research paper on data mining by ieee

IEEE ICDM 2022

22nd ieee international conference on data mining, nov. 28 – dec. 1, 2022 orlando, fl, usa, the world’s premier research, conference in data mining.

The IEEE International Conference on Data Mining (ICDM) has established itself as the world’s premier research conference in data mining. It provides an international forum for presentation of original research results, as well as exchange and dissemination of innovative and practical development experiences. The conference covers all aspects of data mining, including algorithms, software, systems, and applications. ICDM draws researchers, application developers, and practitioners from a wide range of data mining related areas such as big data, deep learning, pattern recognition, statistical and machine learning,databases, data warehousing, data visualization, knowledge-based systems, and high-performance computing. By promoting novel, high-quality research findings, and innovative solutions to challenging data mining problems, the conference seeks to advance the state-of-the-art in data mining.

Topics of interest

Topics of interest include, but are not limited to:

  • Foundations, algorithms, models and theory of data mining, including big data mining.
  • Deep learning and statistical methods for data mining.
  • Mining from heterogeneous data sources, including text, semi-structured, spatio-temporal, streaming, graph, web, and multimedia data.
  • Data mining systems and platforms, and their efficiency, scalability, security and privacy.
  • Data mining for modelling, visualization, personalization, and recommendation.
  • Data mining for cyber-physical systems and complex, time-evolving networks.
  • Applications of data mining in social sciences, physical sciences, engineering, life sciences, web, marketing, finance, precision medicine, health informatics, and other domains.

We particularly encourage submissions in emerging topics of high importance such as ethical data analytics, automated data analytics, data-driven reasoning, interpretable modeling, modeling with evolving environment, cyber-physical systems, multi-modality data mining, and heterogeneous data integration and mining.

Data Mining

Featured article.

Guide to the top data mining algorithms

In today’s ever-expanding technological environment, companies—for instance, in banking, retail, and social media—store large batches of data online and across many systems. Companies can make use of this data and benefit from it through data mining . This article explores how data mining algorithms work and how you can use them. It also looks at some of the top data mining algorithms available today.

To start, data mining is an important step in the larger process of knowledge discovery. It is the process of exploring and analyzing large data sets for patterns, relationships, and trends. Companies engage in data mining to gain useful business insights. For example, a company might use data mining to analyze a group’s buying habits, bank transactions, or medical history to predict the group’s future actions.

People sometimes confuse data mining with data harvesting . However, data harvesting is the process of extracting and analyzing data from online sources. Data mining does not involve “harvesting” data. Instead, it centers on examining data to produce new information.

To do so, data mining typically uses a machine learning method called supervised learning . Supervised learning “teaches” algorithms new processes in data review and analysis. Typically, a supervised learning algorithm views data, applies conditions, acts on the data, and produces results. It then applies the same process and reasoning to new data.

What is an algorithm in data mining?

In general, algorithms employ a series of steps or rules to process data and produce a specific outcome, result, or prediction. Within data mining, algorithms perform functions such as analyzing, classifying, and forecasting data and monitoring data trends .

Data mining algorithms are types of supervised learning algorithms. They use learning algorithm elements like statistics, probability, and artificial intelligence to explore and generate results that benefit companies, industries, and organizations all over the world.

Supervised learning algorithms and other supervised learning methods depend on labeled data. The labeled data includes the algorithm’s expected data output. A simple example is a picture of a dog labeled with the word “dog.” Labeled data helps the algorithm “learn” patterns in the data and later apply these patterns to unlabeled sets of data. In the above example, a labeled picture of a dog could help an algorithm recognize other images of dogs.

Despite their use of labeled data, supervised learning algorithms can predict or estimate unknown data quantities in the future. This is possible as long as the calculations are based on prior patterns in known data.

What is the role of the algorithm in data mining?

Data mining algorithms process large groups of data to produce certain statistical analyses or results for businesses, industries, or organizations. As such, they are a vital part of the data mining process.

A data mining algorithm’s role depends on the expectations of a user, creator, or investor. As we noted previously, many data mining algorithms conduct data analysis on large data sets. Across many fields, data mining algorithms can analyze audio, textual, and visual data according to demographic factors such as age, gender, and income.

For instance, a shoe company might develop a data mining algorithm to uncover the percentage of the company’s stock that women between the ages of twenty-five and thirty own. An organization within the medical field might use data mining algorithms to conduct research on certain diseases and their impacts on different groups of patients. A social media company might use a data mining algorithm to provide facial tagging suggestions.

All of these examples rely on data points, or criteria, that work with a data mining algorithm to produce the best or closest desired outcome.

Many types of data mining algorithms exist to analyze and interpret data and help achieve desired results. Examples include decision trees , support vector machines, k-nearest neighbors, and neural networks. We will discuss these in more depth later.

However, despite this variety in data mining algorithms, the basic underlying process for all of them is similar. Regardless of its specific purpose, a data mining algorithm’s process—taking data and producing a result—remains the same.

What are the main components of an algorithm for data mining?

At a basic level, data mining algorithms contain different elements that, in combination, lead to a result. The main components of data mining algorithms include data, conditions, and expectations (i.e., end goals).

As we discussed previously, a data mining algorithm relies on data to operate. This data usually comes in the form of large data sets that the algorithm reviews and breaks down into smaller data sets. The algorithm breaks down and analyzes data in relationship to variables. Examples of variables include age, gender, salary, and location.

Different types of variables produce different results. Three types of variables that algorithms use are discrete, continuous, and categorical.

Discrete variables consist of finite (countable) numbers. An example is the number of people who attended a concert or the length of a piece of equipment. Continuous variables, in contrast, have an infinite number of values. An example is the date and time a company receives a payment. Categorical variables contain a finite number of categories or groups. These variables aren’t dependent on order. Examples include material type and payment method.

In an algorithm, multiple variables work together to create conditions. When the algorithm applies certain conditions, it produces specific results.

For example, say a company wants to see how many elderly customers buy a certain type of toothpaste. Conditions of the data mining algorithm would include variables such as customer age, toothpaste type, and purchase confirmation. When the algorithm applies these conditions, it can generate the company’s desired result.

Many data mining algorithms also use conditional probability to generate outcomes. Conditional probability involves events and if/then instances. We can look at a coin toss to illustrate this. If I toss a coin, then it will land as either heads or tails. The algorithm “learns” how to understand and use this conditional “language” in order to seek out a specific outcome. Through such language, for example, an algorithm can identify the face of a specific person in a database.

Often, data mining algorithms incorporate Bayes’s theorem of conditional probability and predictive analysis into their data mining processes. Bayes’s eighteenth-century theorem hinges on the fact that one event will likely happen because another event has already happened. Although the theorem is dated, its if/then concepts and approaches remain useful to determine outcomes today. Likewise, predictive analytics offer another way to estimate future impacts on other sets of large data.

How do you write an algorithm for data mining?

Data experts and programmers create data mining algorithms through careful thought, planning, and execution. By establishing input variables, conditions, and output variables, they create algorithms that produce models from data. These models can then predict future data outcomes based on past incidences.

It is important to keep in mind that data programmers write different types of algorithms to create data mining models with specific end goals in mind. Examples of data mining models include the following:

  • A classification model to label loan applicants as low, medium, or high credit risk
  • A decision tree to predict whether a particular consumer will like a product and describe how factors like age and gender will determine product popularity
  • A mathematical model to forecast product sales
  • A set of rules to explain the probabilities that a consumer will purchase a group of products together

Classifications are ways of breaking down and comparing data points. For example, the solar system breaks down into classifications such as planets, moons, and stars. If an algorithm tried to label a specific object in our solar system, it would likely consider these different classifications and their connections to each other in its analytical process.

Decision trees resemble classification models. They start with a main idea that breaks down into several other related ideas when an algorithm applies certain factors. In turn, those ideas break down further as the algorithm applies more conditions. Eventually, these “branches” of ideas lead to an end result.

Both human and machine learning use decision trees as part of the decision-making process. Decision trees present data simply and linearly. For this reason, they represent a key approach to data mining.

