Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
Risk-Management by Numerical Pattern Analysis in Data-Mining
Authors: M. Kargar, R. Mirmiran, F. Fartash, T. Saderi
Abstract:
In this paper a new method is suggested for risk management by the numerical patterns in data-mining. These patterns are designed using probability rules in decision trees and are cared to be valid, novel, useful and understandable. Considering a set of functions, the system reaches to a good pattern or better objectives. The patterns are analyzed through the produced matrices and some results are pointed out. By using the suggested method the direction of the functionality route in the systems can be controlled and best planning for special objectives be done.Keywords: Analysis, Data-mining, Pattern, Risk Management.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1082943
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1275References:
[1] D. T. Larose, "Discovering Knowledge in Data: An Introduction to Data Mining," Copyright C 2005 John Wiley & Sons, Inc. Ch 1, pp.2-4.
[2] J. Pei, Shambhu J. Upadhyaya, Faisal Farooq and Venugopal Govindaraju, "Data Mining for Intrusion Detection: Techniques, Applications and Systems," Proceedings of the 20th International Conference on Data Engineering (ICDE-04) ┬® 2004 IEEE.
[3] E. Bloedorn, "Mining Aviation Safety Data: A Hybrid Approach," The MITRE Corporation, 2000.
[4] D. Kuonen, "A Statistical Perspective of Data Mining," published by CRM Today, December 2004, in CRM Zine (Vol. 48).
[5] V. Karasova, "Spatial data mining as a tool for improving geographical models," Master's Thesis, Helsinki University of Technology, 2005, pp.6-7.
[6] S. Laxman, and P S Sastry, "A survey of temporal data mining," Sadhana Vol. 31, Part 2, April 2006, ┬® Printed in India, p.173.
[7] C. Aflori, and Florin Leon, "Efficient distributed data mining using intelligent agents," supported in part by the National University Research Council under Grant AT no 66 / 2004.
[8] G. Piatetsky-Shapiro, Chabane Djeraba, and Lise Getoor, "What are the grand challenges for data mining?" KDD-2006 Panel Report, SIGKDD Explorations, Volume 8, Issue 2.
[9] J.L. 'Alvarez, J. Mata, and J.C. Riquelme, "Data mining for the management of software development process," International Journal of Software Engineering and Knowledge Engineering, (1994) World Scientific Publishing Company, p.3.
[10] A.J. McGrail, E. Gulski, and E.R.S. Groot , "Data mining techniques to access the condition of high voltage electrical plant," School of Electrical Engineering, University of New South Wales, SYDNEY, NSW 2052, AUSTRALIA, On behalf of WG 15.11 of Study Committee 15, 2002.
[11] J. n B. Ordieres Meré, and Manuel Castej n Limas, "Data mining in industrial processes," Actas del III Taller Nacional de Miner a de Datos y Aprendizaje, TAMIDA2005, P.60.
[12] D. J. Hand, Heikki Mannila and Padhraic Smyth, "Principles of Data Mining (Adaptive Computation and Machine Learning)," The MIT Press (August 1, 2001), Ch 6: models and patterns.
[13] T. Menzies, and Ying Hu, "Data mining for very busy people," Published by the IEEE Computer Society, ┬® 2003 IEEE, P.19.
[14] U. Fayyad, Gregory Piatetsky-Shapiro and Padhraic Smyth, "From Data Mining to Knowledge Discovery in Databases," Copyright ┬® 1996, American Association for Artificial Intelligence, pp. 37-49.
[15] B. Thau Loo, Tyson Condie, Minos Garofalakis, David E. Gay, and Joseph M. Hellerstein, "Declarative networking: language, execution and optimization," SIGMOD 2006, Chicago, Illinois, USA, Copyright 2006 ACM.
[16] M. Nycz, and Barbara Smok, "Intelligent support for decision-making: a conceptual model," Informing Science InSITE - "Where Parallels Intersect", June 2003, P. 916-917.
[17] Xindong Wu1, "Data Mining: An AI Perspective," IEEE Computational Intelligence Bulletin, December 2004, Vol.4 No.2..
[18] M. Karegar, A. Isazadeh, F. Fartash, T. Saderi, A. Habibizad Navin. Data-mining by the probability-based patterns. Proceeding of the 30th International Conference on Information Technology Integrity, ITI 2008 IEEE, June 2008.