Improving the Effective Pattern Discovery for Text Mining
Journal Title: Scholars Journal of Engineering and Technology - Year 2014, Vol 2, Issue 1
Abstract
Huge data mining techniques have been used for mining useful pattern in text document. Text mining can be used to extract the data in document. It is effectively use and update the discovered pattern; still the research is not yet completed. The existing approach is term based approach; they suffer the problem of polysemy and synonymy. In the past years, people have used pattern based approaches for hypothesis which perform better than the term based ones, but many of the experiments do not support this hypothesis. In this paper present a new idea about the effective pattern discovery technique which involved the processes of pattern deploying and pattern evolving, to improve the effectiveness of using and updating discovered patterns for finding relevant and useful information.
Authors and Affiliations
Vijayakumar T, Priya R
On The Higher Degree Equation with Six Unknowns x6-y6-2z3=52nT2m(w2-p2)
We presents non zero solutions of the degree non-homogeneous Diophantine equation in six unknowns represented by in which . In particular, different patterns of non-zero integral solutions of the above equation alon...
A Survey on Cardless Cash Access Using Biometric ATM Security System
Now a days it is important to upgrade the security in ATM systems. Because more fraudulent activities occurred use of magnetic strip card. And also if we want to know the loosed Personal Identification Number (PIN) means...
Analysis of Teledensity Growth Model Using Augmented Dickey-Fuller Technique (ADFT)
Abstract: This research developed a teledensity growth model in Nigeria using a multiple regression approach in order to understand the Nigerian telecommunication growth trend for predictive analytics. Data were obtained...
Encryption Method of Gray Image Based on BP Neural Network
At present, the problem that exists in the gray image encryption is easy to be cracked. Aiming at it, this paper proposes a kind of encryption method based on BP neural network. This method uses the very strong nonlinear...
Heine Theorem and Its Application
In the first part of this paper, it firstly takes and as an example. It presents that the unary function has Heine theorem of the normal limit existence and promotion form, and also Heine theorem of the abnormal limit...