Identification and Evaluation of Functional Dependency Analysis using Rough sets for Knowledge Discovery
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2010, Vol 1, Issue 5
Abstract
The process of data acquisition gained momentum due to the efficient representation of storage/retrieving systems. Due to the commercial and application value of these stored data, Database Management has become essential for the reasons like consistency and atomicity in giving birth to DBMS. The existing database management systems cannot provide the needed information when the data is not consistent. So knowledge discovery in databases and data mining has become popular for the above reasons. The non-trivial future expansion process can be classified as Knowledge Discovery. Knowledge Discovery process can be attempted by clustering tools. One of the upcoming tools for knowledge representation and knowledge acquisition process is based on the concept of Rough Sets. This paper explores inconsistencies in the existing databases by finding the functional dependencies extracting the required information or knowledge based on rough sets. It also discusses attribute reduction through core and reducts which helps in avoiding superfluous data. Here a method is suggested to solve this problem of data inconsistency based medical domain with a analysis.
Authors and Affiliations
Y. V. Sreevani, , Prof. T. , Venkat Narayana Rao
Graph-based Semi-Supervised Regression and Its Extensions
In this paper we present a graph-based semi-supervised method for solving regression problem. In our method, we first build an adjacent graph on all labeled and unlabeled data, and then incorporate the graph prior with t...
A Survey on using Neural Network based Algorithms for Hand Written Digit Recognition
The detection and recognition of handwritten content is the process of converting non-intelligent information such as images into machine edit-able text. This research domain has become an active research area due to vas...
Detecting Distributed Denial of Service Attacks Using Data Mining Techniques
Users and organizations find it continuously challenging to deal with distributed denial of service (DDoS) attacks. . The security engineer works to keep a service available at all times by dealing with intruder attacks....
Clustering: Applied to Data Structuring and Retrieval
Clustering is a very useful scheme for data structuring and retrieval behuhcause it can handle large volumes of multi-dimensional data and employs a very fast algorithm. Other forms of data structuring techniques include...
Towards Improving the Quality of Present MAC Protocols for LECIM Systems
Wireless networking system is quickly growing in the field of communication technology due to its usefulness and huge applications. To make the system more effective to the users its lower energy consumption, security, r...