Volume- 4
Issue- 3
Year- 2016
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Arun Pratap Srivastava , Dr. S. P. Singh
Data Mining techniques plays a vital role like extraction of required knowledge, finding unsuspected information to make strategic decision in a novel way which in term understandable by domain experts. A generalized frame work is proposed by considering non – domain experts during mining process for better understanding, making better decision and better finding new patters in case of selecting suitable data mining techniques based on the user profile by means of intelligent agents.
[1] Ayse Yasemin SEYDIM “Intelligent Agents: A Data Mining Perspective” Southern Methodist University, Dallas, 1999.
[2] Abou-Rjeili, G. Karypis, “Multilevel Algorithms for Partitioning Power-Law Graphs,” IEEE International Parallel & Distributed Processing Symposium (IPDPS), 2006.
[3] A. Bertoni and G. Valentini. “Discovering structures through the Bernstein inequality”. In KES-WIRN 2007, Vietri sul Mare, Italy, 2007.
[4] Berry, M. and Linoff, G” Mastering Data Mining: The Art and Science of customer Relationship Management”, Wiley, 1999.
[5] Charlie Y. Shim, Jung Yeop Kim, Constructing Cost-effective Anomaly Detection Computer Science 2008, WCECS 2008, October 22-24,2008, San Francisco, USA.
[6] D. Dasgupta, F. Gonzalez, K. Yallapu, J. Gomez, R. Yarramettii, CIDS: An Agent-Based Intrusion Detection System, Computers & Security pp 387-398, 2005
[7] Don Gilbert, “Intelligent Agents: The Right Information at the Right Time” IBM Corporation, Research Triangle Park, NC USA, May, 1997.
[8] T.Dean, J.Allen, Y.Aloimonos, “Artificial Intelligence: Theory and Practice”, The Benjamin/Cummings Publishing Co. Inc., 1995.
[9] Eleni Mangina, Intelligent Agent-Based Monitoring Platform for Applications in Engineering, International Journal of Computer Science & applications Vol.2, No.1, pp. 38-48, 2005.
[10] Elth Ogston, Benno Overinder, Maarten van Steen, and Frances Brazier, A Method for Decentralized Clustering in Large Multi-Agent Systems, AAMAS’03, July 14-18, 2003, Melbourne, Australia, ACM 2003.
[11] M. Goebel, L. Grunewald , “A Survey of Data Mining and Knowledge Discovery Software Tools”, SIGKDD Explorations, Vol 1, pp. 20-33, 1999.
[12] J. Han and M. Kamber. “Data Mining, Concepts and Technique”. Morgan Kaufmann, San Francisco, 2001.
[13] Henrik et al., “Methods for Visual Mining of Data in Virtual Reality”, Proceedings of The International Workshop on Visual Data Mining (VDM@PKDD 2001), 2001.
[14] Hing-Yan Lee, Hwee-Leng, Eng-whatt Toh. “A multi-Dimensional Data Visualization Tools for Knowledge Discovery in Databases”, IEEE 0730-3157/1995.
[15] Irina Tudor, Liviu Ionita, Intelligent Agents as Data Mining Techniques used in Academic Environment, The 4th International Conference on Virtual Learning ICVL, pp 380 – 384, 2009.
[16] A.K. Jain, M.N. Murty, and P.J. Flynn. “Data Clustering: a Review. ACM Computing Surveys”, 31(3):264-323, 1999.
[17] Jacques Ferber, “Multi-Agent systems An Introduction to Distributed Artificial Intelligence”, Addison Wesley, 1999.
[18] James Malone, Ken McGarry, Chris Bowerman, “Automated trend analysis of proteomics data using an intelligent data mining architecture” Expert Systems with Applications, Volume 30, Issue 1, Pages 24-33, January 2006.
[19] R. Kohavi, “Data Mining and Visualization”, NAE US Frontiers of Engineering Symposium, 2000.
[20] C. Ko, M. Ruschitzka, and K. Levitt, “Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-based Approach,” Proceedings of the 1997 IEEE Symposium on Security and Privacy, pp. 175~187, May 1997
[21] L. Kaufmann, P.J. Rousseeuw, “Finding Groups in Data: An Introduction to Cluster Analysis, John Wiley, 1990.
[22] Marcos M. Camos, Peter J.Stengard, Boriana L Milenova, “Data- Centric Automated Data Mining”, Proceedings of the Fourth International Conference on Machine Learning and Applications (ICMLA’05), Pages 97-104, 2005.