Mathematical processes are key to identifying correlations in large data sets and then creating predictions. Linear algebra and probability, for example, play an important role in some data mining models.

Rules are also important in data mining models. These rules tell a data mining algorithm where it should act first. Consider, for example, a situation in which you need to know the probability of event A to predict the likelihood that event B will happen because of event A. An important rule in the equation would instruct the algorithm to discern event A’s probability before proceeding to any other calculations.

Once operating, many data mining algorithms work independently, without human supervision. That’s what makes them part of the machine learning family. However, someone must first set up the algorithm and make adjustments as necessary. This is why we categorize data mining algorithms as supervised learning algorithms.

How to use data mining algorithms

Various industries use data mining algorithms for research, investigation, and analytical purposes. These algorithms produce useful insights from the large data sets that companies have at their disposal.

An example of a field employing data mining algorithms for research today is the medical field. Often, doctors and other medical professionals use different data mining algorithms to predict the prevalence of certain diseases, such as heart disease, among a population.

In contrast, law enforcement agencies and social media companies might use data mining algorithms for investigation and analytical purposes. Although for different reasons, both types of organizations might conduct facial recognition searches to confirm a person’s identity.

What should you look for in an algorithm for data mining?

It is important to choose a data mining algorithm that meets your specific needs and goals. As we have discussed above, data mining algorithms vary according to their purpose. If you are considering data mining, you want to ensure that you choose algorithms that fit with your intended purpose.

The ultimate goal of data mining is actionable insight. Finding patterns among large data sets alone might be interesting to an individual or company. But the true value of a data mining algorithm comes from the user’s ability to act on the new information that data mining produces. You should always keep this in mind when evaluating data mining algorithms.

What do you need to write an algorithm for data mining?

Before developers create a data mining algorithm, they must first know the purpose of the algorithm and what it will analyze in terms of both data type and data format. Will the algorithm examine handwriting? Will it examine cell phone photographs? Will it examine shopping tendencies?

In addition to knowing what an algorithm will examine, developers also need an appropriate set of data. Based on the application, data could vary from a collection of sample handwriting or cell phone photos to a large database, such as the history of transactions in a group of retail stores.

Finally, developers need to write an equation that enables the algorithm to test the data. This equation often includes probability and predictive analysis.

How do you measure the efficacy of an algorithm for data mining?

Different algorithms have different levels of efficacy. Testing efficacy sometimes means running data through multiple data mining algorithms in order to see which one produces the best results.

One study in the medical field compared different data mining algorithms’ ability to predict heart disease. When scientists ran data through various algorithms to test for heart disease prevalence, the algorithms produced different results. Some algorithms produced more accurate information and thus proved more useful than others.

Some researchers recommend high-utility itemset mining as a very efficient data mining technique. In this type of data mining, an algorithm searches sets of data for items of high importance to the user. Highly important items might include, for example, specific business transactions, exact medical files, or personal security information.

The development of this type of data mining points to the advancing functionality and promising future of the field. As the world becomes more technologically reliant, more and more data become available. This creates more opportunity for data analysis solutions.

To stay up to date on the latest developments in data mining solutions, check out the IEEE Xplore digital library . Xplore is one of the world’s largest collections of technical literature in engineering, computer science, and related technologies, with five million documents now available in its vast repository. You can search through this library to find out more about ongoing advances in data mining.

Best algorithms for data mining

As mentioned earlier, data mining algorithms fit within the broader category of learning algorithms. Typically, learning algorithms depend on either classification or regression to produce results.

What are the most-used data mining algorithms?

Classification and regression algorithms remain the most-used data mining algorithms available today.

Classification algorithms take data and separate it into groups. Usually the groups correspond to answers to questions, such as “yes” or “no.” Spam filters in email provide a good example of a classification algorithm at work. As an email comes in, an algorithm analyzes its contents (such as sender, subject, and message). Then, the algorithm files the email into either a “yes spam” or “no spam” category.

Examples of classification algorithms are naive Bayes and k-nearest neighbors. (However, you can also use a k-nearest neighbors algorithm as part of a regression model.)

Naive Bayes algorithms use Bayes’s theorem of probability to review data and assign certain classifications to it. For instance, a naive Bayes algorithm might analyze a text to determine its main theme. It might determine, for example, that a text is discussing cats or dogs.

K-nearest neighbors algorithms are some of the simplest and most easy-to-use data mining algorithms today. They have been around since the 1970s. Their main goal is to place a data point into a certain category based on the data around it.

Examples of systems using k-nearest neighbors algorithms include recommendation lists from streaming services such as Netflix or Hulu. These lists take data points (such as movies or TV shows) and recommend similar/related content to users.

Regression algorithms, on the other hand, answer more complex questions related to a data set. Their goal is to discern a relationship between different data points. For example, facial recognition software uses a regression algorithm that gathers and analyzes different data points to verify a person’s identity.

An example of a regression algorithm is a neural network. Neural networks mimic the human brain’s neural paths. Thousands or millions of pieces of information form these complex computer systems. Neural networks use linear regression algorithms to arrive at key decisions.

Both regression and classification models get support from support vector machines (SVMs). An SVM is another type of algorithm. It takes data from regression and classification models and creates graphs from the data. This lends a visual component to the algorithm. SVMs also help separate data into different classifications.

What makes a data mining algorithm popular?

Companies use data mining algorithms to solve many different problems. Consequently, a wide variety of data mining algorithms exist today. You can fine-tune each algorithm to solve a particular problem.

Generally speaking, a data mining algorithm’s popularity hinges on its ability to provide detailed answers to questions concerning big data. These answers can help users predict an event or trend or, more broadly, the future of an industry. But they also help users with tasks such as avoiding spam in their email inboxes or choosing a nightly TV show.

How do algorithms vary from data mining project to project?

All in all, algorithms are versatile. Likewise, their use varies across many projects in different industries. Some projects call for specific types of algorithms. For example, one project might require an algorithm that can test for classification-based outcomes. Another might require an algorithm that can test for regression-based outcomes.

Additionally, some projects depend on multiple algorithms to work. For instance, the results from one algorithm might help produce results that are used by a second algorithm.

Top software packages for using data mining algorithms

Today, companies often choose to invest in software packages that make data mining easy and approachable. Many of these software packages offer the added bonus of providing data managing and storage services in addition to data mining algorithms and tools.

As we have stated above, data mining algorithms vary according to their intended purpose. As such, users should choose a data mining software package that fits with their specific needs.

What software is available for using data mining algorithms?

Software packages reduce the need to produce algorithms from scratch. Likewise, they provide different data analytics tools that aid algorithms and help the user get desired results. Examples of such tools include artificial intelligence and predictive analytics.

Popular software packages such as Alteryx Analytics, Orange, and KNIME contain data analytics tools like these. They also contain additional features that appeal to users. These include, for example, data visualization and display features and accessibility across multiple platforms.

What should you look for in software for using data mining algorithms?

You should keep your goals in mind when considering software options. When you choose software, you should make sure its offerings match your data mining vision. For example, you might want a system that creates visual displays, such as charts and graphs, from a data mining algorithm’s output information. In this case, you want to make sure the software you invest in includes data visualization among its features.

Likewise, you should consider the package’s accessibility options. For instance, can Mac and PC users access the software equally as easily? Is there a cloud-based storage system or a Software-as-a-Service (SaaS) option? What does the package’s interface look like? How would the interface affect your ability to explore and utilize the software?

Furthermore, you might benefit from a software package that you can add paid or free features to over time. Some software packages allow users with a valid product license to freely download or purchase additional features. The future of data mining looks promising. Because of this, having the ability to add features might be especially important going forward.

What are the best free and paid options for data mining algorithm software?

Software packages and their offerings vary according to their monetary value. Often paid-for packages include more high-tech, innovative, and appealing elements. In contrast, free versions generally contain fewer features. However, quality free options do exist.

According to a conference paper on free software tools for data mining, the best free offerings include RapidMiner, Weka, R, KNIME, Orange, and scikit-learn. Many of the companies behind these free tools also offer data mining services.

Paid-for options include Sisense, Neural Designer, and Alteryx Analytics. These companies focus on different data mining tools, such as analytics, machine learning, and business intelligence, respectively.

