Applications of MVS on Hierarchical Clustering Algorithms
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 12
Abstract
Clustering is a valuable method that arranges a large quantity of unordered text documents into a small number of expressive and coherent clusters, thereby offering a basis for instinctive and informative steering and browsing mechanisms. There are some clustering methods which have to adopt some cluster relationship among the data objects that they are applied on. Similarity between a pair of objects can be defined either explicitly or implicitly. The main difference between a traditional dissimilarity/similarity measure and ours is that the former uses only a only a single lookout, which is the origin, while the latter utilizes many diverse viewpoints, which are objects assumed to not be in the same cluster with the two objects being measured. Using multiple viewpoints, more informative assessment of similarity could be achieved. Theoretical analysis and experimental study are conducted to support this claim. Two criterion functions for document Hierarchical clustering are proposed and shown that the proposed method has significant improvement as compare to the existing methods.
Authors and Affiliations
Ch. SKVR Naidu, V Ramu, D Srinivas
Design of Dadda Algorithm based Floating Point Multiplier
In this paper area efficient floating point multiplier is developed using Dadda Algorithm . For improving the speed of mantissa multiplication Dadda multiplier is used by replacing Carry Save Multiplier. The use of pr...
A Novel Approach for Finding Optimal Overlay Nodes In Routing
In networks to enhance the TCP throughput and postponement Overlay steering procedure is proposed.one of the primary point of interest of this method it doesn't have to change current directing technique. Yet, arrang...
Image Segmentation Using Stake-Denotes Algorithm
In this paper, we present stake k-mean fragmentation and regions tracking model, which aims at combining color, texture, pattern, and motion features. in the first the stake algorithm segmented the objects which are...
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor communication of Networks
Low power Wireless sensor network is getting more attention recently by the researchers due to its security issues on denial of communication at the routing or medium access control levels. In this work we discussed...
The Goals of E- Learning and Distance Learning Towards The Educational Development of Nigerian Public Service
The goals of e – learning and distance learning towards the educational development of Nigerian Public Service cannot be overemphasized, hence the need to create more awareness on how to acquire higher academic knowl...