生的隐藏兴趣,当从一组选修科目中选择一个科目时,系统会根据学生的兴趣推荐一些选修科目,以及与该科目或领域相关的研究论文。所实施的关联规则和算法有效地指导学生在研究性学习中取得卓越成就。
{"title":"An effective way to achieve excellence in research based learning using association rules","authors":"Tribikram Pradhan, S. R. Mishra, V. K. Jain","doi":"10.1109/ICDMIC.2014.6954226","DOIUrl":"https://doi.org/10.1109/ICDMIC.2014.6954226","url":null,"abstract":"Now-a-days the storage of a huge amount of data is very easy due to use of modern technologies, but the useful information that remains inside that storage media is unknown to us. The data mining provides us different techniques and rules that can be used to analyze and extract unknown rules, hidden patterns and associations from the previously stored data. Data mining technology is well implemented in the field of marketing, finance but not so familiar in education field. In this paper we are applying Apriori algorithm to find the hidden interest of a student, while selecting a subject from a group of elective subjects, the system will suggest some elective subjects according to student's interest, and the research paper related to that subjects or domain. The implemented Association rules and algorithms guide the students in an effective way to achieve excellence in their research based learning.","PeriodicalId":138199,"journal":{"name":"2014 International Conference on Data Mining and Intelligent Computing (ICDMIC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124389609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Iris recognition system for smart environments 用于智能环境的虹膜识别系统
Pub Date : 2014-11-13 DOI: 10.1109/ICDMIC.2014.6954247
K. Gupta, Rashmi Gupta
Iris recognition is one of the most powerful techniques for biometric identification. The requirement for smart environments is to acquire multiple iris codes from the same eye and evaluate which bits are the most consistent bits in the iris code. When the acquired images are noisy, the inconsistent bits in the iris code should be masked to improve performance. This paper thoroughly investigates the use of multiple training samples for enrollment. Based on this, an enhanced iris recognition approach is proposed for the smart environments employing the fusion of a set of iris images of a given eye using the most consistent feature data. The algorithm reduces the database size and accelerates the matching process. The Chinese Academy of Sciences - Institute of Automation (CASIA) database is used to simulate the studies. The comparison of probe to multiple gallery samples in the proposed approach has been shown to improve the performance of the system compared to the existing Daugman algorithm.
虹膜识别是生物识别技术中最强大的技术之一。智能环境的要求是从同一只眼睛获取多个虹膜码,并评估哪些位是虹膜码中最一致的位。当采集到的图像有噪声时,应对虹膜编码中不一致的位进行掩码,以提高性能。本文深入研究了使用多个训练样本进行登记。在此基础上,提出了一种针对智能环境的增强虹膜识别方法,该方法使用最一致的特征数据融合给定眼睛的一组虹膜图像。该算法减小了数据库的大小,加快了匹配过程。采用中国科学院自动化研究所(CASIA)数据库进行仿真研究。与现有的道格曼算法相比,所提出的方法中探头与多个画廊样本的比较表明,系统的性能得到了改善。
{"title":"Iris recognition system for smart environments","authors":"K. Gupta, Rashmi Gupta","doi":"10.1109/ICDMIC.2014.6954247","DOIUrl":"https://doi.org/10.1109/ICDMIC.2014.6954247","url":null,"abstract":"Iris recognition is one of the most powerful techniques for biometric identification. The requirement for smart environments is to acquire multiple iris codes from the same eye and evaluate which bits are the most consistent bits in the iris code. When the acquired images are noisy, the inconsistent bits in the iris code should be masked to improve performance. This paper thoroughly investigates the use of multiple training samples for enrollment. Based on this, an enhanced iris recognition approach is proposed for the smart environments employing the fusion of a set of iris images of a given eye using the most consistent feature data. The algorithm reduces the database size and accelerates the matching process. The Chinese Academy of Sciences - Institute of Automation (CASIA) database is used to simulate the studies. The comparison of probe to multiple gallery samples in the proposed approach has been shown to improve the performance of the system compared to the existing Daugman algorithm.","PeriodicalId":138199,"journal":{"name":"2014 International Conference on Data Mining and Intelligent Computing (ICDMIC)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124124865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Classification and interpretation of characters in multi-application OCR system 多用途OCR系统中字符的分类与解释
Pub Date : 2014-11-13 DOI: 10.1109/ICDMIC.2014.6954231
Anubha Jain, Jaya Sharma
A great deal of computer vision research and study is dedicated to the systems designed to detect and analyze computer printed documents and human written text. Optical Character Recognition (OCR) refers to the process of converting images of hand-written, typewritten, or printed text into a format understood by machines for the purpose of editing, indexing/searching, and a reduction in storage size. In this paper we have combined the functionality of Optical Character Recognition and have focused on its applications like Image Sudoku Solver, Car License Plate Detection and Recognition, Handwritten and Computer Printed Documents Recognition. This paper develops a user friendly application for performing image to text conversion. The developed system is organized as a set of modules, each dedicated to a specific application. Car License Plate Detection and Recognition system extracts out the License plate accurately and produce an effective recognition of the characters in the License Plate. With the proposed methodology, we have been able to achieve results with 96% accuracy for the tested images. Image Sudoku Solver is intended to work with Sudoku Puzzle images by extracting out the numbers, boundaries from them and then solving the puzzle. In this we are able to extract, recognize and solve around 98% of Sudoku Puzzles being tested for the purpose. Online Handwriting Recognition accomplishes the real time recognition of user's Handwriting from a Mouse or a Laptop Touchpad.
