Asee peer logo

Centralized or Federated Data Management Models, IT Professionals’ Preferences

Download Paper |


2014 ASEE Annual Conference & Exposition


Indianapolis, Indiana

Publication Date

June 15, 2014

Start Date

June 15, 2014

End Date

June 18, 2014



Conference Session

Topics in Computing and Information Technologies

Tagged Division

Computing & Information Technology

Page Count


Page Numbers

24.266.1 - 24.266.13



Permanent URL

Download Count


Request a correction

Paper Authors


Gholam Ali Shaykhian NASA

visit author page

Ali Shaykhian has received a Master of Science (M.S.) degree in Computer Systems from University of Central Florida and a second M.S. degree in Operations Research from the same university and has earned a Ph.D. in Operations Research from Florida Institute of Technology. His research interests include knowledge management, data mining, object-oriented methodologies, design patterns, software safety, genetic and optimization algorithms and data mining. Dr. Shaykhian is a professional member of the American Society for Engineering Education (ASEE).

visit author page


Mohd A. Khairi Najran University

visit author page

B.Sc of computer science from Khartoum university. Earned my masters from ottawa university in system science. My doctoral degree in information system from University of Phoenix( my dissertation was in Master Data Management). I worked in IT industry over 20 years, 10 of them with Microsoft in different groups and for the last 4 years was with business intelligence group. My focus was in Master Data Management. For the last 2 years I teach at universify of Najran in the college of Computer Science and Information System . My research interest in Master Data Management.

visit author page

Download Paper |


Data Mining Algorithms: Improving Data Analysis and Knowledge DiscoveryData mining uses pattern based queries, searches, or other analyses of one or more electronicdatabases in order to discover or locate a predictive pattern or anomalies. As such, it can be usedon representative data sets to monitor for subjects such as terrorist activity, criminal activity, orsystem failure.In recent years, throughout industry and government agencies, thousands data systems aredesigned and tailored to serve specific engineering and business needs. Many of these systemsuse relational algebra with structured query language to categorize and retrieve data. In thesesystems, data analyses are limited and require prior explicit knowledge of metadata and databaserelations; lacking exploratory data mining and discoveries. Engineering and scientific dataanalyses can be improved tremendously with the use of data mining techniques, methods andalgorithms.There are numerous algorithms, techniques and methods used to mine data; including neuralnetworks, genetic algorithms, decision trees, neatest neighbor method, rule induction associationanalysis, slice and dice, segmentation, and clustering. Each approach uniquely detects patterns ina dataset to improve knowledge discovery that can best discover the latent information in largequantities of data stored and strengthen data/text mining and trending within datasets.No one technique solves all data mining problems. This paper will discuss different data miningalgorithms and analyses of electronic data stored in one or more databases, document files, emailfiles, or web pages used to discover or locate predictive patterns or for discovery of knowledge.

Shaykhian, G. A., & Khairi, M. A. (2014, June), Centralized or Federated Data Management Models, IT Professionals’ Preferences Paper presented at 2014 ASEE Annual Conference & Exposition, Indianapolis, Indiana. 10.18260/1-2--20157

ASEE holds the copyright on this document. It may be read by the public free of charge. Authors may archive their work on personal websites or in institutional repositories with the following citation: © 2014 American Society for Engineering Education. Other scholars may excerpt or quote from these materials with the same citation. When excerpting or quoting from Conference Proceedings, authors should, in addition to noting the ASEE copyright, list all the original authors and their institutions and name the host city of the conference. - Last updated April 1, 2015