[23] Maththias Klusch, Stefano Lodi and Gianulco Moro., “Agent based Distributed Data Mining : The KDEC Scheme.”(2003), http://citeseer.ist.psu.edu , 2004.
[24] Major Dennis J. Ingram, H Steven Kremer, and Neil C. Rowe. “Distributed Intrusion Detection for Computer Systems Using Communicating Agents”, 2003.
[25] Mark Slagell. “The design and implementation of MAIDS (mobile agent intrusion detection system)”. Technical Report TR01-07, Iowa State University Department of Computer Science, Ames, IA, USA, 2001
[26] Nigel Robinson, Mary shapcott, Data Mining Information Visualization Beyond Charts and Graphs,Proceedings of the sixth International Conference on information Visualization (IV ’02) 2002 IEEE.
[27] Pierre Maret, Jacques Calmet, Agent-Based Knowledge Communities, International Journal of Computer Science and Applications @Technomathematics Research Foundation Vol. 6, No. 2, pp 1-18, 2009
[28] Dr. Ping chen, Dr. chenyi Hu, Dr. Heloise Lynn, and Yves Simon, “Visualizing Multi-Dimensional Data”, www. Research.acxiom.com, 2002.
[29] Phillip Porras, and Richard Kemmerer, “Penetration State Transition Analysis: A Rule-Based Intrusion Detection Approach,” Proceedings of the Eighth Annual Computer Security Applications Conference, December 1992.
[30] Rajan. J, Saravanan. V, A Framework of an Automated Data Mining System Using Autonomous Intelligent Agents, International Conference on Computer Science and Information Technology, 700-704.
[31] Rui Xu, Donald Wunsch II, “ Survey of Clustering Algorithms,”, IEEE Transactions on Neural Networks, Volume 16, No 3, May 2005, 645-678.
[32] Roberto Tagliaferri, Alberto Bertoni, Gennaro Miele, “ A Review on Clustering and Visualization Methodologies for Genomic Data Analysis”,
[33] S.Russell, P.Norvig,” Artificial Intelligence: A Modern Approach”, Prentice-Hall, 1995.
[34] Rui Xu, Donald Wunsch II, “ Survey of Clustering Algorithms,”, IEEE Transactions Neural Networks, Volume 16, No 3, May 2005, 645-678
[35] V. Saravanan, K. Vivekanandan: “Design and Implementation of Automated Data Mining Using Intelligent Agents in Object Oriented Databases,” Intelligent Information Processing, pages 221- 226, 2004.
[36] Sunderesh S. Heragu, Robert J. Graves, Byung-In Kim and Art St. Onge, Intelligent Agent Based Framework for Manufacturing Systems Control, IEEE Transactions on Systems, Man and Cypernetics – Part A : Systems and Humans, Vol 32, No. 5, Sept 2002.
[37] Eugene H. Spafford and Diego Zamboni. “Intrusion detection using autonomous agents. Computer Networks”, 34(4): 547-570, October 2000.
[38] Schneiderman, “Designing the User Interface”, Addison- Wesley, Chapter 6, 1998.
[39] K. Thearling et al., “Visualising Data Mining Models”, Information Visualisation in Data Mining and Knowledge Discovery, Morgan Kaufman, 2001.
[40] Vuda Sreenivasa Rao, Multi Agent-Based Distributed Data Mining: An Over View, International Journal of Reviews in Computing, pp 83 – 92, ISSN: 2076-3328, E-ISSN: 2076-3336.
[41] Faraz Zaidi, Daniel Archambault, and Guy Melan¸con, Evaluating the Quality of Clustering Algorithms using Cluster Path Lengths, 10th Industrial Conference, ICDM (2010)" July 12 - 14, 2010, Berlin, Germany.
[42] David Meunier, Hélène Paugam-moisy, Cluster detection algorithm in neural networks, Proceedings of 14th European Symposium on Arti¯ cial Neural Networks (ESANN 2006), M. Verlevsen (ed.), Pp 19-24, Bruges, Belgium.
Ph.D. Research Scholar, Computer Science & Engineering, Nims University, Jaipur.Rajasthan, India.
No. of Downloads: 10 | No. of Views: 1128
Ananya Sarker, Md. Shahid Uz Zaman, Md. Azmain Yakin Srizon.
November 2019 - Vol 7, Issue 6
NehaTyagi, AshishAgarwal, AnuragKatiyar, ShubhamGarg, ShudhanshuYadav.
March 2017 - Vol 5, Issue 2