Volume-15 ~ Issue-6
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | A Survey on Fuzzy Association Rule Mining Methodologies |
| Country | : | India |
| Authors | : | Aritra Roy, Rajdeep Chatterjee |
| : | 10.9790/0661-1560108 ![]() |
Abstract: Fuzzy association rule mining (Fuzzy ARM) uses fuzzy logic to generate interesting association rules. These association relationships can help in decision making for the solution of a given problem. Fuzzy ARM is a variant of classical association rule mining. Classical association rule mining uses the concept of crisp sets. Because of this reason classical association rule mining has several drawbacks. To overcome those drawbacks the concept of fuzzy association rule mining came. Today there is a huge number of different types of fuzzy association rule mining algorithms are present in research works and day by day these algorithms are getting better. But as the problem domain is also becoming more complex in nature, continuous research work is still going on. In this paper, we have studied several well-known methodologies and algorithms for fuzzy association rule mining. Four important methodologies are briefly discussed in this paper which will show the recent trends and future scope of research in the field of fuzzy association rule mining.
Keywords: Knowledge discovery in databases, Data mining, Fuzzy association rule mining, Classical association rule mining, Very large datasets, Minimum support, Cardinality, Certainty factor, Redundant rule, Equivalence , Equivalent rules
[1] Fayyad, Usama; Piatetsky-Shapiro, Gregory; Smyth, Padhraic: The KDD Process for Extracting Useful Knowledge from Volumes of Data. Communications of the ACM, Volume 39, Issue 11, Page(s): 27 – 34, 1996.
[2] http://www.umsl.edu/~joshik/msis480/chapt11.htm
[3] J. Han and M. Kamber, Data Mining: Concepts and Techniques: The Morgan Kaufmann Series, 2001.
[4] Hipp, Jochen; Guentzer, Ulrich; Nakhaeizadeh, Gholamreza: Algorithms for Association Rule Mining - A General Survey and Comparison. ACM SIGKDD Explorations Newsletter, Volume 2, Issue 1, 2000.
[5] Agrawal, Rakesh; Imielinski, Tomasz; Swami, Arun: Mining Association Rules between Sets of Items in Large Databases. Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, 1993.
[6] R. Agrawal and R. Srikant, "Fast Algorithms for Mining Association Rules in Large Databases", Proc. of the 20th International Conference on Very Large Data Bases, VLDB, Page(s): 487-499, 1994.
[7] Han, J, Pei, J, Yin, Y: Mining Frequent Patterns without Candidate Generation. In: SIGMOD Conference, ACM Press, Page(s): 1-12, 2000.
[8] Türks¸en, I.B. and Tian Y. 1993. Combination of rules and their consequences in fuzzy expert systems, Fuzzy Sets and Systems, No. 58,3-40, 1993.
[9] http://www.cs.cmu.edu/Groups/AI/html/faqs/ai/fuzzy/part1/faq-doc-4.html
[10] L.A.Zadeh.Outline of a new approach to the analysis of complex systems and decision processes. IEEE Transactions on System, Man, and Cybernetics, Volume 3, Pages(s):28-44, January, 1973.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The diverse and dynamic nature of elements and techniques used to develop Web Application, due to the lack of testing technique and effective programming principles which are used for implementing basic software engineering principles, and undisciplined development processes insure by the high pressure of a very short time to satisfy market request to develop Web application. This paper represent approaches of reengineering in web that how reengineering process can be carried out to evolution activities in legacy system as well we propose the V-model for re-engineering process. This paper presents the need of the technologies and approaches for building new web-services from existing web-applications. In this paper we present the processing of V-model for Reengineering in web application which is the extension of V-model used in software domain. In our approach V-model incorporates with the methodology throughout the phases of web development process to re-engineer the web system.
Keywords: Re-engineering, reverse engineering, forward engineering, V-model, application migration.
[1] P. Fraternali, Tools and Approaches for Developing Data-Intensive web Applications: a Survey, ACM Computing Surveys, 1999. [2] S. Selmi, N. Kraiem, and H. Ben Ghezala, Toward a comprehension view of web engineering, 2005.
[3] E. Chikofsky and J.H.Cross, Reverse Engineering and Design Recovery: A Taxonomy, IEEE Software Engineering journal, (Jan. 1990), pp 13-17.
[4] IEEE Std 1219-1998, In IEEE Standards Software Engineering, 1999 Edition, Volume Two, Process Standards, IEEE Press.
[5] Jovanovic, N. ; Secure Syst. Lab., Tech. Univ. of Vienna ; Kruegel, C. ; Kirda, E., a static analysis tool for detecting Web application vulnerabilities, Security and Privacy, 2006 IEEE.
[6] X. Zhang ; Comput. & Inf. Eng. Coll., Hohai Univ., Nanjing, China ; Z. Wang, e-Business and Information System Security (EBISS), 2010 2nd International Conference on 22-23 may 2010.
[7] J. Conallen, Building Web Applications with UML, Addison- Wesley Publishing Company, Reading, MA, 1999.
[8] J. Conallen, Modelling web application architectures with uml, Communications of the Association for Computing Machinery, 42(10), October 1999.
[9] J. Conallen, Modelling web application with uml, White paper, Conallen Inc. http://www.conallen.com/whitepapers/webapps/Modellingwebapplication.htm, March 1999.
[10] D. Lucca GA, Fasolino AR, De Carlini U, Pace F, Tramontana P. Comprehending, Web applications by a clustering based approach, Proceedings 10th Workshop on Program Comprehension. IEEE Computer Society Press: Los Alamitos CA,2002; 261–270.
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | A Survey on Vehicle to Infrastructure Communication System |
| Country | : | India |
| Authors | : | Ms. Bharati Punjabi |
| : | 10.9790/0661-1561822 ![]() |
Abstract: Vehicle-to-Infrastructure (V2I) Communications for Safety is the wireless exchange of critical safety and operational data between vehicles and roadway infrastructure, intended primarily to avoid motor vehicle crashes. Vehicle-to-infrastructure (V2I) communication based on wireless local area network (WLAN) IEEE 802.11 standard technology can support user in-motion to achieve preferable Internet connectivity. This standard is created for urgent short message transmission.The IEEE 802.11 standard defines an infracture mode with at least one central access point connected to a wired network. In this paper we present an experimental study of IEEE802.11g using off-the-shelf devices in vehicle-to-infrastructure small scale scenario. In order to evaluate the V2I the type of communication in large scale scenario and intelligent transportation systems (ITS) will necessitate wireless vehicle-to-infrastructure (V2I) communica-tions. This wireless link can be implemented by several technolo-gies, such as digital broadcasting, cellular communication, or dedicated short range communication (DSRC) systems. Analyses of the coverage and capacity requirements are presented when each of the three systems are used to implement the V2I link.
Keywords: Short Range Vehicle Network; 802.11g; wireless network; goodput; network performance; transport; mobile stations; auto traffic; vehicle speed.
............................................
