International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 131 | Views: 299

Review Papers | Computer Science & Engineering | India | Volume 5 Issue 1, January 2016 | Popularity: 7.1 / 10


     

A Review of Protection against Unauthorized Access Using Sub-Space Outliers Ranking

Rushikesh V. Mahalle, Parnal P. Pawade


Abstract: Retrieval of information from the databases is now a days significant issues. The thrust of information for decision making is challenging one. To overcome this problem, different techniques have been developed for this purpose. One of techniques is clustering. Clustering is a significant task in data analysis and data mining applications. It is the task of arrangement a set of objects so that objects in the identical group are more related to each other than to those in other groups (clusters). The clustering is unsupervised learning. In this paper we propose a methodology for comparing clustering methods based on the quality of the result and the performance of the execution. The quality of a clustering result depends on both the similarity measure used by the method and its implementation. Clustering has been widely used as a segmentation approach therefore, choosing an appropriate clustering method is very critical to achieve better results. A good clustering method will produce high superiority clusters with high intra-class similarity and low inter-class similarity. There are different types of Clustering algorithms partition-based algorithms such as K-Means, KNN, density-based algorithms. Partitioning clustering algorithm splits the data points into k partition, where each partition represents a cluster. Density based algorithms find the cluster according to the regions which grow with high density. It is the one-scan algorithms.


Keywords: Data Mining, Density Based, Partition Based clustering, UNADA


Edition: Volume 5 Issue 1, January 2016


Pages: 721 - 723


DOI: https://www.doi.org/10.21275/NOV152880



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Rushikesh V. Mahalle, Parnal P. Pawade, "A Review of Protection against Unauthorized Access Using Sub-Space Outliers Ranking", International Journal of Science and Research (IJSR), Volume 5 Issue 1, January 2016, pp. 721-723, https://www.ijsr.net/getabstract.php?paperid=NOV152880, DOI: https://www.doi.org/10.21275/NOV152880



Similar Articles

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1068 - 1070

Predicting the Course Knowledge Level of Students using Data Mining Techniques

Thapaswini P S

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022

Pages: 947 - 949

COVID-19 Prediction using Machine Learning Algorithms

Saily Suresh Patil

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 12 Issue 11, November 2023

Pages: 1840 - 1846

Analysis of Placement for Electronics and Communication Engineering Students using Multiple Clustering

Dr. Dola Sanjay S

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 13 Issue 3, March 2024

Pages: 1036 - 1039

An Investigation of the Applications of Artificial Intelligence and Other New Technologies in Smart Energy Infrastructure

Karan Chawla

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 10, October 2022

Pages: 660 - 667

Prediction of Student Admission using Fuzzy based Education Data Mining

Dr. Nikhat Khan

Share this Article
Top