Purchasing Behavior of the Customer Using Co-Miner Algorithm
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 2, Issue 3
Abstract
In the extended world, the competition is becoming more and more sweltering comparing with similar products that have the same features to the consumers who are about to purchase a certain product. The paper consist tasks involving the process of mining Competitive entities, domains, evidences for g to be competitor mining problems. The task of competitor mining that address in the paper includes mining all the information such as competitors, competing domains, and competitors’ strength. An algorithm CoMiner is suggested, which tries to conduct a Web-scale mining in a domain in dependent manner. The algorithm 1) Given an input entity, extracting a set of comparative candidates and ranking them. 2) Extracting the domains in which the given entity and its competitors play against each other. 3) Determining and summarizing the competitive evidence that details the competitors’ strength. The competitor mining tasks includes acquiring the competitors for a given entity, elaborating the competitive domains with respect to the competitors, and summarizing the opinion of detailed competitive evidences. Although on the Web there are many separate expressions that denote the comparative relationships between the given entity and its Competitors, we need a few patterns to extract candidates from web pages.
Authors and Affiliations
S. S. Sugany
Efficiency Evaluation of Heat Exchanger Based Domestic Solar Water Heater - A Review
In this paper an attempt has been made to review the literature of performance improving techniques for solar water heater. In view of energy crisis, the application of solar energy in the form of solar water heater is...
ON PRIME SUBMODULES IN WEAK MULTIPLICATION MODULES
Throughout this article, all rings will be treated as communicative with non zero identity and all modules will be treated as unitary modules. In this paper, some results have been given on prime sub modules in we...
DETECTION OF COMPUTER VIRUSES USING WELM_ FGA_FBA
Computer viruses are big threat for our society .The expansion of various new viruses of varying forms make the prevention quite tuff. Here we proposed WELM_FGA_FBA to detect computer viruses. The proposed method...
A Study on Image Registration for Remote Sensing Images
Image registration is one of the challenging tasks in image processing problems. The problem of image registration is to find a geometrical transformation that aligns points in one view of an image with correspond...
ANDROID BASED REMOTE CONTROLLER FOR HOME AND OFFICE AUTOMATION
In this paper, as the world gets more and more technologically advanced, we find new technology coming in deeper and deeper into our personal lives even at home. Home automation is becoming more popular around the...