Special issue: Rough and Fuzzy Methods for Data Mining
نویسندگان
چکیده
منابع مشابه
Special issue: Rough and Fuzzy Methods for Data Mining
This special issue of International Journal of Hybrid Intelligent Systems (IJHIS) published by IOS Press contains a selection of papers presented initially at the RSFDGrC’09 Conference (Rough Sets, Fuzzy Sets, Data Mining and Granular Computing) held in IIT Delhi, India, on December 16–20, 2009. RSFDGrC is the series of international scientific conferences spanning over last 15 years. It invest...
متن کاملFuzzy-Rough Data Mining
It is estimated that every 20 months or so the amount of information in the world doubles. In the same way, tools that mine knowledge from data must develop to combat this growth. Such techniques must be able to extract useful, meaningful patterns efficiently in the presence of large amounts of noisy, redundant and sometimes misleading information. To be able to achieve this, data mining is oft...
متن کاملdata mining rules and classification methods in insurance: the case of collision insurance
assigning premium to the insurance contract in iran mostly has based on some old rules have been authorized by government, in such a situation predicting premium by analyzing database and it’s characteristics will be definitely such a big mistake. therefore the most beneficial information one can gathered from these data is the amount of loss happens during one contract to predicting insurance ...
15 صفحه اولSpecial Issue on Environmental Data Mining
Data Mining is the discipline for non trivial identifying of valid, novel, potentially useful, ultimately understandable patterns in data [3] and provides the opportunity to extract relevant decisional knowledge from data bases in any application field. In particular it can contribute to a better understanding of Environmental Sciences. Environmental Sciences is a wide research field with a num...
متن کاملGuest editorial: Special issue on data mining for information security
Computer and communication systems are subject to repeated security attacks. Given the variety of new vulnerabilities discovered every day, the introduction of new attack schemes, and the ever-expanding use of the Internet, it is not surprising that the field of computer and network security has grown and evolved significantly in recent years. Attacks are so pervasive nowadays that many firms, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Hybrid Intelligent Systems
سال: 2011
ISSN: 1875-8819,1448-5869
DOI: 10.3233/his-2011-0125