{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:40:53Z","timestamp":1772908853347,"version":"3.50.1"},"reference-count":42,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.23919\/iconac.2017.8082090","type":"proceedings-article","created":{"date-parts":[[2017,11,2]],"date-time":"2017-11-02T21:36:33Z","timestamp":1509658593000},"page":"1-7","source":"Crossref","is-referenced-by-count":36,"title":["Data mining techniques and applications \u2014 A decade review"],"prefix":"10.23919","author":[{"given":"Hussain Ahmad","family":"Madni","sequence":"first","affiliation":[]},{"given":"Zahid","family":"Anwar","sequence":"additional","affiliation":[]},{"given":"Munam Ali","family":"Shah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1016\/j.eswa.2016.10.010","article-title":"Data mining techniques on satellite images for discovery of risk areas","volume":"72","author":"boubacar","year":"2017","journal-title":"Expert Syst Appl"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.10.015"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/PICA.1999.779395"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/S0933-3657(98)00062-1"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2006.11.006"},{"key":"ref30","first-page":"515","volume":"31","author":"yen","year":"2006","journal-title":"Applying data mining to telecom churn"},{"key":"ref37","first-page":"83","volume":"6","author":"tahmasebian","year":"2017","journal-title":"Applying data mining techniques to determine important parameters in chronic kidney disease and the relations of these parameters to each other"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-007-0053-5"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2008.4493524"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2125.2003.01968.x"},{"key":"ref10","first-page":"39","volume":"239","author":"krawczyk","year":"2017","journal-title":"Neurocomputing A survey on data preprocessing for data stream mining Current status and future directions"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2010.2053532"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/69.553155"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"116","DOI":"10.15623\/ijret.2013.0211019","article-title":"Data Mining Techniques: a Survey Paper","volume":"2","author":"jain","year":"2013","journal-title":"IJRET International Journal of Research in Engineering and Technology"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.02.063"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2006.09.003"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/233269.280351"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1132960.1132963"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-08-044894-7.01318-X"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2006.11.011"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1151030.1151032"},{"key":"ref28","first-page":"301","article-title":"Data Mining Techniques and Applications","volume":"1","author":"ramageri","year":"2010","journal-title":"Indian J Comput Sci Eng"},{"key":"ref4","first-page":"622","volume":"7","author":"nagy","year":"2013","journal-title":"An Educational Data Mining System for Advising Higher Education Students"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2006.02.016"},{"key":"ref3","volume":"3536","author":"dutt","year":"2017","journal-title":"A Systematic Review on Educational Data Mining"},{"key":"ref6","first-page":"1153","volume":"18","author":"buczak","year":"2016","journal-title":"A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/545151.545178"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2016.01.001"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2006.07.007"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-008-0145-x"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/846170.846172"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/846183.846188"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compenvurbsys.2009.11.001"},{"key":"ref20","first-page":"77","article-title":"Frequent pattern mining in web log data","volume":"3","author":"iv\u00e1ncsy","year":"2006","journal-title":"Acta Polytechnica Hungarica"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(00)00123-8"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.20429\/ijsotl.2010.040217"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-007-0067-9"},{"key":"ref24","first-page":"37","article-title":"From Data Mining to Knowledge Discovery in Databases","volume":"17","author":"fayyad","year":"1996","journal-title":"AI Mag"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401965"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/S0957-4174(98)00008-6"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICICTA.2010.831"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.08.006"}],"event":{"name":"2017 23rd International Conference on Automation and Computing (ICAC)","location":"Huddersfield, United Kingdom","start":{"date-parts":[[2017,9,7]]},"end":{"date-parts":[[2017,9,8]]}},"container-title":["2017 23rd International Conference on Automation and Computing (ICAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8067274\/8081956\/08082090.pdf?arnumber=8082090","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T14:08:42Z","timestamp":1570284522000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8082090\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":42,"URL":"https:\/\/doi.org\/10.23919\/iconac.2017.8082090","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}