Ultimately, as technology continues to improve, the variety of data mining algorithms and software packages will likely continue to grow. So too will the importance and potential value of data mining as a field continue to grow in the future.

Interested in becoming an IEEE member ? Joining this community of over 420,000 technology and engineering professionals will give you access to the resources and opportunities you need to keep on top of changes in technology, as well as help you get involved in standards development, network with other professionals in your local area or within a specific technical interest, mentor the next generation of engineers and technologists, and so much more.

Related topics

Top conferences on data mining, xplore articles related to data mining, periodicals related to data mining, e-books related to data mining, courses related to data mining, top organizations on data mining, most published xplore authors for data mining.

  • IEEE Xplore Digital Library
  • IEEE Standards
  • IEEE Spectrum

Collabratec

  • Technical Committees
  • Data Mining

Data Mining and Big Data Analytics Technical Committee

The Data Mining and Big Data Analytics Technical Committee (DMTC) is established to: (1) promote the research, development, education and understanding the principles and applications of data mining and big data analytics and (2) to help researchers whose background is primarily in computational intelligence in increasing their contributions to this area.

The DMTC shall engage in various activities in order to advance the goals described above, including but not limited to the following:

  • Identify and promote new areas of research
  • Propose special sessions to the CIS-sponsored conference organizers
  • Publicize success stories on solving real data mining problems
  • Participate in paper review and selection for CIS-sponsored conferences and publications
  • Recommend candidates/papers for awards and collaborate on production of tutorials and book series with the Multimedia Committee
  • The DMTC will also assist in soliciting proposals for focused workshops or special sessions and actively work with the organizers of CIS-sponsored conferences to ensure their technical excellence

Committee Membership

  • Grant Scott, Chair
  • Ata Kaban and Handing Wang, Vice Chairs

Current directory of Chairs and members: Data Mining and Big Data Analytics Technical Committee Members

DMTC members are appointed to serve one year term. Reappointment is allowed.

Chair is appointed by CIS President.  2 Vice Chairs are appointed by Chair and endorsed by CIS VP of Technical Activities.  TC Members are appointed by Chair and endorsed by CIS VP of Technical Activities.  (Number of members varies, typically less than 20)

If you are interested in being considered for a position on the  Data Mining and Big Data Analytics Technical Committee , or would like more information on the activities of the committee, send an email to [email protected] .   If you are interested in being considered for a position on the committee, please include a link to your CV.

Task Forces

  • Chair: Longzhi Yang
  • Chair: Longbin Cao
  • Chair: Gang Li
  • Chair:  Sandra Ortega-Martorell
  • Chair:  Boudewijn van Dongen
  • Chair: Weiping Ding
  • Chair: Kohei Nakajima
  • Chair:  Alfredo Vellido
  • Chair: Ata Kaban

Updated: 5/9/2024

  • EXCOM-Executive Committee
  • ADCOM-Administrative Committee
  • Strategic Planning Committee
  • Constitution & Bylaws Committee
  • Diversity & Inclusion
  • Standards Committee
  • Technical Activites Committee
  • Strategic Planning Sub-Committee
  • Neural Networks
  • Fuzzy Systems
  • Evolutionary Computation
  • Intelligent Systems Applications Technical Committee
  • Cognitive and Developmental Systems
  • Adaptive Dynamic Programming and Reinforcement Learning
  • Bioinformatics and Bioengineering
  • Computational Finance and Economics
  • Smart World
  • Emergent Technologies
  • Mentoring and Skills Development Sub-Committee
  • Finance Committee
  • Fellows Evaluation Committee
  • Awards Committee
  • Nominations Committee
  • Diversity and Inclusion Sub-committee

research paper on data mining by ieee

Data Mining and Knowledge Discovery

  • Publishes original research papers and practice in data mining and knowledge discovery.
  • Provides surveys and tutorials of important areas and techniques.
  • Offers detailed descriptions of significant applications.
  • Addresses theory, foundational issues, data mining methods, and knowledge discovery processes.
  • Renowned for its focus on techniques and applications.

This is a transformative journal , you may have access to funding.

  • Eyke Hüllermeier

research paper on data mining by ieee

Latest issue

Volume 38, Issue 3

Latest articles

Towards more sustainable and trustworthy reporting in machine learning.

  • Raphael Fischer
  • Thomas Liebig
  • Katharina Morik

research paper on data mining by ieee

Interpretable representations in explainable AI: from theory to practice

  • Kacper Sokol
  • Peter Flach

research paper on data mining by ieee

Multiple hypergraph convolutional network social recommendation using dual contrastive learning

  • Hongyu Wang
  • Shutong Qiao

research paper on data mining by ieee

Bake off redux: a review and experimental evaluation of recent time series classification algorithms

  • Matthew Middlehurst
  • Patrick Schäfer
  • Anthony Bagnall

research paper on data mining by ieee

Lost in the Forest: Encoding categorical variables and the absent levels problem

  • Helen L. Smith
  • Patrick J. Biggs
  • Jonathan C. Marshall

research paper on data mining by ieee

Journal updates

Call for papers: special issue on explainable and interpretable machine learning and data mining.

Guest Editors: Martin Atzmueller, Johannes Fuernkranz, Tomas Klieger, Ute Schmid Submission Deadline: extended to June 15th, 2021

Call for Papers: Special issue on Bias and Fairness in AI

Guest Editors: T. Calders, E. Ntoutsi, M. Pechenizkiy, B. Rosenhahn, S. Ruggieri Submission deadline: August 31, 2021

Call for Papers: ECMLPKDD 2022

Submission deadline: 11 February, 2022

Call for Papers: Special Issue on Programming Language Processing

Submission Deadline: November 30, 2021 Guest Editors: Chang Xu, Siqi Ma, David Lo

Journal information

  • ACM Digital Library
  • Current Contents/Engineering, Computing and Technology
  • Current Index to Statistics
  • EI Compendex
  • Google Scholar
  • Japanese Science and Technology Agency (JST)
  • Mathematical Reviews
  • OCLC WorldCat Discovery Service
  • Science Citation Index Expanded (SCIE)
  • TD Net Discovery Service
  • UGC-CARE List (India)

Rights and permissions

Editorial policies

© Springer Science+Business Media, LLC, part of Springer Nature

  • Find a journal
  • Publish with us
  • Track your research

Share this page:

Data Mining for Internet of Things

Submission Deadline: 31 March 2020

IEEE Access invites manuscript submissions in the area of Data Mining for Internet of Things.

The Internet of Things (IoT) has become an important research domain as mature appliances, systems, infrastructures, and their applications have shown their potential in recent years. We can foresee that smart homes and smart cities using these technologies will be realized in the near future. However, many consumers have concerns with the “smart” information system and environment, especially when entering the era of IoT. The expectations of IoT and its relevant products in this new era are quite high. Instead of smartness alone, consumers of IoT products and services would like to see IoT technologies bring about more intelligent systems and environments. The main difference between the “smart thing” and “intelligent thing” is that the former will use predefined rules to provide services to a user whereas the latter will not only use predefined rules, but will also use the analytical results from intelligent mechanisms to discover suitable services for users. More precisely, using only the predefined rules may not be sufficient to consider every possible situation because the number of rules is limited. Using the results obtained after data analysis we can provide additional information to an IoT system to make it better understand the needs of a user. This is why data analytics has become a promising technology for IoT.

Although most researchers of data mining have recognized how to analyze large-scale data is an important research topic for many years, considerations for the IoT environment are quite different from those for the traditional environment because data for the IoT will be created more quickly and in different formats. That is why research on data analytics for IoT have typically been relevant to big data analytics and cloud computing technologies in recent years. This does not mean that traditional data mining and intelligent algorithms are no longer useful for IoT. In fact, how to redesign these algorithms to make them more efficiently and effectively work for IoT has been a critical research trend. In addition to modifying the traditional data mining and intelligent algorithms, an alternative is to develop new data analysis algorithms. Using deep learning technologies for supervised learning to construct a set of classifiers to recognize data entering an IoT system, and using metaheuristic algorithms for unsupervised learning to find out good solutions for classifying unknown data are two promising technologies today. Moreover, how to determine interesting patterns from a series of events of an IoT system is also a critical research topic. In summary, many modern technologies, such as big data analytics, statistical technologies, and other analysis technologies, have also been used for finding out useful information from an IoT system to provide needed services to a user and to enhance the performance of the IoT system as a whole today.

