• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
course introduction, beginning of dimensionality reduction
course introduction, beginning of dimensionality reduction

Data Mining for Intrusion Detection: from Outliers to True
Data Mining for Intrusion Detection: from Outliers to True

... false positive will give a very large amount of spurious alarms that would be overwhelming for the analyst. Therefore, the goal of this paper is to propose an intrusion detection algorithm that is based on the analysis of usage data coming from multiple partners in order to reduce the number of fals ...
Recall - Precision Curve - Bilkent University Computer Engineering
Recall - Precision Curve - Bilkent University Computer Engineering

Clustering Analysis of Micro Array Data
Clustering Analysis of Micro Array Data

An Unsupervised Pattern Clustering Approach for Identifying
An Unsupervised Pattern Clustering Approach for Identifying

extraction of information from web server logs using nested
extraction of information from web server logs using nested

IOSR Journal of Computer Engineering (IOSR-JCE)
IOSR Journal of Computer Engineering (IOSR-JCE)

Interactive Clustering and Exploration of Large
Interactive Clustering and Exploration of Large

Version2 - School of Computer Science
Version2 - School of Computer Science

... analysis and mining on software engineering data. Our results of the investigation have shown the existing research on clustering SE data does not provide comparative or empirical analysis information or heuristics on which clustering techniques can help generate the clusters numbers automatically o ...
Cortina: a web image search engine
Cortina: a web image search engine

Smetana, Caroline Reiss: Data Analysis Methods for DNA Microarrays: A Critical Review of Applications to Breast Cancer Research
Smetana, Caroline Reiss: Data Analysis Methods for DNA Microarrays: A Critical Review of Applications to Breast Cancer Research

Breast Cancer Prediction using Data Mining Techniques
Breast Cancer Prediction using Data Mining Techniques

... Abstract—Cancer is the most central element for death around the world. In 2012, there are 8.2 million cancer demise worldwide and future anticipated that would have 13 million death by growth in 2030.The earlier forecast and location of tumor can be useful in curing the illness. So the examination ...
Locally adaptive metrics for clustering high dimensional data
Locally adaptive metrics for clustering high dimensional data

Resolution-based Outlier Mining and its Applications
Resolution-based Outlier Mining and its Applications

Package `subspace`
Package `subspace`

L10: Trees and networks Data clustering
L10: Trees and networks Data clustering

Multi-Assignment Clustering for Boolean Data
Multi-Assignment Clustering for Boolean Data

Linearly Decreasing Weight Particle Swarm Optimization with
Linearly Decreasing Weight Particle Swarm Optimization with

... inherent structures that presents in the objects. The purpose of cluster analysis is to classify the clusters into subsets. In this context, each subset and its particular problem have certain meanings. More specifically, a set of patterns usually are vectors in a multi-dimensional space that are gr ...
A framework for spatio-temporal clustering from mobile phone data
A framework for spatio-temporal clustering from mobile phone data

... moving clusters identification and trajectory clustering. Moving clusters refer to a set of objects that move close to each other for a long time interval [17], while trajectory clustering focuses on classification and regrouping of multiple trajectories based on their shapes and other features. Obj ...
An Efficient Approach for Test Suite Reduction using Density based
An Efficient Approach for Test Suite Reduction using Density based

... clustering algorithm and tools used for testing and mining test cases. In section 4, research methodology is presented. In section 5, experimental results are shown. In section 6, performance has been evaluated. In section 7, concluding remarks and future work to be done in this area has been discus ...
Data mining for activity extraction in video data
Data mining for activity extraction in video data

Adaptive Privacy-Preserving Visualization Using Parallel Coordinates
Adaptive Privacy-Preserving Visualization Using Parallel Coordinates

... axis pairs. This has two advantages: a) the clustering algorithm takes local properties between adjacent axis pairs into account, independent of the other axes, as a result of which cluster sizes are optimized and b) as pointed out by Li et al. [19] in parallel coordinates users are ultimately inter ...
Review of Algorithms for Clustering Random Data
Review of Algorithms for Clustering Random Data

A New Approach in Strategy Formulation using Clustering Algorithm
A New Approach in Strategy Formulation using Clustering Algorithm

Isometric Projection
Isometric Projection

< 1 ... 33 34 35 36 37 38 39 40 41 ... 88 >

Nearest-neighbor chain algorithm



In the theory of cluster analysis, the nearest-neighbor chain algorithm is a method that can be used to perform several types of agglomerative hierarchical clustering, using an amount of memory that is linear in the number of points to be clustered and an amount of time linear in the number of distinct distances between pairs of points. The main idea of the algorithm is to find pairs of clusters to merge by following paths in the nearest neighbor graph of the clusters until the paths terminate in pairs of mutual nearest neighbors. The algorithm was developed and implemented in 1982 by J. P. Benzécri and J. Juan, based on earlier methods that constructed hierarchical clusterings using mutual nearest neighbor pairs without taking advantage of nearest neighbor chains.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report