DEVELOPMENT OF HASH TABLE BASED WEB-READY DATA MINING ENGINE
Journal Title: Indian Journal of Computer Science and Engineering - Year 2010, Vol 1, Issue 4
Abstract
This paper focus on analysis and implementation of a hash table based data mining engine used to discover knowledge from transaction database for electronic commerce industry. Apriori algorithm is analyzed and implemented to discover association relationship among amounts of business transaction records. Such relationships can be derived based on individual product purchased in all transactions. They also can be applied to single category level that will provide more granular analysis. This engine can derive both single and multidimensional association rules. The resulted association relationships help in much business decisionmaking processes, such as catalog design, shelf layout, cross-marketing, bundled advertisement, etc.
Authors and Affiliations
SK MD OBAIDULLAH
ADAPTING RULE BASED MACHINE TRANSLATION FROM ENGLISH TO BANGLA
This paper presents the adapting rule based machine translation from English to Bangla. The proposed language translation model relies on rule based methodologies especially fuzzy rules. There are “If - Then” basis rules...
AUTOMATED SYSTEM FOR NURSE SHEDULING USING GRAPH COLORING
The research work presented in this paper aims to provide effective method for solving Nurse scheduling problem (NSP) by satisfying the nurses, patients and hospital requirements. NSP is a major problem faced by many hos...
WAVELET BASED WATERMARKING ON DIGITAL IMAGE
Safeguarding creative content and intellectual property in a digital form has become increasingly difficult as technologies, such as the internet, broadband availability and mobile access advance. It has grown to be prog...
A TESTING FRAMEWORK FOR FAULT TOLERANT COMPOSITION OF TRANSACTIONAL WEB SERVICES
Software testers have great challenges in testing of web services therefore testing technique must be developed for testing of web services. Web service composition is an active research area over last few years. This pa...
NETWORK INTRUSION DETECTION SYSTEM USING FUZZY LOGIC
IDS which are increasingly a key part of system defense are used to identify abnormal activities in a computer system. In general, the traditional intrusion detection relies on the extensive knowledge of security experts...