Random Forest Bagging and X-Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data
In the current ongoing crisis, people mostly rely on mobile phones for all the activities, but query analysis and mobile data security are major issues. Several research works have been made on efficient detection of antipatterns for minimizing the complexity of query analysis. However, more focus n...
Saved in:
| Published in | Wireless communications and mobile computing Vol. 2021; no. 1 |
|---|---|
| Main Authors | , , , , , , |
| Format | Journal Article |
| Language | English |
| Published |
Oxford
Hindawi
2021
John Wiley & Sons, Inc |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1530-8669 1530-8677 1530-8677 |
| DOI | 10.1155/2021/2730246 |
Cover
| Abstract | In the current ongoing crisis, people mostly rely on mobile phones for all the activities, but query analysis and mobile data security are major issues. Several research works have been made on efficient detection of antipatterns for minimizing the complexity of query analysis. However, more focus needs to be given to the accuracy aspect. In addition, for grouping similar antipatterns, a clustering process was performed to eradicate the design errors. To address the above-said issues and further enhance the antipattern detection accuracy with minimum time and false positive rate, in this work, Random Forest Bagging X-means SQL Query Clustering (RFBXSQLQC) technique is proposed. Different patterns or queries are initially gathered from the input SQL query log, and bootstrap samples are created. Then, for each pattern, various weak clusters are constructed via X-means clustering and are utilized as the weak learner (clusters). During this process, the input patterns are categorized into different clusters. Using the Bayesian information criterion, the similarity measure is employed to evaluate the similarity between the patterns and cluster weight. Based on the similarity value, patterns are assigned to either relevant or irrelevant groups. The weak learner results are aggregated to form strong clusters, and, with the aid of voting, a majority vote is considered for designing strong clusters with minimum time. Experiments are conducted to evaluate the performance of the RFBXSQLQC technique using the IIT Bombay dataset using the metrics like antipattern detection accuracy, time complexity, false-positive rate, and computational overhead with respect to the differing number of queries. The results revealed that the RFBXSQLQC technique outperforms the existing algorithms by 19% with pattern detection accuracy, 34% minimized time complexity, 64% false-positive rate, and 31% in terms of computational overhead. |
|---|---|
| AbstractList | In the current ongoing crisis, people mostly rely on
m
