A Graph theory algorithmic approach to data clustering and its Application
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 9
Abstract
Clustering is the unproven classification of data items, into groups known as clusters. The clustering problem has been discussed in many area of research in many disciplines; this reflects its huge usefulness in the field of data analysis. However, clustering may be a difficult problem statistically, and the differences in assumptions in different disciplines made concepts and methodologies slow to occur. This paperpresentstaxonomy of clustering techniques, and recent advances in graphtheorytic approach. We also describe some important applications of clustering algorithms such as image segmentation, object recognition, and information retrieval.
Authors and Affiliations
K. Venkatasubramanian| Research Scholar, SCSVMV University, Kancheepuram Senior Prof. Department of CSE, Dr. S. K. Srivatsa| Pratyusha Institute of Technology & Management(PITAM) Chennai-602 025, Dr. C. Parthasarathy| Assistant Professor,Dept. of IT, SCSVMV University Kancheepuram
A Survey on Random Grid based Cryptography Schemes
A random grid based non-expanded Visual cryptography scheme used to generate meaningful as well as meaningless shares. First, analyze the distribution of pixels on the share image and stack image. A probability alloc...
In created nations, utilizing high quality cement in structures today would bring about both specialized and practical preferred standpoint. In high quality solid, it is important to decrease the water/concrete propo...
A Technique To Sieve Annoying Communications From Osn Client Walls
Internet safety or online social network safety is the security of people and their information when using the Internet. Social media safety means protecting your personal information and terminates the untrusted inf...
As innovation quickly increments, various detecting and versatility abilities have turned out to be promptly accessible to gadgets and thusly portable impromptu systems (MANETs) are being conveyed to play out various...
A Secure Off-Line MICO Payment Approach Using Multiple Physical Unclonable Functions
FRoDO, a protected off-line micro-payment approach utilizing various physical unclonable capacities. FRoDO highlights an identity component to verify the client, and a coin component where coins are not locally store...