A New Clustering Technique On Text In Sentence For Text Mining
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 3
Abstract
Clustering is a commonly considered data mining problem in the text domains. The problem finds numerous applications in customer segmentation, classification, collaborative filtering, visualization, document organization, and indexing. In this paper, the sentence level based clustering algorithm is discussed as a survey. The survey explains about the problems in clustering in sentence level and the solutions to overcome these problems. This paper presents a novel fuzzy clustering algorithm that operates on relational input data; i.e., data in the form of a square matrix of pairwise similarities between data objects Hierarchical Fuzzy Relational Eigenvector Centrality-based Clustering Algorithm (HFRECCA) is extension of FRECCA which is used for the clustering of sentences. Contents present in text documents contain hierarchical structure and there are many terms present in the documents which are related to more than one theme hence HFRECCA will be useful algorithm for natural language documents. In this algorithm single object may belong to more than one cluster.
Authors and Affiliations
B. Lakshmi Narayana| Dept. of CSE, PACE Institute of Technology And Sciences., Ongole, Prakasam District,AP, India, S. Phani Kumar| Dept. of CSE, PACE Institute of Technology And Sciences., Ongole, Prakasam District,AP, India
A Novel Attack Graph Approach For Attack Detection And Prevention Using Nice
DDoS attacks usually take up early stage actions such as multi-step exploitation, low frequency vulnerability scanning and compromising identified vulnerable virtual machines as zombies and lastly DDoS attacks throug...
Spoofing Attacks on Packets And Methods For Detection And Prevention Of Spoofed Packets
In a spoofing attack, the attacker creates misleading context in order to trick the victim into making an inappropriate security-relevant decision. A spoofing attack is like a con game: the attacker sets up a false bu...
A Distributed Opportunistic Routing Policy With Congestion Diversity
Every packet transmission can be caught by an irregular subset of recipient nodes among which the following hand-off is chosen deftly. The primary test in the outline of least deferral steering strategies is adjustin...
A Method Based On a Monolingual Word Alignment Model
Now a day’s, analyzing the things in the real-time world is completely contrast to the past and makes less burden on the user, even then we have a few problems like syntactical and logical errors. This causes the a...
Improvement of Grid Current Compensator in Distributed Generation System
This paper Proposed a new current control topology for grid-connected based distributed generation (DG), which helps the DG to exchange a sinusoidal current into the utility grid despite the distorted grid voltage an...