Granular Computing for Data Mining
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 5
Abstract
Granular computing is a rising computing worldview of data handling. It concerns the handling of complex data substances called data granules, which emerge during the time spent information reflection and induction of learning from data or information. Granular computing, as a rising examination field, gives a calculated structure to concentrate many issues in information mining. This paper inspects some of those issues, including information and learning portrayal and preparing. It is exhibited that one of the crucial errands of information digging is hunting down the correct level of granularity in information and learning portrayal.
Authors and Affiliations
K. Siva Prasad Reddy, D. Mahendra Reddy
Enhanced authentication based security using TDES and MD5
For secure authentication over the internet and secure data transfer purposed using cryptography technique which provide high security. Encryption of an image, audio encryption, chaos based encryption contain various ap...
Evaluating the Chemical Stabilization of Soil Pavement and Its Molecular Spectra
In India, the increment in populace combined with substantially loaded heaps of vehicles passing on heavier stresses focuses particularly on roads running in clayey soil zones which make critical issues for pavements an...
A Research on Big Data Mining with Hadoop F/W and It’s Echo Systems
Nowadays, most of the information saved in companies are unstructured model. In fact, Big data is term refer to huge data sets, have high Velocity, high Volume and high Variety and complex. Due to characteristic of big...
slugRole of Knowledge Management in Modern Libraries
The academic Libraries are now focusing to deliver the information in the digital form through web, Online Public Access Catalogue via Internet. The development of Institutional repository by innovations of information...
Secured Login Authentication on Key Attackers
An innovative solution is proposed to avoid the problem such as password security at application layer. For password security all lower case characters, upper case characters, special characters and digits in password c...