The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data clustering is one of the powerful techniques for the knowledge discovery from data. In this paper, a novel approach for hierarchical clustering has been proposed over non-binary search space. Besides the agglomerative methods, the proposed algorithm has considered the Strength of Presence associated with each transaction, to yield quality clusters which are again more close to the real life situation...
A good visualization model for Data Warehouse (DW) should be semantically enriched enough so that it can express analytical contents along with the multidimensional data model artifacts to the end-user and decision makers. In this paper the OLAP Umbrella visualization model has been proposed for the purpose. Besides preserving the classical multidimensional data model artifacts and OLAP specific contents,...
Association rule induction is a powerful data mining method, used to analyze the regularities in data trends by finding the frequent itemset and association between items or set of items. Several research attempts have been done for the purpose based on the binary data space. In this paper an algorithm has been proposed for the same purpose but based on the non-binary data space. The algorithm is...
The paper presents an image authentication and secures message transmission technique by embedding message/image into color images. Authentication is done by embedding message/image by choosing image blocks of size 3 times 3 called mask from the source image in row major order. The position of insertion is chosen within the mask according to the formula k % s and (k + 1) % s + 1 where k and s are...
An analytical and accurate subthreshold surface potential model for short channel Conventional, LAC & double halo including the effect of inner fringing field is presented, considering the surface potential variation with the depth of the channel depletion layer. With this the drawback of existing models, the assumption of a constant channel depletion layer thickness is removed. A pseudo two dimensional...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.