Optimizing Database Efficiency: Empowering Systems with Data Mining

Ushaa Eswaran*
Department of Electronics and Communications Engineering, Indira Institute of Technology and Sciences, Markapur, Andhra Pradesh, India.
Periodicity:July - September'2023
DOI : https://doi.org/10.26634/jit.12.3.20050

Abstract

Databases are critical for storing structured data, but deriving insights remains challenging. This paper investigates integrating classification, clustering, association rules, and anomaly detection within database architectures to enable intelligent analytics. A unified architecture is proposed along with an asynchronous incremental learning technique to efficiently handle dynamic data. Comprehensive experiments on diverse real-world datasets demonstrate 10–25% improvements in metrics like query latency, accuracy, and costs compared to conventional integration approaches. Emerging applications in multimedia, spatiotemporal, and IoT mining are discussed. The holistic convergence of multiple techniques is highlighted as the key innovation in progressing towards next-generation intelligent databases powered by analytics.

Keywords

Databases, Data Mining, Machine Learning, Knowledge Discovery, Database Performance, Database Architectures.

How to Cite this Article?

Eswaran, U. (2023). Optimizing Database Efficiency: Empowering Systems with Data Mining. i-manager’s Journal on Information Technology, 12(3), 32-38. https://doi.org/10.26634/jit.12.3.20050

References

[1]. Aggarwal, C. C. (2015). Data Mining: The Textbook. Springer, New York (pp. 1-734).
[2]. Aggarwal, C. C. (2013). Outlier Analysis. Springer, New York, New York (pp. 1-34).
[6]. Han, J., Pei, J., & Tong, H. (2022). Data Mining: Concepts and Techniques. Morgan Kaufmann, USA (pp. 1-752).
[7]. Hipp, J., Güntzer, U., & Nakhaeizadeh, G. (2000). Algorithms for association rule mining—A general survey and comparison. ACM Sigkdd Explorations Newsletter, 2(1), 58-64.
[8]. Jayaraman, B., & Evans, D. (2019). Evaluating differentially private machine learning in practice. In 28th USENIX Security Symposium (USENIX Security 19) (pp. 1895-1912).
[9]. Kantardzic, M. (2011). Data Mining: Concepts, Models, Methods, and Algorithms. John Wiley & Sons, New Jersey (pp. 1-534).
[10]. Maimon, O., & Rokach, L. (2005). Data Mining and Knowledge Discovery Handbook. Springer, New York (pp. 1-1285).
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.