Data mining and warehousing for Temporal Data Objects
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 1
Abstract
Mobility data analysis became a more challenging task because of its huge application in different field of science and other daily applications like service accessibility, mobile marketing and traffic management. Online analytical processing (OLAP) and data mining (DM) techniques can be used to make the huge amount of data in to useful knowledge. The challenges of dealing this data have been studied during the last decade and applying a analytical techniques on such data is also considered. To achieve this and handle the data in efficient way we have considered the complex natured temporal data . In this paper we proposed a framework for Mobility / Temporal Data Warehousing and Mining consist of Knowledge Discovery & Delivery steps. Specifically, Trajectory Data Warehousing techniques and OLAP operations are focused for data extraction and traffic pattern management.
Authors and Affiliations
Kola Surya Prakash
Distributed Hash Table (DHT) Based Clone Detection In WSN’s
Distributed Hash Table (DHT) by which a completely decentralized, key-based caching and checking system is created to catch cloned nodes efficiently. The protocol arrangement on competent storage utilization and emin...
Effective Business Analytics using Prefetching Technique
Nowadays, the Web is a vital resource in conducting business apart from information search and entertainment. Predicting users shopping pattern, finding frequent buyers and popular product identification in the e-co...
Adaptive Contention & Slot Reservation Based MAC protocol
The IEEE 802.16 standard is the basic protocol for data communication in the upstream channel in wireless sensor network. Also the reservation based medium access control MAC protocol is adopted by the IEEE 802.16 st...
A Case study on Run time Load Balancing of Virtual Machines in Cloud Environment
In these days many people using clouds for all their needs, because of robust features and security provided by the cloud computing. Cloud computing must satisfy all the needs of users who scale the resource usage in...
Phishing Detection In Selected Feature Using Modified SVM-PSO
The sensitive information such as passwords, credit card number, account details, email information and credential of the external users robbed by threats such kind of threat is called phishing. So many softwareand t...