• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
Full publication in PDF-format
Full publication in PDF-format

Feauture selection Problem using Wrapper Approach in Supervised
Feauture selection Problem using Wrapper Approach in Supervised

... Feature selection is a process that selects a subset of original features. Feature selection is one of the important and frequently used techniques in data preprocessing for data mining. In realworld situations, relevant features are often unknown a priori. Hence feature selection is a must to ident ...
Density Biased Sampling
Density Biased Sampling

... the size of these sets to bias our sample while ensuring that the sample is still representative. Data mining applications on spatial data are a natural application because we have a simple notion of equivalent points: points that are close. To show the applicability of using groups of equivalent po ...
Advances in Document Clustering with Evolutionary
Advances in Document Clustering with Evolutionary

... data have been stored in electronic form. Approximately 80% of these data are stored in text format (IndiraPriya and Ghosh, 2013; Xiao, 2010). Hence, there is a need for organizing and categorizing these data in such a way satisfying the needs for more mining information. One of these text mining te ...
An Optimized Approach for KNN Text Categorization using P
An Optimized Approach for KNN Text Categorization using P

... In the term space model [6][7], a document is presented as a vector in the term space where terms are used as features or dimensions. The data structure resulting from representing all the documents in a given collection as term vectors is referred to as a document-by-term matrix. Given that the ter ...
Extraction of thematic information through image classifications
Extraction of thematic information through image classifications

Exploring the wild birds` migration data for the
Exploring the wild birds` migration data for the

... uses a hierarchical data structure called CF-tree for partitioning the incoming data points in an incremental and dynamic way. BIRCH is order-sensitive as it may generate different clusters for different orders of the same input data. CURE [15] represents each cluster by a certain number of points t ...
an efficient mining technique for web cache of server log files
an efficient mining technique for web cache of server log files

... 5) Recalculate the distance between each data point and new obtained cluster centers. 6) If no data point was reassigned then stop, otherwise repeat from step 3). The k-means clustering algorithm will be applied on web log data to obtain the k number of clusters to identify the association among the ...
STEWARD: A SPATIO-TEXTUAL DOCUMENT SEARCH ENGINE
STEWARD: A SPATIO-TEXTUAL DOCUMENT SEARCH ENGINE

... Quite a few tree/graph visualization packages can be used to visualize DT – better understanding of both data and the classifiers (see Zhang C&G 2009 for more references) But …, DT classifiers usually have low classification accuracies 2010 Workshop on Data Mining for Geoinformatics (DMGI) 18th ACM ...
tr-2003-25
tr-2003-25

Scalable and interpretable data representation for high
Scalable and interpretable data representation for high

... doing so often requires more effort from the user than a simple “plug-and-play” approach. When incorporating machine learning in order to perform data classification tasks, one of the challenges a user may encounter is investigating individual data points and their characteristics, which is often an ...
Inter-Transaction Association Rules Mining for Rare Events Prediction
Inter-Transaction Association Rules Mining for Rare Events Prediction

... A very important area in the data miming research is the mining of association rules, a very simple but useful form of rule patterns for knowledge discovery. Association rules were initially used as a tool to apply market basket analysis to sets of data but they were extended to other kinds of anal ...
Data Mining Approaches for Life Cycle Assessment
Data Mining Approaches for Life Cycle Assessment

A Discretization Algorithm Based on Extended Gini Criterion
A Discretization Algorithm Based on Extended Gini Criterion

... searching possible n values throughout the whole space for all features simultaneously. According to Liu et al., discretization’s framework can be classified into splitting and merging methods [1]. Splitting algorithm consists of four steps, which are sorting the feature value, search for suitable c ...
IOSR Journal of Computer Engineering (IOSR-JCE)
IOSR Journal of Computer Engineering (IOSR-JCE)

