ONLINE STREAM MINING APPROACH FOR CLUSTERING NETWORK TRAFFIC
نویسندگان
چکیده
منابع مشابه
Online Data Stream Mining in Distributed Sensor Network
Amount of end devices like sensors produce a much bigger amount of data. Collecting, transmitting and centrally processing amount of data from amount of devices is problematic. This paper deals with ways of reducing communication and distributed processing of data. With help of data mining and processing over real time stream of data we design an algorithm. This algorithm is based on data minin...
متن کاملA Weightless Neural Network-Based Approach for Stream Data Clustering
One of the major data mining tasks is to cluster similar data, because of its usefulness, providing means of summarizing large ammounts of raw data into handy information. Clustering data streams is particularly challenging, because of the constraints imposed when dealing with this kind of input. Here we report our work, in which it was investigated the use of WiSARD discriminators as primary d...
متن کاملAdaptive Online Traffic Flow Prediction Using Aggregated Neuro Fuzzy Approach
Short term prediction of traffic flow is one of the most essential elements of all proactive traffic control systems. Although various methodologies have been applied to forecast traffic parameters, several researchers have showed that compared with the individual methods, hybrid methods provide more accurate results . These results made the hybrid tools and approaches a more common method for ...
متن کاملA Scalable Distributed Stream Mining System for Highway Traffic Data
To achieve the concept of smart roads, intelligent sensors are being placed on the roadways to collect real-time traffic streams. Traditional method is not a real-time response, and incurs high communication and storage costs. Existing distributed stream mining algorithms do not consider the resource limitation on the lightweight devices such as sensors. In this paper, we propose a distributed ...
متن کاملHypergraph Clustering for Better Network Traffic Inspection
Networked computing environments are subject to configuration errors, unauthorized users, undesired activities and attacks by malicious software. These can be detected by monitoring network traffic, but network administrators are overwhelmed by the amount of data that needs to be inspected. In this paper, we describe how clustering can be used for this application to reduce the amount of data t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Research in Engineering and Technology
سال: 2014
ISSN: 2321-7308,2319-1163
DOI: 10.15623/ijret.2014.0302053