obile phones for all the activities, but query analysis and mobile data security are major issues. Several research works have been made on efficient detection of antipatterns for minimizing the complexity of query analysis. However, more focus needs to be given to the accuracy aspect. In addition, for grouping similar antipatterns, a clustering process was performed to eradicate the design errors. To address the above‐said issues and further enhance the antipattern detection accuracy with minimum time and false positive rate, in this work, Random Forest Bagging X‐means SQL Query Clustering (RFBXSQLQC) technique is proposed. Different patterns or queries are initially gathered from the input SQL query log, and bootstrap samples are created. Then, for each pattern, various weak clusters are constructed via X‐means clustering and are utilized as the weak learner (clusters). During this process, the input patterns are categorized into different clusters. Using the Bayesian information criterion, the similarity measure is employed to evaluate the similarity between the patterns and cluster weight. Based on the similarity value, patterns are assigned to either relevant or irrelevant groups. The weak learner results are aggregated to form strong clusters, and, with the aid of voting, a majority vote is considered for designing strong clusters with minimum time. Experiments are conducted to evaluate the performance of the RFBXSQLQC technique using the IIT Bombay dataset using the metrics like antipattern detection accuracy, time complexity, false
-
positive rate, and computational overhead with respect to the differing number of queries. The results revealed that the RFBXSQLQC technique outperforms the existing algorithms by 19% with pattern detection accuracy, 34% minimized time complexity, 64% false
-
positive rate, and 31% in terms of computational overhead. In the current ongoing crisis, people mostly rely on mobile phones for all the activities, but query analysis and mobile data security are major issues. Several research works have been made on efficient detection of antipatterns for minimizing the complexity of query analysis. However, more focus needs to be given to the accuracy aspect. In addition, for grouping similar antipatterns, a clustering process was performed to eradicate the design errors. To address the above-said issues and further enhance the antipattern detection accuracy with minimum time and false positive rate, in this work, Random Forest Bagging X-means SQL Query Clustering (RFBXSQLQC) technique is proposed. Different patterns or queries are initially gathered from the input SQL query log, and bootstrap samples are created. Then, for each pattern, various weak clusters are constructed via X-means clustering and are utilized as the weak learner (clusters). During this process, the input patterns are categorized into different clusters. Using the Bayesian information criterion, the similarity measure is employed to evaluate the similarity between the patterns and cluster weight. Based on the similarity value, patterns are assigned to either relevant or irrelevant groups. The weak learner results are aggregated to form strong clusters, and, with the