Conferences related to Data Mining

Back to Top

IGARSS 2015 - 2015 IEEE International Geoscience and Remote Sensing Symposium

The Geoscience and Remote Sensing Society (GRSS) seeks to advance science and technology in geoscience, remote sensing and related fields using conferences, education and other resources. Its fields of interest are the theory, concepts and techniques of science and engineering as they apply to the remote sensing of the earth, oceans, atmosphere, and space, as well as the processing, interpretation and dissemination of this information.


2014 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)

IEEE International Conference on Fuzzy Systems is the largest technical event in the field of fuzzy systems. In 2014, International Joint Conference on Neural Networks will be part of the 2104 IEEE World Congress on Computational Intelligence.

  • 2013 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)

    The conference will provide a platform for researchers and practitioners to deliberate / exchange ideas on a wide range topics in fuzzy systems and related areas including fuzzy measures, fuzzy control, fuzzy pattern recognition, data/text/web mining, information/text/image retrieval, knowledge discovery, reasoning, and applications of fuzzy theories in all areas

  • 2012 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)

    The annual FUZZ-IEEE is one of the leading events in the field of fuzzy systems.

  • 2011 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)

    The FUZZ-IEEE 2011 will be held in Taipei, Taiwan. The conference will cover the whole range of research and applications in fuzzy systems and soft computing. In addition to regular oral and poster presentations, the conference will include a full program of tutorials, workshops, panel sessions, and keynote talks.

  • 2010 IEEE 18th International Conference on Fuzzy Systems (FUZZ-IEEE)

  • 2009 IEEE 17th International Conference on Fuzzy Systems (FUZZ-IEEE)

    Topics: Fuzzy logic/reasoning, Fuzzy mathematics, Fuzzy adaptive/control systems, Fuzzy system modeling and analysis, Fuzzy data mining/analysis, Fuzzy decision making, Fuzzy optimization/forecasting, Fuzzy pattern recognition and image/signal processing, Fuzzy information systems, Fuzzy system architecture/hardware, Fuzzy internet applications, Computing with words


2014 International Conference on Distributed Frameworks for Multimedia Applications (DFmA)

Papers are invited on all aspects of Advanced Computer Networks/Next Generation Internet or research areas aligned to it that include (but are not limited to) the following: Multimedia Communications and Systems, Networks/Internet & Communications, Internet Security and Monitoring, Grid and Cloud Computing.

  • 2010 International Conference on Distributed Frameworks for Multimedia Applications (DFmA)

    DFmA (Distributed Frameworks & Applications) formerly known as DFMA (Distributed Framework for Multimedia & Applications) is the series of annual Franco Malaysia Conference on Multimedia that has already initiated in 2005 by the University Franche- Comt and the Universiti Sains Malaysia (USM) to provide a forum for researchers in computer science from both countries and to promote interaction with researchers from other regions as well. DFmA is an international conference born from the collabora


2013 11th International Workshop on Content-Based Multimedia Indexing (CBMI)

The 11th International Content Based Multimedia Indexing Workshop is to bring together the various communities involved in all aspects of content-based multimedia indexing, retrieval, browsing and presentation.The conference will host invited keynote talks and regular, special and demo sessions with contributed research papers.

  • 2012 10th International Workshop on Content-Based Multimedia Indexing (CBMI)

    10th International CBMI Workshop aims at bringing together the various communities involved in all aspects of content-based multimedia indexing, retrieval, browsing and presentation. The scientific program of CBMI 2012 will include invited keynote talks and regular, special and demo sessions with contributed research papers.

  • 2011 9th International Workshop on Content-Based Multimedia Indexing (CBMI)

    CBMI 2011 aims at bringing together the various communities involved in the different aspects of content-based multimedia indexing, retrieval, browsing and presentation.

  • 2010 International Workshop on Content-Based Multimedia Indexing (CBMI)

    CBMI 2010 aims at bringing together the various communities involved in the different aspects of Content-Based Multimedia Indexing. submissions include, but are not limited to multimedia indexing and retrieval, matching and similarity search,construction of high level indices, multimedia content extraction, dentification and tracking of semantic regions in scenes, ...

  • 2009 International Workshop on Content-Based Multimedia Indexing (CBMI)

    CBMI 2009 aims at bringing together the research communities involved in the different aspects of content-based multimedia indexing, such as image analysis, computer vision, pattern recognition and information retrieval with current industrial trends and developments.

  • 2008 International Workshop on Content-Based Multimedia Indexing (CBMI)

    CBMI is the main international forum for the presentation and discussion of the latest technological advances, industrial needs and product developments in multimedia indexing, search, retrieval, navigation and browsing.

  • 2007 International Workshop on Content-Based Multimedia Indexing (CBMI)

    Multimedia indexing and retrieval (image, audio, video, text), Multimedia content extraction, Matching and similarity research, Construction of high level indices, Multi-modal and cross-modal indexing, Content-based search techniques, Multimedia data mining, Presentation tools, Meta-data compression and tranformation, Handling of very large scale multimedia database, Organization, summarization and browsing of multimedia documents, Applications, Evaluation and metrics


2013 16th International Conference on Information Fusion - (FUSION 2013)

Scope of the conference is to provide medium to discuss advances and applications of fusion methodologies. Conference will include contributions in the areas of fusion methodologies, theory and representation, algorithms and modelling and simulation.

  • 2012 15th International Conference on Information Fusion (FUSION)

    The objective of the conference is to provide a forum to discuss advances and applications of fusion methodologies. The conference will feature keynote speeches, special sessions, and tutorials on topics of current interest.

  • 2011 International Conference on Information Fusion (FUSION)

    This conference is dedicated to advancing the knowledge, theory, and applications of information fusion. Topics will include radar processing, artificial intelligence, target tracking, classification, sensor networks, and sensor management.

  • 2010 13th International Conference on Information Fusion - (FUSION 2010)

    This annual conference aims to bring together professionals from around the world to facilitate discussion on the recent advances and pertinent issues in fusion technologies. Key themes are Methodologies, Algorithmic Domains, Solution Paradigms, Sensor Specific Processing and Fusion, Modelling, Simulation and Evaluation and Application Domains.

  • 2009 12th International Conference on Information Fusion - (FUSION 2009)

    Overview -- The 12th International Conference on Information Fusion will be held in Seattle, Washington, at the Grand Hyatt Seattle Hotel. Authors are invited to submit papers describing advances and applications in information fusion, with submission of non-traditional topics encouraged. Conference Site -- Pacific Northwest is one of the most scenic parts of United States and Seattle is the home of some of the world's biggest technology companies such as Boeing and Microsoft. Seattle is easily accessible

  • 2008 11th International Conference on Information Fusion - (FUSION 2008)

    The conference exists to advance the understanding of information fusion methodologies, algorithms, technologies and applications.

  • 2007 10th International Conference on Information Fusion - (FUSION 2007)

    This conference is the annual conference of the International Society of Information Fusion (ISIF:www.isif.org). It is the forum of scientists and engineers involved in sensor fusion, data fusion, information fusion and knowledge management.

  • 2006 9th International Conference on Information Fusion - (FUSION 2006)


More Conferences

Periodicals related to Data Mining

Back to Top

Internet Computing, IEEE

IEEE Internet Computing provides journal-quality evaluation and review of emerging and maturing Internet technologies and applications. The magazine targets the technical and scientific Internet user communities as well as designers and developers of Internet-based applications and enabling technologies. IC publishes refereed articles on the latest developments and key trends in Internet technologies and applications. A crossroads between academic researchers and ...


Knowledge and Data Engineering, IEEE Transactions on

Artificial intelligence techniques, including speech, voice, graphics, images, and documents; knowledge and data engineering tools and techniques; parallel and distributed processing; real-time distributed processing; system architectures, integration, and modeling; database design, modeling, and management; query design, and implementation languages; distributed database control; statistical databases; algorithms for data and knowledge management; performance evaluation of algorithms and systems; data communications aspects; system ...


Systems, Man, and Cybernetics, Part B, IEEE Transactions on

The scope of the IEEE Transactions on Systems, Man and Cybernetics Part B: Cybernetics includes computational approaches to the field of cybernetics. Specifically, the transactions welcomes papers on communication and control across machines or between machines, humans, and organizations. The scope of Part B includes such areas as computational intelligence, computer vision, neural networks, genetic algorithms, machine learning, fuzzy systems, ...


Transactions on Sustainable Energy

The IEEE Transactions on Sustainable Energy is a cross disciplinary and internationally archival journal aimed at disseminating results of research on sustainable energy that relates to, arises from, or deliberately influences energy generation, transmission, distribution and delivery. The journal will publish original research on theories and development on principles of sustainable energy technologies and systems.This journal will cover the following ...




