CONCEPTUAL THREE PHASE ITERATIVE MODEL OF KDD
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2012, Vol 2, Issue 1
Abstract
KDD process includes how data is stored and accessed, how andwhat algorithms can apply to large amount of data efficiently,how results can be interpreted and visualized. KDD is theprocess of identifying valid, interesting and understandablepatterns in data. In this paper we will describe conceptual threePhase Iterative Model of KDD. The main layers of this purposedmodel are: Philosophy Layer, Technique Layer and ApplicationLayer. We will also perform the comparison of Tradition KDDModel with Three Phase Iterative Model.
Authors and Affiliations
Simmi Bagga, Dr. G. N. Singh
Enhanced Tiny Encryption Algorithm with Embedding (ETEA)
As computer systems become more pervasive and complex, security is increasingly important. Secure Transmission refers to the transfer of data such as confidential or proprietary information over a secure channel. Many se...
TDMA Scheduling Algorithm Using Independent Sets in Network Graph
Wireless Sensor Networks (WSNs) is a distributed wireless network consists of large amount of sensor nodes which gather useful information from a variety of environment and these sensor nodes communicate with each other...
A CLUSTER ANALYSIS AND DECISION TREE HYBRID APPROACH IN DATA MINING TO DESCRIBING TAX AUDIT
In this research, we use clustering and classification methods to mine the data of tax and extract the information about tax audit by using hybrid algorithms K-MEANS, SOM and HAC algorithms from clustering and CHAID and...
Effect of oral injection of tramadol, sildenafil and combined of tramadol and sildenafil on serum testosterone level for Wistar breed male rats
Introduction:Testosterone is the main sexual hormone in human males, and has a pharmacological effect on the physiology of sexual function. It is known that suppression of testosterone in eugonadal adult males leads to r...
Analysis of MAC Protocol for Reliable Broadcast
In wireless communication It is important to find a reliable broadcasting protocol that is especially designed for an optimum performance of public-safety and data travelling related applications. Using RSU and OBU, ther...