大量的计算机视觉研究致力于检测和分析计算机打印文件和人类书面文本的系统。光学字符识别(OCR)是指将手写、打字或打印文本的图像转换成机器可以理解的格式,以进行编辑、索引/检索和减少存储大小的过程。本文结合光学字符识别的功能,重点介绍了光学字符识别在图像数独求解器、汽车牌照检测与识别、手写和计算机打印文件识别等方面的应用。本文开发了一个用户友好的应用程序来执行图像到文本的转换。开发的系统被组织为一组模块,每个模块专门用于特定的应用程序。汽车车牌检测识别系统准确地提取出车牌,并对车牌中的字符进行有效的识别。使用所提出的方法,我们已经能够达到测试图像96%准确率的结果。Image Sudoku Solver旨在通过从图像中提取数字,边界然后解决谜题来处理数独谜题图像。在这种情况下,我们能够提取、识别并解决98%的数独谜题。在线手写识别实现了实时识别用户的笔迹从鼠标或笔记本电脑的触摸板。
{"title":"Classification and interpretation of characters in multi-application OCR system","authors":"Anubha Jain, Jaya Sharma","doi":"10.1109/ICDMIC.2014.6954231","DOIUrl":"https://doi.org/10.1109/ICDMIC.2014.6954231","url":null,"abstract":"A great deal of computer vision research and study is dedicated to the systems designed to detect and analyze computer printed documents and human written text. Optical Character Recognition (OCR) refers to the process of converting images of hand-written, typewritten, or printed text into a format understood by machines for the purpose of editing, indexing/searching, and a reduction in storage size. In this paper we have combined the functionality of Optical Character Recognition and have focused on its applications like Image Sudoku Solver, Car License Plate Detection and Recognition, Handwritten and Computer Printed Documents Recognition. This paper develops a user friendly application for performing image to text conversion. The developed system is organized as a set of modules, each dedicated to a specific application. Car License Plate Detection and Recognition system extracts out the License plate accurately and produce an effective recognition of the characters in the License Plate. With the proposed methodology, we have been able to achieve results with 96% accuracy for the tested images. Image Sudoku Solver is intended to work with Sudoku Puzzle images by extracting out the numbers, boundaries from them and then solving the puzzle. In this we are able to extract, recognize and solve around 98% of Sudoku Puzzles being tested for the purpose. Online Handwriting Recognition accomplishes the real time recognition of user's Handwriting from a Mouse or a Laptop Touchpad.","PeriodicalId":138199,"journal":{"name":"2014 International Conference on Data Mining and Intelligent Computing (ICDMIC)","volume":"17 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130981452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Knowledge discovery of weighted RFM sequential patterns with multi time interval from customer sequence database 客户序列数据库中多时间间隔加权RFM序列模式的知识发现
Pub Date : 2014-11-13 DOI: 10.1109/ICDMIC.2014.6954250
Chandni Naik, A. Kharwar, Mukesh Patel
Sequential pattern mining is helpful methodology to discover customer purchasing behaviour from large sequence database. Sequential pattern mining can be used in medical records, marketing, sales analysis, and web log analysis and so on. The traditional sequential pattern mining does not give the pattern which is recent and profitable. So, RFM-based sequential pattern mining techniques is introduced. Although RFM-based sequential pattern mining gives buying patterns which are recently active and profitable however it does not give the time interval between each and every items. To discover a time interval, RFM-TI algorithm is proposed. The advantages of considering multi time interval is, from that we are able to realize what customer would possibly buy in next “h” step rather than next step. The experimental evaluation shows that the proposed method can discover more valuable patterns than RFM-based sequential pattern mining.