Xplore Articles related to Data Mining

Back to Top

Automatic co-registration performance of fully polarimetric SAR images with texture relationship

Kamolratn Chureesampant; Junichi Susaki 2011 IEEE International Geoscience and Remote Sensing Symposium, 2011

This paper presents a methodology for automatic co registration of polarimetric Synthetic Aperture Radar (SAR) images obtained from similar satellites, but with differing view angles. The Scale Invariant Feature Transform (SIFT) algorithm is applied to extract candidate Ground Control Points (GCPs), where two-way keypoint matching eliminates improbable correspondence keypoints. Minimizing the Root Mean Squared Error (RMSE) also removes matching points ...


Fine Grained Transaction Log for Data Recovery in Database Systems

Ge Fu; Hong Zhu; Yucai Feng; Yi Zhu; Jie Shi; Min Chen; Xueqiong Wang 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference, 2008

Data recovery for malicious committed transactions after attacks increasingly becomes an important issue. Damage assessment for data recovery requires a transaction log which record data items read or written by all malicious and benign transactions. Unfortunately, conventional undo/redo log could not record read operations for transactions; and existing auditing mechanisms in DBMS could not capture operations for data items. In ...


An Evolving Information System Based on Data Mining Knowledge to Support Customer Relationship Management

Ming Ren; Zuoliang Chen; Chuanlan Liu; Guoqing Chen 2008 IEEE Symposium on Advanced Management of Information for Globalized Enterprises (AMIGE), 2008

It is becoming more vital than ever before for business to manage customer relationship and build customer loyalty. Information systems and data mining techniques have significant contributions in the customer relationship management process. In the dynamic business environment, information systems need to evolve to adapt to the change in requirements, which is driven by customer relationship management. An evolving information ...


Machine learning approaches to power-system security assessment

L. Wehenkel IEEE Expert, 1997

The paper discusses a framework that uses machine learning and other automatic-learning methods to assess power-system security. The framework exploits simulation models in parallel to screen diverse simulation scenarios of a system, yielding a large database. Using data mining techniques, the framework extracts synthetic information about the simulated system's main features from this database


Modeling of MOSFETs for CMOS RF-IC Design

Guizhu Lu; Zhiyuan Shi; Gary Li 2007 International Workshop on Anti-Counterfeiting, Security and Identification (ASID), 2007

High-frequency (HF) modeling of MOSFETs for radio-frequency (RF) integrated circuit (IC) design is discussed. Modeling of the quasi-static (QS) and non- quasi-static (NQS) effect is discussed. Through the simulation results of the QS and NQS model with the comparison to the measured data, it is proved that the inclusion of the NQS effect would be a desirable feature for a ...


More Xplore Articles

Educational Resources on Data Mining

Back to Top

eLearning

Automatic co-registration performance of fully polarimetric SAR images with texture relationship

Kamolratn Chureesampant; Junichi Susaki 2011 IEEE International Geoscience and Remote Sensing Symposium, 2011

This paper presents a methodology for automatic co registration of polarimetric Synthetic Aperture Radar (SAR) images obtained from similar satellites, but with differing view angles. The Scale Invariant Feature Transform (SIFT) algorithm is applied to extract candidate Ground Control Points (GCPs), where two-way keypoint matching eliminates improbable correspondence keypoints. Minimizing the Root Mean Squared Error (RMSE) also removes matching points ...


Fine Grained Transaction Log for Data Recovery in Database Systems

Ge Fu; Hong Zhu; Yucai Feng; Yi Zhu; Jie Shi; Min Chen; Xueqiong Wang 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference, 2008

Data recovery for malicious committed transactions after attacks increasingly becomes an important issue. Damage assessment for data recovery requires a transaction log which record data items read or written by all malicious and benign transactions. Unfortunately, conventional undo/redo log could not record read operations for transactions; and existing auditing mechanisms in DBMS could not capture operations for data items. In ...


An Evolving Information System Based on Data Mining Knowledge to Support Customer Relationship Management

Ming Ren; Zuoliang Chen; Chuanlan Liu; Guoqing Chen 2008 IEEE Symposium on Advanced Management of Information for Globalized Enterprises (AMIGE), 2008

It is becoming more vital than ever before for business to manage customer relationship and build customer loyalty. Information systems and data mining techniques have significant contributions in the customer relationship management process. In the dynamic business environment, information systems need to evolve to adapt to the change in requirements, which is driven by customer relationship management. An evolving information ...


