نتایج جستجو برای: fuzzy mining

تعداد نتایج: 174051  

2008
Maybin K. Muyeba M. Sulaiman Khan Frans Coenen

A novel framework is described for mining fuzzy Association Rules (ARs) relating the properties of composite attributes, i.e. attributes or items that each feature a number of values derived from a common schema. To apply fuzzy Association Rule Mining (ARM) we partition the property values into fuzzy property sets. This paper describes: (i) the process of deriving the fuzzy sets (Composite Fuzz...

Journal: :Frontiers in artificial intelligence and applications 2022

Spatial colocation pattern mining is to discover the subsets of spatial objects frequently appearing together in adjacent geographic locations. In existing research, several algorithms were proposed for excavating maximal prevalent patterns. Furthermore, fuzzy neighborhood relationship(FNR) was employed evaluate proximity between instances improving accuracy results. However, approach discoveri...

Background & Aim: A main problem in diabetes is its timely and accurate diagnosis. This study aimed at diagnosing diabetes using data mining methods. Methods: The present study is an analytical investigation including 768 individuals with 8 attributes. Artificial neural networks and fuzzy neural networks were used to diagnose the diabetes. To achieve a real accuracy, the Kfold method was used ...

2000
John E. Dickerson

The Fuzzy Intrusion Recognition Engine (FIRE) is an anomaly-based intrusion detection system that uses fuzzy logic to assess whether malicious activity is taking place on a network. It uses simple data mining techniques to process the network input data and help expose metrics that are particularly significant to anomaly detection. These metrics are then evaluated as fuzzy sets. FIRE uses a fuz...

2005
M. H. Marghny

In essence, data mining consists of extracting knowledge from data. This paper proposes an evolutionary system for discovering fuzzy classi cation rules. Fuzzy logic is useful for data mining especially in the case for performing classi cation task. Three methods were used to extract fuzzy classi cation rules using Evolutionary Algorithms: (1) genetic selection small number of large number of f...

2008
Kyoung-Mo Yang Eung-Hee Kim Suk-Hyung Hwang Sung-Hee Choi

Data Mining(also known as Knowledge Discovery) is defined as the non-trivial extraction of implicit, previously unknown, and potentially useful information from data. It includes not only methods for extracting information from the given data, but also visualizing the information. Formal Concept Analysis(FCA) is one of Data mining research fields, and it has been applied to a number of areas su...

Journal: :Appl. Soft Comput. 2013
Chun-Hao Chen Ai-Fang Li Yeong-Chyi Lee

In real-world applications, transactions usually consist of quantitative values. Many fuzzy data mining approaches have thus been proposed for finding fuzzy association rules with the predefined minimum support from the give quantitative transactions. However, the common problems of those approaches are that an appropriate minimum support is hard to set, and the derived rules usually expose com...

2007
RITU SONI RAJEEV NANDA

Data collection and analysis in web mining faces certain unique challenges. Due to a variety of reasons inherent in web browsing and web logging, the likelihood of bad or incomplete data is higher than conventional applications. The analytical techniques in web mining need to accommodate such data. Fuzzy and rough sets provide the ability to deal with incomplete and approximate information. Fuz...

2013
SONIA HAMEED Mohammad Ali Jinnah

Data mining is used to extract useful information hidden in the data. Sometimes this extraction of information leads to revealing sensitive information. Privacy preservation in Data Mining is a process of sanitizing sensitive information. This research focuses on sanitizing sensitive rules discovered in quantitative data. The proposed scheme, Privacy Preserving in Fuzzy Association Rules (PPFAR...

2002
German Florez Susan M. Bridges Rayford B. Vaughn

We have been using fuzzy data mining techniques to extract patterns that represent normal behavior for intrusion detection. In this paper we describe a variety of modifications that we have made to the data mining algorithms in order to improve accuracy and efficiency. We use sets of fuzzy association rules that are mined from network audit data as models of " normal behavior. " To detect anoma...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید