International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 131

Review Papers | Computer Science & Engineering | India | Volume 5 Issue 1, January 2016


A Review of Protection against Unauthorized Access Using Sub-Space Outliers Ranking

Rushikesh V. Mahalle [2] | Parnal P. Pawade [2]


Abstract: Retrieval of information from the databases is now a days significant issues. The thrust of information for decision making is challenging one. To overcome this problem, different techniques have been developed for this purpose. One of techniques is clustering. Clustering is a significant task in data analysis and data mining applications. It is the task of arrangement a set of objects so that objects in the identical group are more related to each other than to those in other groups (clusters). The clustering is unsupervised learning. In this paper we propose a methodology for comparing clustering methods based on the quality of the result and the performance of the execution. The quality of a clustering result depends on both the similarity measure used by the method and its implementation. Clustering has been widely used as a segmentation approach therefore, choosing an appropriate clustering method is very critical to achieve better results. A good clustering method will produce high superiority clusters with high intra-class similarity and low inter-class similarity. There are different types of Clustering algorithms partition-based algorithms such as K-Means, KNN, density-based algorithms. Partitioning clustering algorithm splits the data points into k partition, where each partition represents a cluster. Density based algorithms find the cluster according to the regions which grow with high density. It is the one-scan algorithms.


Keywords: Data Mining, Density Based, Partition Based clustering, UNADA


Edition: Volume 5 Issue 1, January 2016,


Pages: 721 - 723

A Review of Protection against Unauthorized Access Using Sub-Space Outliers Ranking


How to Cite this Article?

Rushikesh V. Mahalle, Parnal P. Pawade, "A Review of Protection against Unauthorized Access Using Sub-Space Outliers Ranking", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=NOV152880, Volume 5 Issue 1, January 2016, 721 - 723, #ijsrnet

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'Data Mining'

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1068 - 1070

Predicting the Course Knowledge Level of Students using Data Mining Techniques

Thapaswini P S [2]

Share this Article

Downloads: 68

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021

Pages: 1669 - 1672

Random Forest Based Heart Disease Prediction

Adeen [3] | Preeti Sondhi [7]

Share this Article


Top