Study on the Data Stream Mining and its Application Facing the Mobile Environment

2010 ◽  
Vol 43 ◽  
pp. 695-698
Author(s):  
Ji Nan Gu ◽  
Guo Jing Li

the striving development of mobile business and the wide use of mobile equipment have enlightened the requirement of high efficient analyst instrument of data stream. Mobile data mining is under the environment of pervasive and finds the knowledge from the continuous data stream. We apply the mining technology of data stream to mobile environment and discuss the algorithm. And we introduce the concrete idea and steps of mobile data mining on the base of improved data stream disposing model. At last, we introduce the application instance that is the application of mobile ERP.

2020 ◽  
Author(s):  
Yuhao Zhao

Abstract With the advancement of network technology and large-scale computing, distributed data streams have been widely used in the application of financial risk analysis. However, while data mining reveals financial models, it also increasingly poses a threat to privacy. Therefore, how to prevent privacy leakage during the efficient mining process poses new challenges to the data mining technology. This article is mainly aimed at the current privacy data leakage in financial data mining, combined with existing data mining technology to study data mining and privacy protection. First, a data mining model for dual privacy protection is defined, which can better meet the characteristics of distributed data streams while achieving privacy protection effects. Secondly, a privacy-oriented data stream mining algorithm is proposed, which uses random interference technology to effectively protect the original sensitive data. Finally, the analysis and discussion of the algorithm in this paper through simulation experiments show that the algorithm is feasible and effective, and can better adapt to the distributed data flow distribution and dynamic characteristics, while achieving better privacy protection effects, effectively Reduced communication load.


2020 ◽  
Author(s):  
Yuhao Zhao

Abstract With the advancement of network technology and large-scale computing, distributed data streams have been widely used in the application of financial risk analysis. However, while data mining reveals financial models, it also increasingly poses a threat to privacy. Therefore, how to prevent privacy leakage during the efficient mining process poses new challenges to the data mining technology. This article is mainly aimed at the current privacy data leakage in financial data mining, combined with existing data mining technology to study data mining and privacy protection. First, a data mining model for dual privacy protection is defined, which can better meet the characteristics of distributed data streams while achieving privacy protection effects. Secondly, a privacy-oriented data stream mining algorithm is proposed, which uses random interference technology to effectively protect the original sensitive data. Finally, the analysis and discussion of the algorithm in this paper through simulation experiments show that the algorithm is feasible and effective, and can better adapt to the distributed data flow distribution and dynamic characteristics, while achieving better privacy protection effects, effectively Reduced communication load.


Author(s):  
Yuhao Zhao

AbstractWith the advancement of network technology and large-scale computing, distributed data streams have been widely used in the application of financial risk analysis. However, while data mining reveals financial models, it also increasingly poses a threat to privacy. Therefore, how to prevent privacy leakage during the efficient mining process poses new challenges to the data mining technology. This article is mainly aimed at the current privacy data leakage in financial data mining, combined with existing data mining technology to study data mining and privacy protection. First, a data mining model for dual privacy protection is defined, which can better meet the characteristics of distributed data streams while achieving privacy protection effects. Secondly, a privacy-oriented data stream mining algorithm is proposed, which uses random interference technology to effectively protect the original sensitive data. Finally, the analysis and discussion of the algorithm in this paper through simulation experiments show that the algorithm is feasible and effective, and can better adapt to the distributed data flow distribution and dynamic characteristics, while achieving better privacy protection effects, effectively reduced communication load.


2013 ◽  
Vol 380-384 ◽  
pp. 3570-3574
Author(s):  
Yong Hong Cheng ◽  
Li Hua Ouyang ◽  
Xin Yan Liu

computer network multimedia communication has spread all over daily work and life fields, people also have put forward higher requirements for computer multimedia communication network. Based on current network multimedia communication, there are a large amount of data transmission, high-speed and dynamic characteristics, the mining technology of its communication data flow is carried out related to research. In this paper, the frequent item sets of data stream mining technology is carried out related to research, and the classical HCOUNT algorithm is carried out relevant analysis, according to the relevant analysis, the classical HCOUNT algorithm is improved, in order to alleviate possible error problem in data mining. Finally, the data stream mining algorithms are carried out relevant analysis of actual experimental data. Study on the technical aspects of the data flow mining in computer network multimedia communication, it is an important role in the development of the computer network multimedia communication. Study on the improvement of the current algorithm, it provides reference in the similar field of algorithm research


Author(s):  
Chris Wrench ◽  
Frederic Stahl ◽  
Giuseppe Di Fatta ◽  
Vidhyalakshmi Karthikeyan ◽  
Detlef D. Nauck

Complex Event Processing has been a growing field for the last ten years. It has seen the development of a number of methods and tools to aid in the processing of event streams and clouds though it has also been troubled by the lack of a cohesive definition. This paper aims to layout the technologies surrounding CEP and to distinguish it from the closely related field of Event Stream Processing. It also aims to explore the work done to apply Data Mining Techniques to both of these fields. An outline of stream processing technologies is laid out including the Data Stream Mining techniques that have been adapted for CEP.


Sign in / Sign up

Export Citation Format

Share Document