• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
data mining techniques in cloud computing: a survey
data mining techniques in cloud computing: a survey

Data Mining for Intrusion Detection: from Outliers to True - HAL
Data Mining for Intrusion Detection: from Outliers to True - HAL

... seen before (and is thus considered as abnormal). Considering the large amount of new usage patterns emerging in the Information Systems, even a weak percent of false positive will give a very large amount of spurious alarms that would be overwhelming for the analyst. Therefore, the goal of this pap ...
Finding density-based subspace clusters in graphs with feature
Finding density-based subspace clusters in graphs with feature

... Either both clusters are merged or some objects are lost. In Fig. 1b an extract of the corresponding network structure is shown. Since the restrictive quasi-clique property would only assign a low density to this cluster, the cluster would probably be split by the model of Günnemann et al. (2010). I ...
as a PDF
as a PDF

... New approach like data mining is required for quality prediction and control to keep pace with increased complexity of manufacturing. Data Mining is the non-trivial process of identifying valid, novel, potentially useful and ultimately understandable patterns. [4] The domain knowledge is used to gui ...
thesis paper
thesis paper

Distributed Scalable Collaborative Filtering Algorithm
Distributed Scalable Collaborative Filtering Algorithm

Density-Based Clustering of Polygons
Density-Based Clustering of Polygons

Scalable Density-Based Distributed Clustering
Scalable Density-Based Distributed Clustering

Introduction to Similarity Assessment and Clustering
Introduction to Similarity Assessment and Clustering

... There is a separate “quality” function that measures the “goodness” of a cluster. The definitions of similarity functions are usually very different for interval-scaled, boolean, categorical, ordinal and ratio-scaled variables. Weights should be associated with different variables based on applicati ...
A Parallel Clustering Method Combined Information Bottleneck
A Parallel Clustering Method Combined Information Bottleneck

Scalable Density-Based Distributed Clustering
Scalable Density-Based Distributed Clustering

dm_clustering1
dm_clustering1

MOA: Massive Online Analysis, a framework for stream classification
MOA: Massive Online Analysis, a framework for stream classification

Using an Ontology-based Approach for Geospatial Clustering
Using an Ontology-based Approach for Geospatial Clustering

... Because OWL can formally represent the meaning of the domain terminology and it allows performing useful reasoning tasks on these documents, we used it as the language to represent the ontology. We use the OWL Plugin [14] of Protégé-2000 to construct the spatial clustering ontology. The current onto ...
Research Issues in Automatic Database Clustering
Research Issues in Automatic Database Clustering

Big Data Clustering A Review final - UM Repository
Big Data Clustering A Review final - UM Repository

Performance Evaluation of Density-Based Outlier Detection on High
Performance Evaluation of Density-Based Outlier Detection on High

Determining the number of clusters using information entropy for
Determining the number of clusters using information entropy for

Extensions to the k-Means Algorithm for Clustering Large Data Sets
Extensions to the k-Means Algorithm for Clustering Large Data Sets

Medical Records Clustering Based on the Text Fetched from Records
Medical Records Clustering Based on the Text Fetched from Records

Fuzzy adaptive resonance theory: Applications and
Fuzzy adaptive resonance theory: Applications and

Automated interpretation of 3D laserscanned point clouds for plant organ segmentation
Automated interpretation of 3D laserscanned point clouds for plant organ segmentation

network traffic clustering and geographic visualization
network traffic clustering and geographic visualization

Multi-Agent Clustering - Computer Science Intranet
Multi-Agent Clustering - Computer Science Intranet

... The agents within our framework need to be able to communicate to carry out their tasks. JADE provides a communication mechanism that makes use of the FIPA ACL performatives [9]. However, as has been discussed previously in [19], the FIPA ACL has limited applicability to dialogues not involving purc ...
Intro PDB - University of Louisiana at Lafayette
Intro PDB - University of Louisiana at Lafayette

... clustering obtains a partition of the objects into clusters such that the objects in a cluster are more similar to each other than to objects in different clusters. K-means, and K-mediod methods determine K cluster representatives and assign each object to the cluster with its representative closest ...
< 1 ... 26 27 28 29 30 31 32 33 34 ... 88 >

Nearest-neighbor chain algorithm



In the theory of cluster analysis, the nearest-neighbor chain algorithm is a method that can be used to perform several types of agglomerative hierarchical clustering, using an amount of memory that is linear in the number of points to be clustered and an amount of time linear in the number of distinct distances between pairs of points. The main idea of the algorithm is to find pairs of clusters to merge by following paths in the nearest neighbor graph of the clusters until the paths terminate in pairs of mutual nearest neighbors. The algorithm was developed and implemented in 1982 by J. P. Benzécri and J. Juan, based on earlier methods that constructed hierarchical clusterings using mutual nearest neighbor pairs without taking advantage of nearest neighbor chains.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report