2021
DOI: 10.1007/978-981-33-4305-4_59
|View full text |Cite
|
Sign up to set email alerts
|

Improved Density-Based Learning to Cluster for User Web Log in Data Mining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 20 publications
0
5
0
Order By: Relevance
“…This data may be used by lenders to evaluate and approve loan applications. It's worth noting that, although the CIBIL Score is significant in the loan application process, it doesn't always provide all of the information needed [37]- [45]. When it comes to financing, a lender's first consideration is your CIBIL Score; the higher your score, the greater your chances of getting your loan investigated and approved.…”
Section: Existing Workmentioning
confidence: 99%
“…This data may be used by lenders to evaluate and approve loan applications. It's worth noting that, although the CIBIL Score is significant in the loan application process, it doesn't always provide all of the information needed [37]- [45]. When it comes to financing, a lender's first consideration is your CIBIL Score; the higher your score, the greater your chances of getting your loan investigated and approved.…”
Section: Existing Workmentioning
confidence: 99%
“…Apart from that sometimes companies fail to maintain privacy in some data that contains personal information about the preferences of the customers. On the other hand, data visualisation is a crucial process in data mining as it is a prime interaction that highlights the output in an effective and respectable manner to the purchasers [14]. The data extracted must pass in a remarkable way by keeping a balance with the plan.…”
Section: Issues To Implement Data Mining To Analysis Financesmentioning
confidence: 99%
“…The following changes are contemplated across the network to attain such an objective: The critical details are updated with an ECC (Elliptic Curve Cryptography) algorithm with XNOR capabilities during the job planning process. This study applies a principle of insecurity to select additional communication with hostile nodes in the game model [6].…”
Section: Introductionmentioning
confidence: 99%