This Special Section in IEEE Access will focus on data mining technologies for the IoT and its applications, such as smart home, smart city, industry, online social network, and even internet of vehicles. We also welcome research on IoT related technologies, such as cloud computing, network security, wireless sensor network, vehicular networking, smart grids, and big data.

The topics of interest include, but are not limited to:

  • Data Mining for the IoT
  • Machine and Deep Learning for the IoT
  • Metaheuristic Algorithms for the IoT
  • Cloud Computing for the IoT
  • Big Data for the IoT
  • Mobile Computing and Sensing for the IoT
  • Security Framework for the IoT
  • Privacy Protection for the IoT
  • IoT in Smart Home and Smart City
  • IoT in Energy Management
  • Industry IoT
  • IoT in Agriculture and Environment
  • IoT in eHealth and Ambient Assisted Living
  • Internet of Vehicles
  • Edge Computing
  • Applications of the IoT

We also highly recommend the submission of multimedia with each article as it significantly increases the visibility, downloads, and citations of articles.

Associate Editor:  Chun-Wei Tsai, National Chung-Hsing University, Taiwan

Guest Editors:

  • Mu-Yen Chen, National Taichung University of Science and Technology, Taiwan
  • Francesco Piccialli, University of Naples Federico II, Italy
  • Tie Qiu, Tianjin University, China
  • Jason J. Jung, Chung-Ang University, Republic of Korea
  • Patrick C. K. Hung, University of Ontario Institute of Technology, Canada
  • Sherali Zeadally, University of Kentucky, USA

Relevant IEEE Access Special Sections:

  • Smart Caching, Communications, Computing and Cybersecurity for Information-Centric Internet of Things
  • Healthcare Information Technology for the Extreme and Remote Environments
  • Internet-of-Things (IoT) Big Data Trust Management

IEEE Access Editor-in-Chief: Michael Pecht, Professor and Director, CALCE, University of Maryland

Paper submission: Contact Associate Editor and submit manuscript to: http://ieee.atyponrex.com/journal/ieee-access

For inquiries regarding this Special Section, please contact: [email protected] .

At a Glance

  • Journal: IEEE Access
  • Format: Open Access
  • Frequency: Continuous
  • Submission to Publication: 4-6 weeks (typical)
  • Topics: All topics in IEEE
  • Average Acceptance Rate: 27%
  • Model: Binary Peer Review
  • Article Processing Charge: US $1,995

Featured Articles

research paper on data mining by ieee

Reducing Losses and Energy Storage Requirements of Modular Multilevel Converters With Optimal Harmonic Injection

View in IEEE Xplore

research paper on data mining by ieee

Enhancing Accuracy in Actigraphic Measurements: A Lightweight Calibration Method for Triaxial Accelerometers

research paper on data mining by ieee

MMNeRF: Multi-Modal and Multi-View Optimized Cross-Scene Neural Radiance Fields

Submission guidelines.

© 2024 IEEE - All rights reserved. Use of this website signifies your agreement to the IEEE TERMS AND CONDITIONS.

A not-for-profit organization, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

AWARD RULES:

NO PURCHASE NECESSARY TO ENTER OR WIN. A PURCHASE WILL NOT INCREASE YOUR CHANCES OF WINNING.

These rules apply to the “2024 IEEE Access Best Video Award Part 1″ (the “Award”).

  • Sponsor: The Sponsor of the Award is The Institute of Electrical and Electronics Engineers, Incorporated (“IEEE”) on behalf of IEEE Access , 445 Hoes Lane, Piscataway, NJ 08854-4141 USA (“Sponsor”).
  • Eligibility: Award is open to residents of the United States of America and other countries, where permitted by local law, who are the age of eighteen (18) and older. Employees of Sponsor, its agents, affiliates and their immediate families are not eligible to enter Award. The Award is subject to all applicable state, local, federal and national laws and regulations. Entrants may be subject to rules imposed by their institution or employer relative to their participation in Awards and should check with their institution or employer for any relevant policies. Void in locations and countries where prohibited by law.
  • Agreement to Official Rules : By participating in this Award, entrants agree to abide by the terms and conditions thereof as established by Sponsor. Sponsor reserves the right to alter any of these Official Rules at any time and for any reason.  All decisions made by Sponsor concerning the Award including, but not limited to the cancellation of the Award, shall be final and at its sole discretion. 
  • How to Enter: This Award opens on January 1, 2024 at 12:00 AM ET and all entries must be received by 11:59 PM ET on June 30, 2024 (“Promotional Period”).

Entrant must submit a video with an article submission to IEEE Access . The video submission must clearly be relevant to the submitted manuscript.  Only videos that accompany an article that is accepted for publication in IEEE Access will qualify.  The video may be simulations, demonstrations, or interviews with other experts, for example.  Your video file should not exceed 100 MB.

Entrants can enter the Award during Promotional Period through the following method:

  • The IEEE Author Portal : Entrants can upload their video entries while submitting their article through the IEEE Author Portal submission site .
  • Review and Complete the Terms and Conditions: After submitting your manuscript and video through the IEEE Author Portal, entrants should then review and sign the Terms and Conditions .

Entrants who have already submitted a manuscript to IEEE Access without a video can still submit a video for inclusion in this Award so long as the video is submitted within 7 days of the article submission date.  The video can be submitted via email to the article administrator.  All videos must undergo peer review and be accepted along with the article submission.  Videos may not be submitted after an article has already been accepted for publication. 

The criteria for an article to be accepted for publication in IEEE Access are:

  • The article must be original writing that enhances the existing body of knowledge in the given subject area. Original review articles and surveys are acceptable even if new data/concepts are not presented.
  • Results reported must not have been submitted or published elsewhere (although expanded versions of conference publications are eligible for submission).
  • Experiments, statistics, and other analyses must be performed to a high technical standard and are described in sufficient detail.
  • Conclusions must be presented in an appropriate fashion and are supported by the data.
  • The article must be written in standard English with correct grammar.
  • Appropriate references to related prior published works must be included.
  • The article must fall within the scope of IEEE Access
  • Must be in compliance with the IEEE PSPB Operations Manual.
  • Completion of the required IEEE intellectual property documents for publication.
  • At the discretion of the IEEE Access Editor-in-Chief.
  • Disqualification: The following items will disqualify a video from being considered a valid submission:
  • The video is not original work.
  • A video that is not accompanied with an article submission.
  • The article and/or video is rejected during the peer review process.
  • The article and/or video topic does not fit into the scope of IEEE Access .
  • The article and/or do not follow the criteria for publication in IEEE Access .
  • Videos posted in a comment on IEEE Xplore .
  • Content ​is off-topic, offensive, obscene, indecent, abusive or threatening to others.
  • Infringes the copyright, trademark or other right of any third party.
  • Uploads viruses or other contaminating or destructive features.
  • Is in violation of any applicable laws or regulations.
  • Is not in English​.
  • Is not provided within the designated submission time.
  • Entrant does not agree and sign the Terms and Conditions document.

Entries must be original. Entries that copy other entries, or the intellectual property of anyone other than the Entrant, may be removed by Sponsor and the Entrant may be disqualified. Sponsor reserves the right to remove any entry and disqualify any Entrant if the entry is deemed, in Sponsor’s sole discretion, to be inappropriate.