aid of voting, a majority vote is considered for designing strong clusters with minimum time. Experiments are conducted to evaluate the performance of the RFBXSQLQC technique using the IIT Bombay dataset using the metrics like antipattern detection accuracy, time complexity, false-positive rate, and computational overhead with respect to the differing number of queries. The results revealed that the RFBXSQLQC technique outperforms the existing algorithms by 19% with pattern detection accuracy, 34% minimized time complexity, 64% false-positive rate, and 31% in terms of computational overhead. |
| Author | Dhanaraj, Rajesh Kumar Vijayakumar, V. Poongodi, M. Kotecha, Ketan Krishnasamy, Lalitha Ramakrishnan, Vinothsaravanan Hamdi, Mounir |
| Author_xml | – sequence: 1 givenname: Rajesh Kumar orcidid: 0000-0002-2038-7359 surname: Dhanaraj fullname: Dhanaraj, Rajesh Kumar organization: School of Computing Science and EngineeringGalgotias UniversityIndiagalgotiasuniversity.edu.in – sequence: 2 givenname: Vinothsaravanan orcidid: 0000-0002-7368-3223 surname: Ramakrishnan fullname: Ramakrishnan, Vinothsaravanan organization: Computer Science and EngineeringJAIN (Deemed-to-be-University)India – sequence: 3 givenname: M. orcidid: 0000-0001-6801-6138 surname: Poongodi fullname: Poongodi, M. organization: College of Science and EngineeringHamad Bin Khalifa UniversityDohaQatarhbku.edu.qa – sequence: 4 givenname: Lalitha orcidid: 0000-0002-4682-8191 surname: Krishnasamy fullname: Krishnasamy, Lalitha organization: Department of Information TechnologyKongu Engineering CollegeIndiakongu.ac.in – sequence: 5 givenname: Mounir orcidid: 0000-0002-9766-0085 surname: Hamdi fullname: Hamdi, Mounir organization: College of Science and EngineeringHamad Bin Khalifa UniversityDohaQatarhbku.edu.qa – sequence: 6 givenname: Ketan orcidid: 0000-0003-2653-3780 surname: Kotecha fullname: Kotecha, Ketan organization: Symbiosis Centre for Applied Artificial IntelligenceSymbiosis International (Deemed University)PuneIndiassbs.edu.in – sequence: 7 givenname: V. orcidid: 0000-0003-3752-7220 surname: Vijayakumar fullname: Vijayakumar, V. organization: School of Computing Science and EngineeringUniversity of South WalesSydneyAustraliasouthwales.ac.uk |
| BookMark | eNqFkE1LAzEQhoMo-HnzBwQ86mo-utndY239gopUPXhbpulsjaxJTbJI_71ZWjwI6imT4ZmXmWefbFtnkZBjzs45z_MLwQS_EIVkYqC2yB7PJctKVRTb37Wqdsl-CG-MsUTxPdI9gp27d3rtPIZIL2GxMHZBU5O-ZPcINtBR24WIHud0aKNZQkwfS8cYUUfjLG18mn-aTui0Q7-iE7egjfN0qDWG0Ic9oe480ns3My3SMUQ4JDsNtAGPNu8Beb6-eh7dZpOHm7vRcJJpKYuYVXkjZmUlGYMKy4INKiF4I7iYIWpWMM4L3TAoUcp5LhLTyFLkA1DpNAkDeUCydWxnl7D6hLatl968g1_VnNW9srpXVm-UJf5kzS-9--iSj_rNdd6mDWuhmFIqr1SfKtaU9i4Ej02tTYReRfRg2t-iz34M_bPJ6Rp_NXYOn-Zv-gvZzpW6 |