Machine learning approaches to power-system security assessment

L. Wehenkel IEEE Expert, 1997

The paper discusses a framework that uses machine learning and other automatic-learning methods to assess power-system security. The framework exploits simulation models in parallel to screen diverse simulation scenarios of a system, yielding a large database. Using data mining techniques, the framework extracts synthetic information about the simulated system's main features from this database


Modeling of MOSFETs for CMOS RF-IC Design

Guizhu Lu; Zhiyuan Shi; Gary Li 2007 International Workshop on Anti-Counterfeiting, Security and Identification (ASID), 2007

High-frequency (HF) modeling of MOSFETs for radio-frequency (RF) integrated circuit (IC) design is discussed. Modeling of the quasi-static (QS) and non- quasi-static (NQS) effect is discussed. Through the simulation results of the QS and NQS model with the comparison to the measured data, it is proved that the inclusion of the NQS effect would be a desirable feature for a ...


More eLearning Resources

IEEE-USA E-Books

  • No title

    This book offers a comprehensive overview of the various concepts and research issues about blogs or weblogs. It introduces techniques and approaches, tools and applications, and evaluation methodologies with examples and case studies. Blogs allow people to express their thoughts, voice their opinions, and share their experiences and ideas. Blogs also facilitate interactions among individuals creating a network with unique characteristics. Through the interactions individuals experience a sense of community. We elaborate on approaches that extract communities and cluster blogs based on information of the bloggers. Open standards and low barrier to publication in Blogosphere have transformed information consumers to producers, generating an overwhelming amount of ever-increasing knowledge about the members, their environment and symbiosis. We elaborate on approaches that sift through humongous blog data sources to identify influential and trustworthy bloggers leveraging content and net ork information. Spam blogs or "splogs" are an increasing concern in Blogosphere and are discussed in detail with the approaches leveraging supervised machine learning algorithms and interaction patterns. We elaborate on data collection procedures, provide resources for blog data repositories, mention various visualization and analysis tools in Blogosphere, and explain conventional and novel evaluation methodologies, to help perform research in the Blogosphere. The book is supported by additional material, including lecture slides as well as the complete set of figures used in the book, and the reader is encouraged to visit the book website for the latest information. Table of Contents: Modeling Blogosphere / Blog Clustering and Community Discovery / Influence and Trust / Spam Filtering in Blogosphere / Data Collection and Evaluation

  • 2D Shape Measures for Computer Vision

    Shape is a critical element of computer vision systems, and can be used in many ways and for many applications. Examples include classification, partitioning, grouping, registration, data mining, and content based image retrieval. A variety of schemes that compute global shape measures, which can be categorized as techniques based on minimum bounding rectangles, other bounding primitives, fitted shape models, geometric moments, and Fourier descriptors are described.

  • Index

    Genetic programming, a form of genetic algorithm that evolves programs and program-like executable structures, is a new paradigm for developing reliable, time- and cost-effective applications. The second volume of Advances in Genetic Programming highlights many of the most recent technical advances in this increasingly popular field. The twenty-three contributions are divided into four parts: Variations on the Genetic Programming Theme; Hierarchical, Recursive, and Pruning Genetic Programs; Analysis and Implementation Issues; and New Environments for Genetic Programming.The first part extends the core concepts of genetic programming through the addition of new evolutionary techniques -- adaptive and self-adaptive crossover methods, hill climbing operators, and the inclusion of introns into the representation.Creating more concise executable structures is a long-term research topic in genetic programming. The second part describes the field's most recent efforts, including the dynamic manipulation of automatically defined functions, evolving logic programs that generate recursive structures, and using minimum description length heuristics to determine when and how to prune evolving structures.The third part takes up the many implementation and analysis issues associated with evolving programs. Advanced applications of genetic programming to nontrivial real-world problems are described in the final part: remote sensing of pressure ridges in Arctic sea ice formations from satellite imagery, economic prediction through model evolution, the evolutionary development of stress and loading models for novel materials, and data mining of a large customer database to optimize responses to special offers.

