Purchasing Behavior of the Customer Using Co-Miner Algorithm
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 2, Issue 3
Abstract
In the extended world, the competition is becoming more and more sweltering comparing with similar products that have the same features to the consumers who are about to purchase a certain product. The paper consist tasks involving the process of mining Competitive entities, domains, evidences for g to be competitor mining problems. The task of competitor mining that address in the paper includes mining all the information such as competitors, competing domains, and competitors’ strength. An algorithm CoMiner is suggested, which tries to conduct a Web-scale mining in a domain in dependent manner. The algorithm 1) Given an input entity, extracting a set of comparative candidates and ranking them. 2) Extracting the domains in which the given entity and its competitors play against each other. 3) Determining and summarizing the competitive evidence that details the competitors’ strength. The competitor mining tasks includes acquiring the competitors for a given entity, elaborating the competitive domains with respect to the competitors, and summarizing the opinion of detailed competitive evidences. Although on the Web there are many separate expressions that denote the comparative relationships between the given entity and its Competitors, we need a few patterns to extract candidates from web pages.
Authors and Affiliations
S. S. Sugany
EXPERIMENTAL ANALYSIS OF THE CHARACTERISTIC PERFORMANCE OF STANDALONE PHOTOVOLTAIC SYSTEM
This paper demonstrates an insight solar PV Stand Alone system which is a practical model with a halogen light source. At different situations the performance of solar PV cells are analyzed. The system produces power wi...
FINITE ELEMENT ANALYSIS OF STACKED VESSELS
The stacked vessels will experience seismic conditions for San Francisco California. These conditions will be analyzed using finite element analysis and the UB-97 code. ASME section IID allowed stresses will be us...
SECURITY FOR DATA STORAGE IN CLOUD COMPUTING
Cloud computing is nothing but a specific style of computing where everything from computing power to business apps are provided facility. This application moves the various data to the large data centers through...
DETECTION OF COMPUTER VIRUSES USING WELM_FA prevention quite tuff .Here we proposed WELM_FA to detect computer viruses. The proposed method efficiently detects static and nature changing viruses.
Computer viruses are big threat for our society .The expansion of various new viruses of varying forms make the prevention quite tuff .Here we proposed WELM_FA to detect computer viruses. The proposed method effic...
WSN ROUTING PROTOCOLS: A REVIEW
WSN is a set of connected tiny devices (sensor nodes) with limited energy resource. WSNs have ability to extract the information from the harsh and hostile environment without human interaction. Once, WSN is deplo...