Refine your search
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Vijayarani, S.
- Design and Development of Novel Methods for Searching Sequences
Abstract Views :255 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, Bharathiar University, Coimbatore, Tamil Nadu, IN
1 Department of Computer Science, Bharathiar University, Coimbatore, Tamil Nadu, IN
Source
Journal of Applied Information Science, Vol 2, No 2 (2014), Pagination: 29-36Abstract
The concept of sequence data mining aimed to retrieve the frequent patterns in the sequences of products purchased by the customers through the time ordered transactions. Later, the application of sequence mining was extended to complex applications like telecommunication, network detection, DNA and protein sequence research. The technique of searching among sequence data is very important in many applications. A search technique is a technique for finding an item with specified properties among a collection of items. The searching process in sequence databases plays an important role in many application domains, mainly for information retrieval and data mining. When there are a number of stored objects, it will be too slow to linearly search all the stored items to find those that satisfy the query criteria. Hence various techniques and data structures are required to organise and manage the search process so that objects relevant to the query can be located quickly. In this research work, a new sequence search technique SSPP is proposed for performing sequence search operation in a retail dataset. The performance of SSPP technique is analysed to show the efficiency of the proposed technique when compared to other sequence search methods.Keywords
Sequence, Sequence Database, Prefix Span, SSP, SSPP.- Data Mining Clustering Technique in Data Streams-A Survey
Abstract Views :200 |
PDF Views:2
Authors
S. Vijayarani
1,
P. Sathya
1
Affiliations
1 Department of Computer Science, Bharathiar University, Coimbatore, IN
1 Department of Computer Science, Bharathiar University, Coimbatore, IN
Source
Data Mining and Knowledge Engineering, Vol 4, No 5 (2012), Pagination: 270-276Abstract
A data stream is a continuous, real time, ordered sequence of items. It is impossible to control the order in which items arrives. Real time surveillances system, telecommunication system, sensor network, financial applications are some of the examples of the data stream systems. These types of streams produced millions or billions of updates every hour. These data must be processed to extract the information in a meaningful way. As data stored in a database and data warehouse are processed by using some mining algorithm. Data mining is an extraction of interesting pattern or knowledge from huge amount of data. In this paper, we will study how the data mining techniques are used in data streams as well as the clustering problem for data stream applications. To partition the data sets into one or more groups of similar objects is known as clustering.Keywords
Clustering, Data Mining, Data Streams.- An Efficient K-Anonymity Technique
Abstract Views :191 |
PDF Views:3
Authors
Affiliations
1 School of Computer Science and Engineering, Bharathiar University, Coimbatore, IN
2 Department of MCA, Kongu Engineering College, Perundurai, Erode, IN
1 School of Computer Science and Engineering, Bharathiar University, Coimbatore, IN
2 Department of MCA, Kongu Engineering College, Perundurai, Erode, IN
Source
Data Mining and Knowledge Engineering, Vol 2, No 7 (2010), Pagination: 117-122Abstract
With the speedy developments in the hardware technology and the rapid escalation of internet increases the capability to accumulate enormous amount of personal data about consumers and individuals. In various circumstances, these data may be mishandled for a variety of purposes. This huge collection of data can be used for data mining also. The concept of data mining is to extract hidden knowledge from the large database. Applying data mining algorithms to get hidden knowledge which is a sensitive one, then it must be safeguarded from others. To perform data mining tasks in a secured way, privacy becomes very vital. Randomization, Statistical Disclosure Control, Cryptography, K-Anonymity and etc. are some of the privacy techniques to perform the data mining tasks in a privacy preserving way. In this paper, we discuss k-anonymity techniques. The inspiring feature at the back of k-anonymity is that many attributes in the data can often be considered as pseudo-identifiers which can be used in conjunction with public records in order to uniquely identify the records. Here, we have experimented the two k-anonymity techniques such as k-anonymity using clustering and de-clustering. Based on the experimental results, we compare the performance of these techniques using ID3 classifier. The result shows that the de-clustering approach provides stronger privacy protection than clustering approach in many circumstances.Keywords
Privacy, Anonymity, Clustering, De-Clustering, Decision Tree.- Utility Mining Algorithms - A Comparative Study
Abstract Views :183 |
PDF Views:2
Authors
Affiliations
1 Department of Computer Science, Bharathiar University, Coimbatore, Tamil Nadu, IN
2 Department of Computer Science, School of Computer Science and Engineering, Bharathiar University, Coimbatore, Tamil Nadu, IN
1 Department of Computer Science, Bharathiar University, Coimbatore, Tamil Nadu, IN
2 Department of Computer Science, School of Computer Science and Engineering, Bharathiar University, Coimbatore, Tamil Nadu, IN
Source
Journal of Applied Information Science, Vol 4, No 1 (2016), Pagination: 37-44Abstract
