A Comparative Analysis of Various Clustering Techniques used for Very Large Datasets
Journal Title: International Journal of Computer Science and Communication Networks - Year 2013, Vol 3, Issue 5
Abstract
Data Mining is the process of extracting hidden knowledge, useful trends and pattern from large databases which is used in organization for decision-making purpose. There are various data mining techniques like clustering, classification, prediction, outlier analysis and association rule mining. Clustering plays an important role in data mining process. This paper focuses about clustering techniques.There are several applications where clustering technique is used. Clustering is the process of assigning data sets into different groups so that data sets in same group having similar behavior as compared to data sets in other groups. This paper discusses about various clustering techniques. It also describes about various pros and cons of these techniques. This paper also focuses on comparative analysis of various clustering techniques.
Authors and Affiliations
Preeti Baser, Dr. Jatinderkumar Saini
Effect of Commutation Inductor in ZVS and Clamped Voltage
This paper presents an analysis of the effect of commutation inductor in ZVS and clamped voltage. To constructsuch converters, a switch cell, which consists of the basic PWM switch cell and an additional commutation indu...
Developments in Indoor Optical Fiber Wireless Networks
Optical wireless is an innovative technology combining the mobility of radio frequency (RF) wireless communications with the high bandwidth availability of optical communications. Next generation of wireless communicatio...
Performance Study of Bandwidth Request Mechanisms in IEEE 802.16e Networks
WiMAX (Worldwide Interoperability for Microwave Access) is the IEEE 802.16 standards-based wireless technology that provides fixed and mobile Internet access for Metropolitan Area Networks (MAN). The IEEE 802.16 std. inc...
Study of Information Hiding Techniques and their Counterattacks: A Review Article
With the rapid development of the internet technologies, digital media needs to be transmitted conveniently over the network. Attacks, unauthorized access of the information over the network become greater issues now a d...
Fuzzy Clustering as an Intrusion Detection Technique
Intrusion detection and clustering have always been hot topics in the field of machine learning. Clustering as an intrusion detection technique has long before proved to be beneficial. But as the methods and types of att...