Research Article | OPEN ACCESS
Data Mining-an Evolutionary Arena
1Priya Govindarajan and 2K.S. Ravichandran
1Sastra University, Kumbakonam, India
2Sastra University, Thanjavur, India
Research Journal of Applied Sciences, Engineering and Technology 2014 22:4749-4753
Received: January 16, 2014 | Accepted: February 15, 2014 | Published: June 10, 2014
Abstract
This study presents a survey of information retrieval and its various methodologies. In today’s escalating world, tracking of information should be done with ease. Keeping that as a constraint, most of the qualms can be deciphered with the aid of Machine Learning (ML). ML can be envisioned as a tool, which identifies and disseminates all information through computerized systems, which can be integrated in the respective domains, in order to get a better and more proficient retrieval of content. This study summarizes the well-known methods used in feature extraction and for classification of text. ML can be portrayed as a major tracker for surveillance, with the aid of some trained ML algorithms. In order to strengthen the response policies for any queries, which is being surrounded with two main issues like policy matching and policy administration, can be prevailed over Joint Threshold Administration Model, JTAM (i.e., Principle of separation of duty). This study gives an overall review about tracking of information with respective to semantic as well as syntactic perspective. It revolves around some of the application as well as administrative mechanism involved in Information Retrieval for mining the data. Data mining techniques in various arenas has been explored; this survey explores the various techniques and evolution of mining in detail.
Keywords:
Data mining feature extraction, information retrieval, machine learning, syntactic and semantic perspective,
References
-
Bellazreg, R., N. Boudriga, K. Trimeche and S. An, 2013. Border surveillance: A dynamic deployment scheme for WSN-based solutions. Proceeding of 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC, 2013), pp: 1-8.
-
Bollegala, D., Y. Matsuo and M. Ishizuka, 2011. Automatic discovery of personal name aliases from the web. IEEE T. Knowl. Data En., 23(6): 831-844.
CrossRef
-
Butt, L., G. Zuccon, A. Nguyen, A. Bergheim and N. Grayson, 2013. Classification of cancer-related death certificates using machine learning. Australas. Med. J., 6(5): 292-300.
CrossRef PMid:23745151 PMCid:PMC3674421
-
Cheng, T.H., C.P. Wei and V.S. Tseng, 2006. Feature selection for medical data mining: Comparisons of expert judgment and automatic approaches. Proceeding of 19th IEEE Symposium on Computer-Based Medical System (CBMC, 2006), pp: 165-170.
-
Fong, S.W., D. Roussinov and D.B. Skillicorn, 2008. Detecting word substitutions in text. IEEE T. Knowl. Data En., 20(8): 1067-1076.
CrossRef
-
Hwang, M., C. Choi and P. Kim, 2011. Automatic enrichment of semantic relation network and its application to word sense disambiguation. IEEE T. Knowl. Data En., 23(6): 845-858.
CrossRef
-
Kamra, A. and E. Bertino, 2011. Design and implementation of an intrusion response system for relational databases. IEEE T. Knowl. Data En., 23(6): 875-888.
CrossRef
-
Oana, F., D. Inkpen and T. Tran, 2011. Learning approach a machine for identifying disease-treatment relations in short texts. IEEE T. Knowl. Data En., 23(6): 801-814.
CrossRef
-
Regnstrom, K. and D.J. Burgess, 2005. Pharmacogenomics and its potential impact on drug and formulation development. Crit. Rev. Ther. Drug, 22(5): 465-492.
CrossRef
-
Rosario, B. and M.A. Hearst, 2004. Classifying semantic relations in bioscience text. Proceedings of the 42nd Annual Meeting on Association for Computational Linguistics, pp: 430.
CrossRef
-
Swan, R. and J. Allan, 2000. Automatic generation of overview timelines. Proceedings of the 23rd annual international ACM SIGIR conference on Research and development in information retrieval (SIGIR, 2000), pp: 49-56.
CrossRef
-
Syed, M., Y.Q. Zhang and Y. Pan, 2002. Parallel granular networks for credit card fraud detection. Proceeding of IEEE International Conference on Fuzzy System, 1: 572-577.
-
Usmani, Z.U.H., S. Irum, S. Qadeer and T. Qureshi, 2012. Suicide bombing forecaster-novel techniques to predict patterns of suicide bombing in Pakistan. Simul. Series, 44(17): 36-43.
-
Vittal, K.P., P.P. Ajay, S.B. Ajay and C.H.S. Rao, 2010. Computer controlled intrusion-detector and automatic firing-unit for border security. Proceeding of 2nd International Conference on Computer and Network Technology (ICCNT, 2010), pp: 289-293.
CrossRef
-
Wang, N., M.R. Lyu and C. Yang, 2013. A Machine learning framework for space medicine predictive diagnostics with physiological signals. Proceeding of the IEEE Aerospace Conference. Big Sky, MT, USA, pp: 1-12.
CrossRef
-
Zaidi, S.Z.H., S.S.R. Abidi, S. Manikam and C. Yu-N, 2004. ADMI: A multi-agent architecture to autonomously generate data mining services. Proceeding of the 2nd International IEEE Conference on Intelligent Systems, pp: 273-279.
CrossRef
-
Zhang, X.H., X.C. Yang, W.H. Shi and T.J. Lu, 2008. Data mining-based marketing support system for telecom operators. Proceeding of the 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM '08), pp: 1-6.
CrossRef
Competing interests
The authors have no competing interests.
Open Access Policy
This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Copyright
The authors have no competing interests.
|
|
|
ISSN (Online): 2040-7467
ISSN (Print): 2040-7459 |
|
Information |
|
|
|
Sales & Services |
|
|
|