Utility mining is an emerging topic in data mining. The aim of utility mining is to discover the itemsets that have maximum utilities. Here utility refers number of items bought, cost of an item or it can be any other user choice in a transaction database. Frequent itemset mining is starting point of utility mining. In frequent itemset mining most often occurring itemsets in a transaction are retrieved. The discovery of such frequent itemsets can help in many business decision making process. Frequent itemset mining concentrates on the number of occurrence of items in a transaction, but not the value of items. But utility mining considers importance of itemsets like the profit it earns in a transaction, quantity in a transaction. In this paper various utility mining algorithms like MEU (Mining with expected utility), FUM (Fast Utility Mining), Two-Phase, CTU-Mine, UP-Growth (Utility Pattern Growth), and FHM (Faster High Utility itemset Mining) MHUI-BIT (Mining High-Utility Itemsets based on BIT vector), MHUT-TID (Mining High-Utility Itemsets based on TIDlist), and THUI (Temporal High Utility Itemsets) are discussed.Keywords
Utility Mining, High Utility Itemset Mining, MEU, MHUI-BIT & MHUT-TID, THUI-Mine, FUM, Two-Phase CTU-Mine, UP-Growth, FHM.- An Efficient Text Pattern Matching Algorithm for Retrieving Information from Desktop
Abstract Views :134 |
PDF Views:0
Authors
R. Janani
1,
S. Vijayarani
1
Affiliations
1 Department of Computer Science, School of Computer Science and Engineering, Bharathiar University, Coimbatore - 641046, Tamil Nadu, IN
1 Department of Computer Science, School of Computer Science and Engineering, Bharathiar University, Coimbatore - 641046, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 43 (2016), Pagination:Abstract
Objectives: To retrieve the information after analyzing the contents of the documents which are stored in the desktop by applying string matching algorithms. Methods/Statistical Analysis: To analyze the content of the documents, the various pattern matching algorithms are used to find all the occurrences of a limited set of patterns within an input text or input document. In order to perform this task, this research work used four existing string matching algorithms; they are Brute Force algorithm, Knuth-Morris-Pratt algorithm (KMP), Boyer Moore algorithm and Rabin Karp algorithm. This work also proposes three new string matching algorithms. They are Enhanced Boyer Moore algorithm, Enhanced Rabin Karp algorithm and Enhanced Knuth-Morris-Pratt algorithm. Findings: For experimentation, this work has used two types of documents, i.e. .txt and .docx. Performance measures used are search time, number of iterations and accuracy. From the experimental results, it is realized that the enhanced KMP algorithm gives better accuracy compared to other string matching algorithms. Application/Improvements: Normally, these algorithms are used in the field of text mining, document classification, content analysis and plagiarism detection. In future, these algorithms have to be enhanced to improve their performance and the various types of documents will be used for experimentation.Keywords
Brute Force, Boyer Moore, Information Retrieval, Knuth-Morris-Pratt, Pattern Matching, Rabin Karp.- Video Distribution with Energy Efficient Statistical QOS Provision over Wireless Networks
Abstract Views :147 |
PDF Views:3
Authors
Source
International Journal of Innovative Research and Development, Vol 2, No 4 (2013), Pagination: 628-637Abstract
The resource allocation problem for general multi hop multicast network flows and derives the optimal solution that minimizes the total energy consumption while guaranteeing a statistical end-to-end delay bound on each network path. Existing approaches use negated signal-to-noise ratio as link weights on the complete network graph, finds the minimum spanning tree using those weights to maximize the sum rate, and performs optimal resource allocation on the flow corresponding to the obtained tree structure and maintains a set of dominant flows that are optimal for a potentially large percentage of channel states under a certain network topology and performs flow selection. We propose network flow based algorithm allocates resources in the I th iteration, until all resources are exhausted and the utility is maximized by minimizing the flow cost representing the negative values of 'data rate'. In contrast to maximum-utility resource allocation, the problem of minimum power subject to rate target that we consider does not admit a single-stage multi-commodity flow formulation. In the proposed NFBA, we maximize the 'potential power saving' on the flow instead of minimizing the cost, in a Ft adaptively. We analyze our proposed scheme in terms of complexity, power and cost.- An Improved Bisecting K-Means Algorithm for Text Document Clustering
Abstract Views :312 |
PDF Views:1
Authors
Affiliations
1 Bharathiar University, Coimbatore, Tamil Nadu, IN
1 Bharathiar University, Coimbatore, Tamil Nadu, IN
Source
International Journal of Knowledge Based Computer System, Vol 4, No 2 (2016), Pagination: 32-37Abstract
Cluster analysis is an unsupervised learning approach that aims to group the objects into different groups or clusters. So that each cluster can contain similar objects with respect to any predefined condition. Text document clustering is the important technique of text mining in efficiently organizing the large volume of documents into a small number of significant clusters. The main objective of this research work is to cluster the collection of documents into related groups based on the contents of the particular documents. In order to perform this clustering task, this research work makes use of two existing algorithms, namely K-means and Bisecting K-means algorithm, and also this research work proposes a new clustering algorithm namely Enhanced-Bisecting K-means algorithm. From the experimental results it is observed that the proposed algorithm gives the better clustering accuracy than other algorithms.Keywords
Text Mining, Text Document Clustering, K-Means, Bisecting K-Means, Enhanced Bisecting K-Means.References
- Steinbach, M., Karypis, G., & Kumar, V. (2000). A Comparison of Document Clustering Techniques.
