Data Mining Clustering Techniques
Journal Title: Engineering and Scientific International Journal - Year 2016, Vol 3, Issue 2
Abstract
— Data mining is a powerful technology to extract information from the large amount of the data. Data mining is considered as one of the important field in knowledge management. Today, Data mining helps different organization focus on the data they collected based on the attitude of their customer‘s. For the past few years, research in data mining continues in various fields of organization and research such as Statistics, Artificial Intelligence, Pattern Recognition, Machine Learning, Business, Education, Scientific etc. This paper discuss the various concepts of data mining and its techniques.
Authors and Affiliations
RoopRekha R
Improving Iris Performance using Segmentation with CASIA Database
We can recognize humans each other according to their numerous characteristics of age. Identity verification (authentication) in computer systems has been traditionally based on something like password, key, card, pin an...
Molecular interaction of various transition metals with aqueous solutions at different temperature
The viscosities and densities of various transition metals CuSO4.5H2O, MnSO4.H2O, NiCl2.6H2O, CoCl2.6H2O and ZnSo4.7H2O in aqueous medium have been calculated at different temperature like 303K, 306K, 309K, 312K and 315K...
Resource Allocation of Efficient Energy in OFDM Systems using Distributed Antennas
We develop an energy-efficient resourceallocation scheme with proportional fairness for downlink multiuser orthogonal frequency-division multiplexing (OFDM) systems with distributed antennas. Our aim is to maximize energ...
Cloud Virtualization : An Overview
Cloud computing is one of today's most exciting technology because of its cost-reducing, flexibility, and scalability. With the fast growing of cloud computing technology, Data security becomes more and more important in...
Online Proffering Approach with Secure Manner using Scrambled Technique
This paper proposes the secured cloud proffering with scrambled technique and uses the Hardware Security Module (temporary storage) to store automatic generating keys for encryption, decryption, and authentication which...