Convergence of IT and Data Mining with other technologies

Authors

  • Shilpa Mahajan School of Engineering and Technology, Ansal University, India

Keywords:

IT security, physical security, convergence, mobility data mining, genomics, proteomics, RMS, process management

Abstract

In this age of technology and communication convergence, we cannot help but be impacted by technologies and innovations that center on computers. This paper examines the growing need for a secure environment and a general-purpose analytics engine. The process need for secure environment is Physical or It security and the process used for analysis is called Data Mining. This paper will also give us the review towards the convergence of various technologies such as IT and Physical Security and data mining with biology, computing, mobility, knowledge management, etc. for human values like privacy, recognition, operational intelligence, etc. and also relationship between data mining/IT security.

 

References

G. Piatetsky-Shapiro, G. Frawley, and W. Frawley. “Knowledge Discovery in Databases”. AAAI Press, Menlo Park, California, 1991.

S. Jablonski, C. Bussler, “Workflow management, Modeling concepts, architecture and implementation”, Thomson, London, UK, 1996.

A. Abecker, A. Bernardi, K. Hinkelmann, O. Kühn and M. Sintek, “Toward a Technology for Organizational Memories”. IEEE Intelligent Systems, vol. 13, no. 3, pp. 40-48, 1998.

Q. Ma, and J.T.L. Wang, “Biological Data Mining using Bayesian Neural Networks: A case study. International Journal on Artificial Intelligence Tools, Special Issue on Biocomputing, 1999, vol. 8, no. 4, pp. 433-451.

R. Tibshirani, T. Hastie, M. Eisen, D. Ross, D. Botstein, and P. Brown, “Clustering methods for the analysis of DNA microarray data (Tech. Rep.). Department of Statistics”, Stanford University, Stanford, California, USA, 1999.

H.J.Miller and J.Han(eds). Geographic Data Mining and Knowledge Discovery. Taylor & Francis, 2001.

T. Berners-Lee, J. Hendler, and O. Lassila, “The Semantic Web: A new form of Web content that is meaningful to computers will unleash a revolution of new possibilities”,Sci. Amer., May 2001.

D.S. Whishart, “Tools for protein technologies. In Sensen, C.W. (Ed.), Biotechnology, Genomics and Bioinformatics, vol. 5b, Wiley-VCH, 2002, pp. 325-344.

F. Zeng, C.H.R. Yap and L. Wong, “Using feature generation and feature selection for accurate prediction of translation initiation sites”. Genome Informatics, 2002, vol. 13, pp. 192-200.

G. Piatetsky-Shapiro, and P. Tamayo, “Microarray Data Mining: Facing the Challenges”. SIGKDD Explorations, 2003, vol. 5, no. 2, pp. 1-5.

M. zur Muehlen, “Organizational management in workflow applications”, Informational Technology and Management Journal. Kluwer Academic Publisher, 2004, vol. 5, no. 3, pp. 271-291.

R. Bino, R. Hall, O. Fiehn, J. Kopka, K. Saito, J. Draper, B. Nikolau, P. Mendes, U. Roessner-Tunali, M. Beale, R. Trethewey, B. Lange, E. Wurtele, and L. Sumner, “Potential of metabolomics as a functional genomics tool.” Trends Plant Sci, vol. 9, no. 9, pp. 418–425, September 2004.

B. Liang and P. Dubey, “BRecognition, mining and synthesis”, Intel Technol. J., vol. 9, May 2005.

ProDatO “Integration Technology GmbH: Handbuch iPM Integrated Process Manager”’ Software documentation (in German), Erlangen, Germany, 2005, www.prodato.de.

O. Marjanovic, “The next stage of operational business intelligence – creating new challenges for business process management”, in Sprague”, R.H. Jr (Ed.), Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS’07), 2007, IEEE Computer Society, Los Alamitos.

Y. Xia, A. Campen, D. Rigsby, Y. Guo, X. Feng, E. Su, M. Palakal, and S. Li, DGEM, “Mining Gene Expression database for primary se tissues, Molecular Diagnosis & Therapy, Issue 3, 2007

B. Thuraisingham. Managing threats to web databases and cyber systems: Issues, solutions and challenges. In V. Kumar et al, editor, Cyber Security: Threats and Countermeasures. Kluwer

B. Thuraisingham. Data mining, national security, privacy and civil liberties. SIGKDD Explorations, January 2003

F. Bolz et al. The Counterterrorism Handbook: Tactics, Procedures, and Techniques. CRC Press, 2001

Downloads

Published

2013-08-30

How to Cite

[1]
S. Mahajan, “Convergence of IT and Data Mining with other technologies”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 1, no. 4, pp. 31–37, Aug. 2013.

Issue

Section

Technical Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.