- Proceedings of Knowledge Discovery and Data Mining (KDD) Workshop Text Mining.
- Baghel, R., & Dhir, R. (2010). A frequent concepts based document clustering algorithm. International Journal of Computer Applications, July, 4(5), 6-12.
- Li, Y., Lv, X., Liu, Y., & Shi, S. (2010). Research on text clustering based on concept weight. 4th International Conference on Genetic and Evolutionary Computing.
- Napoleon, D., & Pavalakodi, S. (2011). A new method for dimensionality reduction using k-means clustering algorithm for high dimensional data set. International Journal of Computer Applications, January, 13(7), 41-46.
- Liu, M., He, Y., & Hu, H. (2004). Web fuzzy clustering and its applications in web usage mining. Proceedings of 8th International Symposium on Future Software Technology.
- Katariya, N. P., & Chaudhari, M. S. (2015). Bisecting kmeans algorithm for text clustering. International Journal of Advanced Research in Computer Science and Software Engineering, Februrary, 5(2), 221-223.
- Uncu, O., Gruver, W. A., Kotak, D. B., Sabaz, D., Alibhai, Z., & Ng, C. (2006). GRIDBSCAN: Grid densitybased spatial clustering of applications with noise.
- IEEE International Conference on Systems, Man, and Cybernetics, October 8-11, Taipei, Taiwan.
- Han, J., & Kambr, M. (2001). Data Mining: Concepts and Techniques. Hand Book. Beijing: Higher Education Press.
- Thangamani, M., & Thangaraj, P. (2010). Ontology based fuzzy document clustering scheme. Modern Applied Science, July, 4(7), 148-156.
- Jayabharathy, J., Kanmani, S., & Parveen, A. (2011). Document Clustering and Topic Discovery based on Semantic Similarity in Scientific Literature.
- Beil, F., Ester, M., Xu, X. (2002). Frequent term-based text clustering. ACM 1-58113-567-X/02/0007.
- Deng, J., Hu, J. L., Chi, H., & Wu, J. (2010). An improved fuzzy clustering method for text mining.
- nd International Conference on Networks Security, Wireless Communications and Trusted Computing.
- Hamzah, A., Susanto, A., Soesianto, F., & Istyanto, J. E.(2007). Concept based text document clustering.
- Proceedings of International Conference on Electrical Engineering and Informatics, Indonesia June.
- Ji, J., Chan, T. Y. T., & Zhao, Q. (2009). Fast document clustering based on weighted comparative advantage Proceedings of IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October.
