Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- San Jose State University (58)
- University of Texas at Arlington (33)
- Air Force Institute of Technology (29)
- Brigham Young University (27)
- University for Business and Technology in Kosovo (27)
-
- University of Central Florida (18)
- Utah State University (18)
- Western University (18)
- Wayne State University (17)
- Clemson University (16)
- University of South Florida (16)
- University of Texas at El Paso (16)
- Louisiana State University (14)
- Nova Southeastern University (14)
- Old Dominion University (14)
- University of Nevada, Las Vegas (14)
- New Jersey Institute of Technology (13)
- Wright State University (13)
- California Polytechnic State University, San Luis Obispo (12)
- University of Arkansas, Fayetteville (12)
- University of Tennessee, Knoxville (12)
- Regis University (11)
- University of Massachusetts Amherst (11)
- Portland State University (9)
- University of Nebraska at Omaha (9)
- University of New Orleans (9)
- Dartmouth College (8)
- William & Mary (8)
- California State University, San Bernardino (7)
- City University of New York (CUNY) (7)
- Keyword
-
- Applied sciences (14)
- College for Professional Studies (11)
- School of Computer & Information Science (11)
- Computer security (9)
- Data mining (8)
-
- Machine learning (8)
- Clustering (7)
- Computer Science (7)
- Department of Computer Science and Engineering (7)
- Machine Learning (7)
- Software engineering (7)
- Classification (6)
- Computer and information sciences (6)
- Department of Computer Science (6)
- MS Software Engineering and Database Technologies (6)
- Privacy (6)
- Security (6)
- Android (5)
- Cloud computing (5)
- Computer networks--Security measures (5)
- Malware (Computer software) (5)
- Optimization (5)
- Simulation (5)
- #antcenter (4)
- Computer science (4)
- Cryptography (4)
- Digital (4)
- Information retrieval (4)
- Intrusion detection systems (Computer security) (4)
- MS Information Technology Management (4)
- Publication
-
- Theses and Dissertations (97)
- Master's Projects (58)
- Electronic Theses and Dissertations (25)
- Computer Science and Engineering Theses (23)
- Electronic Thesis and Dissertation Repository (18)
-
- Open Access Theses & Dissertations (16)
- USF Tampa Graduate Theses and Dissertations (16)
- Dissertations and Theses (15)
- CCE Theses and Dissertations (14)
- Dissertations (14)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (14)
- Browse all Theses and Dissertations (13)
- Wayne State University Dissertations (13)
- All Theses (12)
- Doctoral Dissertations (12)
- Open Access Dissertations (11)
- Regis University Student Publications (comprehensive collection) (11)
- Theses (11)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (10)
- Computer Science and Engineering Dissertations (10)
- Masters Theses (10)
- Student Work (9)
- University of New Orleans Theses and Dissertations (9)
- All Graduate Plan B and other Reports, Spring 1920 to Spring 2023 (8)
- Dissertations, Theses, and Masters Projects (8)
- Honors Theses (8)
- LSU Doctoral Dissertations (8)
- Graduate Theses and Dissertations (7)
- Master's Theses (7)
- Theses Digitization Project (7)
- File Type
Articles 571 - 600 of 612
Full-Text Articles in Physical Sciences and Mathematics
Developing A Semantic Web Crawler To Locate Owl Documents, Ronald Dean Koron
Developing A Semantic Web Crawler To Locate Owl Documents, Ronald Dean Koron
Browse all Theses and Dissertations
The terms Semantic Web and OWL are relatively new and growing concepts in the World Wide Web. Because these concepts are so new there are relatively few applications and/or tools for utilizing the potential power of this new concept. Although there are many components to the Semantic Web, this thesis will focus on the research question, "How do we go about developing a web crawler for the Semantic Web that locates and retrieves OWL documents." Specifically for this thesis, we hypothesize that by giving URIs to OWL documents, including all URIs from within these OWL documents, priority over other types …
Winding Resistance And Winding Power Loss Of High-Frequency Power Inductors, Rafal P. Wojda
Winding Resistance And Winding Power Loss Of High-Frequency Power Inductors, Rafal P. Wojda
Browse all Theses and Dissertations
The scope of this research is concentrated on analytical winding size optimization (thickness or diameter) of high-frequency power inductors wound with foil, solid-round wire, multi-strand wire, and litz-wire conductors.
