A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kanya, N.
- Data Mining Challenges with Big Data
Authors
1 Department of CSE, Dr. M.G.R Educational & Research Institute, Chennai, TN, IN
Source
Data Mining and Knowledge Engineering, Vol 7, No 7 (2015), Pagination: 267-270Abstract
Big Data involves huge quantity of growing data sets with manifold independent sources. Through the fast development of networking, data storage, and the data collection capacity. Big Data are now quickly expanding in all science and engineering domains, as well as physical, biological and biomedical sciences. This data-driven model involves demand-driven aggregation of information sources, mining and analysis, user interest modelling, and security and privacy considerations. We analyze the challenging issues in the data-driven model and also in the Big Data revolution.Keywords
Big Data, Data Mining, KDD.- Reduce Crime Attacks on Online Transactions Using Biometric Identifier and OTP
Authors
1 Department of Computer Science and Engineering, Dr. M.G.R Educational & Research Institute University, IN
2 Department of Computer Science and Engineering, Dr. M.G.R Educational & Research Institute University, IN
Source
Biometrics and Bioinformatics, Vol 7, No 6 (2015), Pagination: 163-165Abstract
The development in electronic communication has resulted in a bigger demand for speedy and precise user recognition and verification. Access codes for building, bank financial records and computer systems frequently employ personal identification numbers (PIN's) for recognition and security verifications. Traditional method of identification based on possession of ID cards or elite information like a social security number or a password are not all together dependable. To enlarge the security in the authentication process Biometric authentication and other digital signatures are used even though they give the successful authentication they are feeble against online attacks like botnet, malware, Intruders, spoofing ECT. In this scheme fingerprint biometric technique and Onetime password is used for well-organized authentication and anti-spoofing, Intruder detection system, DIKE key exchange and encryption technique to give efficient security against online attacks.
Keywords
Biometrics, DIKE, OTP, Malware Detection, Botnet Detection.- A Study on Relationship Extraction from Text Data
Authors
Source
Data Mining and Knowledge Engineering, Vol 8, No 7 (2016), Pagination: 216-221Abstract
The tremendous growth of Biomedical text mining increases the publications in literature. The task of Information Extraction is to identify the predefined set of concepts in a specific field. It will disregard unwanted irrelevant information’s. And recognizes the specific class of predefined entities, relationships and events. The manual identification of entity and relationships biomedical literature consumes much time and lengthy and laborious task. Automation of entity and relationship extraction addresses this issues. Various approaches are proposed to extract relationship from biomedical literature. This study analyses a range of approaches to automatic extraction of relationships from biomedical literature. It investigates various methods of relation Extraction System based on the working approach of the systems. The study includes the relation extraction approaches like Co-occurrence based approach, pattern based approach, Rule Based approach and machine Learning Based approaches. The outcomes of the systems are compared using the gold standards of text mining such as precision, recall and F-Measure.
Keywords
Conditional Random Field, Information Extraction, Named Entity Recognition, Relation Extraction, Support Vector Machine, Text Mining.- Named Entity Recognition from Biomedical Text-An Information Extraction Task
Authors
1 Department of Computer Science and Engineering, Manonmaniam Sundaranar University, IN
2 Department of Computer Science and Engineering, Madanapalle Institute of Technology and Science, IN