A Comparative Study of Hierarchical Clustering in Heterogeneous Environment
Journal Title: International Journal of Linguistics and Computational Applications - Year 2016, Vol 3, Issue 2
Abstract
— In this project, the Hierarchical clustering is one of the most popular clustering methods that can find hierarchical structure hidden in input data for data analysis. To perform this method, one needs to define the notion of distance between two clusters. The inter-cluster distance is defined as that the distance between the shortest line connecting two clusters, for connecting single linkage. For the full linkage, the inter-cluster distance is defined as that the longest straight line between the two clusters. For the average linkage, the inter-cluster distance is defined as that the distance between the cluster members. For the centroid linkage, the inter-cluster distance is defined as that the distance between the centers of the two clusters. Maintaining the inter-cluster distance globally, is the challenging one in the wireless network for sharing large data packets. In a wireless network, the large number of flows can cause congestion. Therefore, a flow control mechanism is required that the amount of data inside the network. In a wireless networks, the bandwidth is a shared resources. The common assumption is that the bandwidth available to a node is shared within the interference range of the node, this affects the available bandwidth inside a network. The estimation of bandwidth in a network results in reducing the overhead of the data transmission. The difficulties in the wireless network is that are Interferences, Absorption and reflection, Multipath fading, Hidden node problem, Resource sharing problem, Capacity, Channel, Network, Safety, etc.
Authors and Affiliations
Nehru Revathi
Video Steganography and Security Cryptography
— Today’s world is growing rapidly over internet technologies. Steganography play an important role in the field of information security [1]. Video and images are very common choice for hiding data. In Visual cryptograph...
தமிழ் நாடகத்தில் பெண்; கலைஞர்கள்
தமிழ்ச் சூழலில் பெண்கள் நாடகத்துறையில் ஈடுபடத் தொடங்கி சுமார் அரை நூற்றாண்டுகள் கடந்துவிட்டன. தமிழ் இலக்கிய வரலாற்றைப் பொறுத்தவரை, சங்க காலத்தில் பெண் நிகழ்த்துக்கலைஞர்கள் இருந்தமைக்கான சான்றுகள் காணக்கிடைக்கின்றன. ஆனால்...
தமிழ்க் கவிதை மரபும் ஒலிமாற்றங்களும்
தமிழ்க் கவிதை மரபும் ஒலிமாற்றங்களும்
Implementation of Lock the Accused and Over Speed Monitoring with Emergency Support to the Victim using Lot
— In this paper , Speed of the considerable number of Vehicles are checked. On the off chance that any vehicle goes past the allowed vehicle then cautioning is offered twice to the driver, if speed is proceeded with then...
Comparative Survey of UNIX, Linux, Windows7 Operating System
Here I has given the Comparative Survey of Unix, Linux and Windows 7 Operating System. First in brief I has given their history. Then compared their Design principles and then compared the Security provided by Unix, Linu...