Hierarchal cluster based algorithm
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science technology
Active In SP
**

Posts: 740
Joined: Jan 2010
#1
30-01-2010, 07:34 AM


Description :Grouping customer transactions into segments may help understand customers better. The marketing literature has concentrated on identifying important segmentation variables (e.g., customer loyalty) and on using cluster analysis and mixture models for segmentation. The data mining literature has provided various clustering algorithms for segmentation without focusing specifically on clustering customer transactions. Building on the notion that observable customer transactions are generated by latent behavioral traits, in this paper, we investigate using a pattern-based clustering approach to grouping customer transactions. We define an objective function that we maximize in order to achieve a good clustering of customer transactions and present an algorithm,GHIC, that groups customer transactions such that item sets generated from each cluster, while similar to each other, are different from ones generated from others. We present experimental results from user-centric Web usage data that demonstrates that GHIC generates a highly effective clustering of transactions
Technology Used : Java , Swing
Algorithm : Clustering
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
vinod nambiar
Active In SP
**

Posts: 2
Joined: Mar 2010
#2
27-03-2010, 12:27 AM

can u please share ur project and implimentation implementation with me...thanks in advance
my mail id prkvkr@gmail.com
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Maximum Power Point Tracking using Perturb and Observe Algorithm For a PV System seminar flower 8 1,927 17-03-2015, 05:40 AM
Last Post: GT Racing
  Image Data Acquisition and compression using K-RLE Algorithm on Embedded ARM ppt seminar projects maker 0 596 28-09-2013, 04:36 PM
Last Post: seminar projects maker
  Integer Wavelet Transform based Steganographic Method using OPA Algorithm pdf seminar projects maker 0 377 11-09-2013, 04:04 PM
Last Post: seminar projects maker
  A Time-based Cluster-Head Selection Algorithm for LEACH project girl 2 614 06-09-2013, 09:44 AM
Last Post: study tips
  Optimal Job Scheduling using Ant Colony Algorithm in Grid Computing PPT study tips 0 390 21-08-2013, 02:49 PM
Last Post: study tips
  AN ALGORITHM FOR WATERMARKING MOBILE PHONE COLOUR IMAGES USING BCH CODE pdf study tips 0 379 03-07-2013, 04:53 PM
Last Post: study tips
  Mining Closed Sequences with Constraint Based on BIDE Algorithm Report study tips 0 378 26-06-2013, 04:56 PM
Last Post: study tips
  IMPLEMENTING RSA ENCRYPTION ALGORITHM TO ENHANCE THE DATA SECURITY OF CLOUD study tips 0 394 24-06-2013, 04:56 PM
Last Post: study tips
  Comments on ‘‘A note on teaching–learning-based optimization algorithm’’ pdf study tips 0 397 20-06-2013, 04:40 PM
Last Post: study tips
  A NEW APPROACH FOR IMAGE SEGMENTATION USING PILLAR-KEANS ALGORITHM FOR COLOUR PPT study tips 0 307 19-06-2013, 12:31 PM
Last Post: study tips