An Approach to Text Documents Clustering with {n, n-1, ….., 1}-Word(s) Appearance Using Graph Mining Techniques
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2016, Vol 4, Issue 12
Abstract
This paper is about text document clustering with an input of n words. Initially a cluster of all text documents with extension name ".Txt" from m-documents of various types is formed. Then on an input of n-words, the proposed algorithm starts n, n-1, n-2,.....,1 sets of cluster. Each cluster of text documents with the presence of n, n-1, n- 2,......,1 word(s) respectively. These n-forms of clustering are treated as documents-words relation and in memory it is represented as un-oriented documents-words incidence matrix. Finally these un-oriented documents-words incidence matrices are represented as bi-partite graphs, since the bipartite graph has two sets of nodes namely document and word. The proposed algorithm using graph mining techniques was implemented using C++ programming language and the result was satisfactory.
Authors and Affiliations
Bapuji Rao| Research Scholar, CSE, BPUT, Rourkela, India CSE&A, IGIT, Sarang, Dhenkanal, India bapuji.research@gmail.com, Saroja Nanda Mishra| Research Scholar, CSE, BPUT, Rourkela, India CSE&A, IGIT, Sarang, Dhenkanal, India sarose.mishra@gmail.com
Power Quality Improvement For PV/Battery Hybrid System Using Fuzzy Logic Controlling Technique
power quality improvement for pv/battery hybrid system using fuzzy logic controlling technique has been presented this paper. The PV side cascaded boost DC-DC converter is controlled by P&O algorithm to extract the m...
Anonymous Asserts Profile Protection In Mobile Social Networks
In The Current Environment Through Social Network People Can Find Others And Make Their Own Network. An Individual User Can Have Multiple Accounts Of Social Networking Sites. In This Paper We Proposed An Algorithm Fo...
A Novel Approach to Build Reliable and Efficient Query Services in Cloud with RASP Data Perturbation
Inspired and motivated by the widespread development and deployment of public cloud computing infrastructures, using clouds to host data query services has become an fascinating solution for the advantages on scalabi...
We present a novel cryptographic primitive named as conjunctive keyword search with assigned analyzer and timing empowered intermediary reencryption work (RedtPECK), which is a sort of a period subordinate SE conspire...
Adopting Cloud Computing Technique for Efficient Event Forwarding Service To Users
Forwarding large volume of live content to relevant users in scalable efficient way in emergency application is main challenging task. One of the model named as the publisher and subscribe is used to forward the even...