نتایج جستجو برای: two step clustering

تعداد نتایج: 2688892  

Journal: :J. Complexity 2014
Ángel Alberto Magreñán Ioannis K. Argyros

We present sufficient convergence conditions for two-step Newton methods in order to approximate a locally unique solution of a nonlinear equation in a Banach space setting. The advantages of our approach under the same computational cost over other studies such as [9–25] for the semilocal convergence case are: weaker sufficient convergence conditions, more precise error bounds on the distances...

Journal: :Environmental Health Perspectives 1996
Trias Thireou Vassilis Atlamazoglou Manolis Levakis Elias Eliopoulos Athanassios Hountas George Tsoucaris Kostas Bethanis

An important stage in macromolecular crystallography is that of phase extension and refinement when initial phase estimates are available from isomorphous replacement or anomalous scattering or other methods. For this purpose, an alternative method called the twin variables (TwiV) method has been proposed. The algorithm is based on alternately transferring the phase information between the twin...

Journal: :Hiroshima Mathematical Journal 1985

The rapid growing of information technology (IT) motivates and makes competitive advantages in health care industry. Nowadays, many hospitals try to build a successful customer relationship management (CRM) to recognize target and potential patients, increase patient loyalty and satisfaction and finally maximize their profitability. Many hospitals have large data warehouses containing customer ...

2011
DOLAN ANTENUCCI GREGORY HANDY AKSHAY MODI MILLER TINKERHESS

We present two techniques to aid in the retrieval of information from Twitter. First we present a technique to cluster hashtags in meaningful topic groups using a combination of co-occurrence frequency, graph clustering and textual similarity. Second, we present a technique to classify a tweet in terms of these topic groups based on their word content using a combination of PCA dimensionality r...

2013
Karthik G

Data safekeeping and security has been a key concern in the rapidly growing computer systems and networks. One of the recent methods for identifying any abnormal activities staging in a computer system is carried out by Intrusion Detection Systems (IDS) and it forms a significant portion of system defence against attacks. Various methods based on Intrusion Detection Systems have been proposed i...

The rapid growing of information technology (IT) motivates and makes competitive advantages in health care industry. Nowadays, many hospitals try to build a successful customer relationship management (CRM) to recognize target and potential patients, increase patient loyalty and satisfaction and finally maximize their profitability. Many hospitals have large data warehouses containing customer ...

2015
K. P. Agrawal Sanjay Garg andPinkal Patel

Outlier detection is very important functionality of data mining, it has enormous applications. This paper proposes a clustering based approach for outlier detection using spatio-temporal data. It uses three step approach to detect spatiotemporal outliers. In the first step of outlier detection, clustering is performed on the spatio-temporal dataset with proposed Spatio-Temporal Shared Nearest ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید