A Review on Data Mining, Its Applications and Approaches
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 106 | Views: 346

Review Papers | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016 | Popularity: 6.2 / 10


     

A Review on Data Mining, Its Applications and Approaches

Anu Verma, Jyoti Arora


Abstract: Data mining is the process of extracting useful information from the large amount of database at any time and at any place. The normalization is a process of organizing the data in database to avoid data redundancy, insertion anomaly, update anomaly & deletion anomaly. If a database design is not perfect, it may contain anomalies, which are like a bad dream for any database administrator. Managing a database with anomalies is next to impossible. In the proposed work, data set of normalization is analyzed. The analyzation process is done to remove the missing values from the database. Then an encryption function is developed. Different classifiers are implemented for accuracy of data.


Keywords: Data Mining, Encryption, Normalization


Edition: Volume 5 Issue 6, June 2016


Pages: 1211 - 1215


DOI: https://www.doi.org/10.21275/NOV164153



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Anu Verma, Jyoti Arora, "A Review on Data Mining, Its Applications and Approaches", International Journal of Science and Research (IJSR), Volume 5 Issue 6, June 2016, pp. 1211-1215, https://www.ijsr.net/getabstract.php?paperid=NOV164153, DOI: https://www.doi.org/10.21275/NOV164153

Similar Articles

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 654 - 659

Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial

GVSS Jayanth Anish

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1068 - 1070

Predicting the Course Knowledge Level of Students using Data Mining Techniques

Thapaswini P S

Share this Article

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 12 Issue 11, November 2023

Pages: 1840 - 1846

Analysis of Placement for Electronics and Communication Engineering Students using Multiple Clustering

Dr. Dola Sanjay S

Share this Article
Top