2017
DOI: 10.23956/ijarcsse/v7i6/0122
|View full text |Cite
|
Sign up to set email alerts
|

Study of Different Data Mining Tools-An Overview

Abstract: Today practically everybody approaches colossal measure of information. A few across the board associations have their own particular extensive information storehouses, information stockrooms, which are as yet extending with questions over information and the requirement for extraction of most useful information design and refined learning. , Data can now be put away in a wide range of sorts of databases and data archives, other than being accessible on the Internet or in printed frame. With such measure of in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 2 publications
0
0
0
Order By: Relevance
“…This versatile software accommodates both structured and unstructured data and boasts robust data visualization capabilities. Furthermore, Knime is renowned for its user-friendly nature, offering an intuitive interface for designing analytical workflows [8]. The dataset employed in this study was sourced from javapoint.com, comprising 400 instances and 3 attributes, all free from missing values.…”
Section: Methodsmentioning
confidence: 99%
“…This versatile software accommodates both structured and unstructured data and boasts robust data visualization capabilities. Furthermore, Knime is renowned for its user-friendly nature, offering an intuitive interface for designing analytical workflows [8]. The dataset employed in this study was sourced from javapoint.com, comprising 400 instances and 3 attributes, all free from missing values.…”
Section: Methodsmentioning
confidence: 99%
“…Knime is wellequipped to handle both structured and unstructured data and offers robust data visualization capabilities. As detailed in reference [7], this software played a pivotal role in our data analysis pipeline.…”
Section: Methodsmentioning
confidence: 99%
“…In this study, the researchers analyzed the various social engineering attacks that can be used to exploit vulnerabilities in Android devices, and proposed a set of countermeasures to prevent such attacks. there is another study entitled "A Study on Remote Administration Tools and Their Impact on Android Devices" conducted by Ravikumar, N., & Gokulnath, C [18]. In this study, the researchers analyzed the impact of remote administration tools on Android devices, and identified various security risks associated with these tools.…”
Section: Issn 2085-4552mentioning
confidence: 99%
“…AhMyth is a popular Android hacking tool and relatively easy to use on Kali Linux. Here are the steps to run AhMyth on Kali Linux [18]:…”
Section: A Operating System Installation and Remote Administration To...mentioning
confidence: 99%