Open Access   Article Go Back

A Comprehensive Survey of Dynamic Data Mining Process in Knowledge Discovery from Database

D. Ramana Kumar1 , S. Krishna Mohan Rao2

Section:Survey Paper, Product Type: Journal Paper
Volume-6 , Issue-12 , Page no. 504-509, Dec-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i12.504509

Online published on Dec 31, 2018

Copyright © D. Ramana Kumar, S. Krishna Mohan Rao . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: D. Ramana Kumar, S. Krishna Mohan Rao, “A Comprehensive Survey of Dynamic Data Mining Process in Knowledge Discovery from Database,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.504-509, 2018.

MLA Style Citation: D. Ramana Kumar, S. Krishna Mohan Rao "A Comprehensive Survey of Dynamic Data Mining Process in Knowledge Discovery from Database." International Journal of Computer Sciences and Engineering 6.12 (2018): 504-509.

APA Style Citation: D. Ramana Kumar, S. Krishna Mohan Rao, (2018). A Comprehensive Survey of Dynamic Data Mining Process in Knowledge Discovery from Database. International Journal of Computer Sciences and Engineering, 6(12), 504-509.

BibTex Style Citation:
@article{Kumar_2018,
author = {D. Ramana Kumar, S. Krishna Mohan Rao},
title = {A Comprehensive Survey of Dynamic Data Mining Process in Knowledge Discovery from Database},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2018},
volume = {6},
Issue = {12},
month = {12},
year = {2018},
issn = {2347-2693},
pages = {504-509},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3369},
doi = {https://doi.org/10.26438/ijcse/v6i12.504509}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i12.504509}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3369
TI - A Comprehensive Survey of Dynamic Data Mining Process in Knowledge Discovery from Database
T2 - International Journal of Computer Sciences and Engineering
AU - D. Ramana Kumar, S. Krishna Mohan Rao
PY - 2018
DA - 2018/12/31
PB - IJCSE, Indore, INDIA
SP - 504-509
IS - 12
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
286 270 downloads 159 downloads
  
  
           

Abstract

Data mining and knowledge discovery in databases have been considered as an important research area in education and industry. This survey presents an overview, a description and future direction which denotes a standard for knowledge discovery using dynamic data mining process model. The paper mentions particular real-world applications, data mining techniques, challenges incorporated in real-world application of knowledge discovery, current and future research concepts in the field. The applications to both academic and industrial concerns are discussed. The major target of the survey is the integration of the research in this particular area and thereby assisting in improving the existing model by using dynamic data mining. The bonding between the knowledge discovery and dynamic data mining in real world is reviewed with appropriate examples. The survey critically evaluates the area of knowledge discovery database to inform users about various models and to develop various models using dynamic data mining. The knowledge discovery database management standards will help in promoting the industry growth and pushing the industry beyond the edge.

Key-Words / Index Term

Knowledge Discovery Database, Data Mining, Dynamic Data Mining Real World Application