序列模式挖掘是一种从大型序列数据库中发现顾客购买行为的有效方法。顺序模式挖掘可用于医疗记录、市场营销、销售分析和web日志分析等。传统的顺序模式挖掘不能给出最近的、有利可图的模式。因此,引入了基于rfm的顺序模式挖掘技术。尽管基于rfm的顺序模式挖掘给出了最近活跃且有利可图的购买模式,但它并没有给出每个项目之间的时间间隔。为了发现时间间隔,提出了RFM-TI算法。考虑多时间间隔的好处是,我们可以从中了解客户在下一个“h”步而不是下一个步骤可能购买什么。实验结果表明,与基于rfm的序列模式挖掘相比,该方法能发现更多有价值的模式。
{"title":"Knowledge discovery of weighted RFM sequential patterns with multi time interval from customer sequence database","authors":"Chandni Naik, A. Kharwar, Mukesh Patel","doi":"10.1109/ICDMIC.2014.6954250","DOIUrl":"https://doi.org/10.1109/ICDMIC.2014.6954250","url":null,"abstract":"Sequential pattern mining is helpful methodology to discover customer purchasing behaviour from large sequence database. Sequential pattern mining can be used in medical records, marketing, sales analysis, and web log analysis and so on. The traditional sequential pattern mining does not give the pattern which is recent and profitable. So, RFM-based sequential pattern mining techniques is introduced. Although RFM-based sequential pattern mining gives buying patterns which are recently active and profitable however it does not give the time interval between each and every items. To discover a time interval, RFM-TI algorithm is proposed. The advantages of considering multi time interval is, from that we are able to realize what customer would possibly buy in next “h” step rather than next step. The experimental evaluation shows that the proposed method can discover more valuable patterns than RFM-based sequential pattern mining.","PeriodicalId":138199,"journal":{"name":"2014 International Conference on Data Mining and Intelligent Computing (ICDMIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130203335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
NER for Hindi language using association rules NER表示使用关联规则的印地语
Pub Date : 2014-11-13 DOI: 10.1109/ICDMIC.2014.6954253
Arti Jain, Divakar Yadav, Dev Tayal
In this paper, we propose a state-of-art association rule mining algorithm for Hindi NER. Association rules are one of the key components of the data mining. Mined rules are of - TYPE 1, TYPE 2 and Type 3 i.e. dictionary, bi-gram and feature rules respectively. We consider corpus of news articles (100 training and 50 test sets) from leading Hindi newspapers. Hindi NER shows significant increase in performance when TYPE 2 rules are combined with TYPE 1 or with TYPE 3.
在本文中,我们提出了一种最先进的印地语NER关联规则挖掘算法。关联规则是数据挖掘的关键组成部分之一。挖掘的规则类型为- TYPE 1、TYPE 2和TYPE 3,即字典规则、双图规则和特征规则。我们考虑来自主要印地语报纸的新闻文章语料库(100个训练集和50个测试集)。当类型2规则与类型1或类型3相结合时,印地语NER表现出显著的性能提高。
{"title":"NER for Hindi language using association rules","authors":"Arti Jain, Divakar Yadav, Dev Tayal","doi":"10.1109/ICDMIC.2014.6954253","DOIUrl":"https://doi.org/10.1109/ICDMIC.2014.6954253","url":null,"abstract":"In this paper, we propose a state-of-art association rule mining algorithm for Hindi NER. Association rules are one of the key components of the data mining. Mined rules are of - TYPE 1, TYPE 2 and Type 3 i.e. dictionary, bi-gram and feature rules respectively. We consider corpus of news articles (100 training and 50 test sets) from leading Hindi newspapers. Hindi NER shows significant increase in performance when TYPE 2 rules are combined with TYPE 1 or with TYPE 3.","PeriodicalId":138199,"journal":{"name":"2014 International Conference on Data Mining and Intelligent Computing (ICDMIC)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121816606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Generalized fuzzy c-means with spatial information for clustering of remote sensing images 基于空间信息的广义模糊c均值遥感图像聚类
Pub Date : 2014-11-13 DOI: 10.1109/ICDMIC.2014.6954242
Prem Shankar Singh Aydav, S. Minz
Fuzzy c-means clustering technique has been popularly used for remote sensing image data classification. However as per the studies the classical fuzzy c-means clustering algorithm has been able to achieve less accuracy due to spatial relationship existence and multi class existence in remotely sensed images. Remote sensing images contain large number of classes but the probability of a pixel belonging to some classes may be low. Traditional fuzzy c-means algorithm considers all classes simultaneously during clustering process. In this paper generalized fuzzy c-means has been applied in exploring k nearest neighbors approach out of c cluster centers. Spatial information has been also integrated with generalized fuzzy c-means technique. The experimental results show that the generalized fuzzy c-means technique with spatial information yields better results than traditional fuzzy c-means technique.
模糊c均值聚类技术已广泛应用于遥感影像数据分类。但研究表明,传统的模糊c均值聚类算法由于遥感图像存在空间关系和多类存在,精度较低。遥感图像包含大量的类,但一个像素属于某些类的概率可能很低。传统的模糊c均值算法在聚类过程中同时考虑所有类。本文将广义模糊c均值应用于从c个聚类中心出发探索k个最近邻方法。空间信息也与广义模糊c均值技术相结合。实验结果表明,具有空间信息的广义模糊c-均值技术比传统模糊c-均值技术具有更好的效果。
{"title":"Generalized fuzzy c-means with spatial information for clustering of remote sensing images","authors":"Prem Shankar Singh Aydav, S. Minz","doi":"10.1109/ICDMIC.2014.6954242","DOIUrl":"https://doi.org/10.1109/ICDMIC.2014.6954242","url":null,"abstract":"Fuzzy c-means clustering technique has been popularly used for remote sensing image data classification. However as per the studies the classical fuzzy c-means clustering algorithm has been able to achieve less accuracy due to spatial relationship existence and multi class existence in remotely sensed images. Remote sensing images contain large number of classes but the probability of a pixel belonging to some classes may be low. Traditional fuzzy c-means algorithm considers all classes simultaneously during clustering process. In this paper generalized fuzzy c-means has been applied in exploring k nearest neighbors approach out of c cluster centers. Spatial information has been also integrated with generalized fuzzy c-means technique. The experimental results show that the generalized fuzzy c-means technique with spatial information yields better results than traditional fuzzy c-means technique.","PeriodicalId":138199,"journal":{"name":"2014 International Conference on Data Mining and Intelligent Computing (ICDMIC)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131420498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
NUYA: An encrypted mechanism for securing cloud data from data mining attacks NUYA:保护云数据免受数据挖掘攻击的加密机制
Pub Date : 2014-11-13 DOI: 10.1109/ICDMIC.2014.6954254
N. Singh, Yashwant Singh Patel, Utpalendu Das, Ananya Chatterjee
Cloud Computing is a vast infrastructural and rising pool, which provides huge storage of data in one sphere. Organizations, now a days are in the marathon of equipping the whole system in a cloud form. The attackers evaluating data for a long time to extract the valued information to perform data mining based attacks on the cloud. In the recent architectures the data is sited in a single or distributed cloud provider. It gives the opportunity to the cloud providers and attackers to unauthorized access from cloud and also gives the chance to analyze the client data for a long time to extract the sensitive information, which is responsible for the privacy violation of clients. This paper proposes an approach that firstly maintains the confidentiality, integrity, and authentication for the stored data in cloud. Secondly, it presents distributed storage cloud architecture, which includes the description of trusted computing work group (TCG) and trusted platform module (TPM). It provides hardware authentication for trustworthy computing platform and also uses Kerberos authentication to avoid software attacks. This proposed approach establishes file locality by clustering the related data based on their physical distance and effective matching with client applications. It supports efficient clustering and reduces communication cost in large-scale cloud computing applications.
