安全统一的流数据模式挖掘模型

Sreenivasa Rao Annaluri, Venkata Ramana Attili, Kalli Srinivasa Nageswara Prasad
{"title":"安全统一的流数据模式挖掘模型","authors":"Sreenivasa Rao Annaluri, Venkata Ramana Attili, Kalli Srinivasa Nageswara Prasad","doi":"10.1504/IJICS.2021.113170","DOIUrl":null,"url":null,"abstract":"The intimidating challenge is practice of data mining (DM) over the streams of data because of its continuous data streaming. On the data streams, the practices of mining should be performed on cluster of streamed records in specified interval of time. The representation of window is the buffered records set which might be dynamic or static in the size. When compared with other practices of mining, the 'frequent pattern mining' on the streams of data are crucial. This occurs because, for predicting the pattern frequency, many of the existing methods repeatedly scan entire buffered transactions. This denotes the intricacy of procedure and overhead of memory. This paper proposes novel DM algorithms in particular for identifying the frequent patterns from indefinite data streams which scans every window once, therefore windows buffered records is pruned that evades computational and memory overhead. 'Unifold mining model for pattern discovery from streaming data' is the contribution of this paper. The outperformance of UMM when compared with other contemporary models is represented by crucial assessment of algorithm and optimisation schemes.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure and unifold mining model for pattern discovery from streaming data\",\"authors\":\"Sreenivasa Rao Annaluri, Venkata Ramana Attili, Kalli Srinivasa Nageswara Prasad\",\"doi\":\"10.1504/IJICS.2021.113170\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The intimidating challenge is practice of data mining (DM) over the streams of data because of its continuous data streaming. On the data streams, the practices of mining should be performed on cluster of streamed records in specified interval of time. The representation of window is the buffered records set which might be dynamic or static in the size. When compared with other practices of mining, the 'frequent pattern mining' on the streams of data are crucial. This occurs because, for predicting the pattern frequency, many of the existing methods repeatedly scan entire buffered transactions. This denotes the intricacy of procedure and overhead of memory. This paper proposes novel DM algorithms in particular for identifying the frequent patterns from indefinite data streams which scans every window once, therefore windows buffered records is pruned that evades computational and memory overhead. 'Unifold mining model for pattern discovery from streaming data' is the contribution of this paper. The outperformance of UMM when compared with other contemporary models is represented by crucial assessment of algorithm and optimisation schemes.\",\"PeriodicalId\":164016,\"journal\":{\"name\":\"Int. J. Inf. Comput. Secur.\",\"volume\":\"43 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-02-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Int. J. Inf. Comput. Secur.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/IJICS.2021.113170\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Inf. Comput. Secur.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJICS.2021.113170","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

令人生畏的挑战是数据流上的数据挖掘(DM)实践,因为它是连续的数据流。在数据流上,挖掘实践应在指定的时间间隔内对流记录集群进行挖掘。窗口的表示形式是缓冲记录集,其大小可以是动态的,也可以是静态的。与其他挖掘实践相比,数据流上的“频繁模式挖掘”至关重要。这是因为,为了预测模式频率,许多现有方法重复扫描整个缓冲事务。这表示过程的复杂性和内存的开销。本文提出了一种新的DM算法,特别用于从不确定的数据流中识别频繁模式,该算法扫描每个窗口一次,因此窗口缓冲记录被修剪,从而避免了计算和内存开销。“从流数据中发现模式的统一挖掘模型”是本文的贡献。与其他当代模型相比,UMM的优异表现体现在对算法和优化方案的关键评估上。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Secure and unifold mining model for pattern discovery from streaming data
The intimidating challenge is practice of data mining (DM) over the streams of data because of its continuous data streaming. On the data streams, the practices of mining should be performed on cluster of streamed records in specified interval of time. The representation of window is the buffered records set which might be dynamic or static in the size. When compared with other practices of mining, the 'frequent pattern mining' on the streams of data are crucial. This occurs because, for predicting the pattern frequency, many of the existing methods repeatedly scan entire buffered transactions. This denotes the intricacy of procedure and overhead of memory. This paper proposes novel DM algorithms in particular for identifying the frequent patterns from indefinite data streams which scans every window once, therefore windows buffered records is pruned that evades computational and memory overhead. 'Unifold mining model for pattern discovery from streaming data' is the contribution of this paper. The outperformance of UMM when compared with other contemporary models is represented by crucial assessment of algorithm and optimisation schemes.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Vulnerability discovery modelling: a general framework Modelling and visualising SSH brute force attack behaviours through a hybrid learning framework Empirical risk assessment of attack graphs using time to compromise framework Fault-based testing for discovering SQL injection vulnerabilities in web applications Leveraging Intel SGX to enable trusted and privacy preserving membership service in distributed ledgers
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1