... major tendencies are major undertakings pursued in intelligent data analysis, data mining, and system modeling. Clustering is a technique used to make group of the documents having similar features. Documents within a cluster have similar objects and dissimilar objects as compared to any other clust ...
Enhanced SMART-TV - Internetworking Indonesia Journal
Enhanced SMART-TV - Internetworking Indonesia Journal

... scalable nearest-neighbors classifier. It uses vertical data structure and approximates a set of potential candidate of neighbors by means of vertical total variation. The total variation of a set of objects about a given object is computed using an efficient and scalable Vertical Set Squared Distan ...
view profile - Computer Society Of India
view profile - Computer Society Of India

... Abled People: A Prototype Model. InProceedings of the International Conference on Data Engineering and Communication Technology 2017 (pp. 565-575). Springer Singapore. 15. Sharma R, Bhateja V, Satapathy SC. GSM Based Automated Detection Model for Improvised Explosive Devices. In Information Systems ...
ppt-file - SFU Computing Science
ppt-file - SFU Computing Science

an efficient algorithm for detecting outliers in a
an efficient algorithm for detecting outliers in a

... 6.Iterate till all the possibilities of super set checked with other MinSupp 7.CiFPM is generated when no supersets of same support count 8.Terminate all the item set generation 9.MinSupp={α} 10.If MinSupp then OutDet 11. Terminate the process The algorithm Closed in-Frequent Pattern Mining Discover ...
Unit 3 Notes - LesersGuide
Unit 3 Notes - LesersGuide

Finding Generalized Path Patterns for Web Log Data Mining *
Finding Generalized Path Patterns for Web Log Data Mining *

Integer Matrix Factorization and Its Application
Integer Matrix Factorization and Its Application

... system under consideration. For the simplicity of discussion, we shall assume that the entries of the given matrix A are from the same set Z. In practice, different columns of A may be composed of elements from different subsets of Z. Even the same element in Z may have different meaning in differen ...
I. Introduction
I. Introduction

... predefined groups, for example an email program might attempt to classify an email as legitimate or spam [9]. Clustering is like classification but the groups are not predefined, so the algorithm will try to group similar items together [9]. One of the data sampling methods for classification task i ...
Linköping University Post Print Text-based Analysis for Command and Control
Linköping University Post Print Text-based Analysis for Command and Control

... stages of Rosell and Velupillai (2008) encompass the iterated work process in ESDA and qualitative data analysis by Miles well: when analyzing logs from a team scenario, researchers may use transcribed communications as an entry point to further analysis and annotate the transcribed text according t ...
Evaluating the Performance of Association Rule Mining
Evaluating the Performance of Association Rule Mining

... Frequent patterns are patterns that appear in a database most frequently. Various techniques have been recommended to increase the performance of frequent pattern mining algorithms. Energetic frequent pattern (FP) mining algorithms are conclusive for mining association rule. Here, we examine the mat ...
< 1 ... 42 43 44 45 46 47 48 49 50 ... 169 >

K-means clustering

k-means clustering is a method of vector quantization, originally from signal processing, that is popular for cluster analysis in data mining. k-means clustering aims to partition n observations into k clusters in which each observation belongs to the cluster with the nearest mean, serving as a prototype of the cluster. This results in a partitioning of the data space into Voronoi cells.The problem is computationally difficult (NP-hard); however, there are efficient heuristic algorithms that are commonly employed and converge quickly to a local optimum. These are usually similar to the expectation-maximization algorithm for mixtures of Gaussian distributions via an iterative refinement approach employed by both algorithms. Additionally, they both use cluster centers to model the data; however, k-means clustering tends to find clusters of comparable spatial extent, while the expectation-maximization mechanism allows clusters to have different shapes.The algorithm has a loose relationship to the k-nearest neighbor classifier, a popular machine learning technique for classification that is often confused with k-means because of the k in the name. One can apply the 1-nearest neighbor classifier on the cluster centers obtained by k-means to classify new data into the existing clusters. This is known as nearest centroid classifier or Rocchio algorithm.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report