  • Glossary

    Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations requiring that the computer and communication industries build spying into their systems for government convenience have increased rapidly. The application of the 1994 Communications Assistance for Law Enforcement Act has expanded beyond the intent of Congress to apply to voice over Internet Protocol (VoIP) and other modern data services; attempts are being made to require ISPs to retain their data for years in case the government wants it; and data mining techniques developed for commercial marketing applications are being applied to widespread surveillance of the population. InPrivacy on the Line, Whitfield Diffie and Susan Landau strip away the hype surrounding the policy debate over privacy to examine the national security, law enforcement, commercial, and civil liberties issues. They discuss the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated and expanded edition revises their original--and prescient--discussions of both policy and technology in light of recent controversies over NSA spying and other government threats to communications privacy.

  • About the Author

    The ever-growing number of new telecommunications technologies, along with the rapid growth of data networks and cable television systems has created a demand for sound network planning. In one concise volume, this book offers professionals in telecommunications and networking and graduate students an introduction to the theory underlying the interdisciplinary field of network planning, a critical aspect of network management that integrates planning telecommunications and data networks. In PLANNING TELECOMMUNICATIONS NETWORKS you will learn about the mathematical theory behind network planning, including an accessible treatment of linear programming and graph algorithms. Other featured topics cover: Reliability theory for network planning Recent software advances in databases, expert systems, object-oriented programming, data mining and data visualization Latest developments in new optimization techniques such as tabu search, simulated annealing, genetic algorithms, and neural networks Complete with homework problems, this text offers you a broad overview of network planning to begin your exploration of this emerging field. Sponsored by: IEEE Communications Society. An Instructor's Manual presenting detailed solutions to all the problems in the book is available upon request from the Wiley Makerting Department.

  • Sales Opportunity Miner: Data Mining for Automatic Evaluation of Sales Opportunity

    This chapter contains sections titled: Introduction Problem Formulation Related Work Sales Opportunity Miner Experimental Results and Model Evaluations Conclusions This chapter contains sections titled: References

  • References

    A comprehensive introduction to the exploding field of data mining We are surrounded by data, numerical and otherwise, which must be analyzed and processed to convert it into information that informs, instructs, answers, or otherwise aids understanding and decision-making. Due to the ever-increasing complexity and size of today's data sets, a new term, data mining, was created to describe the indirect, automatic data analysis techniques that utilize more complex and sophisticated tools than those which analysts used in the past to do mere data analysis. Data Mining: Concepts, Models, Methods, and Algorithms discusses data mining principles and then describes representative state-of- the-art methods and algorithms originating from different disciplines such as statistics, machine learning, neural networks, fuzzy logic, and evolutionary computation. Detailed algorithms are provided with necessary explanations and illustrative examples. This text offers guidance: how and when to use a particular software tool (with their companion data sets) from among the hundreds offered when faced with a data set to mine. This allows analysts to create and perform their own data mining experiments using their knowledge of the methodologies and techniques provided. This book emphasizes the selection of appropriate methodologies and data analysis software, as well as parameter tuning. These critically important, qualitative decisions can only be made with the deeper understanding of parameter meaning and its role in the technique that is offered here. Data mining is an exploding field and this book offers much-needed guidance to selecting among the numerous analysis programs that are available.

  • Audience Reactions for Information Extraction About Persuasive Language in Political Communication

    This chapter contains sections titled: Introduction Persuasion and NLP Corps Exploiting the Corpus Corps and Persuasive Expression Mining Corps and Qualitative Analysis of Persuasive Communication Predicting Audience Reaction Conclusions and Future Work

  • Bibliography

    Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations requiring that the computer and communication industries build spying into their systems for government convenience have increased rapidly. The application of the 1994 Communications Assistance for Law Enforcement Act has expanded beyond the intent of Congress to apply to voice over Internet Protocol (VoIP) and other modern data services; attempts are being made to require ISPs to retain their data for years in case the government wants it; and data mining techniques developed for commercial marketing applications are being applied to widespread surveillance of the population. InPrivacy on the Line, Whitfield Diffie and Susan Landau strip away the hype surrounding the policy debate over privacy to examine the national security, law enforcement, commercial, and civil liberties issues. They discuss the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated and expanded edition revises their original--and prescient--discussions of both policy and technology in light of recent controversies over NSA spying and other government threats to communications privacy.

  • Information Graphics in Multimodal Documents

    This chapter contains sections titled: Introduction Role of Information Graphics in Multimodal Documents Methodology for Processing Information Graphics Implementation of Our Message Recognition System Related Work Conclusion Acknowledgment



Standards related to Data Mining

Back to Top

No standards are currently tagged "Data Mining"