  • Entrant’s Warranty and Authorization to Sponsor: By entering the Award, entrants warrant and represent that the Award Entry has been created and submitted by the Entrant. Entrant certifies that they have the ability to use any image, text, video, or other intellectual property they may upload and that Entrant has obtained all necessary permissions. IEEE shall not indemnify Entrant for any infringement, violation of publicity rights, or other civil or criminal violations. Entrant agrees to hold IEEE harmless for all actions related to the submission of an Entry. Entrants further represent and warrant, if they reside outside of the United States of America, that their participation in this Award and acceptance of a prize will not violate their local laws.
  • Intellectual Property Rights: Entrant grants Sponsor an irrevocable, worldwide, royalty free license to use, reproduce, distribute, and display the Entry for any lawful purpose in all media whether now known or hereinafter created. This may include, but is not limited to, the IEEE A ccess website, the IEEE Access YouTube channel, the IEEE Access IEEE TV channel, IEEE Access social media sites (LinkedIn, Facebook, Twitter, IEEE Access Collabratec Community), and the IEEE Access Xplore page. Facebook/Twitter/Microsite usernames will not be used in any promotional and advertising materials without the Entrants’ expressed approval.
  • Number of Prizes Available, Prizes, Approximate Retail Value and Odds of winning Prizes: Two (2) promotional prizes of $350 USD Amazon gift cards. One (1) grand prize of a $500 USD Amazon gift card. Prizes will be distributed to the winners after the selection of winners is announced. Odds of winning a prize depend on the number of eligible entries received during the Promotional Period. Only the corresponding author of the submitted manuscript will receive the prize.

The grand prize winner may, at Sponsor’ discretion, have his/her article and video highlighted in media such as the IEEE Access Xplore page and the IEEE Access social media sites.

The prize(s) for the Award are being sponsored by IEEE.  No cash in lieu of prize or substitution of prize permitted, except that Sponsor reserves the right to substitute a prize or prize component of equal or greater value in its sole discretion for any reason at time of award.  Sponsor shall not be responsible for service obligations or warranty (if any) in relation to the prize(s). Prize may not be transferred prior to award. All other expenses associated with use of the prize, including, but not limited to local, state, or federal taxes on the Prize, are the sole responsibility of the winner.  Winner(s) understand that delivery of a prize may be void where prohibited by law and agrees that Sponsor shall have no obligation to substitute an alternate prize when so prohibited. Amazon is not a sponsor or affiliated with this Award.

  • Selection of Winners: Promotional prize winners will be selected based on entries received during the Promotional Period. The sponsor will utilize an Editorial Panel to vote on the best video submissions. Editorial Panel members are not eligible to participate in the Award.  Entries will be ranked based on three (3) criteria:
  • Presentation of Technical Content
  • Quality of Video

Upon selecting a winner, the Sponsor will notify the winner via email. All potential winners will be notified via their email provided to the sponsor. Potential winners will have five (5) business days to respond after receiving initial prize notification or the prize may be forfeited and awarded to an alternate winner. Potential winners may be required to sign an affidavit of eligibility, a liability release, and a publicity release.  If requested, these documents must be completed, signed, and returned within ten (10) business days from the date of issuance or the prize will be forfeited and may be awarded to an alternate winner. If prize or prize notification is returned as undeliverable or in the event of noncompliance with these Official Rules, prize will be forfeited and may be awarded to an alternate winner.

  • General Prize Restrictions:  No prize substitutions or transfer of prize permitted, except by the Sponsor. Import/Export taxes, VAT and country taxes on prizes are the sole responsibility of winners. Acceptance of a prize constitutes permission for the Sponsor and its designees to use winner’s name and likeness for advertising, promotional and other purposes in any and all media now and hereafter known without additional compensation unless prohibited by law. Winner acknowledges that neither Sponsor, Award Entities nor their directors, employees, or agents, have made nor are in any manner responsible or liable for any warranty, representation, or guarantee, express or implied, in fact or in law, relative to any prize, including but not limited to its quality, mechanical condition or fitness for a particular purpose. Any and all warranties and/or guarantees on a prize (if any) are subject to the respective manufacturers’ terms therefor, and winners agree to look solely to such manufacturers for any such warranty and/or guarantee.

11.Release, Publicity, and Privacy : By receipt of the Prize and/or, if requested, by signing an affidavit of eligibility and liability/publicity release, the Prize Winner consents to the use of his or her name, likeness, business name and address by Sponsor for advertising and promotional purposes, including but not limited to on Sponsor’s social media pages, without any additional compensation, except where prohibited.  No entries will be returned.  All entries become the property of Sponsor.  The Prize Winner agrees to release and hold harmless Sponsor and its officers, directors, employees, affiliated companies, agents, successors and assigns from and against any claim or cause of action arising out of participation in the Award. 

Sponsor assumes no responsibility for computer system, hardware, software or program malfunctions or other errors, failures, delayed computer transactions or network connections that are human or technical in nature, or for damaged, lost, late, illegible or misdirected entries; technical, hardware, software, electronic or telephone failures of any kind; lost or unavailable network connections; fraudulent, incomplete, garbled or delayed computer transmissions whether caused by Sponsor, the users, or by any of the equipment or programming associated with or utilized in this Award; or by any technical or human error that may occur in the processing of submissions or downloading, that may limit, delay or prevent an entrant’s ability to participate in the Award.

Sponsor reserves the right, in its sole discretion, to cancel or suspend this Award and award a prize from entries received up to the time of termination or suspension should virus, bugs or other causes beyond Sponsor’s control, unauthorized human intervention, malfunction, computer problems, phone line or network hardware or software malfunction, which, in the sole opinion of Sponsor, corrupt, compromise or materially affect the administration, fairness, security or proper play of the Award or proper submission of entries.  Sponsor is not liable for any loss, injury or damage caused, whether directly or indirectly, in whole or in part, from downloading data or otherwise participating in this Award.

Representations and Warranties Regarding Entries: By submitting an Entry, you represent and warrant that your Entry does not and shall not comprise, contain, or describe, as determined in Sponsor’s sole discretion: (A) false statements or any misrepresentations of your affiliation with a person or entity; (B) personally identifying information about you or any other person; (C) statements or other content that is false, deceptive, misleading, scandalous, indecent, obscene, unlawful, defamatory, libelous, fraudulent, tortious, threatening, harassing, hateful, degrading, intimidating, or racially or ethnically offensive; (D) conduct that could be considered a criminal offense, could give rise to criminal or civil liability, or could violate any law; (E) any advertising, promotion or other solicitation, or any third party brand name or trademark; or (F) any virus, worm, Trojan horse, or other harmful code or component. By submitting an Entry, you represent and warrant that you own the full rights to the Entry and have obtained any and all necessary consents, permissions, approvals and licenses to submit the Entry and comply with all of these Official Rules, and that the submitted Entry is your sole original work, has not been previously published, released or distributed, and does not infringe any third-party rights or violate any laws or regulations.

12.Disputes:  EACH ENTRANT AGREES THAT: (1) ANY AND ALL DISPUTES, CLAIMS, AND CAUSES OF ACTION ARISING OUT OF OR IN CONNECTION WITH THIS AWARD, OR ANY PRIZES AWARDED, SHALL BE RESOLVED INDIVIDUALLY, WITHOUT RESORTING TO ANY FORM OF CLASS ACTION, PURSUANT TO ARBITRATION CONDUCTED UNDER THE COMMERCIAL ARBITRATION RULES OF THE AMERICAN ARBITRATION ASSOCIATION THEN IN EFFECT, (2) ANY AND ALL CLAIMS, JUDGMENTS AND AWARDS SHALL BE LIMITED TO ACTUAL OUT-OF-POCKET COSTS INCURRED, INCLUDING COSTS ASSOCIATED WITH ENTERING THIS AWARD, BUT IN NO EVENT ATTORNEYS’ FEES; AND (3) UNDER NO CIRCUMSTANCES WILL ANY ENTRANT BE PERMITTED TO OBTAIN AWARDS FOR, AND ENTRANT HEREBY WAIVES ALL RIGHTS TO CLAIM, PUNITIVE, INCIDENTAL, AND CONSEQUENTIAL DAMAGES, AND ANY OTHER DAMAGES, OTHER THAN FOR ACTUAL OUT-OF-POCKET EXPENSES, AND ANY AND ALL RIGHTS TO HAVE DAMAGES MULTIPLIED OR OTHERWISE INCREASED. ALL ISSUES AND QUESTIONS CONCERNING THE CONSTRUCTION, VALIDITY, INTERPRETATION AND ENFORCEABILITY OF THESE OFFICIAL RULES, OR THE RIGHTS AND OBLIGATIONS OF ENTRANT AND SPONSOR IN CONNECTION WITH THE AWARD, SHALL BE GOVERNED BY, AND CONSTRUED IN ACCORDANCE WITH, THE LAWS OF THE STATE OF NEW JERSEY, WITHOUT GIVING EFFECT TO ANY CHOICE OF LAW OR CONFLICT OF LAW, RULES OR PROVISIONS (WHETHER OF THE STATE OF NEW JERSEY OR ANY OTHER JURISDICTION) THAT WOULD CAUSE THE APPLICATION OF THE LAWS OF ANY JURISDICTION OTHER THAN THE STATE OF NEW JERSEY. SPONSOR IS NOT RESPONSIBLE FOR ANY TYPOGRAPHICAL OR OTHER ERROR IN THE PRINTING OF THE OFFER OR ADMINISTRATION OF THE AWARD OR IN THE ANNOUNCEMENT OF THE PRIZES.

