Generating Customer Profiles for Retail Stores Using Clustering Techniques
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 6
Abstract
The retail industry collects huge amounts of data on sales, customer buying history, goods transportation, consumption, and service. With increased availability and ease of use of modern computing technology and e-commerce, the availability and popularity of such businesses has grown rapidly. Many retail stores have websites where customers can make online purchases. These factors have resulted in increase in the quantity of the data collected. For this reason, the retail industry is a major application area for data mining. This paper elaborates upon the use of the data mining technique of clustering to segment customer profiles for a retail store. Retail data mining can help identify customer buying patterns and behaviours, improve customer service for better customer satisfaction and hence retention.
Authors and Affiliations
Pramod Prasad , Dr. Latesh G. Malik
Interference Reduction Technique in WCDMA using Cell Resizing
In WCDMA, the interference is produced by different factors such as thermal noise, intra cell traffic, traffic in adjacent cells and external traffic. In addition, the increase in number of users in a cell consequently i...
Log Mining Based on Hadoop’s Map and Reduce Technique
In the world of cloud and grid computing Virtual Database Technology (VDB) is one of the effective solutions for integration of data from heterogeneous sources. Hadoop is a large-scale distributed batch processing infras...
Hybrid Particle Swarm Optimization for Regression Testing
Regression Testing ensures that any enhancement made to software will not affect specified functionality of software. The execution of all test cases can be long and complex to run; this makes it a costlier process. The...
Biometric Template Security Using Invisible Watermarking With Minimum Degradation in Quality of Template
In this paper, we present an approach to enhance the Biometric Template Security by using Invisible Watermarking. For embedding the watermark in the Biometric Template, we used Parity Checker Method [2]. The use of Parit...
COMPARISON OF MULTICAST ROUTING PROTOCOLS IN AD-HOC WIRELESS NETWORKS
The majority of applications are in the areas where rapid deployment and dynamic reconfiguration are necessary and a wire line network is not available. These include military battlefields, emergency search and rescue si...