• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
Future Reserch
Future Reserch

Finding Non-Redundant, Statistically Signi cant Regions in
Finding Non-Redundant, Statistically Signi cant Regions in

2082-4599-1-SP - Majlesi Journal of Electrical Engineering
2082-4599-1-SP - Majlesi Journal of Electrical Engineering

... sensitive items and we will arrange them based on sensitivity and length of the items in descending order. Up to the time that all of the sensitive rules are not hidden, the LHS element is deleted from the transactions which totally cover that sensitive rule and it starts from the next transaction w ...
Document
Document

Generating a Diverse Set of High-Quality Clusterings
Generating a Diverse Set of High-Quality Clusterings

Enhancements on Local Outlier Detection
Enhancements on Local Outlier Detection

Audience Segment Expansion Using Distributed In
Audience Segment Expansion Using Distributed In

Learning Approximate Sequential Patterns for Classification
Learning Approximate Sequential Patterns for Classification

... propose a two-step process to discover such patterns. Using locality sensitive hashing (LSH), we first estimate the frequency of all subsequences and their approximate matches within a given Hamming radius in labeled examples. The discriminative ability of each pattern is then assessed from the esti ...
A Fuzzy FCA-based Approach to Conceptual Clustering for Automatic Generation of Concept Hierarchy on Uncertainty Data
A Fuzzy FCA-based Approach to Conceptual Clustering for Automatic Generation of Concept Hierarchy on Uncertainty Data

A Discretization Algorithm Based on Extended Gini Criterion
A Discretization Algorithm Based on Extended Gini Criterion

... continuous value according to cut point and stop when a stopping criterion is met, otherwise repeat the second step. Splitting methods are categorized into four types of method, which are binning, entropy, dependency and accuracy. To name a few, some of the algorithms developed under binning are Equ ...
Ensemble of Classifiers to Improve Accuracy of the CLIP4 Machine
Ensemble of Classifiers to Improve Accuracy of the CLIP4 Machine

... Columns of this matrix correspond to variables of the optimized function (attributes). Rows correspond to function constrains (examples). The solution is obtained by selecting minimal number of matrix columns in such a way that for every row there will be at least one matrix cell with the value of 1 ...
a clustering-based approach for enriching trajectories with
a clustering-based approach for enriching trajectories with

No Slide Title - UCLA Computer Science
No Slide Title - UCLA Computer Science

symbiotic evolutionary subspace clustering (s-esc)
symbiotic evolutionary subspace clustering (s-esc)

Movement Data Anonymity through Generalization
Movement Data Anonymity through Generalization

An approach to improve the efficiency of apriori algorithm
An approach to improve the efficiency of apriori algorithm

K - Department of Computer Science
K - Department of Computer Science

paper - AET Papers Repository
paper - AET Papers Repository

... Cameron (1997) indicates that clustering methods are an important tool when analyzing traffic accidents as these methods are able to identify groups of road users, vehicles and road segments which would be suitable targets for countermeasures. More specifically, cluster analysis is a statistical tec ...
Web Mining for Personalization: A Survey in the Fuzzy Framework
Web Mining for Personalization: A Survey in the Fuzzy Framework

Concept Decompositions for Large Sparse Text Data using Clustering by Inderjit S. Dhillon and Dharmendra S. Modha
Concept Decompositions for Large Sparse Text Data using Clustering by Inderjit S. Dhillon and Dharmendra S. Modha

Exact Primitives for Time Series Data Mining
Exact Primitives for Time Series Data Mining

Cross-domain Text Classification using Wikipedia
Cross-domain Text Classification using Wikipedia

thesis - Cartography Master
thesis - Cartography Master

Finding Highly Correlated Pairs Efficiently with Powerful Pruning
Finding Highly Correlated Pairs Efficiently with Powerful Pruning

... address here: We want to consider the supports of the pairs in a pruning rule without actually counting these supports. In this paper, we show that this can be done. We propose a pruning rule that involves the supports of the pairs. Meanwhile, we give a pruning method for this rule that does not req ...
More Data Mining with Weka - Department of Computer Science
More Data Mining with Weka - Department of Computer Science

< 1 2 3 4 5 6 7 8 9 ... 88 >

Nearest-neighbor chain algorithm



In the theory of cluster analysis, the nearest-neighbor chain algorithm is a method that can be used to perform several types of agglomerative hierarchical clustering, using an amount of memory that is linear in the number of points to be clustered and an amount of time linear in the number of distinct distances between pairs of points. The main idea of the algorithm is to find pairs of clusters to merge by following paths in the nearest neighbor graph of the clusters until the paths terminate in pairs of mutual nearest neighbors. The algorithm was developed and implemented in 1982 by J. P. Benzécri and J. Juan, based on earlier methods that constructed hierarchical clusterings using mutual nearest neighbor pairs without taking advantage of nearest neighbor chains.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report