| CitedBy_id | crossref_primary_10_1007_s00217_023_04377_9 crossref_primary_10_1016_j_compeleceng_2022_108205 crossref_primary_10_35940_ijitee_B9406_0212323 crossref_primary_10_1007_s00500_022_07331_1 crossref_primary_10_1007_s00500_023_07960_0 crossref_primary_10_1007_s10489_024_06137_y crossref_primary_10_1155_2022_2110785 crossref_primary_10_1007_s41870_023_01695_9 crossref_primary_10_1155_2022_2004716 crossref_primary_10_1021_acsestwater_4c01003 crossref_primary_10_1007_s00500_023_08018_x crossref_primary_10_4018_IJITWE_304049 crossref_primary_10_1016_j_comptc_2024_115032 crossref_primary_10_1155_2023_4506488 crossref_primary_10_3390_foods13162576 |
| Cites_doi | 10.1016/j.jss.2019.110486 10.1109/tkde.2017.2772252 10.3390/s20174937 10.1016/j.ins.2018.12.031 10.1016/j.knosys.2020.105792 10.1002/cpe.4676 10.1016/j.eswa.2013.08.089 10.1007/s10586-017-1122-y 10.17706/jcp.13.9.1042-1052 10.1016/j.fss.2019.06.008 10.1016/j.csi.2017.09.010 10.9756/bp2019.1002/27 10.1007/s12065-020-00474-w 10.1016/j.future.2018.10.038 10.1016/j.asoc.2017.11.007 10.32604/cmc.2021.015363 10.1109/ACCESS.2021.3103746 10.1109/tsc.2015.2502595 10.1016/j.sysarc.2020.101861 10.14778/3007263.3007304 10.1109/ICoAC.2013.6921946 10.14569/ijacsa.2017.080555 10.14778/3137628.3137656 10.1016/j.future.2020.03.010 10.1007/s10664-020-09900-0 10.1109/access.2021.3052956 10.1016/j.future.2016.05.005 10.1109/access.2021.3083923 10.1016/j.infsof.2017.11.016 |
| ContentType | Journal Article |
| Copyright | Copyright © 2021 Rajesh Kumar Dhanaraj et al. Copyright © 2021 Rajesh Kumar Dhanaraj et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: Copyright © 2021 Rajesh Kumar Dhanaraj et al. – notice: Copyright © 2021 Rajesh Kumar Dhanaraj et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | RHU RHW RHX AAYXX CITATION 7SC 7SP 7XB 8FD 8FE 8FG ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L7M L~C L~D M0N P5Z P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS Q9U ADTOC UNPAY |
| DOI | 10.1155/2021/2730246 |
| DatabaseName | Hindawi Publishing Complete Hindawi Publishing Subscription Journals Hindawi Publishing Open Access CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts ProQuest Central (purchase pre-March 2016) Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) ProQuest Central Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One Community College ProQuest Central ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Computing Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic Unpaywall for CDI: Periodical Content Unpaywall |
| DatabaseTitle | CrossRef Publicly Available Content Database Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace Advanced Technologies & Aerospace Collection ProQuest Computing ProQuest Central Basic ProQuest One Academic Eastern Edition Electronics & Communications Abstracts ProQuest Technology Collection ProQuest SciTech Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) |
| DatabaseTitleList | CrossRef Publicly Available Content Database |
| Database_xml | – sequence: 1 dbid: RHX name: Hindawi Publishing Open Access url: http://www.hindawi.com/journals/ sourceTypes: Publisher – sequence: 2 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository – sequence: 3 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1530-8677 |