The first part of this research concerns analytical optimization of the winding size (thickness or diameter) for the inductors conducting a sinusoidal current. Estimation of winding resistance in individual inductor layers made of foil, taking into account the skin and proximity effects is performed. Approximated equations for the winding power loss in each layer are given and the optimal values of foil thickness for each layer are derived.
A low- and …
Knn-R: Building Secure And Efficient Outsourced Knn Query Service With The Rasp Encryption, Huiqi Xu
Knn-R: Building Secure And Efficient Outsourced Knn Query Service With The Rasp Encryption, Huiqi Xu
Browse all Theses and Dissertations
With the wide deployment of public cloud computing infrastructures, outsourcing database services to the cloud has become an appealing solution to save operating expense. However, some databases might be so sensitive or precious that the data owner does not want to move to the cloud unless the security is guaranteed. On the other hand, a secure outsourced service should still provide efficient query processing and significantly reduce the inhouse workload to fully realize the benefits of outsourcing. We summarize these key features for an outsourced service as the CPEL criteria: data Confidentiality, query Privacy, Efficient query processing, and Low inhouse …
Direct Optimization Of Ranking Measures For Learning To Rank Models, Li Li Guo
Direct Optimization Of Ranking Measures For Learning To Rank Models, Li Li Guo
Browse all Theses and Dissertations
The main challenge in learning-to-rank for information retrieval is the difficulty to di- rectly optimize ranking measures to automatically construct a ranking model from training data. It is mainly due to the fact that the ranking measures are determined by the order of ranked documents rather than the specific values of ranking model scores, thus they are non-convex, nondifferentiable and discontinuous. To address this issue, listwise approaches have been proposed where loss functions are defined either by exploiting a probabilistic model or by optimizing upper bounds or smoothed approximations of ranking measures. Even though very promising results have been achieved, …
Linked Open Data Alignment & Querying, Prateek Jain
Linked Open Data Alignment & Querying, Prateek Jain
Browse all Theses and Dissertations
The recent emergence of the "Linked Data" approach for publishing data represents a major step forward in realizing the original vision of a web that can "understand and satisfy the requests of people and machines to use the web content" i.e. the Semantic Web. This new approach has resulted in the Linked Open Data (LOD) Cloud, which includes more than 295 large datasets contributed by experts belonging to diverse communities such as geography, entertainment, and life sciences. However, the current interlinks between datasets in the LOD Cloud, as we will illustrate,are too shallow to realize much of the benefits promised. …
Enhancing Description Logics For Rules Coverage, David Carral Martinez
Enhancing Description Logics For Rules Coverage, David Carral Martinez
Browse all Theses and Dissertations
This thesis is a formal study on how to extend the set of logic constructors of description logics languages, used for knowledge representation in the Semantic Web field to capture some of the previously exclusive rules expressivity. Description Logics, the logics underpinning the Web Ontology Language OWL, and rules are currently the most prominent paradigms used for modeling knowledge for the Semantic Web. While both of these approaches are based on classical logic, the paradigms also differ significantly, so that naive combinations result in undesirable properties such as undecidability. Recent work has shown that many rules can in fact be …
Evolutionary Computing Driven Search Based Software Testing And Correction, Joshua Lee Wilkerson
Evolutionary Computing Driven Search Based Software Testing And Correction, Joshua Lee Wilkerson
Doctoral Dissertations
"For a given program, testing, locating the errors identified, and correcting those errors is a critical, yet expensive process. The field of Search Based Software Engineering (SBSE) addresses these phases by formulating them as search problems. This dissertation addresses these challenging problems through the use of two complimentary evolutionary computing based systems. The first one is the Fitness Guided Fault Localization (FGFL) system, which novelly uses a specification based fitness function to perform fault localization. The second is the Coevolutionary Automated Software Correction (CASC) system, which employs a variety of evolutionary computing techniques to perform testing, correction, and verification of …
