Auto-assemblage for Suffix Tree Clustering
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
Due to explosive growth of extracting the information from large repository of data, to get effective results, clustering is used. Clustering makes the searching efficient for better search results. Clustering is the process of grouping of similar type content. Document Clustering; organize the documents of similar type contents into groups. Partitioned and Hierarchical clustering algorithms are mainly used for clustering the documents. In this paper, k-means describe the partitioned clustering algorithm and further hierarchical clustering defines the Agglomerative hierarchical clustering and Divisive hierarchical clustering. The paper presents the tool, which describe the algorithmic steps that are used in Suffix Tree Clustering (STC) algorithm for clustering the documents. STC is a search result clustering, which perform the clustering on the dataset. Dataset is the collection of the text documents. The paper focuses on the steps for document clustering by using the Suffix Tree Clustering Algorithm. The algorithm steps are display by the screen shots that is taken from the running tool.
Authors and Affiliations
Pushplata , Mr. Ram Chatterjee
Intrusion Detection Based Security Solution for Cluster Based WSN
Wireless sensor network (WSN) can provide low cost solution to variety of real-world problems. Sensors are low cost tiny devices with limited storage, computational capability and power. they can be deployed in...
Solving Three Dimensional Bin Packing Problem Using Elitism Based Genetic Algorithm
The bin packing problem is a combinatorial NP-hard problem. In it, objects of different volumes must be packed into a finite number of bins of capacity V in a way that minimizes the number of bins used. Most of the...
A Survey on Intrusion Detection System in Data Mining
This paper presents a survey of techniques of intrusion detection system using supervised and unsupervised learning. The techniques are categorized based upon different approaches like Statistics, Data mining, Ne...
Network Coding based Privacy Preservation Technique for Multi-Hop Wireless Networks
Privacy is one of the critical issues in multi-hop wireless networks, where attacks such as traffic analysis and flow tracing can be easily launched by a malicious adversary due to the open wireless medium. Network...
STUDY OF VARIOUS ISSUES IN VOICE TRANSLATION
In today’s world the language translation plays an important role. Requirement of speech translation is increasing day by day. In this paper, we have reviewed various approaches to translate the actual voice/speech. T...