• No se han encontrado resultados

[PDF] Top 20 A new algorithm for mining frequent connected subgraphs based on adjacency matrices

Has 10000 "A new algorithm for mining frequent connected subgraphs based on adjacency matrices" found on our website. Below are the top 20 most common "A new algorithm for mining frequent connected subgraphs based on adjacency matrices".

A new algorithm for mining frequent connected subgraphs based on adjacency matrices

A new algorithm for mining frequent connected subgraphs based on adjacency matrices

... our algorithm has the best perfor- mance, the improvement achieved by grCAM in PTE (for low support thresh- olds) is small (the attained reduction is less than the 10%) due to the label distribution in this ... See full document

26

Reducing the number of canonical form tests for frequent subgraph mining

Reducing the number of canonical form tests for frequent subgraph mining

... Abstract. Frequent connected subgraph (FCS) mining is an interesting problem with wide applications in real ...FCS mining algorithms have been focused on detecting duplicate candidates ... See full document

15

Representative frequent approximate subgraph mining on multi-graph collections

Representative frequent approximate subgraph mining on multi-graph collections

... FAS mining algorithms, in this ...allEdges) based on graph transformations, which allows the application algorithms designed for mining all FASs from simple-graph collections to mine ... See full document

135

A New Algorithm for Rhythm Discrimination in Cardioverter Defibrillators Based on the Initial Voltage Changes of the Ventricular Electrogram

A New Algorithm for Rhythm Discrimination in Cardioverter Defibrillators Based on the Initial Voltage Changes of the Ventricular Electrogram

... This was the control group, intended to build and estimate the parameters of the discrimination algorithm. Sixteen patients, with inducible monomorphic VT and an implanted third generation-ICD (Micro-Jewel 7221 ... See full document

6

New Algorithms and Architectures for Arithmetic in GF(^2m) Suitable for Elliptic Curve Cryptography

New Algorithms and Architectures for Arithmetic in GF(^2m) Suitable for Elliptic Curve Cryptography

... General word polynomial multiplier, based on a look-up table tehnique.. An algorithm for standard redution using irreduible trino- mials.[r] ... See full document

151

A Fuzzy approach based on dynamic programming and metaheuristics for selecting safeguards for risk management for information systems

A Fuzzy approach based on dynamic programming and metaheuristics for selecting safeguards for risk management for information systems

... A Method for Fuzzy Risk Analysis based on the New Similarity of Trapezoidal Fuzzy Numbers. Fuzzy risk analysis based on similarity measure of generalized fuzzy num- bers[r] ... See full document

11

Heuristic strategies for different variants of the Order Batching Problem

Heuristic strategies for different variants of the Order Batching Problem

... -hard for general instances, but it is solvable in polynomial time if each batch does not contain more than two orders (Gademann and Velde, ...(VND) algorithm that considered 6 different neighborhood ... See full document

191

Teaching supervisory control based on a web portal and a system of laboratory tasks

Teaching supervisory control based on a web portal and a system of laboratory tasks

... written based on experience with teaching subjects on control systems and industrial automation at technical ...methods on how to organize and moderate an educational process with an active ... See full document

6

Analyzing strengths and weaknesses of fuzzy association rules algorithms

Analyzing strengths and weaknesses of fuzzy association rules algorithms

... A methodology to compare fuzzy association rules algorithms is presented in this paper, showing that allows the epithet on equal terms. This is motivated because of this is not a soft computing area with a ... See full document

45

Fair bandwidth allocation algorithm for PONS based on network utility maximization

Fair bandwidth allocation algorithm for PONS based on network utility maximization

... [36] 10-Gigabit-capable passive optical networks (XG-PON): Transmission convergence (TC) layer specification, ITU-T Recommendation G.987.3, ITU Standard, January 2014. Noemi Merayo received the Telecommunication Engineer ... See full document

13

Opinion mining of online product reviews using a lexicon-based algorithm

Opinion mining of online product reviews using a lexicon-based algorithm

... sources for sentiment analysis, because there are millions of users expressing their opinions on different topics, using syntactic structures to describe emotions or state facts (Pak & Paroubek, ... See full document

57

Human authentication through signature recognition

Human authentication through signature recognition

... Our algorithm needs to be fed with an ordered sequence of ...order. For writing Victor I would write first the V, then the i, and so ...Even for each letter, like the V I will always start from top ... See full document

50

Quantum walk based algorithm on scale free networks

Quantum walk based algorithm on scale free networks

... algorithms on this ...controls. For this task, we make use of ancilla qubits which allow to temporarily store information of the control qubit, and ultimately determine whether or not to apply the ... See full document

132

Fast algorithm for H.264/AVC intra prediction based on discrete wavelet transform

Fast algorithm for H.264/AVC intra prediction based on discrete wavelet transform

... This article shows a new algorithm for fast partition mode algorithm based on Discrete Wavelet Transform (DWT). It allows reducing the number of candidate modes to those which ... See full document

8

A Dynamic Gesture Recognition System based on CIPBR Algorithm

A Dynamic Gesture Recognition System based on CIPBR Algorithm

... return as output vectors with different sizes. CIPBR algorithm returns a set of vectors, each one containing around 200 features. To use this vectors as input in a HMM, and achieve a convergence state, it is ... See full document

7

A FACE RECOGNITION ALGORITHM BASED ON CONVOLUTIONAL NEURAL NETWORK

A FACE RECOGNITION ALGORITHM BASED ON CONVOLUTIONAL NEURAL NETWORK

... the new neurons are gradually added by using error back propagation until the convergence conditions of formula (2) is ...structure based on ORL face ... See full document

7

Ontology Based Data Mining Approach on Web Documents

Ontology Based Data Mining Approach on Web Documents

... Some works made use of graph-based ranking method to extract key phrases. In this method a graph with terms and its relatedness is build. Next using graph-based ranking algorithm, the terms are ... See full document

5

Minimal Decision Rules Based on the A Priori Algorithm

Minimal Decision Rules Based on the A Priori Algorithm

... data mining tasks for obtaining better ...classify new objects into one of the different decisions categories when this classification cannot be perfectly ...sets for data mining ... See full document

14

A Modified Multi-Pulse PPM Modulation based on PWM

A Modified Multi-Pulse PPM Modulation based on PWM

... especially for those applications of telecommunications that require an important efficiency in bandwidth use, it also suffers as PPM from synchronization problem ...[6,7]. On the other hand, the growing of ... See full document

6

Mining interesting frequent patterns in a single graph using inexact matching

Mining interesting frequent patterns in a single graph using inexact matching

... look for some independence in our patterns, less- ening the redundancy in the set of frequent patterns, and, at the same time, we want a subset being able to retain information from the original pattern ... See full document

122

Show all 10000 documents...