Methods And Algorithms For Scalable Verification Of Asynchronous Designs, Haiqiong Yao
Methods And Algorithms For Scalable Verification Of Asynchronous Designs, Haiqiong Yao
USF Tampa Graduate Theses and Dissertations
Concurrent systems are getting more complex with the advent of multi-core processors and the support of concurrent programs. However, errors of concurrent systems are too subtle to detect with the traditional testing and simulation. Model checking is an effective method to verify concurrent systems by exhaustively searching the complete state space exhibited by a system. However, the main challenge for model checking is state explosion, that is the state space of a concurrent system grows exponentially in the number of components of the system. The state space explosion problem prevents model checking from being applied to systems in realistic size. …
Economic Culture And Trading Behaviors In Information Markets, Khalid Nasser Alhayyan
Economic Culture And Trading Behaviors In Information Markets, Khalid Nasser Alhayyan
USF Tampa Graduate Theses and Dissertations
There are four main components for influencing traders' behaviors in an information market context: trader characteristics, organizational characteristics, market design, and external information. This dissertation focuses on investigating the impact of individual trader characteristics on trading behaviors. Two newly-developed constructs, highly relevant to information market contexts, were identified to increase our understanding about trading behaviors: trader's economic culture and trader independence. The theory of planned behavior is used as the theoretical basis to postulate hypotheses for empirical testing. Data collected from subjects through a series of web-based experiments shows that trader participation can be fostered through recruiting individuals who are …
Basal Graph Structures For Geometry Based Organization Of Wide-Baseline Image Collections, Aveek Shankar Brahmachari
Basal Graph Structures For Geometry Based Organization Of Wide-Baseline Image Collections, Aveek Shankar Brahmachari
USF Tampa Graduate Theses and Dissertations
We propose algorithms for organization of images in wide-area sparse-view datasets. In such datasets, if the images overlap in scene content, they are related by wide-baseline geometric transformations. The challenge is to identify these relations even if the images sparingly overlap in their content. The images in a dataset are then grouped into sets of related images with the relations captured in each set as a basal (minimal and foundational) graph structures. Images form the vertices in the graph structure and the edges define the geometric relations between the images. We use these basal graphs for geometric walkthroughs and detection …
Tagline: Information Extraction For Semi-Structured Text Elements In Medical Progress Notes, Dezon K. Finch
Tagline: Information Extraction For Semi-Structured Text Elements In Medical Progress Notes, Dezon K. Finch
USF Tampa Graduate Theses and Dissertations
Text analysis has become an important research activity in the Department of Veterans Affairs (VA). Statistical text mining and natural language processing have been shown to be very effective for extracting useful information from medical documents. However, neither of these techniques is effective at extracting the information stored in semi-structure text elements. A prototype system (TagLine) was developed as a method for extracting information from the semi-structured portions of text using machine learning. Features for the learning machine were suggested by prior work, as well as by examining the text, and selecting those attributes that help distinguish the various classes …
The Application Of Fuzzy Granular Computing For The Analysis Of Human Dynamic Behavior In 3d Space, Murad Mohammad Alaqtash
The Application Of Fuzzy Granular Computing For The Analysis Of Human Dynamic Behavior In 3d Space, Murad Mohammad Alaqtash
Open Access Theses & Dissertations
Human dynamic behavior in space is very complex in that it involves many physical, perceptual and motor aspects. It is tied together at a sensory level by linkages between vestibular, visual and somatosensory information that develop through experience of inertial and gravitational reaction forces. Coordinated movement emerges from the interplay among descending output from the central nervous system, sensory input from the body and environment, muscle dynamics, and the emergent dynamics of the whole neuromusculoskeletal system.
