Search
Search Results
-
A New Theoretical Framework for K-Means-Type Clustering
One of the fundamental clustering problems is to assign n points into k clusters based on the minimal sum-of-squares(MSSC), which is known to be... -
The Mathematics of Learning: Dealing with Data *
Learning is key to develo** systems tailored to a broad range of data analysis and information extraction tasks. We outline the mathematical... -
Web Page Classification*
This chapter describes systems that automatically classify web pages into meaningful categories. It first defines two types of web page... -
Clustering Via Decision Tree Construction
Clustering is an exploratory data analysis task. It aims to find the intrinsic structure of data by organizing data objects into similarity groups or... -
Sequential Pattern Mining by Pattern-Growth: Principles and Extensions*
Sequential pattern mining is an important data mining problem with broad applications. However, it is also a challenging problem since the mining may... -
A Feature/Attribute Theory for Association Mining and Constructing the Complete Feature Set
A correct selection of features (attributes) is vital in data mining. For this aim, the complete set of features is constructed. Here are some... -
Incremental Mining on Association Rules
The discovery of association rules has been known to be useful in selective marketing, decision analysis, and business management. An important... -
Web Mining – Concepts, Applications and Research Directions
From its very beginning, the potential of extracting valuable knowledge from the Web has been quite evident. Web mining, i.e. the application of data... -
Mining Association Rules from Tabular Data Guided by Maximal Frequent Itemsets
We propose the use of maximal frequent itemsets (MFIs) to derive association rules from tabular datasets. We first present an efficient method to... -
Logical Regression Analysis: From Mathematical Formulas to Linguistic Rules
Data mining means the discovery of knowledge from (a large amount of)data, and so data mining should provide not only predictions but also knowledge... -
Privacy-Preserving Data Mining
The growth of data mining has raised concerns among privacy advocates. Some of this is based on a misunderstanding of what data mining does. The... -
Procedure-Aware Action Quality Assessment: Datasets and Performance Evaluation
In this paper, we investigate the problem of procedure-aware action quality assessment, which analyzes the action quality by delving into the...
-
Application of neural networks to predict indoor air temperature in a building with artificial ventilation: impact of early stop**
Indoor air temperature prediction can facilitate energy-saving actions without compromising the indoor thermal comfort of occupants. The aim of this...
-
A method for recognizing facial expression intensity based on facial muscle variations
Expression intensity recognition is a research problem in the field of computer vision and pattern recognition, which can be understood as the...
-
Cyber intrusion detection using dual interactive Wasserstein generative adversarial network with war strategy optimization in wireless sensor networks
Wireless sensor network (WSN) is one of the essential components of a multi-hop cyber-physical system comprising many fixed or moving sensors. There...
-
Dual strategy for single image denoising and generation using deep neural network
Removing noise in the real-world scenario has been a daunting task in the field of natural language processing. Research has shown that Deep Neural...
-
UDCT: lung Cancer detection and classification using U-net and DARTS for medical CT images
Lung cancer is the most fatal disease in recent times. Early detection of the same is very crucial and challenging task. Therefore, proper diagnostic...
-
Multitask EfficientNet affective computing for student engagement detection
In the realm of education, feedback emerges as a pivotal component, serving to foster engagement and interaction while also facilitating the...
-
ASRE-KG&RS: knowledge graph and recommender system for adaptive smart radio environment
With the rapid advancement of wireless communication technologies, efficient utilization of the spectrum has become more complex and competitive....
-
Analyzing processing time and load factor: 5-node mix network with ElGamal encryption and XOR shuffling
To provide anonymous communication, this paper proposes the implementation of a 5-node mix network using ElGamal encryption and XOR Shuffling. An...