CLUSTERED SPATIAL DATA MINING ASSOCIATION RULE TO EXPLORE LARGE VOLUMES OF RURAL CRIME
Journal Title: International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com - Year 2012, Vol 12, Issue 3
Abstract
In this paper which interest to integrate a large volume of data sets into useful information by adopting a various information techniques in the latest technology in world. The method approaches of Single variate Association Rule for Area to Crime based on the knowledge discovery techniques such as, clustering and association-rule mining. Data mining provides a clear finding to prevent from crime with associated to another crime occurrence with the naked observation on correlation between one crime to another crime. This tool is an autonomous pattern detector to reveal plausible cause-effect associations between layers of point and area data. We present TATA algorithm with an exploratory analysis for the effectively explore geo-referenced data. We hope this will lead to new approaches in the exploration of large volumes of spatio-temporal data in crime model.
Authors and Affiliations
Thangavelu A , Sathyaraj S. R , Syed Firdose , Krishnakeerthi Ch , Balasubramanian S
Recognition of Expressions on Human Face using AI Techniques
Facial expressions convey non-verbal cues, which play an important role in interpersonal relations. Facial expressions recognition technology helps in designing an intelligent human computer interfaces. This paper discus...
Collection of Data in Secure Way in Wireless Sensor Networks
Wireless Sensor Networks make it possible to send secure data from source to destination. If applied to network monitoring data on a host, they can used to detect compromised node and denial-of-service is two key attacks...
A Survey on Protocols & Attacks in MANET Routing
A mobile ad hoc network (MANET) is a dynamic wireless network that can be formed without any pre-existing infrastructure in which each node can act as a router. MANET has no clear line of defense, so, it is accessible to...
“A STUDY ON SECURE SHELL (SSH) PROTOCOL”
Secure Shell (SSH) provides an open protocol for securing network communications that is less complex and expensive than hardware-based VPN solutions. Secure Shell client/server solutions provide command shell, file tran...
COMPATIBLE SERVICE RETRIEVAL USING IMPROVED SIMILARITY MEASURE
Now-a-days retrieving suitable services become a prominent need for the user. However available service retrieving mechanism uses the compatible similarity between the services so that user can get likely homogeneous ser...