DATA MINING ANALYSIS FOR NATIONAL SECURITY
Journal Title: International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR) - Year 2017, Vol 7, Issue 3
Abstract
This work takes a view on different data mining and geospatial modeling analysis in the identification process study. The structure and working principle are reviewed alongside recent development in Biometric process. Data mining is a technique that enables registration of citizen from childbirth to the age of 18 upward, while keeping tract with the physical appearance of the child plus his historical background. A database comprises of densely interconnected computer processors working simultaneously (in parallel). A key feature of neural networks is that they are programmed to 'learn' by sifting data repeatedly, looking for relationships to build mathematical models, and automatically correcting these models to refine them continuously.
Authors and Affiliations
R. E. OKONIGENE, M. J. E. EVBOGHAI, GUIAWA MATHURINE
Database Migration Analysis for Data Assurance Using D2Loader
Data migration process can take place in different forms such as moving data, application or business elements from an organization's onsite computer to the cloud, vice-versa or between two cloud environments. There are...
An Application of Artificial Intelligence with Vector Quantization for Image Compression
This paper uses two compression techniques on an image, namely, Vector Quantization (VQ) and Feed Forward Neural Network (FFNN). VQ is used along with K-Mean clustering to initiate the centroids and form the codebook. Th...
FAIZ UL HAQUE ZEYA, RAO ABDUL RAFAY, MUHAMMAD USMAN MALIK
Finding a medicine can sometimes become a real headache and can sometimes cost a lot of time which is really not very efficient in the current age of technology. The Tabhouse is an online web based project. The Tabhouse...
AN EFFICIENT RESOURCE SCHEDULING ALGORITHM USING KNAPSACK
Grid computing is utilized in variety of computational areas now-a-days. It is the next generation of distributed computing. In grid computing, we try to integrate many heterogonous, geographically distributed computing...
An Energy Efficient Cluster Formation Protocol for Multi-Hop Wireless Sensor Networks Using Fuzzy Logic
Life time performance/enhancement plays always a vital role as most of the WSN’s operate in the unwanted environment where people can’t access and monitor the things in practically. Clustering is one of the very flexible...