云计算是一个巨大的基础设施和不断上升的池,它在一个领域提供了巨大的数据存储。组织,现在每天都在以云的形式装备整个系统。攻击者对数据进行长时间的评估,从中提取有价值的信息,在云上进行基于数据挖掘的攻击。在最近的体系结构中,数据位于单个或分布式云提供商中。它为云提供商和攻击者提供了从云进行未经授权访问的机会,也为长期分析客户端数据提取敏感信息提供了机会,这对客户端的隐私侵犯负有责任。本文提出了一种首先维护云存储数据的机密性、完整性和身份验证的方法。其次,提出了分布式存储云架构,包括可信计算工作组(TCG)和可信平台模块(TPM)的描述;它为可信计算平台提供硬件认证,并使用Kerberos认证来避免软件攻击。该方法基于物理距离对相关数据进行聚类,并与客户端应用程序进行有效匹配,从而确定文件的局部性。在大规模云计算应用中,支持高效集群,降低通信成本。
{"title":"NUYA: An encrypted mechanism for securing cloud data from data mining attacks","authors":"N. Singh, Yashwant Singh Patel, Utpalendu Das, Ananya Chatterjee","doi":"10.1109/ICDMIC.2014.6954254","DOIUrl":"https://doi.org/10.1109/ICDMIC.2014.6954254","url":null,"abstract":"Cloud Computing is a vast infrastructural and rising pool, which provides huge storage of data in one sphere. Organizations, now a days are in the marathon of equipping the whole system in a cloud form. The attackers evaluating data for a long time to extract the valued information to perform data mining based attacks on the cloud. In the recent architectures the data is sited in a single or distributed cloud provider. It gives the opportunity to the cloud providers and attackers to unauthorized access from cloud and also gives the chance to analyze the client data for a long time to extract the sensitive information, which is responsible for the privacy violation of clients. This paper proposes an approach that firstly maintains the confidentiality, integrity, and authentication for the stored data in cloud. Secondly, it presents distributed storage cloud architecture, which includes the description of trusted computing work group (TCG) and trusted platform module (TPM). It provides hardware authentication for trustworthy computing platform and also uses Kerberos authentication to avoid software attacks. This proposed approach establishes file locality by clustering the related data based on their physical distance and effective matching with client applications. It supports efficient clustering and reduces communication cost in large-scale cloud computing applications.","PeriodicalId":138199,"journal":{"name":"2014 International Conference on Data Mining and Intelligent Computing (ICDMIC)","volume":"282 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116083428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Systemic Lupus Erythematosus manifestation using ID3 algorithm - A clinical analysis 系统性红斑狼疮的ID3算法临床分析
Pub Date : 2014-11-13 DOI: 10.1109/ICDMIC.2014.6954265
S. Gomathi, V. Narayani
Discovering hidden patterns in medical data and relationship between them is often fallow. Classification technique in data mining is used to discover the hidden knowledge from enormous data. This work is done on predicting the risk of Systemic Lupus Erythematosus (SLE)/ Lupus using data mining classification technique. Decision tree algorithm is used for training set of data. A new proposed framework and an enhanced algorithm is proposed. The classification algorithm is used to reduce the complexity and to increase the performance.
发现医疗数据中的隐藏模式以及它们之间的关系往往是不重要的。数据挖掘中的分类技术用于从海量数据中发现隐藏的知识。本研究利用数据挖掘分类技术预测系统性红斑狼疮(SLE)/狼疮的风险。采用决策树算法对数据集进行训练。提出了一种新的框架和改进算法。采用分类算法来降低复杂度,提高性能。
{"title":"Systemic Lupus Erythematosus manifestation using ID3 algorithm - A clinical analysis","authors":"S. Gomathi, V. Narayani","doi":"10.1109/ICDMIC.2014.6954265","DOIUrl":"https://doi.org/10.1109/ICDMIC.2014.6954265","url":null,"abstract":"Discovering hidden patterns in medical data and relationship between them is often fallow. Classification technique in data mining is used to discover the hidden knowledge from enormous data. This work is done on predicting the risk of Systemic Lupus Erythematosus (SLE)/ Lupus using data mining classification technique. Decision tree algorithm is used for training set of data. A new proposed framework and an enhanced algorithm is proposed. The classification algorithm is used to reduce the complexity and to increase the performance.","PeriodicalId":138199,"journal":{"name":"2014 International Conference on Data Mining and Intelligent Computing (ICDMIC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124071490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2014 International Conference on Data Mining and Intelligent Computing (ICDMIC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1