There have been many attempts to directly capture the activities of the neuronal system in human locomotion without the ability to clarify how the …
Distributed And Collaborative Watermarking In Relational Data, Prakash Kumar
Distributed And Collaborative Watermarking In Relational Data, Prakash Kumar
Masters Theses
"Watermarking relational data is an important topic in the field of copyright protection, given the increasing prevalence of piracy and illegal duplication of databases. While there exists solutions for watermarking relational data, the problems that arise due to multiple ownership (two or more) of databases have not been acknowledged. This research focuses on developing a novel watermarking scheme to counter the problems. The watermarking scheme proposed necessitates the owners of the database in consideration to come together to perform the watermarking process. The scheme can be applied to insert watermarks in both numerical and categorical data. The watermarking scheme is …
Vehicle Path Verification Using Wireless Sensor Networks, Gerry W. Howser
Vehicle Path Verification Using Wireless Sensor Networks, Gerry W. Howser
Masters Theses
"Path Verification is a problem where a verifier would like to determine how closely a vehicle actually traversed a path that it claims to have traversed. This problem has critical significances in terms of vehicle mobility. Mobile nodes can be patrols officers or cab drivers, while respective verifiers can be police dispatchers or cab operators. In this paper, we design a sensor network assisted technique for vehicle path verification. In our design, a number of static wireless sensors placed in road segments will serve as witnesses and certify vehicles as they move. Post movement, these witness certificates will be utilized …
How Should Plastic-Packaging Companies Apply Artificial Proofs And Topics Of Invention To Communicate Sustainability? : A Heuristic Developed On The Basis Of Rhetorical Analysis, Shristy Bashyal
Masters Theses
"This study examines how the ten plastic-packaging companies use artificial proofs and topics of invention to communicate sustainability-related information. The objective of this study was to answer the following research questions:
(i) Do plastic-packaging companies define sustainability on their website?
(ii) What are the strengths and weaknesses of the arguments in these companies' sustainability-related communications?
(iii) What invention strategies should technical marketing communicators use to communicate company's sustainable practices?
To answer these questions, I analyzed the sustainability-related documents available on the websites of the ten companies. On the basis of this analysis, I developed an invention heuristic that can be …
Under Pressure: A Psychophysiological Analysis Of The Effect Of Temporal Constraints On Information Processing And Decision Making, Nagaratna Krishna Sneha Pochinapeddi
Under Pressure: A Psychophysiological Analysis Of The Effect Of Temporal Constraints On Information Processing And Decision Making, Nagaratna Krishna Sneha Pochinapeddi
Masters Theses
"In recent times, decision making under time pressure has become more common than ever and hence, it has become a hot topic for behavioral researchers. This research studies the effects of temporal constraints on users' decision quality and decision strategy. The paper primarily addresses two research questions: (i) Does time pressure affect decision quality? (ii) Does time pressure affect decision strategy? The decision accuracy and decision strategy of the participants were measured for three time-pressure conditions namely, No time pressure, Reasonable time pressure and Extreme time pressure. Research results from the past revealed that, Cognitive style is also observed to …
Robust Evolutionary Algorithms, Brian Wesley Goldman
Robust Evolutionary Algorithms, Brian Wesley Goldman
Masters Theses
"Evolutionary Algorithms (EAs) have shown great potential to solve complex real world problems, but their dependence on problem specific configuration in order to obtain high quality performance prevents EAs from achieving widespread use. While it is widely accepted that statically configuring an EA is already a complex problem, dynamic configuration of an EA is a combinatorially harder problem. Evidence provided here supports the claim that EAs achieve the best results when using dynamic configurations. By designing methods that automatically configure parts of an EA or by changing how EAs work to avoid configurable aspects, EAs can be made more robust, …
A Method For Securing Online Community Service: A Study Of Selected Western Australian Councils, Sunsern Limwiriyakul
A Method For Securing Online Community Service: A Study Of Selected Western Australian Councils, Sunsern Limwiriyakul
Theses: Doctorates and Masters
Since the Internet was made publicly accessible, it has become increasingly popular and its deployment has been broad and global thereby facilitating a range of available online services such as Electronic Mail (email), news or bulletins, Internet Relay Chat (IRC) and World Wide Web (WWW). Progressively, other online services such as telephony, video conference, video on demand, Interactive Television (ITV) and Geographic Information System (GIS) have been integrated with the Internet and become publicly available. Presently, Internet broadband communication services incorporating both wired and wireless network technologies has seen the emergence of the concept of a digital community which has …
