An efficient data mining process on temporal data using relevance feedback method

Author(s):  
S. Nageswari ◽  
M. Sivaram ◽  
Mavaluru Dinesh ◽  
D. Yuvaraj
2017 ◽  
Vol 8 (1) ◽  
Author(s):  
Albert Albert ◽  
Marcel Bonar Kristanda ◽  
Seng Hansun

A catalog is a register of all bibliographic items found in a library. A bibliographic item can be any information entity. The library catalog has evolved from manual, website based catalog to mobile catalog. Unfortunately, there are still many obstacles in the results of library catalog search, including the relevant results of documents based on input from the user. The purpose of this research is to make the library catalog based on mobile application in android using relevant calculation used rocchio relevance feedback method. Terms— android, library, library catalog, mobile, rocchio.


2018 ◽  
Vol 9 (1) ◽  
pp. 9-17
Author(s):  
Marcel Bonar Kristanda ◽  
Seng Hansun ◽  
Albert Albert

Library catalog is a documentation or list of all library collections. Unfortunately, there is a problem identified in the process of searching a book inside library catalog in Universitas Multimedia Nusantara’s library information system regarding the relevant result based on user query input. This research aims to design and build a library catalog application on Android platform in order to increase the relvancy of searching result in a database using calculated Rocchio Relevance Feedback method along with user experience measurement. User experience analysis result presented a good respond with 91.18% score based by all factor and relevance value present 71.43% precision, 100% recall, and 83.33% F-Measure. Differences of relevant results between the Senayan Library Information system (SLiMS) and the new Android application ranged at 36.11%. Therefore, this Android application proved to give relevant result based on relevance rank. Index Terms—Rocchio, Relevance, Feedback, Pencarian, Buku, Aplikasi, Android, Perpustakaan.


2017 ◽  
Vol 8 (1) ◽  
pp. 51-59 ◽  
Author(s):  
Masoud Al Quhtani

AbstractBackground: The globalization era has brought with it the development of high technology, and therefore new methods of preserving and storing data. New data storing techniques ensure data are stored for longer periods of time, more efficiently and with a higher quality, but also with a higher data abuse risk. Objective: The goal of the paper is to provide a review of the data mining applications for the purpose of corporate information security, and intrusion detection in particular. Methods/approach: The review was conducted using the systematic analysis of the previously published papers on the usage of data mining in the field of corporate information security. Results: This paper demonstrates that the use of data mining applications is extremely useful and has a great importance for establishing corporate information security. Data mining applications are directly related to issues of intrusion detection and privacy protection. Conclusions: The most important fact that can be specified based on this study is that corporations can establish a sustainable and efficient data mining system that will ensure privacy and successful protection against unwanted intrusions.


2007 ◽  
Vol 18 (3) ◽  
pp. 255-279 ◽  
Author(s):  
P. Compieta ◽  
S. Di Martino ◽  
M. Bertolotto ◽  
F. Ferrucci ◽  
T. Kechadi

Sign in / Sign up

Export Citation Format

Share Document