A Modified Ant-based Clustering for Medical Data
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 7
Abstract
Ant-based techniques, in the computer sciences, are designed for those who take biological inspirations on the behavior of the social insects. Data-clustering techniques are classification algorithms that have a wide range of applications, from Biology to Image processing and Data presentation. The ant-based clustering technique has been proven a promising technique for the data clustering problems. In this paper a modified ant-based clustering is proposed for medical data processing. The performance of the proposed method is compared with k-means clustering.
Authors and Affiliations
C. Immaculate Mary, , Dr. S. V. Kasmir Raja
Classification of Different Species Families using Clustering lgorithm
The division of similar objects into groups is known as Clustering. The main objective of this implementation is classification of DNA sequences related to different species and their families using Clustering Algorithm...
MATHEMATICAL MODELING ON NETWORK FRACTIONAL ROUTING THROUGH INEQUALITIES
A Network is a set, directed, acyclic multigraph over which messages can be transmitted from source node to sink node. Linear programming is one of the most important optimization techniques to help decision making in ne...
Mining Recurrent Pattern Identification on Large Database
Recurrent pattern mining is an important problem in the context of data mining. In this paper data mining algorithms have been discussed and compared. Recurrent pattern mining has been an important area in data mining re...
INVESTMENT PORTFOLIO MANAGER- MOBILE APPLICATION
The application of this project is to help the user keep track of his investments and manage his portfolio anytime, anywhere. A system of this sort finds its applications in trading, keeping track of the user's/company's...
Semantic Inference Model For DatabaseInference Detection Violation
Database Security has become a major problem in modern day’s applications. Generally for Information security everybody tries to protect sensitive data by using different security techniques. Despite these security measu...