- An Enhanced Algorithm for Retrieving High Utility- Frequent Item Sets with Negative Utility Values
Abstract Views :133 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, Bharathiar University, Coimbatore - 641046, Tamil Nadu, IN
2 Department of Computer Science, Bharathiar University, Coimbatore - 641046, Tamil Nadu,, IN
1 Department of Computer Science, Bharathiar University, Coimbatore - 641046, Tamil Nadu, IN
2 Department of Computer Science, Bharathiar University, Coimbatore - 641046, Tamil Nadu,, IN
Source
Indian Journal of Science and Technology, Vol 10, No 13 (2017), Pagination:Abstract
Objectives: Utility mining gains more attraction in recent years. Utility mining can be defined as mining item’s utility and revealing high utility items. In this work an algorithm EHUFIM (i.e Enhanced High Utility Frequent Itemset Mining), was proposed to reveal high utility – frequent itemsets even with negative profits. Methods/Statistical Analysis: The proposed algorithm uses utility mining methods to retrieve high profitable items. Then it uses support measure to reveal high occurrence items. The algorithm implements filter procedure of HUINIV algorithm to handle negative profit items. Findings: This algorithm discovers itemset that have more frequency and high utility with negative profit. Discovering such items helps in decision making in super markets, cross product marketing etc. The proposed algorithm was executed and performance of the algorithms was calculated. Application/Improvement: Existing utility frequents mining algorithms does not consider negative profit values. But, this proposed algorithm, takes negative utility values into account.Keywords
High Utility Itemset, Negative Utility Itemset, Transaction Weighted Utility Property, Utility Frequent Itemset Mining, Utility MiningHigh Utility Itemset, Negative Utility Itemset, Transaction Weighted Utility Property, Utility Frequent Itemset Mining, Utility Mining- Bio Inspired Algorithms for Dimensionality Reduction and Outlier Detection in Medical Datasets
Abstract Views :113 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, School of Computer Science and Engineering, Bharathiar University, Coimbatore, IN
2 Department of Computer Science, PSG College of Arts & Science, Coimbatore, IN
3 Department of Computer Science, Nirmala College for Women, Coimbatore, IN
1 Department of Computer Science, School of Computer Science and Engineering, Bharathiar University, Coimbatore, IN
2 Department of Computer Science, PSG College of Arts & Science, Coimbatore, IN
3 Department of Computer Science, Nirmala College for Women, Coimbatore, IN
Source
International Journal of Advanced Networking and Applications, Vol 14, No 1 (2022), Pagination: 5277-5286Abstract
Dimensionality Reduction is one of the useful techniques used in number of applications in order to reduce the number of features to improve the productivity and efficiency of the task. Clustering is one of the influential tasks in data mining. Dimensionality reductions are used in data mining, Image processing, Networking, Mobile computing, etc. The elementary intention of this work is to apply dimensionality reduction algorithms and then cluster the datasets to detect outliers. A bio-inspired ACO (Ant Colony optimization) algorithm has been proposed to reduce dimensionality. Also another bio-inspired algorithm FA (Firefly Algorithm) has been proposed to detect outliers. The three distinct medical datasets: thyroid dataset, Oesophagal dataset and Heart disease dataset are used for experimental results.Keywords
Dimensionality Reduction, Clustering, Outlier Detection, ACO (Ant Colony Optimization) Algorithm, FA (Firefly Algorithm).References
- . Dr. S. Vijayarani, S. Maria Sylviaa-Comparative Analysis of Dimensionality Reduction Techniques. International Journal of Innovative Research in Computer and Communication Engineering Vol. 4, Issue 1, January 2016.
- . http://www.comp.dit.ie/btierney/Oracle11gDoc/datamine. 111/b28129/feature_extr.html
- . Larose D.T, “Discovery knowledge in data-Introduction to Data mining, ISBN 0-471-66657-2, ohn Wiley & Sons, Inc., 2005.
- . Dr. S. Vijayarani, Ms. P. Jothi- Hierarchical and Partitioning Clustering Algorithms for Detecting Outliers in Data Streams- International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 4, April 2014
- . S. D. Pachgade, S. S. Dhande, “Outlier Detection over Data Set Using Cluster-Based and Distance-Base Approach”, International Journal of Advanced Research in Computer Science and Software Engineering ISSN: 2277, Volume 2, Issue 6, June 2012.
- . Cormen, Thomas H, Charles E, “Introduction to Algorithms, 2nd edition”, McGraw- Hill, New York.
- . Edwin M. Knox and Raymond T. Ng, “Algorithms for Mining Distance”, Based Outliers in Large Datasets. http://www.vldb.org/conf/1998/p392.pdf
- . Rajendra Pamula, Jatindra Kumar Deka, SukumarNandi “An Outlier Detection Method based on clustering”, Second International Conference on Emerging Applications of Information Technology, 2011.
- . Grubbs, F. E. (February 1969). "Procedures for detecting outlying observations in samples". Technometrics 11 (1): 1–21. doi:10.1080/00401706.1969.10490657.
- . Hodge.V and J. Austin, “A Survey of Outlier Detection Methodologies”, Artificial Intelligence Review, Vol. 22, pp. 85-126, 2003.