References

[1] K. S., Hemanth, C. M., Vastrad, S. Nagaraju, “Data Mining Technique for Knowledge Discovery from Engineering Materials Data Sets”, In International Conference on Computer Science and Information Technology,Springer, Berlin, Heidelberg, pp. 512-522,2011
[2] U. Fayyad, G. Piatetsky-Shapiro, P. Smyth, “From data mining to knowledge discovery in databases”, AI magazine, Vol.17, Issue.3, pp.37, 1996
[3] M. Panda, M. R. Patra, “Evaluating machine learning algorithms for detecting network intrusions”, International journal of recent trends in engineering, Vol.1, Issue.1, pp. 472, 2009.
[4] D. Y. Yeung, C. Chow, “Parzen-window network intrusion detectors” In Object recognition supported by user interaction for service robots, IEEE, Vol. 4, pp. 385-388, 2002.
[5] J. Han, M. Kamber, “Data Mining: Concepts and Techniques”, 2/e San Francisco: CA. Morgan Kaufmann Publishers, an imprint of Elsevier. pp-5-38, 2006
[6] L. L. Berry, “Relationship marketing of services—growing interest, emerging perspectives”, Journal of the Academy of marketing science, Vol. 23, Issue. 4, pp. 236-245, 1995.
[7] R. Agrawal, H. Mannila, R. Srikant, H. Toivonen, A. I. Verkamo, “Fast discovery of association rules”, Advances in knowledge discovery and data mining, Vol. 12, Issue.1, pp. 307-328, 1996.
[8] C. Priyadharsini, A. S. Thanamani, “An Overview of Knowledge Discovery Database and Data mining Techniques”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 2, Issue.1, 2014.
[9] T. E. Senator, H. G. Goldberg, J. Wooton, M. A. Cottini, A. U. Khan, C. D. Klinger, R. W. Wong, “Financial Crimes Enforcement Network AI System (FAIS) Identifying Potential Money Laundering from Reports of Large Cash Transactions.” AI magazine, Vol.16, Issue.4, pp. 21, 1995.
[10] R. J. Brachman, T. Anand, “The process of knowledge discovery in databases”. In Advances in knowledge discovery and data mining (1996, February), American Association for Artificial Intelligence, pp. 37-57.
[11] S. S. Anand, A. R. Patrick, J G. Hughes, D. A. Bell, “A data mining methodology for cross-sales”, Knowledge-based systems, Vol.10, Issue.7, pp. 449-461, 1998.
[12] A. K. Jain, R. C. Dubes, “Algorithms for clustering data”, 1988.
[13] S. Butler, “An investigation into the relative abilities of three alternative data mining methods to derive information of business value from retail store-based transaction data”, Doctoral dissertation, BSc thesis, School of Computing and Mathematics, Deakin University, Australia, 2002.
[14] S. Moyle, M. Bohanec, E. Osrowski, “Large and tall buildings: a case study in the application of decision support and data mining”, Kluwer International Series In Engineering And Computer Science, pp. 191-202, 2003.
[15] K. J. Cios, G. W. Moore, “Medical data mining and knowledge discovery: Overview of key issues”, Studies in Fuzziness and Soft Computing, Vol.60, pp. 1-20, 2001.
[16] J. P. Sacha, K. J. Cios, L. S. Goodenday, “Issues in automating cardiac SPECT diagnosis”, IEEE Engineering in Medicine and Biology Magazine, Vol.19, Issue.4, pp. 78-88, 2000.
[17] H. Sak, A. Senior, F. Beaufays, “Long short-term memory recurrent neural network architectures for large scale acoustic modeling”. In Fifteenth annual conference of the international speech communication association ,2014.
[18] D. J. Hand, “Deconstructing statistical questions. Journal of the Royal Statistical Society”, Series A (Statistics in Society), pp. 317-356, 1994.
[19] J. Hall, G. Mani, D. Barr, “Applying computational intelligence to the investment process”, Proceedings of CIFER-96: Computational Intelligence in Financial Engineering. Washington, DC: IEEE Computer Society ,1996.
[20] R. S. Manikantan, Ostermann, B. Tjaden, “Detecting Anomalous Network Traffic with Self-organizing Maps”, Ohio University, pp.37, 2003.
[21] Y. Jing, T. Li, H. Fujita, B. Wang, N. Cheng, “An incremental attribute reduction method for dynamic data mining”, Information Sciences, Vol.465, pp. 202-218, 2018
[22] H. A. Nguyen, D. Choi, “Application of data mining to network intrusion detection: classifier selection model”, In Asia-Pacific Network Operations and Management Symposium, Springer, Berlin, Heidelberg, pp. 399-408, 2008
[23] R. Burbidge, B. Buxton, “An introduction to support vector machines for data mining”, Keynote papers, young OR, Vol.12, pp. 3-15, 2001
[24] H. Bhavsar, M. H. Panchal, “A review on support vector machine for data classification”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Vol.1, Issue.10, pp. 185, 2012.
[25] K. Suresh, C. Jnaneswari, G. L. Kranthi, K. Bindu, “Knowledge Discovery in Datamining Using Soft Computing”, Vol.3, pp. 3952-3957, 2012.
[26] K. Kusum, S. Bharti, Shukla, S. Jain, “Intrusion detection using clustering”, Vol.1, Issue. 2, 3, 4, pp.6, 2010.
[27] A. N. Huy, D. Choi, “Application of Data Mining to Network Intrusion Detection: Classifier Selection Model”, pp.1, 2008.
[28] P. Mrutyunjaya, M. R. Patra, “Evaluating Machine Learning Algorithms for Detecting Network Intrusions”, International Journal of Recent Trends in Engineering, Vol.1, Issue.1, May 2009.
[29] M. Ramadas, S. Ostermann, B. Tjaden, “Detecting anomalous network traffic with self-organizing maps”, In International Workshop on Recent Advances in Intrusion Detection September, Springer, Berlin, Heidelberg, pp. 36-54, 2003
[30] R. O. Duda, P. E. Hart, “Pattern Classification and Scene Analysis”, New York: Wiley, pp: 78, 1973.
[31] W. V. Qiang, Megalooikonomou, “A Clustering Algorithm for Intrusion Detection”, pp. 3, 2004.
[32] KNN Model-Based Approach in Classification, Gongde Guo1, Hui Wang , David Bell , Kieran Greer School of Computer Science, Queen`s University Belfast, BT7 1NN, UK. partly European Commission project ICONS, project no. IST-2001-32429,2001.
[33] Priyanka, Sana Khan, Tulsi Kour, "Investigation on Smart Health Care Using Data Mining Methods", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.2, pp.31-36, 2016.
[34] Prakash Singh , "Efficient Deep Learning for Big Data: A Review", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.6, pp.36-41, 2016.