| Editor | Jain, Deepak Kumar |
| Editor_xml | – sequence: 1 givenname: Deepak Kumar surname: Jain fullname: Jain, Deepak Kumar |
| ExternalDocumentID | 10.1155/2021/2730246 10_1155_2021_2730246 |
| GrantInformation_xml | – fundername: Symbiosis International University, India |
| GroupedDBID | .3N .4S .DC .GA 05W 0R~ 123 1L6 1OC 33P 3SF 3WU 4.4 4ZD 50Y 50Z 52M 52O 52T 52U 52W 66C 6OB 702 7PT 8-0 8-1 8-3 8-4 8-5 8UM 930 A03 AAESR AAFWJ AAJEY AAONW ABIJN ABPVW ACGFO ADBBV ADIZJ AENEX AEUQT AFBPY AFKRA AIAGR AJXKR ALAGY ALMA_UNASSIGNED_HOLDINGS AMBMR ARAPS ARCSS ASPBG ATUGU AVWKF AZBYB AZQEC AZVAB BAFTC BCNDV BENPR BGLVJ BHBCM BNHUX BROTX BRXPI CCPQU CS3 D-E D-F DPXWK DR2 DU5 DWQXO EBS EDO F00 F01 F04 F21 G-S G.N GNP GNUQQ GODZA GROUPED_DOAJ H.T H.X HCIFZ HZ~ I-F IAO ITC ITG ITH IX1 JPC K7- KQQ LAW LITHE LP6 LP7 M0N MK4 MY~ N04 N05 NF~ O66 O9- OIG OK1 P2P P2W P2X P4D PIMPY Q.N QB0 QRW R.K RHU RHW RHX RWI RX1 RYL SUPJJ TUS UB1 W8V W99 WBKPD WIH WLBEL XPP XV2 ~IA ~WT .Y3 24P 31~ 5VS AAEVG AAMMB AANHP AAYXX AAZKR ACBWZ ACCMX ACRPL ACXQS ACYXJ ADNMO AEFGJ AEIMD AEUCX AFZJQ AGQPQ AGXDD AIDQK AIDYY AZFZN BDRZF BFHJK CITATION EJD FEDTE H13 HF~ HVGLF LH4 LW6 PHGZM PHGZT PQGLB PUEGO ROL WYUIH 7SC 7SP 7XB 8FD 8FE 8FG ABUWG JQ2 L7M L~C L~D P62 PKEHL PQEST PQQKQ PQUKI PRINS Q9U ADTOC UNPAY |
| ID | FETCH-LOGICAL-c337t-95f2b89300a9e87049221f212beec070117cf0a8e33d52a9ef38254a60213a43 |
| IEDL.DBID | RHX |
| ISSN | 1530-8669 1530-8677 |
| IngestDate | Sun Oct 26 03:17:18 EDT 2025 Sat Aug 23 13:48:30 EDT 2025 Wed Oct 01 01:09:02 EDT 2025 Thu Apr 24 23:11:15 EDT 2025 Sun Jun 02 18:51:38 EDT 2024 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Language | English |
| License | This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. The publication of this article was funded by Qatar National Library. public-domain |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c337t-95f2b89300a9e87049221f212beec070117cf0a8e33d52a9ef38254a60213a43 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0001-6801-6138 0000-0003-3752-7220 0000-0003-2653-3780 0000-0002-4682-8191 0000-0002-7368-3223 0000-0002-2038-7359 0000-0002-9766-0085 |
| OpenAccessLink | https://dx.doi.org/10.1155/2021/2730246 |
| PQID | 2606665964 |
| PQPubID | 2034344 |
| ParticipantIDs | unpaywall_primary_10_1155_2021_2730246 proquest_journals_2606665964 crossref_citationtrail_10_1155_2021_2730246 crossref_primary_10_1155_2021_2730246 hindawi_primary_10_1155_2021_2730246 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2021-00-00 |
| PublicationDateYYYYMMDD | 2021-01-01 |
| PublicationDate_xml | – year: 2021 text: 2021-00-00 |
| PublicationDecade | 2020 |
| PublicationPlace | Oxford |
| PublicationPlace_xml | – name: Oxford |
| PublicationTitle | Wireless communications and mobile computing |
| PublicationYear | 2021 |
| Publisher | Hindawi John Wiley & Sons, Inc |
| Publisher_xml | – name: Hindawi – name: John Wiley & Sons, Inc |
