Predicting the Computer Access Needs of Employee Using Data Mining Algorithms

Authors

  • Himanshi Mathur Student, Department of Computer Engineering, Poornima College of Engineering, Jaipur, Rajasthan, India
  • Mannu Devi Student, Department of Computer Engineering, Poornima College of Engineering, Jaipur, Rajasthan, India
  • Mahak Bansal Student, Department of Computer Engineering, Poornima College of Engineering, Jaipur, Rajasthan, India
  • Mohit Raj Purohit Student, Department of Computer Engineering, Poornima College of Engineering, Jaipur, Rajasthan, India
  • Barkha Narang Assistant Professor, Department of Computer Engineering, Poornima College of Engineering, Jaipur, Rajasthan, India

Keywords:

Data Mining, KDD, KNN, Computer access, security, fraud detection

Abstract

Every business relies on data to better organize and access the information to improve their business operations and to identify opportunities for improvement. A better framework improves the ability to valuable products and better services to their customers. The wide swaths of data that every organization gathers requires a proper methodology to gain knowledge about the latest trends in the market. Data mining is the process that analyses the data collected by the insights and make decisions. There is a considerable amount of data regarding an employee's role within a company and other organizations. Organizations collect their employees' data to provide access according to their roles and responsibilities. In this study, we can see how data mining divides big data sets into small parts to understand patterns and relations between all datasets that can help solve computer access needs in an organization.

References

Gao C, Zheng Y, Li N, Li Y, Qin Y, Piao J, Quan Y, Chang J, Jin D, He X, Li Y. A survey of graph neural networks for recommender systems: challenges, methods, and directions. ACM Transactions on Recommender Systems (ACM TORS). 2023 Mar 3; 1(1): 1–51.

Janaro J, Clifton C. A Virtual Reality: Preserving the Right to Appear" In Person" Before an Administrative Separation Board. Richmond Public Interest Law Review. 2022;25(2):43–66.

Hastie T, Tibshirani R, Friedman JH, Friedman JH. The elements of statistical learning: data mining, inference, and prediction. New York: springer; 2009 Aug.

Han J, Kamber M, Pei J. Data mining concepts and techniques third edition. University of Illinois at Urbana-Champaign Micheline Kamber Jian Pei Simon Fraser University. 2012.

Witten IH, Frank E. Data mining: practical machine learning tools and techniques with Java implementations. Acm Sigmod Record. 2002 Mar 1;31(1):76–7.

van der Sloot, Bart, Dennis Broeders, and Erik Schrijvers. "Exploring the Boundaries of Big Data. Amsterdam: WRR." (2016).

Jain N, Srivastava V. Data mining techniques: a survey paper. IJRET: International Journal of Research in Engineering and Technology. 2013 Nov;2(11):2319–1163.

Aha DW. Tolerating noisy, irrelevant and novel attributes in instance-based learning algorithms. International Journal of Man-Machine Studies. 1992 Feb 1;36(2):267–287.

Kubat M, Matwin S. Addressing the Curse of Imbalanced Training Sets: One-Sided Selection. Proceedings of the 14th International Conference on Machine Learning. 1997; 179–186.

Kubat M, Holte R, Matwin S. Learning when Negative Examples Abound. In Proceedings of ECML-97, 9th European Conference on Machine Learning. 1997; 146–153.

Chawla NV, Japkowicz N, Kotcz A. Editorial: special issue on learning from imbalanced data sets. ACM SIGKDD Explor: Newsletter. 2004; 6(1): 1–6.

Batista GE, Prati RC, Monard MC. A study of the behavior of several methods for balancing machine learning training data. ACM SIGKDD Explor: Newsletter. 2004; 6(1): 20–29.

Zadrozny B, Elkan C. Learning and making decisions when costs and probabilities are both unknown. Proceedings of the 7th ACM SIGKDD international conference on Knowledge discovery and data mining. 2001; 204–213.

Provost F, Fawcett T. Robust classification for imprecise environments. Mach Learn. 2001; 42(3): 203–231.

Fawcett T. ROC graphs: Notes and practical considerations for researchers. Pattern Recognit Lett. 2004; 31(8): 1–38. http://www.hpl.hp.com/personal/Tom Fawcett/papers/ index.html, 2003.

Drummond C, Holte R. Explicitly representing expected cost: An alternative to ROC representation. In Proceedings of the 6th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2001; 198–207.

Furnkranz J, Flach P. An analysis of rule evaluation metrics. In Proceedings of the 20th International Conference on Machine Learning. 2003; 202–209.

Zheng Z, Wu X, Srihari R. Feature selection for text categorization on imbalanced data. SIGKDD Explor: newsletter. 2004; 6(1): 80–89.

Akbani R, Kwek S, Japkowicz N. Applying support vector machines to imbalanced datasets. Machine Learning: ECML 2004, 15th European Conference on Machine Learning Proc. Berlin Heidelberg: Springer; 2004; 39–50.

Beck JE, Woolf BP. High-level student modeling with machine learning. InIntelligent Tutoring Systems: 5th International Conference, ITS 2000 Montréal, Canada, June 19–23, 2000 Proceedings 5 2000 (pp. 584–593). Springer Berlin Heidelberg.

Published

2023-05-05