DATA CLEANING IN KNOWLEDGE DISCOVERY DATABASE (KDD)-DATA MINING
Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER SCIENCE AND ELECTRONICS ENGINEERING
Author(s): ANTONI WIBOWO , FAUZIAH ABDUL RAHMAN , MOHAMMAD ISHAK DESA , NORHAIDAH ABU HARIS
Abstract: Data quality is a main issue in quality information management. Data quality problems occur anywhere in information systems. These problems are solved by data cleaning. Data cleaning (DC)is a process used to determine inaccurate, incomplete or unreasonable data and then improve the quality through correcting of detected errors and omissions. Generally data cleaning reduces errors and improves the data quality. It is well known that the process of correcting errors in data and eliminating bad records are time consuming and involve a tedious process but it cannot be ignored. Various process of DC have been discussed in the previous studies, but there’s no standard or formalized the DC process. Knowledge Discovery Database (KDD) is a tool that enables one to intelligently analyze and explore extensive data for effective decision making. The Cross-Industry Standard Process for Data Mining (CRISP-DM) is one of the KDD methodology often used for this purpose. This paper review and emphasize
- Publication Date: 09-Mar-2014
- DOI: 10.15224/978-1-63248-000-2-76
- Views: 0
- Downloads: 0
NS-AKA: AN IMPROVED AND EFFICIENT AKA PROTOCOL FOR 3G (UMTS) NETWORKS
Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER SCIENCE AND ELECTRONICS ENGINEERING
Author(s): NARENDRA S. CHAUDHARI , NEETESH SAXENA
Abstract: In this paper, we propose an improved and efficient AKA protocol named “NS-AKA” to prevent the 3G UMTS networks from various attacks like man-in-the-middle attack, redirection attack, replay attack and active attacks in the corrupted UMTS networks. This protocol completely eliminates the need of synchronization between a mobile station and its home network, and protects the actual identity of each user in the networks, (i.e., IMSI) by generating a temporary identity for each user during the authentication. The NS-AKA protocol generates minimum communication and computation overheads compared to UMTS-AKA, S-AKA, AP-AKA, and EURASIP-AKA protocols. On an average the NS-AKA protocol reduces 67% of the bandwidth consumption during the authentication process as compare to UMTS-AKA, which is the maximum reduction of bandwidth by any AKA protocol referred in the paper.
- Publication Date: 09-Mar-2014
- DOI: 10.15224/978-1-63248-000-2-74
- Views: 0
- Downloads: 0