Full Paper View Go Back

Convergence of IT and Data Mining with other technologies

Shilpa Mahajan1

Section:Technical Paper, Product Type: Isroset-Journal
Vol.1 , Issue.4 , pp.31-37, Jul-2013


Online published on Aug 31, 2013


Copyright © Shilpa Mahajan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Shilpa Mahajan, “Convergence of IT and Data Mining with other technologies,” International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.4, pp.31-37, 2013.

MLA Style Citation: Shilpa Mahajan "Convergence of IT and Data Mining with other technologies." International Journal of Scientific Research in Computer Science and Engineering 1.4 (2013): 31-37.

APA Style Citation: Shilpa Mahajan, (2013). Convergence of IT and Data Mining with other technologies. International Journal of Scientific Research in Computer Science and Engineering, 1(4), 31-37.

BibTex Style Citation:
@article{Mahajan_2013,
author = {Shilpa Mahajan},
title = {Convergence of IT and Data Mining with other technologies},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {7 2013},
volume = {1},
Issue = {4},
month = {7},
year = {2013},
issn = {2347-2693},
pages = {31-37},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=69},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=69
TI - Convergence of IT and Data Mining with other technologies
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Shilpa Mahajan
PY - 2013
DA - 2013/08/31
PB - IJCSE, Indore, INDIA
SP - 31-37
IS - 4
VL - 1
SN - 2347-2693
ER -

4380 Views    4428 Downloads    4233 Downloads
  
  

Abstract :
In this age of technology and communication convergence, we cannot help but be impacted by technologies and innovations that center on computers. This paper examines the growing need for a secure environment and a general-purpose analytics engine. The process need for secure environment is Physical or It security and the process used for analysis is called Data Mining. This paper will also give us the review towards the convergence of various technologies such as IT and Physical Security and data mining with biology, computing, mobility, knowledge management, etc. for human values like privacy, recognition, operational intelligence, etc. and also relationship between data mining/IT security.

Key-Words / Index Term :
IT security, physical security, convergence; mobility data mining; genomics; proteomics; RMS; process management

References :
[1] G. Piatetsky-Shapiro, G. Frawley, and W. Frawley.
“Knowledge Discovery in Databases”. AAAI Press,
Menlo Park, California, 1991.
[2] S. Jablonski, C. Bussler, “Workflow management,
Modeling concepts, architecture and implementation”,
Thomson, London, UK, 1996.
[3] A. Abecker, A. Bernardi, K. Hinkelmann, O. KĂĽhn and
M. Sintek, “Toward a Technology for Organizational
Memories”. IEEE Intelligent Systems, vol. 13, no. 3, pp.
40-48, 1998.
[4] Q. Ma, and J.T.L. Wang, “Biological Data Mining using
Bayesian Neural Networks: A case study. International
Journal on Artificial Intelligence Tools, Special Issue on
Biocomputing, 1999, vol. 8, no. 4, pp. 433-451.
[5] R. Tibshirani, T. Hastie, M. Eisen, D. Ross, D. Botstein,
and P. Brown, “Clustering methods for the analysis of
DNA microarray data (Tech. Rep.). Department of
Statistics”, Stanford University, Stanford, California,
USA, 1999.
[6] H.J.Miller and J.Han(eds). Geographic Data Mining and
Knowledge Discovery. Taylor & Francis, 2001.
[7] T. Berners-Lee, J. Hendler, and O. Lassila, “The
Semantic Web: A new form of Web content that is
meaningful to computers will unleash a revolution of
new possibilities”,Sci. Amer., May 2001.
[8] D.S. Whishart, “Tools for protein technologies. In
Sensen, C.W. (Ed.), Biotechnology, Genomics and
Bioinformatics, vol. 5b, Wiley-VCH, 2002, pp. 325-344.
[9] F. Zeng, C.H.R. Yap and L. Wong, “Using feature
generation and feature selection for accurate prediction
of translation initiation sites”. Genome Informatics,
2002, vol. 13, pp. 192-200.
[10] G. Piatetsky-Shapiro, and P. Tamayo, “Microarray Data
Mining: Facing the Challenges”. SIGKDD Explorations,
2003, vol. 5, no. 2, pp. 1-5.
[11] M. zur Muehlen, “Organizational management in
workflow applications”, Informational Technology and
Management Journal. Kluwer Academic Publisher,
2004, vol. 5, no. 3, pp. 271-291.
[12] R. Bino, R. Hall, O. Fiehn, J. Kopka, K. Saito, J.
Draper, B. Nikolau, P. Mendes, U. Roessner-Tunali, M.
Beale, R. Trethewey, B. Lange, E. Wurtele, and L.
Sumner, “Potential of metabolomics as a functional
genomics tool.” Trends Plant Sci, vol. 9, no. 9, pp. 418–
425, September 2004.
[13] B. Liang and P. Dubey, “BRecognition, mining and
synthesis”, Intel Technol. J., vol. 9, May 2005.
[14] ProDatO “Integration Technology GmbH: Handbuch
iPM Integrated Process Manager”’ Software
documentation (in German), Erlangen, Germany, 2005,
www.prodato.de.
[15] O. Marjanovic, “The next stage of operational business
intelligence – creating new challenges for business
process management”, in Sprague”, R.H. Jr (Ed.),
Proceedings of the 40th Annual Hawaii International
Conference on System Sciences (HICSS’07), 2007,
IEEE Computer Society, Los Alamitos.
[16] Y. Xia, A. Campen, D. Rigsby, Y. Guo, X. Feng, E. Su,
M. Palakal, and S. Li, DGEM, “Mining Gene Expression
database for primary se tissues, Molecular Diagnosis &
Therapy, Issue 3, 2007

[17] B. Thuraisingham. Managing threats to web databases
and cyber systems: Issues, solutions and challenges. In
V. Kumar et al, editor, Cyber Security: Threats and
Countermeasures. Kluwer

[18] B. Thuraisingham. Data mining, national security,
privacy and civil liberties. SIGKDD Explorations,
January 2003

[19] F. Bolz et al. The Counterterrorism Handbook: Tactics,
Procedures, and Techniques. CRC Press, 2001

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation