• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
Predicting Missing Attribute Values Using k
Predicting Missing Attribute Values Using k

Hierarchical Clustering
Hierarchical Clustering

Hartigan`s K-Means Versus Lloyd`s K-Means -- Is It Time for a
Hartigan`s K-Means Versus Lloyd`s K-Means -- Is It Time for a

Data Mining Techniques for Text Mining
Data Mining Techniques for Text Mining

Grouping related attributes - RIT Scholar Works
Grouping related attributes - RIT Scholar Works

... studied. A brief overview of the solution is presented with adequate references. In all cases, the intention is to discuss the completeness of the solution that is offered. The common theme to all these sections is not just grouping of attributes, but also the reduction of attributes. This chapter p ...
SOM-based Generating of Association Rules
SOM-based Generating of Association Rules

apriori algorithm for mining frequent itemsets –a review
apriori algorithm for mining frequent itemsets –a review

... M. Patel et.al, a proposed of many algorithms to mine association rule that uses support and confidence as constraint. We proposed a method based on support value that increase the performance of Apriori algorithm and minimizes the number of candidate generated and removed candidate at checkpoint wh ...
Clustering - Ohio State Computer Science and Engineering
Clustering - Ohio State Computer Science and Engineering

An accurate MDS-based algorithm for the visualization of large
An accurate MDS-based algorithm for the visualization of large

... accuracy of the results obtained by our approach, we need to compare their Stress values to the ones obtained by full scaling of the entire datasets. Those datasets are similar in size (4435 items with 36 features in satimage, and 4177 items with 7 numerical features in abalone), which allows full s ...
Transaction / Regular Paper Title
Transaction / Regular Paper Title

Data Stream Clustering Algorithms: A Review
Data Stream Clustering Algorithms: A Review

... been used to mine data streams due to its suitability for use with huge volumes of data, which gave rise to the micro and macroclustering concepts. These two concepts enable BIRCH to overcome two major drawbacks found in the HAC algorithm, namely, scalability and failure to undo what has been previo ...
Optimized Association Rule Mining with Maximum Constraints using
Optimized Association Rule Mining with Maximum Constraints using

Tan`s, Steinbach`s, and Kumar`s textbook slides
Tan`s, Steinbach`s, and Kumar`s textbook slides

... – A cluster is a set of objects such that an object in a cluster is closer (more similar) to the “center” of a cluster, than to the center of any other cluster – The center of a cluster is often a centroid, the average of all the points in the cluster, or a medoid, the most “representative” point of ...
Ant-based Clustering Algorithms: A Brief Survey
Ant-based Clustering Algorithms: A Brief Survey

... The clustering problem is the ordering of a set of data into groups, based on one or more features of the data. Cluster analysis [15] [39] [44] is an unsupervised learning method that constitutes a main role of an intelligent data analysis process. It is used for the exploration of inter-relationshi ...
Visualizing Clustering Results
Visualizing Clustering Results

Data Mining Methods for Recommender Systems
Data Mining Methods for Recommender Systems

Vered Tsedaka 2005
Vered Tsedaka 2005

Data Stream Clustering with Affinity Propagation
Data Stream Clustering with Affinity Propagation

... which might prevent the algorithm from catching the distribution changes in a timely manner; likewise, it adversely affects the adjustment of the number k of clusters. In [23], data samples flowing in are categorized as discardable (outliers), or compressible (accounted for by the current model), or ...
Advances in Document Clustering with Evolutionary
Advances in Document Clustering with Evolutionary

Visual Quality Assessment of Subspace Clusterings
Visual Quality Assessment of Subspace Clusterings

DYNAMIC DATA ASSIGNING ASSESSMENT
DYNAMIC DATA ASSIGNING ASSESSMENT

Novel Intrusion Detection System Using Hybrid Approach
Novel Intrusion Detection System Using Hybrid Approach

... both variance and bias. This approach provides better performance and increase accuracy Duanyang in [6] provides hybrid approach that combine host and network based ids to provide more effective intrusion detection system. This scheme is used for both anomaly and misuse detection. In paper, Prashant ...
Fast Rank-2 Nonnegative Matrix Factorization for
Fast Rank-2 Nonnegative Matrix Factorization for

Distance-Based Outlier Detection: Consolidation and Renewed
Distance-Based Outlier Detection: Consolidation and Renewed

... use of compact data structures [22, 10], the benefits of pruning and randomization [5], among others. In fact, each new proposal, including some by ourselves is inevitably backed by a strong set of empirical results showcasing the benefits of the new method over competitive strawman or the previous ...
Data Mining
Data Mining

< 1 ... 18 19 20 21 22 23 24 25 26 ... 88 >

Nearest-neighbor chain algorithm



In the theory of cluster analysis, the nearest-neighbor chain algorithm is a method that can be used to perform several types of agglomerative hierarchical clustering, using an amount of memory that is linear in the number of points to be clustered and an amount of time linear in the number of distinct distances between pairs of points. The main idea of the algorithm is to find pairs of clusters to merge by following paths in the nearest neighbor graph of the clusters until the paths terminate in pairs of mutual nearest neighbors. The algorithm was developed and implemented in 1982 by J. P. Benzécri and J. Juan, based on earlier methods that constructed hierarchical clusterings using mutual nearest neighbor pairs without taking advantage of nearest neighbor chains.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report