| References | e_1_2_10_22_2 e_1_2_10_23_2 e_1_2_10_20_2 e_1_2_10_21_2 e_1_2_10_19_2 e_1_2_10_1_2 e_1_2_10_3_2 e_1_2_10_17_2 e_1_2_10_2_2 e_1_2_10_18_2 e_1_2_10_5_2 e_1_2_10_15_2 e_1_2_10_4_2 e_1_2_10_16_2 e_1_2_10_7_2 e_1_2_10_13_2 e_1_2_10_6_2 e_1_2_10_14_2 e_1_2_10_9_2 e_1_2_10_11_2 e_1_2_10_8_2 e_1_2_10_12_2 e_1_2_10_10_2 e_1_2_10_30_2 e_1_2_10_28_2 e_1_2_10_29_2 e_1_2_10_26_2 e_1_2_10_27_2 e_1_2_10_24_2 e_1_2_10_25_2 |
| References_xml | – ident: e_1_2_10_6_2 doi: 10.1016/j.jss.2019.110486 – ident: e_1_2_10_2_2 doi: 10.1109/tkde.2017.2772252 – ident: e_1_2_10_22_2 doi: 10.3390/s20174937 – ident: e_1_2_10_3_2 doi: 10.1016/j.ins.2018.12.031 – ident: e_1_2_10_18_2 – ident: e_1_2_10_7_2 doi: 10.1016/j.knosys.2020.105792 – ident: e_1_2_10_21_2 doi: 10.1002/cpe.4676 – ident: e_1_2_10_25_2 doi: 10.1016/j.eswa.2013.08.089 – ident: e_1_2_10_24_2 doi: 10.1007/s10586-017-1122-y – ident: e_1_2_10_14_2 doi: 10.17706/jcp.13.9.1042-1052 – ident: e_1_2_10_4_2 doi: 10.1016/j.fss.2019.06.008 – ident: e_1_2_10_17_2 doi: 10.1016/j.csi.2017.09.010 – ident: e_1_2_10_20_2 doi: 10.9756/bp2019.1002/27 – ident: e_1_2_10_27_2 doi: 10.1007/s12065-020-00474-w – ident: e_1_2_10_1_2 doi: 10.1016/j.future.2018.10.038 – ident: e_1_2_10_16_2 doi: 10.1016/j.asoc.2017.11.007 – ident: e_1_2_10_13_2 doi: 10.32604/cmc.2021.015363 – ident: e_1_2_10_19_2 doi: 10.1109/ACCESS.2021.3103746 – ident: e_1_2_10_5_2 doi: 10.1109/tsc.2015.2502595 – ident: e_1_2_10_23_2 doi: 10.1016/j.sysarc.2020.101861 – ident: e_1_2_10_9_2 doi: 10.14778/3007263.3007304 – ident: e_1_2_10_30_2 doi: 10.1109/ICoAC.2013.6921946 – ident: e_1_2_10_12_2 doi: 10.14569/ijacsa.2017.080555 – ident: e_1_2_10_10_2 doi: 10.14778/3137628.3137656 – ident: e_1_2_10_28_2 doi: 10.1016/j.future.2020.03.010 – ident: e_1_2_10_8_2 doi: 10.1007/s10664-020-09900-0 – ident: e_1_2_10_15_2 doi: 10.1109/access.2021.3052956 – ident: e_1_2_10_29_2 doi: 10.1016/j.future.2016.05.005 – ident: e_1_2_10_26_2 doi: 10.1109/access.2021.3083923 – ident: e_1_2_10_11_2 doi: 10.1016/j.infsof.2017.11.016 |
| SSID | ssj0003021 |
| Score | 2.5012684 |
| Snippet | In the current ongoing crisis, people mostly rely on mobile phones for all the activities, but query analysis and mobile data security are major issues.... In the current ongoing crisis, people mostly rely on m obile phones for all the activities, but query analysis and mobile data security are major issues.... |
| SourceID | unpaywall proquest crossref hindawi |
| SourceType | Open Access Repository Aggregation Database Enrichment Source Index Database Publisher |
| SubjectTerms | Accuracy Algorithms Bagging Cell phones Clustering Complexity Datasets Decision trees Genetic algorithms Machine learning Methods Performance evaluation Queries Query languages Similarity |
| SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV1NT9wwELXooqrtAdEvdVuK5gC9VBZJHDvJoULLl1DFroBSaW_RJJnQSttkC4kQ_77jrLOFA3CNRpbssWfeTOz3hNgKSsb8WMYyVIYLFL9QMkYiqXRekB9H5Cn7UHg8Mcc_w-9TPV0Rk_4tjL1W2cfELlAXdW575DtBh7R1YsLd-V9pVaPs39VeQgOdtELxraMYeyZWA8uMNRCre4eT0_NlbFZe4BhUPRkbk_RX4bW2XQB_h5M5Jy1zL0k9_2Wr45vf9zDoi7aa4-0NzmZ30tHRulhzOBJGC8e_FitUvRGv7rALvhXtOVZF_Qes-uZ1A3tom8uXwB9hKsfEOQr2Z60lSqACRjytece1WcEBNd0FrQrs4xP4cXYCZy1d3cJJfQkMcmHUqSzawbp2PcG4zji6wAE2-E5cHB1e7B9Lp7Igc6WiRia6DDJGLZ6HCfHpDZMg8Etevowo54Dg-1FeehiTUoUO2KZUtqpEw-ulMFTvxaCqK_ogAMMEs5IBZ-TxDiBMTOGZ0o8JTRjllA3F135V09wxkFshjFnaVSJap9YHqfPBUGwvrecL5o0H7Lacg54w2-i9l7pjep3-31RD8WXp0UfH-fj4OJ_ES2u9aNJsiEFz1dJnhi1Ntun24j9gVeYE priority: 102 providerName: ProQuest – databaseName: Unpaywall dbid: UNPAY link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwEB6VrRBw4I1YKMiHwgVlm8Sxk0hclpaqQt2KQistBxQ59rggtsmqm2hVTvwEfiO_hHEeVReJh7jF0ciJ7dHMN6PxNwCboSXMr2ziRVxSgBIY7iUK0eNCGwySGH3uLgpPDuTecfRmKqZr8LK_C2McRXypzGL0ycWky8-Nte72dbG11KfaxevBFrldci9yNDf2CqxLQUh8AOvHB2_HH1qKVN9LZNPRrnuO477uXYiVKVY80tXusyuA81pdzNX5Us1ml3zP7i342P91W3LyZVRX-Uh__YXQ8X-XdRtudqCUjVstugNrWNyFG5eoCu_B8p0qTHnKXCvPRcVeKZepPmH0kk1_fPs-QXJ5bHtWO94FNGxcVK5W22Ub2Q5WTb1XwdxdFvb-cJ8d1nh2zvbLE0aYmY2bpo1uuib7j2xS5mSs2I6q1H042n19tL3ndU0bPM15XHmpsGFOIMj3VYpkDKI0DANLDjJH1GRfgiDW1lcJcm5ESDKWuyBVSVo9VxF_AIOiLPAhMBWlKreEX2OfFApVKo0vbZCgklGsMR_Ci_7cMt0Rmru-GrOsCWyEyNyOZt2ODuHZhfS8JfL4jdxmd0R_Edvo9SPrjzELm2iQVDEawvMLnfnjPI_-VfAxXHfDNvuzAYPqrMYnhIeq_Gmn9j8BnrcD3g priority: 102 providerName: Unpaywall |
| Title | Random Forest Bagging and X-Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data |
| URI | https://dx.doi.org/10.1155/2021/2730246 https://www.proquest.com/docview/2606665964 https://downloads.hindawi.com/journals/wcmc/2021/2730246.pdf |
| UnpaywallVersion | publishedVersion |
| Volume | 2021 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 1530-8677 dateEnd: 20250131 omitProxy: true ssIdentifier: ssj0003021 issn: 1530-8677 databaseCode: BENPR dateStart: 20170101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVWIB databaseName: Wiley Online Library - Core collection (SURFmarket) issn: 1530-8677 databaseCode: DR2 dateStart: 20010101 customDbUrl: isFulltext: true eissn: 1530-8677 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0003021 providerName: Wiley-Blackwell – providerCode: PRVWIB databaseName: Wiley Online Library Open Access customDbUrl: eissn: 1530-8677 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0003021 issn: 1530-8677 databaseCode: 24P dateStart: 20170101 isFulltext: true titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html providerName: Wiley-Blackwell |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDI54CAEHxFOMx-QDcEEVbdOm7XEPxoS2CQZI41SlrQtIo0Os1bR_j9N1EwPxOCZ1UylfEvtzHZuxEzMmm1_GrmZxQQTFiLjmSkSN22GEhuugztVF4XZHNB-s657dK5IkDb__widtp-i5cUFalrSJWGSLrlCRW91mb3bg0pMiLaquuUJ40_j2L-_OaZ6VZ0V5Ry9zhuVqlrzJ8Uj2-590TGOTbRTGIVQmaG6xBUy22fqnlIE7LOsS9R-8giqpOUyhKpXH-AmoE3paG0nxQK2fqewHGEElSVXEtPL5QR3TPOoqAXWjBO5uW3Cb4fsYWoMnIMsVKnnpRDVY7oNHaA8COjKgLlO5y-4bl_e1plaUTtBCzp1U8-zYDMgU0XXpIW1JyzNNIyY1FSCGtMsNwwljXbrIeWSbJBNzRRWloPni0uJ7bCkZJLjPQFqeDGKyIh2dYEXpiUgXseGiFJYTYlBi59NZ9cMirbiqbtH3c3ph277CwC8wKLHTmfTbJJ3GD3InBUB_iB1N0fOLvTf0zZyT2Z6wSuxshuiv4xz873OHbE01Jx6YI7aUvmd4TDZJGpRpXTauymy5etm56VKr3jXL-SqlvofOTeXxA9JD2jc |
