A Comprehensive Study of Data Mining and Application
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 1
Abstract
Data mining refers to extracting or ―mining‖ knowledge from large amounts of data. Data mining involves an integration of techniques from multiple disciplines such as database technology, statistics, machine learning, high performance computing, pattern recognition, neural networks, data visualization, information retrieval, image and signal processing, and spatial data analysis. Data mining applications can use a variety of parameters to examine the data. They include association, sequence or path analysis, classification, clustering and forecasting. An application compared to other data analysis applications such as structured queries or statistical analysis software. Illustration of the data mining application that offer opportunities for research. The overall goal of the data mining process is to extract information from a data set and transform it into an understandable structure for further use. In this paper present a comprehensive study for data mining, models, issue, and focuses its application.
Authors and Affiliations
Dheeraj Agrawal
BER AND SIMULATION OF OFDM MODULATOR AND DEMODULATOR FOR WIRELESS BROADBAND APPLICATIONS
With the rapid growth of digital wireless communication in recent years, the need for high speed mobile data transmission has increased. New modulation techniques are being implemented to keep up with the desired more...
Computer Assisted Testing and Evaluation System: Distance Evaluation Using Mobile Agent Technology
The growth of Internet has led to new avenues for distance education. A crucial factor for the success of distance education is effective mechanisms for distance evaluation (DE). Existing Internet evaluation mechanisms,...
DESIGN AND PERFORMANCE ANALYSIS OF RING OSCILLATORS
DESIGN AND PERFORMANCE ANALYSIS OF RING OSCILLATORS
End to End Delay Improvement Using Multipath Routing in MANET
Congestion and the loss of energy is the most common problem in the Ad hoc network. A considerable amount of energy is consumed in wireless interfaces. On the other hand the actual available bandwidth varies due to...
A Scalable Privacy-Preserving Verification Correctness Protocol to Identify Corrupted Data in Cloud Storage
Cloud computing prevails over the whole world which makes the mankind to rely more on a number of online storage systems to back up data or for using it in real time which gives an anywhere, anytime access. Thus lot o...