  • Limitation of Liability:  The Sponsor, Award Entities and their respective parents, affiliates, divisions, licensees, subsidiaries, and advertising and promotion agencies, and each of the foregoing entities’ respective employees, officers, directors, shareholders and agents (the “Released Parties”) are not responsible for incorrect or inaccurate transfer of entry information, human error, technical malfunction, lost/delayed data transmissions, omission, interruption, deletion, defect, line failures of any telephone network, computer equipment, software or any combination thereof, inability to access web sites, damage to a user’s computer system (hardware and/or software) due to participation in this Award or any other problem or error that may occur. By entering, participants agree to release and hold harmless the Released Parties from and against any and all claims, actions and/or liability for injuries, loss or damage of any kind arising from or in connection with participation in and/or liability for injuries, loss or damage of any kind, to person or property, arising from or in connection with participation in and/or entry into this Award, participation is any Award-related activity or use of any prize won. Entry materials that have been tampered with or altered are void. If for any reason this Award is not capable of running as planned, or if this Award or any website associated therewith (or any portion thereof) becomes corrupted or does not allow the proper playing of this Award and processing of entries per these rules, or if infection by computer virus, bugs, tampering, unauthorized intervention, affect the administration, security, fairness, integrity, or proper conduct of this Award, Sponsor reserves the right, at its sole discretion, to disqualify any individual implicated in such action, and/or to cancel, terminate, modify or suspend this Award or any portion thereof, or to amend these rules without notice. In the event of a dispute as to who submitted an online entry, the entry will be deemed submitted by the authorized account holder the email address submitted at the time of entry. “Authorized Account Holder” is defined as the person assigned to an email address by an Internet access provider, online service provider or other organization responsible for assigning email addresses for the domain associated with the email address in question. Any attempt by an entrant or any other individual to deliberately damage any web site or undermine the legitimate operation of the Award is a violation of criminal and civil laws and should such an attempt be made, the Sponsor reserves the right to seek damages and other remedies from any such person to the fullest extent permitted by law. This Award is governed by the laws of the State of New Jersey and all entrants hereby submit to the exclusive jurisdiction of federal or state courts located in the State of New Jersey for the resolution of all claims and disputes. Facebook, LinkedIn, Twitter, G+, YouTube, IEEE Xplore , and IEEE TV are not sponsors nor affiliated with this Award.
  • Award Results and Official Rules: To obtain the identity of the prize winner and/or a copy of these Official Rules, send a self-addressed stamped envelope to Kimberly Rybczynski, IEEE, 445 Hoes Lane, Piscataway, NJ 08854-4141 USA.

data mining Recently Published Documents

Total documents.

  • Latest Documents
  • Most Cited Documents
  • Contributed Authors
  • Related Sources
  • Related Keywords

Distance Based Pattern Driven Mining for Outlier Detection in High Dimensional Big Dataset

Detection of outliers or anomalies is one of the vital issues in pattern-driven data mining. Outlier detection detects the inconsistent behavior of individual objects. It is an important sector in the data mining field with several different applications such as detecting credit card fraud, hacking discovery and discovering criminal activities. It is necessary to develop tools used to uncover the critical information established in the extensive data. This paper investigated a novel method for detecting cluster outliers in a multidimensional dataset, capable of identifying the clusters and outliers for datasets containing noise. The proposed method can detect the groups and outliers left by the clustering process, like instant irregular sets of clusters (C) and outliers (O), to boost the results. The results obtained after applying the algorithm to the dataset improved in terms of several parameters. For the comparative analysis, the accurate average value and the recall value parameters are computed. The accurate average value is 74.05% of the existing COID algorithm, and our proposed algorithm has 77.21%. The average recall value is 81.19% and 89.51% of the existing and proposed algorithm, which shows that the proposed work efficiency is better than the existing COID algorithm.

Implementation of Data Mining Technology in Bonded Warehouse Inbound and Outbound Goods Trade

For the taxed goods, the actual freight is generally determined by multiplying the allocated freight for each KG and actual outgoing weight based on the outgoing order number on the outgoing bill. Considering the conventional logistics is insufficient to cope with the rapid response of e-commerce orders to logistics requirements, this work discussed the implementation of data mining technology in bonded warehouse inbound and outbound goods trade. Specifically, a bonded warehouse decision-making system with data warehouse, conceptual model, online analytical processing system, human-computer interaction module and WEB data sharing platform was developed. The statistical query module can be used to perform statistics and queries on warehousing operations. After the optimization of the whole warehousing business process, it only takes 19.1 hours to get the actual freight, which is nearly one third less than the time before optimization. This study could create a better environment for the development of China's processing trade.

Multi-objective economic load dispatch method based on data mining technology for large coal-fired power plants

User activity classification and domain-wise ranking through social interactions.

Twitter has gained a significant prevalence among the users across the numerous domains, in the majority of the countries, and among different age groups. It servers a real-time micro-blogging service for communication and opinion sharing. Twitter is sharing its data for research and study purposes by exposing open APIs that make it the most suitable source of data for social media analytics. Applying data mining and machine learning techniques on tweets is gaining more and more interest. The most prominent enigma in social media analytics is to automatically identify and rank influencers. This research is aimed to detect the user's topics of interest in social media and rank them based on specific topics, domains, etc. Few hybrid parameters are also distinguished in this research based on the post's content, post’s metadata, user’s profile, and user's network feature to capture different aspects of being influential and used in the ranking algorithm. Results concluded that the proposed approach is well effective in both the classification and ranking of individuals in a cluster.

A data mining analysis of COVID-19 cases in states of United States of America

Epidemic diseases can be extremely dangerous with its hazarding influences. They may have negative effects on economies, businesses, environment, humans, and workforce. In this paper, some of the factors that are interrelated with COVID-19 pandemic have been examined using data mining methodologies and approaches. As a result of the analysis some rules and insights have been discovered and performances of the data mining algorithms have been evaluated. According to the analysis results, JRip algorithmic technique had the most correct classification rate and the lowest root mean squared error (RMSE). Considering classification rate and RMSE measure, JRip can be considered as an effective method in understanding factors that are related with corona virus caused deaths.

Exploring distributed energy generation for sustainable development: A data mining approach

A comprehensive guideline for bengali sentiment annotation.

Sentiment Analysis (SA) is a Natural Language Processing (NLP) and an Information Extraction (IE) task that primarily aims to obtain the writer’s feelings expressed in positive or negative by analyzing a large number of documents. SA is also widely studied in the fields of data mining, web mining, text mining, and information retrieval. The fundamental task in sentiment analysis is to classify the polarity of a given content as Positive, Negative, or Neutral . Although extensive research has been conducted in this area of computational linguistics, most of the research work has been carried out in the context of English language. However, Bengali sentiment expression has varying degree of sentiment labels, which can be plausibly distinct from English language. Therefore, sentiment assessment of Bengali language is undeniably important to be developed and executed properly. In sentiment analysis, the prediction potential of an automatic modeling is completely dependent on the quality of dataset annotation. Bengali sentiment annotation is a challenging task due to diversified structures (syntax) of the language and its different degrees of innate sentiments (i.e., weakly and strongly positive/negative sentiments). Thus, in this article, we propose a novel and precise guideline for the researchers, linguistic experts, and referees to annotate Bengali sentences immaculately with a view to building effective datasets for automatic sentiment prediction efficiently.

Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques

Studying information diffusion in SNS (Social Networks Service) has remarkable significance in both academia and industry. Theoretically, it boosts the development of other subjects such as statistics, sociology, and data mining. Practically, diffusion modeling provides fundamental support for many downstream applications (e.g., public opinion monitoring, rumor source identification, and viral marketing). Tremendous efforts have been devoted to this area to understand and quantify information diffusion dynamics. This survey investigates and summarizes the emerging distinguished works in diffusion modeling. We first put forward a unified information diffusion concept in terms of three components: information, user decision, and social vectors, followed by a detailed introduction of the methodologies for diffusion modeling. And then, a new taxonomy adopting hybrid philosophy (i.e., granularity and techniques) is proposed, and we made a series of comparative studies on elementary diffusion models under our taxonomy from the aspects of assumptions, methods, and pros and cons. We further summarized representative diffusion modeling in special scenarios and significant downstream tasks based on these elementary models. Finally, open issues in this field following the methodology of diffusion modeling are discussed.

The Influence of E-book Teaching on the Motivation and Effectiveness of Learning Law by Using Data Mining Analysis

This paper studies the motivation of learning law, compares the teaching effectiveness of two different teaching methods, e-book teaching and traditional teaching, and analyses the influence of e-book teaching on the effectiveness of law by using big data analysis. From the perspective of law student psychology, e-book teaching can attract students' attention, stimulate students' interest in learning, deepen knowledge impression while learning, expand knowledge, and ultimately improve the performance of practical assessment. With a small sample size, there may be some deficiencies in the research results' representativeness. To stimulate the learning motivation of law as well as some other theoretical disciplines in colleges and universities has particular referential significance and provides ideas for the reform of teaching mode at colleges and universities. This paper uses a decision tree algorithm in data mining for the analysis and finds out the influencing factors of law students' learning motivation and effectiveness in the learning process from students' perspective.

Intelligent Data Mining based Method for Efficient English Teaching and Cultural Analysis

The emergence of online education helps improving the traditional English teaching quality greatly. However, it only moves the teaching process from offline to online, which does not really change the essence of traditional English teaching. In this work, we mainly study an intelligent English teaching method to further improve the quality of English teaching. Specifically, the random forest is firstly used to analyze and excavate the grammatical and syntactic features of the English text. Then, the decision tree based method is proposed to make a prediction about the English text in terms of its grammar or syntax issues. The evaluation results indicate that the proposed method can effectively improve the accuracy of English grammar or syntax recognition.

Export Citation Format

Share document.

DATA MINING IEEE PAPERS AND PROJECTS-2020

Data mining is the process of discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems

Data stream mining , as its name suggests, is connected with two basic fields of computer science, ie data mining and data streams. Data mining [1 4] is an interdisciplinary subfield of computer science whose main aim is to develop tools and methods for exploring

FREE IEEE PAPER AND PROJECTS

Ieee projects 2022, seminar reports, free ieee projects ieee papers.

Mining the Opinions of Software Developers for Improved Project Insights: Harnessing the Power of Transfer Learning

Ieee account.

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

Topics For Seminar

  • cloud computing
  • Computer Science
  • Data Analysis
  • data mining
  • Data mining techniques
  • ieee seminar topics
  • machine learning
  • research papers
  • seminar topics

Data Mining: Research Papers | Seminar Topics | IEEE

  • Share to Facebook
  • Share to Twitter

Data Mining

Data mining seminar topics | ieee research papers, share this article, subscribe via email, related post.

  • Like on Facebook
  • Follow on Twitter
  • Follow on Slideshare
  • Follow on Pinterest
  • Subscribe on Youtube

Trending Seminar Topics

  • 100+ Seminar Topics for Youth, Teenagers, College Students Young people are on a never-ending quest for transcendence, which drives them to want to improve the environment, countries, communities,...
  • 30+ Technical Seminar Topics for Presentation: Latest Tech Trends Technology is rapidly evolving today, allowing for faster change and progress and accelerating the rate of change. However, it is not just t...
  • 100 PowerPoint Presentation Topics in Hindi (Download PPT) विद्यार्थियों के लिए प्रेजेंटेशन का महत्व प्रेजेंटेशन (presentation) देना शैक्षणिक पाठ्यक्रम का एक महत्वपूर्ण व्यावहारिक पाठ्यक्रम है, ...
  • 100+ Interesting Biology Presentation Topics with PPT Biology Topics for Presentation & Research Biology is a topic that every school student studies and university student who does major in...
  • 100 Interesting Fun Topics for Presentations Fun Topics for Presentations We have prepared for you a fantastic collection of fun topics for presentation with relevant links to the artic...

Recent Seminar Topics

Seminar topics.

  • 💻 Seminar Topics for CSE Computer Science Engineering
  • ⚙️ Seminar Topics for Mechanical Engineering ME
  • 📡 Seminar Topics for ECE Electronics and Communication
  • ⚡️ Seminar Topics for Electrical Engineering EEE
  • 👷🏻 Seminar Topics for Civil Engineering
  • 🏭 Seminar Topics for Production Engineering
  • 💡 Physics Seminar Topics
  • 🌎 Seminar Topics for Environment
  • ⚗️ Chemistry Seminar Topics
  • 📈 Business Seminar Topics
  • 👦🏻 Seminar Topics for Youth

Investigatory Projects Topics

  • 👨🏻‍🔬 Chemistry Investigatory Projects Topics
  • 📧 Contact Us For Seminar Topics
  • 👉🏼Follow us in Slideshare

Presentation Topics

  • 🌍 Environment Related Presentation Topics
  • ⚗️ Inorganic Chemistry Presentation Topics
  • 👨🏻‍🎓 General Presentation Topics
  • 🦚 Hindi Presentation Topics
  • 🪐 Physics Presentation Topics
  • 🧪 Chemistry: Interesting Presentation Topics
  • 🌿 Biology Presentation Topics
  • 🧬 Organic Chemistry Presentation Topics

Speech Topics and Ideas

  • 🦁 Informative and Persuasive Speech Topics on Animals
  • 🚗 Informative and Persuasive Speech Topics on Automotives
  • 💡 Ideas to Choose Right Informative Speech
  • 👩🏻‍🎓 Informative Speech Topics For College Students
  • 🔬 Informative Speech Topics on Science and Technology

IMAGES

  1. Using Data Mining for Intelligence-Led Policing and Crime Analysis

    research paper on data mining by ieee

  2. IEEE 2014

    research paper on data mining by ieee

  3. 2014 IEEE DOTNET DATA MINING PROJECT Mining probabilistically frequent

    research paper on data mining by ieee

  4. Introduction to Data Mining and Knowledge Discovery

    research paper on data mining by ieee

  5. (PDF) IEEE Paper

    research paper on data mining by ieee

  6. 18.Data Mining with Big Data

    research paper on data mining by ieee

VIDEO

  1. Major Issues in Data Mining || Data Mining challenges

  2. Challenges and Opportunities for Educational Data Mining ! Research Paper review

  3. Data Science Paper Publication: IEEE vs Springer

  4. Data Mining Introduction

  5. Claudio Paganini: No Events on Closed Causal Curves

  6. What is Educational Data Mining?

COMMENTS

  1. Data Mining: Data Mining Concepts and Techniques

    Data mining is a field of intersection of computer science and statistics used to discover patterns in the information bank. The main aim of the data mining process is to extract the useful information from the dossier of data and mold it into an understandable structure for future use. There are different process and techniques used to carry out data mining successfully.

  2. Data mining techniques and applications

    Data mining is also known as Knowledge Discovery in Database (KDD). It is also defined as the process which includes extracting the interesting, interpretable and useful information from the raw data. There are different sources that generate raw data in very large amount. This is the main reason the applications of data mining are increasing rapidly. This paper reviews data mining techniques ...

