Intelligent mobile agents are today accepted as powerful tools for data mining in a distributed environment. The use of data mining algorithms further beefs up the intelligence in software agents. Knowledge discovery and data mining algorithms are applied to discover hidden patterns and relations in complex datasets using intelligent agents. The distributed… (More)
Intelligent agents are today accepted as powerful tools for data mining in a distributed environment. Artificial Intelligence (AI) algorithms are utilized to render software agents more intelligent. Knowledge discovery and data mining methods have been applied to discover hidden patterns and relations in complex datasets where clustering is one of the most… (More)
unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
The pattern extraction and discovery of useful information from a dataset are the foremost purposes of data mining; the multiple attempts and strong beliefs in the development and the formulation of the unified data mining frameworks that would answer to the fundamental versions related to the discovery of knowledge. In this paper we are presenting a novel… (More)
The past decade has witnessed a rapid growth of mobile services and subscriptions around the globe, so much so that mobile technology seems to bridge the digital divide very much faster than traditional desktop PCs. Educationalists and institutions have quickly seized the opportunities offered by the mobile technology and numerous pilot projects, each one… (More)
Clustering is a technique in data mining to find interesting patterns in a given dataset. A large dataset is grouped into clusters of smaller sets of similar data using k-means algorithm. Initial centroids are required as input parameters when using k-means clustering algorithm. There are different methods to choose initial centroids, from actual sample… (More)
Recently, network resource has become extremely vulnerable to Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, which have become a pressing problem due to scarcity of an efficient method to locate the real attacker. Especially, as network topology becomes more advanced and complex, IP traceback is difficult but necessary. For… (More)