Coevolutionary Algorithms For The Optimization Of Strategies For Red Teaming Applications, Tirtha Ranjeet
Coevolutionary Algorithms For The Optimization Of Strategies For Red Teaming Applications, Tirtha Ranjeet
Theses: Doctorates and Masters
Red teaming (RT) is a process that assists an organization in finding vulnerabilities in a system whereby the organization itself takes on the role of an “attacker” to test the system. It is used in various domains including military operations. Traditionally, it is a manual process with some obvious weaknesses: it is expensive, time-consuming, and limited from the perspective of humans “thinking inside the box”. Automated RT is an approach that has the potential to overcome these weaknesses. In this approach both the red team (enemy forces) and blue team (friendly forces) are modelled as intelligent agents in a multi-agent …
A Learning-Based Approach To Exploiting Sensing Diversity In Performance Critical Sensor Networks, Matthew Alexander Keally
A Learning-Based Approach To Exploiting Sensing Diversity In Performance Critical Sensor Networks, Matthew Alexander Keally
Dissertations, Theses, and Masters Projects
Wireless sensor networks for human health monitoring, military surveillance, and disaster warning all have stringent accuracy requirements for detecting and classifying events while maximizing system lifetime. to meet high accuracy requirements and maximize system lifetime, we must address sensing diversity: sensing capability differences among both heterogeneous and homogeneous sensors in a specific deployment. Existing approaches either ignore sensing diversity entirely and assume all sensors have similar capabilities or attempt to overcome sensing diversity through calibration. Instead, we use machine learning to take advantage of sensing differences among heterogeneous sensors to provide high accuracy and energy savings for performance critical applications.;In …
Deductive Formal Verification Of Embedded Systems, Zheng Lu
Deductive Formal Verification Of Embedded Systems, Zheng Lu
LSU Doctoral Dissertations
We combine static analysis techniques with model-based deductive verification using SMT solvers to provide a framework that, given an analysis aspect of the source code, automatically generates an analyzer capable of inferring information about that aspect.
The analyzer is generated by translating the collecting semantics of a program to a formula in first order logic over multiple underlying theories. We import the semantics of the API invocations as first order logic assertions. These assertions constitute the models used by the analyzer. Logical specification of the desired program behavior is incorporated as a first order logic formula. An SMT-LIB solver treats …
A New Model For Coalition Formation Games, Alfred Samman
A New Model For Coalition Formation Games, Alfred Samman
LSU Doctoral Dissertations
We present two broad categories of games, namely, group matching games and bottleneck routing games on grids. Borrowing ideas from coalition formation games, we introduce a new category of games which we call group matching games. We investigate how these games perform when agents are allowed to make selfish decisions that increase their individual payoffs versus when agents act towards the social benefit of the game as a whole. The Price of Anarchy (PoA) and Price of Stability (PoS) metrics are used to quantify these comparisons. We show that the PoA for a group matching game is at most kα …
Ensemble Methods For Malware Diagnosis Based On One-Class Svms, Xing An
Ensemble Methods For Malware Diagnosis Based On One-Class Svms, Xing An
LSU Master's Theses
Malware diagnosis is one of today’s most popular topics of machine learning. Instead of simply applying all the classical classification algorithms to the problem and claim the highest accuracy as the result of prediction, which is the typical approach adopted by studies of this kind, we stick to the Support Vector Machine (SVM) classifier and based on our observation of some principles of learning, characteristics of statistics and the behavior of SVM, we employed a number of the potential preprocessing or ensemble methods including rescaling, bagging and clustering that may enhance the performance to the classical algorithm. We implemented the …
Opportunistic Lookahead Routing Procedure For Delay Tolerant Networks, Priyanka Rotti
Opportunistic Lookahead Routing Procedure For Delay Tolerant Networks, Priyanka Rotti
LSU Master's Theses
Delay Tolerant Networks are wireless networks that have sporadic network connectivity, thus rendering the existence of instantaneous end-to-end paths from a source to a destination difficult or impossible. Hence, in such networks, message delivery relies heavily on the store-and-forward paradigm to route messages. However, limited knowledge of the contact times between the nodes poses a big challenge to effective forwarding of messages. In this thesis, we discuss several aspects of routing in DTNs and present one algorithm and three variants for addressing the routing problem in DTNs: (i) the Look-ahead Protocol, in which the forwarding decision at each node to …
Conformance Testing Of Peer-To-Peer Systems Using Message Traffic Analysis, John Wesley Burris
Conformance Testing Of Peer-To-Peer Systems Using Message Traffic Analysis, John Wesley Burris
LSU Doctoral Dissertations