| linkProvider | Hindawi Publishing |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9NAEF6VVqhwQLwqAgX20HJBq9r7sn2oUNq0SmkS0RKk3Ky1PS5IwQ6NrSg_jv_GrLMO7YFy6tUaz2Fmduab2Z0ZQvZ4jpjf5CGTQmOC4meChQaACZVm4IcBeMI2Cg9Huv9Nfp6oyQb53fbC2GeVrU9sHHVWprZGfsAbpK0iLT_NfjG7NcrerrYrNIxbrZAdNiPGXGPHOSwXmMLND896qO99zk9Pxsd95rYMsFSIoGKRynmCUdvzTARovTLi3M_RoycAKR4I3w_S3DMhCJEpjjS5sFmV0RgdhZEC2T4gW1LICHO_raOT0ZfLdSgQHncDWz0Wah21L--VskUH_wCxA8ZIfSsmPvxuk_HFj1uQd7suZma5MNPpjeh3-pQ8cbCVdld29oxsQPGcPL4xzPAFqS9NkZU_qV32Oa_okbG17CuKH-mEDQFDIj2e1nYuA2S0i1KcNaM9C9qDqnkPVlDb60K_XgzoRQ3XSzooryhiatptljpaZs3tANBhmaAzoz1TmZdkfB_i3iGbRVnAK0KNjEySI74NPDQ4MJHOPJ37IRgtgxSSDvnYSjVO3cBzu3djGjeJj1Kx1UHsdNAh-2vq2WrQxz_o9pyC_kO222ovdl5hHv-14Q75sNbonXxe383nPdnuj4eDeHA2On9DHtk_V_WhXbJZXdfwFhFTlbxzdklJfM8n4Q-OHiBd |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9NAEF6VIqA9IJ5qoMAeWi5oFdvrXdsHhEJDaGlSUWil3Ky1PVsqpXZobEX5af13zDh2aA-UU6_WeA47szPfzM6DsR3PIuY3NhS-1BiguJkUoQEQUqUZuGEAjqRG4dGR3j_1v43VeI1dtb0wVFbZ2sTaUGdFSjnyrlcjbRVpv2ubsojv_cGn6W9BG6TopbVdp7FUkUNYzDF8m3086KOsdz1v8OVkb180GwZEKmVQikhZL0GP7TgmAtRcP_I816I1TwBSvAyuG6TWMSFImSkPaaykiMpo9IzS-BLZ3mP3AxriTk3qg68rJyAdrxnV6ohQ66ituVeK0g1uF1EDekd9wxs--EVh-Pz8Bth9VOVTs5ibyeSa3xs8YY8bwMp7Sw17ytYgf8Y2r40xfM6qHybPigtOaz5nJf9sKIt9xvEjH4sRoDPke5OKJjJAxnt5SVXclIfkfSjrSrCcU5cL_3k85McVXC74sDjjiKZ5r17nSMzqdwHgoyJBM8b7pjQv2MldHPZLtp4XOWwxbvzIJBaRbeCgqoGJdOZo64ZgtB-kkHTYh_ZU47QZdU4bNyZxHfIoFZMM4kYGHba7op4uR3z8g26nEdB_yLZb6cWNPZjFf7W3w96vJHorn1e383nHHqL-x8ODo8PXbIN-XCaGttl6eVnBG4RKZfK2VkrO4ju-BH8Aiuod9w |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwEB6VrRBw4I1YKMiHwgVlm8Sxk0hclpaqQt2KQistBxQ59rggtsmqm2hVTvwEfiO_hHEeVReJh7jF0ciJ7dHMN6PxNwCboSXMr2ziRVxSgBIY7iUK0eNCGwySGH3uLgpPDuTecfRmKqZr8LK_C2McRXypzGL0ycWky8-Nte72dbG11KfaxevBFrldci9yNDf2CqxLQUh8AOvHB2_HH1qKVN9LZNPRrnuO477uXYiVKVY80tXusyuA81pdzNX5Us1ml3zP7i342P91W3LyZVRX-Uh__YXQ8X-XdRtudqCUjVstugNrWNyFG5eoCu_B8p0qTHnKXCvPRcVeKZepPmH0kk1_fPs-QXJ5bHtWO94FNGxcVK5W22Ub2Q5WTb1XwdxdFvb-cJ8d1nh2zvbLE0aYmY2bpo1uuib7j2xS5mSs2I6q1H042n19tL3ndU0bPM15XHmpsGFOIMj3VYpkDKI0DANLDjJH1GRfgiDW1lcJcm5ESDKWuyBVSVo9VxF_AIOiLPAhMBWlKreEX2OfFApVKo0vbZCgklGsMR_Ci_7cMt0Rmru-GrOsCWyEyNyOZt2ODuHZhfS8JfL4jdxmd0R_Edvo9SPrjzELm2iQVDEawvMLnfnjPI_-VfAxXHfDNvuzAYPqrMYnhIeq_Gmn9j8BnrcD3g |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Random+Forest+Bagging+and+X-Means+Clustered+Antipattern+Detection+from+SQL+Query+Log+for+Accessing+Secure+Mobile+Data&rft.jtitle=Wireless+communications+and+mobile+computing&rft.au=Dhanaraj%2C+Rajesh+Kumar&rft.au=Ramakrishnan%2C+Vinothsaravanan&rft.au=Poongodi%2C+M.&rft.au=Krishnasamy%2C+Lalitha&rft.date=2021&rft.pub=Hindawi&rft.issn=1530-8669&rft.eissn=1530-8677&rft.volume=2021&rft_id=info:doi/10.1155%2F2021%2F2730246&rft.externalDocID=10_1155_2021_2730246 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1530-8669&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1530-8669&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1530-8669&client=summon |