- . Aastha Joshi, Rajneet Kaur, “A Review: Comparative Study of Various Clustering Techniques in Data Mining” International Journal of Advanced Research in computer Science and Software Engineering, Volume 3, Issue 3, March 2013 ISSN: 2277 128X
- . Elahi, M. KunLi, Nisar, W. XinjieLv, HonganWang, “Fuzzy Systems and Knowledge Discovery”, Fifth International Conference on Vol.5, andVol .3, pp. 23-27, 2002
- . Behera Abhishek, T., Johnson, T., and Chadderdon, G.: 1998, ‘Classification and Novelty Detection using Linear Models and a Class Dependent - Elliptical Bassi Function Neural Network ’. In: Proceedings of the International conference on neural networks. Anchorage, Alaska.
- . Garima Singh, Vijay Kumar, “An Efficient Clustering and Distance Based Approach for Outlier Detection”, International Journal of Computer Trends and Technology (IJCTT) – volume 4 Issue 7–July 2013
- . Rekha Awasthi, Anil Kumar Tiwari and Seema Pathak, “An Analysis Of Density Based Clustering Technique with Dimensionality Reduction For Diabetic Patient” International Journal of Computer Engineering and Applications, Volume IX, Issue IV, April 15 www.ijcea.com ISSN 2321-3469.
- . Zhang, T., Ramakrishnan, R., and Livny, M. 1997. BIRCH: A new data clustering algorithm and its applications. Journal of Data Mining and Knowledge Discovery, 1, 2, 141-182
- . Sadia Patka1, M. S. Khatib2, Kamlesh Kelwade, “Recent Trends and Rapid Development of Applications in Data Mining”, International Conference on Advances in Engineering & Technology, IOSR Journal of Computer Science 2014, page no 73-78.
- . Charu C. Aggarwal, Phillip S. Y, An effective and efficient algorithm for higher dimensional outlier detection.
- . Ishida, E.E.O & de Souza, R.S, Hubble parameter reconstruction from a principal component analysis: minimizing the bias. Astronomy & Astrophysics, Volume 527, id.A49 (2011)
- . http://www.slideshare.net/kompellark/t19-factor-analysis
- .Dr. T. Christopher, T. Divya, “A Study of Clustering Based Algorithm for Outlier Detection in Data streams”. Proceedings of the UGC Sponsored National Conference on Advanced Networking and Applications, 27th March 2015.
- . Caruana, R., Niculescu-Mizil, A. "An empirical comparison of supervised learning algorithms". Proceedings: 23rd International Conference on Machine Learning, 2006. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.122.5901&rep=rep1&type=pdf
- .http://www.academia.edu/14545523/IRJET-A HYBRID FIREFLY BASED APPROACH FOR DATA CLUSTERING Volume No.3 Issue No. 4, August 2015
- . Ajeet Pandey, Akhilesh Kumar Singh-Ant Colony Optimization Based Routing Algorithm in Various Wireless Sensor Network- A Survey- Journal of Advanced Computing and Communication Technologies
- .https://books.google.co.in/books?id=7KuqCAAAQBAJ&pg=PA15&lpg=PA15&dq=%22been+applied+to+many+combinatorial+optimization+problems,%22&source=bl&ots=LxB2gjBdyW&sig=FNup4pJps2J8sqQpvsYRa2bQYA&hl=en&sa=X&redir_esc=y#v=onepage&q=%22been%20applied%20to%20many%20combinatorial%20optimization%20problems%2C%22&f=false
- . D. Asir Antony Gnana Singh, P.Surenther, E. Jebamalar Leavline- Ant Colony Optimization Based Attribute Reduction for Disease Diagnostic System-International Journal of Applied Engineering Research, ISSN 0973-4562 Vol. 10 No.55 (2015)© Research India Publications; httpwww.ripublication.comijaer.htm
- . Fahim. A. M., A. M. Salem, F. A. Torkey and M. A. Ramadan, “An Efficient enhanced k-means clustering algorithm”, journal of Zhejiang University, Vol.10 (7), 2006 page no 1626-1633.
- . Han, J., Kamber, M.: “Data Mining Concepts and Techniques”, Morgan Kaufmann Publishers, 2006.
- . http://www.thearling.com/text/dmwhite/dmwhite.html
- . Jonathon Shlens, “A Tutorial on Principal Component Analysis” https://en.wikipedia.org/wiki/Principal_component_analysis