Peer-to-Peer architectures are used by a large number of distributed systems; however, the challenges such as maintaining a reliable and stable peer-to-peer network can make such networks undesirable for distributed systems. Peer-to-peer architectures are designed to be executed on systems with diverse hardware configurations, distant geographic locations, and varied, unpredictable Internet connectivity that make the software testing process difficult. This research defines a method for conformance testing peer-to-peer content distribution systems called “Method for Conformance Testing by Analyzing Message Activity” (MCTAMA). MCTAMA uses a common representation for describing the behavior of nodes during both design and deployment. ATAMA generates, evaluates …
Software Architectural Support For Tangible User Interfaces In Distributed, Heterogeneous Computing Environments, Cornelius Toole
Software Architectural Support For Tangible User Interfaces In Distributed, Heterogeneous Computing Environments, Cornelius Toole
LSU Doctoral Dissertations
This research focuses on tools that support the development of tangible interaction-based applications for distributed computing environments. Applications built with these tools are capable of utilizing heterogeneous resources for tangible interaction and can be reconfigured for different contexts with minimal code changes. Current trends in computing, especially in areas such as computational science, scientific visualization and computer supported collaborative work, foreshadow increasing complexity, distribution and remoteness of computation and data. These trends imply that tangible interface developers must address concerns of both tangible interaction design and networked distributed computing. In this dissertation, we present a software architecture that supports separation …
Cluster Based Jamming And Countermeasures For Wireless Sensor Network Mac Protocols, David Trammell
Cluster Based Jamming And Countermeasures For Wireless Sensor Network Mac Protocols, David Trammell
LSU Doctoral Dissertations
A wireless sensor network (WSN) is a collection of wireless nodes, usually with limited computing resources and available energy. The medium access control layer (MAC layer) directly guides the radio hardware and manages access to the radio spectrum in controlled way. A top priority for a WSN MAC protocol is to conserve energy, however tailoring the algorithm for this purpose can create or expose a number of security vulnerabilities. In particular, a regular duty cycle makes a node vulnerable to periodic jamming attacks. This vulnerability limits the use of use of a WSN in applications requiring high levels of security. …
Visualization Of Time-Varying Data From Atomistic Simulations And Computational Fluid Dynamics, Bidur Bohara
Visualization Of Time-Varying Data From Atomistic Simulations And Computational Fluid Dynamics, Bidur Bohara
LSU Doctoral Dissertations
Time-varying data from simulations of dynamical systems are rich in spatio-temporal information. A key challenge is how to analyze such data for extracting useful information from the data and displaying spatially evolving features in the space-time domain of interest. We develop/implement multiple approaches toward visualization-based analysis of time-varying data obtained from two common types of dynamical simulations: molecular dynamics (MD) and computational fluid dynamics (CFD). We also make application case studies. Parallel first-principles molecular dynamics simulations produce massive amounts of time-varying three-dimensional scattered data representing atomic (molecular) configurations for material system being simulated. Rendering the atomic position-time series along with …
Semantically-Aware Data Discovery And Placement In Collaborative Computing Environments, Xinqi Wang
Semantically-Aware Data Discovery And Placement In Collaborative Computing Environments, Xinqi Wang
LSU Doctoral Dissertations
As the size of scientific datasets and the demand for interdisciplinary collaboration grow in modern science, it becomes imperative that better ways of discovering and placing datasets generated across multiple disciplines be developed to facilitate interdisciplinary scientific research.
For discovering relevant data out of large-scale interdisciplinary datasets. The development and integration of cross-domain metadata is critical as metadata serves as the key guideline for organizing data. To develop and integrate cross-domain metadata management systems in interdisciplinary collaborative computing environment, three key issues need to be addressed: the development of a cross-domain metadata schema; the implementation of a metadata management system …
Decision Rule Induction For Service Sector Using Data Mining- A Rough Set Theory Approach, Zhonghua Hu
Decision Rule Induction For Service Sector Using Data Mining- A Rough Set Theory Approach, Zhonghua Hu
Open Access Theses & Dissertations
Nowadays, data mining is more widely used than ever before; not only by the academic area, but also in the industry and business area. Apart from execution of business processes, the creation of knowledge base and its utilization for the benefit of the organization is becoming a strategy tool to compete. Despite of having ever growing data bases, the problem is that the finance company fails to fully capitalize the true benefits which can be gained from this great wealth of information. The data mining technology instead of classic statistical analysis is developed to help the people to discover the …