Sciweavers

58 search results - page 6 / 12
» dmin 2006
Sort
View
DMIN
2006
105views Data Mining» more  DMIN 2006»
13 years 7 months ago
Structural Analysis and Destabilizing Terrorist Networks
This paper proposed structural analysis and mathematical methods for destabilizing terrorist networks. The three different approaches are discussed for example: (i) cohesion analys...
Nasrullah Memon, Henrik Legind Larsen
DMIN
2006
151views Data Mining» more  DMIN 2006»
13 years 7 months ago
Rough Set Theory: Approach for Similarity Measure in Cluster Analysis
- Clustering of data is an important data mining application. One of the problems with traditional partitioning clustering methods is that they partition the data into hard bound n...
Shuchita Upadhyaya, Alka Arora, Rajni Jain
DMIN
2006
160views Data Mining» more  DMIN 2006»
13 years 7 months ago
MF-tree: Extracting and Clustering the Structural Features from Music Object in MusicXML
In the music information retrieval field, the most important topic is to extract the feature which represents the content from the music objects. The content feature is useful for ...
Yu-Chih Shen, Jia-Lien Hsu, Shuk-Chun Chung
DMIN
2006
115views Data Mining» more  DMIN 2006»
13 years 7 months ago
Privacy Preserving in Clustering using Fuzzy Sets
Data mining techniques, in spite of their benefit in a wide range of applications have also raised threat to privacy and data security. This paper addresses the problem of preservi...
S. Srinivasa Rao 0002, K. V. S. V. N. Raju, P. Kus...
DMIN
2006
83views Data Mining» more  DMIN 2006»
13 years 7 months ago
On Novelty Evaluation of Potentially Useful Patterns
- As is generally accepted, the most important feature that a Knowledge Discovery in Database (KDD) system must possess is, to be able to discover patterns that are "novel&quo...
Ying Xie, Manmathasivaram Nagarajan, Vijay V. Ragh...