Applications of MVS on Hierarchical Clustering Algorithms
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 12
Abstract
Clustering is a valuable method that arranges a large quantity of unordered text documents into a small number of expressive and coherent clusters, thereby offering a basis for instinctive and informative steering and browsing mechanisms. There are some clustering methods which have to adopt some cluster relationship among the data objects that they are applied on. Similarity between a pair of objects can be defined either explicitly or implicitly. The main difference between a traditional dissimilarity/similarity measure and ours is that the former uses only a only a single lookout, which is the origin, while the latter utilizes many diverse viewpoints, which are objects assumed to not be in the same cluster with the two objects being measured. Using multiple viewpoints, more informative assessment of similarity could be achieved. Theoretical analysis and experimental study are conducted to support this claim. Two criterion functions for document Hierarchical clustering are proposed and shown that the proposed method has significant improvement as compare to the existing methods.
Authors and Affiliations
Ch. SKVR Naidu, V Ramu, D Srinivas
HDRI (High Dynamic Range Image) Acquisition By Multiple Exposure Fusion
Innovative technologies in image capturing and image processing enable photographs with multiple exposures to be fused into high dynamic range images. Many such technologies came into existence. However, occasionally...
Security Measures To Prevent Vampire Attacks To Protect Routing Infrastructure
A Vampire attack is the composition and transmission of a message that sources more power to be consumed by the network than if an open node transmitted a message of the same size to the same destination although usi...
Data Security in Cloud Computing using RSA Algorithm
Cloud Computing is an emerging paradigm which has become today’s hottest research area due to its ability to reduce the costs associated with computing. In today’s era, it is most interesting and enticing technology whi...
Network Ids Approach To Counter Zombie Explorative Attacks Using Network Intrusion Detection And Countermeasures Election (NICE)
Attackers can look at vulnerabilities of a cloud system and compromise virtual machines to organize additional large-scale Distributed Denialof-Service (DDoS). DDoS attacks generally occupy early stage actions such as...
A Reliable Routing Approach in Mobile AdHoc Network based on Genetic Algorithms
The Mobile Network is highly constraint requirement to improve the quality of service in secure way, it uses different changes in MANET protocols, its parameters, routing algorithm etc. Nature inspired and the challeng...