Selecting the correct Data Mining Method: Classification & InDaMiTe-R
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 12, Issue 6
Abstract
One of the most difficult tasks in the whole KDD process is to choose the right data mining technique, as the commercial software tools provide more and more possibilities together and the decision requires more and more expertise on the methodological point of view. Indeed, there are a lot of data mining techniques available for an environmental scientist wishing to discover some model from her/his data. This diversity can cause some troubles to the scientist who often have not a clear idea of what are the available methods, and moreover, use to have doubts about the most suitable method to be applied to solve a concrete domain problem. Within the data mining literature there is not a common terminology. A classification of the data mining methods would greatly simplify the understanding of the whole space of available methods. In this work, a classification of most common data mining methods is presented in a conceptual map which makes easier the selection process. Also an intelligent data mining assistant is presented. It is oriented to provide model/algorithm selection support, suggesting the user the most suitable data mining techniques for a given problem.
Authors and Affiliations
Prof. Thakur Ritesh
Comparative Study of Ids for Manet
Abstract: Recent advancements in wireless communication and the miniaturization of computers have led to a new concept called the mobile ad hoc network (MANET), where two or more mobile nodes can form a temporary n...
Enhancing The Ic Engine Performance By Using The ElectrolysisAnd Preheating Process
Abstract:Our present fuel resources are not going to be around forever and with the ever increasing consumption their extinction is nearly unavoidable. Also our fuel resources which are mostly made up of fossil f...
Privacy-Preserving Public Auditing For Secure Cloud Storage
Abstract: By using Cloud storage, users can access applications, services, software whenever they requires over the internet. Users can put their data remotely to cloud storage and get benefit of on-demand services...
Efficient Detection of Internet Worms Using Data Mining Techniques
Internet worms pose a serious threat to computer security.Traditional approaches using signatures to detect worms pose little danger to the zero day attacks. The focus of malware research is shifting from using signature...
Use of MPSO To Break Transposition Cipher System
Particle swarm optimization (PSO) based cryptanalysis has acquired much attention because it has fast convergence rate. We investigate the use of Modify Particle Swarm Optimization (MPSO) with some modification in fitnes...