2018
DOI: 10.1504/ijkedm.2018.095524
|View full text |Cite
|
Sign up to set email alerts
|

Clustering and association rule mining-based traffic analysis and prediction of Dhaka

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Clustering is an unsupervised approach for grouping similar documents (Siddiky et al, 2012;Jayabharathy and Kanmani, 2015). The goal of most clustering algorithms is to minimize the objective function (J) that measures the quality of clusters to find the optimum J which is the sum of the squared distances between each cluster center and each data point (Ahmed et al, 2018). There are two major clustering approaches: hard and fuzzy (soft).…”
Section: Methodsmentioning
confidence: 99%
“…Clustering is an unsupervised approach for grouping similar documents (Siddiky et al, 2012;Jayabharathy and Kanmani, 2015). The goal of most clustering algorithms is to minimize the objective function (J) that measures the quality of clusters to find the optimum J which is the sum of the squared distances between each cluster center and each data point (Ahmed et al, 2018). There are two major clustering approaches: hard and fuzzy (soft).…”
Section: Methodsmentioning
confidence: 99%
“…Muyeed Ahmed, Mir Tahsin Imtiaz, Raiyan Khan and Rashedur M. Rahman [4] Traffic is one of the major problems for any populated city. Currently, there are many traffic alert systems available and almost all of them work with user submitted inputs to give those alerts.…”
Section: Literature Survey On Association Rule Miningmentioning
confidence: 99%
“…From the analysis of abstracted patterns, decision-making process can be done very easily. Many modern intrusion detection systems are based on data mining and database-centric architecture [4], where a number of data mining techniques have been found. Data mining-based intrusion detection systems can be classified into misuse detection and anomaly detection.…”
Section: Introductionmentioning
confidence: 99%