𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Advanced data preprocessing using fuzzy clustering techniques

✍ Scribed by Harald Genther; Manfred Glesner


Publisher
Elsevier Science
Year
1997
Tongue
English
Weight
675 KB
Volume
85
Category
Article
ISSN
0165-0114

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


About the use of fuzzy clustering techni
✍ A.F. GΓ³mez-Skarmeta; M. Delgado; M.A. Vila πŸ“‚ Article πŸ“… 1999 πŸ› Elsevier Science 🌐 English βš– 811 KB

In this work we present an alternative approach to generate fuzzy rules with a functional consequent associated to the TSK fuzzy model. In our case, using fuzzy clustering algorithms that look for linear behaviours in the product space of the input-output data, we analyse different methods to genera

Utilization of self-organizing map and f
✍ Sarat Kumar Das; Prabir Kumar Basudhar πŸ“‚ Article πŸ“… 2009 πŸ› Elsevier Science 🌐 English βš– 632 KB

In this paper soft computing techniques, self-organizing maps and fuzzy clustering techniques have been proposed to isolate different layers in stratified soil based on available cone penetration test results. The results have been compared with that obtained from cone classification chart, hierarch

Technique to quantify local clustering o
✍ Alexander G. Nikonenko; Galina G. Skibo πŸ“‚ Article πŸ“… 2004 πŸ› John Wiley and Sons 🌐 English βš– 152 KB

## Abstract Synaptic vesicles are organelles that specialize in the storage of a neurotransmitter that continuously undergo an exo‐endocytotic cycle. During this cycle vesicles change their positions within a presynaptic terminal and their numbers as well as spatial arrangement can provide insight

Privacy preserving data mining: A noise
✍ Md Zahidul Islam; Ljiljana Brankovic πŸ“‚ Article πŸ“… 2011 πŸ› Elsevier Science 🌐 English βš– 356 KB

During the whole process of data mining (from data collection to knowledge discovery) various sensitive data get exposed to several parties including data collectors, cleaners, preprocessors, miners and decision makers. The exposure of sensitive data can potentially lead to breach of individual priv