• Title/Summary/Keyword: Network Mining

Search Result 1,036, Processing Time 0.023 seconds

Case study of the mining-induced stress and fracture network evolution in longwall top coal caving

  • Li, Cong;Xie, Jing;He, Zhiqiang;Deng, Guangdi;Yang, Bengao;Yang, Mingqing
    • Geomechanics and Engineering
    • /
    • v.22 no.2
    • /
    • pp.133-142
    • /
    • 2020
  • The evolution of the mining-induced fracture network formed during longwall top coal caving (LTCC) has a great influence on the gas drainage, roof control, top coal recovery ratio and engineering safety of aquifers. To reveal the evolution of the mining-induced stress and fracture network formed during LTCC, the fracture network in front of the working face was observed by borehole video experiments. A discrete element model was established by the universal discrete element code (UDEC) to explore the local stress distribution. The regression relationship between the fractal dimension of the fracture network and mining stress was established. The results revealed the following: (1) The mining disturbance had the most severe impact on the borehole depth range between approximately 10 m and 25 m. (2) The distribution of fractures was related to the lithology and its integrity. The coal seam was mainly microfractures, which formed a complex fracture network. The hard rock stratum was mainly included longitudinal cracks and separated fissures. (3) Through a numerical simulation, the stress distribution in front of the mining face and the development of the fracturing of the overlying rock were obtained. There was a quadratic relationship between the fractal dimension of the fractures and the mining stress. The results obtained herein will provide a reference for engineering projects under similar geological conditions.

Wireless Network Health Information Retrieval Method Based on Data Mining Algorithm

  • Xiaoguang Guo
    • Journal of Information Processing Systems
    • /
    • v.19 no.2
    • /
    • pp.211-218
    • /
    • 2023
  • In order to improve the low accuracy of traditional wireless network health information retrieval methods, a wireless network health information retrieval method is designed based on data mining algorithm. The invalid health information stored in wireless network is filtered by data mapping, and the health information is clustered by data mining algorithm. On this basis, the high-frequency words of health information are classified to realize wireless network health information retrieval. The experimental results show that exactitude of design way is significantly higher than that of the traditional method, which can solve the problem of low accuracy of the traditional wireless network health information retrieval method.

From Multimedia Data Mining to Multimedia Big Data Mining

  • Constantin, Gradinaru Bogdanel;Mirela, Danubianu;Luminita, Barila Adina
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.381-389
    • /
    • 2022
  • With the collection of huge volumes of text, image, audio, video or combinations of these, in a word multimedia data, the need to explore them in order to discover possible new, unexpected and possibly valuable information for decision making was born. Starting from the already existing data mining, but not as its extension, multimedia mining appeared as a distinct field with increased complexity and many characteristic aspects. Later, the concept of big data was extended to multimedia, resulting in multimedia big data, which in turn attracted the multimedia big data mining process. This paper aims to survey multimedia data mining, starting from the general concept and following the transition from multimedia data mining to multimedia big data mining, through an up-to-date synthesis of works in the field, which is a novelty, from our best of knowledge.

Towards Improving Causality Mining using BERT with Multi-level Feature Networks

  • Ali, Wajid;Zuo, Wanli;Ali, Rahman;Rahman, Gohar;Zuo, Xianglin;Ullah, Inam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3230-3255
    • /
    • 2022
  • Causality mining in NLP is a significant area of interest, which benefits in many daily life applications, including decision making, business risk management, question answering, future event prediction, scenario generation, and information retrieval. Mining those causalities was a challenging and open problem for the prior non-statistical and statistical techniques using web sources that required hand-crafted linguistics patterns for feature engineering, which were subject to domain knowledge and required much human effort. Those studies overlooked implicit, ambiguous, and heterogeneous causality and focused on explicit causality mining. In contrast to statistical and non-statistical approaches, we present Bidirectional Encoder Representations from Transformers (BERT) integrated with Multi-level Feature Networks (MFN) for causality recognition, called BERT+MFN for causality recognition in noisy and informal web datasets without human-designed features. In our model, MFN consists of a three-column knowledge-oriented network (TC-KN), bi-LSTM, and Relation Network (RN) that mine causality information at the segment level. BERT captures semantic features at the word level. We perform experiments on Alternative Lexicalization (AltLexes) datasets. The experimental outcomes show that our model outperforms baseline causality and text mining techniques.

Sequential Pattern Mining for Intrusion Detection System with Feature Selection on Big Data

  • Fidalcastro, A;Baburaj, E
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.5023-5038
    • /
    • 2017
  • Big data is an emerging technology which deals with wide range of data sets with sizes beyond the ability to work with software tools which is commonly used for processing of data. When we consider a huge network, we have to process a large amount of network information generated, which consists of both normal and abnormal activity logs in large volume of multi-dimensional data. Intrusion Detection System (IDS) is required to monitor the network and to detect the malicious nodes and activities in the network. Massive amount of data makes it difficult to detect threats and attacks. Sequential Pattern mining may be used to identify the patterns of malicious activities which have been an emerging popular trend due to the consideration of quantities, profits and time orders of item. Here we propose a sequential pattern mining algorithm with fuzzy logic feature selection and fuzzy weighted support for huge volumes of network logs to be implemented in Apache Hadoop YARN, which solves the problem of speed and time constraints. Fuzzy logic feature selection selects important features from the feature set. Fuzzy weighted supports provide weights to the inputs and avoid multiple scans. In our simulation we use the attack log from NS-2 MANET environment and compare the proposed algorithm with the state-of-the-art sequential Pattern Mining algorithm, SPADE and Support Vector Machine with Hadoop environment.

Finding Naval Ship Maintenance Expertise Through Text Mining and SNA

  • Kim, Jin-Gwang;Yoon, Soung-woong;Lee, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.7
    • /
    • pp.125-133
    • /
    • 2019
  • Because military weapons systems for special purposes are small and complex, they are not easy to maintain. Therefore, it is very important to maintain combat strength through quick maintenance in the event of a breakdown. In particular, naval ships are complex weapon systems equipped with various equipment, so other equipment must be considered for maintenance in the event of equipment failure, so that skilled maintenance personnel have a great influence on rapid maintenance. Therefore, in this paper, we analyzed maintenance data of defense equipment maintenance information system through text mining and social network analysis(SNA), and tried to identify the naval ship maintenance expertise. The defense equipment maintenance information system is a system that manages military equipment efficiently. In this study, the data(2,538cases) of some naval ship maintenance teams were analyzed. In detail, we examined the contents of main maintenance and maintenance personnel through text mining(word cloud, word network). Next, social network analysis(collaboration analysis, centrality analysis) was used to confirm the collaboration relationship between maintenance personnel and maintenance expertise. Finally, we compare the results of text mining and social network analysis(SNA) to find out appropriate methods for finding and finding naval ship maintenance expertise.

Network Anomaly Detection using Association Rule Mining in Network Packets (네트워크 패킷에 대한 연관 마이닝 기법을 적용한 네트워크 비정상 행위 탐지)

  • Oh, Sang-Hyun;Chang, Joong-Hyuk
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.3
    • /
    • pp.22-29
    • /
    • 2009
  • In previous work, anomaly-based intrusion detection techniques have been widely used to effectively detect various intrusions into a computer. This is because the anomaly-based detection techniques can effectively handle previously unknown intrusion methods. However, most of the previous work assumed that the normal network connections are fixed. For this reason, a new network connection may be regarded as an anomalous event. This paper proposes a new anomaly detection method based on an association-mining algorithm. The proposed method is composed of two phases: intra-packet association mining and inter-packet association mining. The performances of the proposed method are comparatively verified with JAM, which is a conventional representative intrusion detection method.

Improved Bitcoin Network Neighbors Connection Algorithm to Reduce Block Propagation Time (블록 전파 시간 단축을 위한 비트코인 네트워크 이웃 연결 알고리즘 개선)

  • Bang, Jiwon;Choi, Mi-Jung
    • KNOM Review
    • /
    • v.23 no.1
    • /
    • pp.26-33
    • /
    • 2020
  • Bitcoin is an electronic money that does not rely on centralized institutions such as banks and financial institutions, unlike the world's paper currencies such as dollar, won, euro and yen. In Bitcoin network, a block with transaction details is generated by mining, and the message that the block has been created is broadcast to all participating nodes in a broadcasting method to secure reliability through verification. Likewise, the mining and block propagation methods in the Bitcoin network are greatly affected by the performance of the P2P network. For example, in the case of mining, the node receiving the reward for mining varies depending on whether the block is first mined in the network and the proof of mining is propagated faster. In this paper, we applied local characteristics and Round-to-Trip(RTT) measurement to solve the problems of the existing neighbor connection method and block propagation method performed in Bitcoin network. An algorithm to improve block propagation speed is presented. Through experiments, we compare the performance of the improved algorithm with the existing algorithm to verify that the overall block propagation time is reduced.

Using Structural Changes to support the Neural Networks based on Data Mining Classifiers: Application to the U.S. Treasury bill rates

  • Oh, Kyong-Joo
    • 한국데이터정보과학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.57-72
    • /
    • 2003
  • This article provides integrated neural network models for the interest rate forecasting using change-point detection. The model is composed of three phases. The first phase is to detect successive structural changes in interest rate dataset. The second phase is to forecast change-point group with data mining classifiers. The final phase is to forecast the interest rate with BPN. Based on this structure, we propose three integrated neural network models in terms of data mining classifier: (1) multivariate discriminant analysis (MDA)-supported neural network model, (2) case based reasoning (CBR)-supported neural network model and (3) backpropagation neural networks (BPN)-supported neural network model. Subsequently, we compare these models with a neural network model alone and, in addition, determine which of three classifiers (MDA, CBR and BPN) can perform better. For interest rate forecasting, this study then examines the predictability of integrated neural network models to represent the structural change.

  • PDF

Distributed Incremental Approximate Frequent Itemset Mining Using MapReduce

  • Mohsin Shaikh;Irfan Ali Tunio;Syed Muhammad Shehram Shah;Fareesa Khan Sohu;Abdul Aziz;Ahmad Ali
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.207-211
    • /
    • 2023
  • Traditional methods for datamining typically assume that the data is small, centralized, memory resident and static. But this assumption is no longer acceptable, because datasets are growing very fast hence becoming huge from time to time. There is fast growing need to manage data with efficient mining algorithms. In such a scenario it is inevitable to carry out data mining in a distributed environment and Frequent Itemset Mining (FIM) is no exception. Thus, the need of an efficient incremental mining algorithm arises. We propose the Distributed Incremental Approximate Frequent Itemset Mining (DIAFIM) which is an incremental FIM algorithm and works on the distributed parallel MapReduce environment. The key contribution of this research is devising an incremental mining algorithm that works on the distributed parallel MapReduce environment.