  3. IEEE International Conference on Data Mining (ICDM)

    Profile Information. Communications Preferences. Profession and Education. Technical Interests. Need Help? US & Canada:+1 800 678 4333. Worldwide: +1 732 981 0060. Contact & Support. About IEEE Xplore.

  4. Data Mining in Education: A Review of Current Practices

    A significant amount of data is physically kept on hard drives or virtually stored in the cloud in the real world. Data is retained for a variety of purposes, such as learning, accessing, understanding, and so forth. Large amounts of data must be stored using an excellent infrastructure, which is quite expensive. Data mining tools were made available to help with this issue. Numerous ...

  5. (PDF) Trends in data mining research: A two-decade review using topic

    Proceedings of the 6th IEEE International Conference on Data Mining (ICDM), Hong Kong, China, 18-22 December 2006 , pp. 1043-1048. DOI: 10.1109/ICDM.2006.64.

  6. Perspectives on Test Data Mining from Industrial Experience

    This paper offers some perspectives on the practice of data mining based on recent experimental research work to establish a link between system-level failures and structural scan test patterns. Beyond the obvious goal to obtain accurate results, knowledge discovery and data insights deserve equal if not higher emphasis. Domain knowledge plays a crucial role in guiding the use of multiple ...

  7. Call for Papers

    The IEEE International Conference on Data Mining (ICDM) has established itself as the world's premier research conference in data mining. ... ICDM is a premier forum for presenting and discussing current research in data mining. Therefore, at least one author of each accepted paper must complete the conference registration and present the ...

  8. IEEE International Conference on Data Mining 2022 (ICDM2022)

    The IEEE International Conference on Data Mining (ICDM) has established itself as the world's premier research conference in data mining. ... By promoting novel, high-quality research findings, and innovative solutions to challenging data mining problems, the conference seeks to advance the state-of-the-art in data mining. Topics of interest ...

  9. Data Mining on IEEE Technology Navigator

    According to a conference paper on free software tools for data mining, the best free offerings include RapidMiner, Weka, R, KNIME, Orange, and scikit-learn. Many of the companies behind these free tools also offer data mining services. Paid-for options include Sisense, Neural Designer, and Alteryx Analytics.

  10. Data Mining Based Privacy Attack Through Paper Traces

    The techniques used in this research are data mining techniques; classification and clustering algorithm. In this first stage of research, the aim of this research is to determine whether it is possible to classify shopping data to correct shopper profiles, and to separate a set of shopping data into two meaningful groups, according to the ...

  11. Data Mining for the Internet of Things: Literature Review and

    A variety of researches focusing on knowledge view, technique view, and application view can be found in the literature. However, no previous effort has been made to review the different views of data mining in a systematic way, especially in nowadays big data [5-7]; mobile internet and Internet of Things [8-10] grow rapidly and some data mining researchers shift their attention from data ...

  12. (PDF) IEEE Access Special Section Editorial: Advanced Data Mining

    He has published over 50 research papers in top-tier journals and conferences, including IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (TNNLS), IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ...

  13. [PDF] Data Mining: An AI Perspective

    This paper reviews the topics of interest from the IEEE International Conference on Data Mining from an AI perspective, including key AI ideas that have been used in both data mining and machine learning. Data mining, or knowledge discovery in databases (KDD), is an interdisciplinary area that integrates techniques from several fields including machine learning, statistics, and database ...

  14. Data Mining

    The Data Mining and Big Data Analytics Technical Committee (DMTC) is established to: (1) promote the research, development, education and understanding the principles and applications of data mining and big data analytics and (2) to help researchers whose background is primarily in computational intelligence in increasing their contributions to ...

  15. A comprehensive survey of data mining

    Data mining plays an important role in various human activities because it extracts the unknown useful patterns (or knowledge). Due to its capabilities, data mining become an essential task in large number of application domains such as banking, retail, medical, insurance, bioinformatics, etc. To take a holistic view of the research trends in the area of data mining, a comprehensive survey is ...

  16. Using Permutation Tests to Identify Statistically Sound and

    SUBMIT PAPER. Close Add email alerts. You are adding the following journal to your email alerts ... Journal of Educational Computing Research, 60(4), 1035-1062 ... (Eds.), Proceedings of 2019 IEEE International Conference on Data Mining (pp. 1330-1335). IEEE. Google Scholar. Ulitzsch E., He Q., Pohl S. (2022). Using sequence mining ...

  17. Home

    Data Mining and Knowledge Discovery is a leading technical journal focusing on the extraction of information from vast databases. Publishes original research papers and practice in data mining and knowledge discovery. Provides surveys and tutorials of important areas and techniques. Offers detailed descriptions of significant applications.

  18. Data Mining for Internet of Things

    IEEE Access invites manuscript submissions in the area of Data Mining for Internet of Things. The Internet of Things (IoT) has become an important research domain as mature appliances, systems, infrastructures, and their applications have shown their potential in recent years. We can foresee that smart homes and smart cities using these ...

  19. (PDF) Data mining techniques and applications

    Data Mining Algorithms and Techniques. Various algorithms and techniques like Classification, Clustering, Regression, Artificial. Intelligence, Neural Networks, Association Rules, Decision Trees ...

  20. 345193 PDFs

    Explore the latest full-text research PDFs, articles, conference papers, preprints and more on DATA MINING. Find methods information, sources, references or conduct a literature review on DATA MINING

  21. data mining Latest Research Papers

    Epidemic diseases can be extremely dangerous with its hazarding influences. They may have negative effects on economies, businesses, environment, humans, and workforce. In this paper, some of the factors that are interrelated with COVID-19 pandemic have been examined using data mining methodologies and approaches.

  22. Research on Assisted Reproductive Technology and Gene ...

    Research on Assisted Reproductive Technology and Gene Modification Model Based on Data Mining Abstract: With the wide development of ART (Assisted Reproductive Technology), the offspring of ART has gradually become an important part of the world population, and its reproductive genetic safety has been paid more and more attention by scholars ...

  23. Data Mining Ieee Papers and Projects-2020

    The data mining is defined as a process used to extract usable data from a larger set of any raw data . It implies analysing data patterns in large batches of data using one or more software. Data mining has applications in multiple fields, like science and research. As an. Breast cancer prediction using Data mining.

  24. Mining the Opinions of Software Developers for Improved ...

    Sentiment Analysis, a crucial tool for analyzing user opinions, has shown efficacy particularly when tailored to specific domains. While existing research predominantly focuses on training various classifiers for sentiment analysis within the software engineering (SE) domain, the outcomes often lack consistency when tested across different datasets. To address this gap, this paper proposes a ...

  25. Demystifying Data Governance for Process Mining ...

    2021. TLDR. The paper provides a holistic view of opportunities and challenges for process mining in organizations identified in a Delphi study with 40 international experts from academia and industry and conveys insights into the comparative relevance of individual items, as well as differences in the perceived relevance between academics and ...

  26. Data Mining: Research Papers

    The wide availability of huge amounts of data and the imminent need for turning such data into useful information and knowledge. In this article, we have listed a few research papers related to Data Mining. It will help the students to select seminar topics for CSE and computer science engineering projects. Download the PDF papers to study and ...

  27. Research on Intelligent Algorithm of Transformer Area Topology

    Based on the measurement data of low-voltage distribution network, this paper presents a method to identify the topological relationship of transformer area. Firstly, a self-organizing feature mapping algorithm is used to determine the number of transformers in a large number of transformers and user data. ... {2023 IEEE 7th Conference on ...

  28. Trusted Data Access Control Based on Logistics Business Collaboration

    In the context of the digital evolution of the logistics industry, the interconnection of logistics information systems and associated data have become an obstacle of business collaboration among various stakeholders. A critical challenge in this domain is ensuring controllable access to logistics business data, given the industry's current state characterized by independence, autonomy ...

  29. Employers

    Email: [email protected]. Online inquiry form. IT Professional Internship Information for Employers Procedure Every year invitations to join the scheme are sent to companies around November. The internship period is 9 months and it starts in summer, earliest in July and latest in September. Students work in internship 4 days/week, with ...