Auto-assemblage for Suffix Tree Clustering
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
Due to explosive growth of extracting the information from large repository of data, to get effective results, clustering is used. Clustering makes the searching efficient for better search results. Clustering is the process of grouping of similar type content. Document Clustering; organize the documents of similar type contents into groups. Partitioned and Hierarchical clustering algorithms are mainly used for clustering the documents. In this paper, k-means describe the partitioned clustering algorithm and further hierarchical clustering defines the Agglomerative hierarchical clustering and Divisive hierarchical clustering. The paper presents the tool, which describe the algorithmic steps that are used in Suffix Tree Clustering (STC) algorithm for clustering the documents. STC is a search result clustering, which perform the clustering on the dataset. Dataset is the collection of the text documents. The paper focuses on the steps for document clustering by using the Suffix Tree Clustering Algorithm. The algorithm steps are display by the screen shots that is taken from the running tool.
Authors and Affiliations
Pushplata , Mr. Ram Chatterjee
Improving the Efficiency of Ranked keyword Search over Cloud Data
In this paper we define and solve the effective yet secure ranked keyword search over encrypted cloud data. We used order preserving symmetric encryption to protect the cloud data. Even though there are lots of searching...
Charismatic of Malware diffusion in distributed peer-to-peer networks
in this paper, we articulate a reasoned sculpt to portray the diffusion of malware in distributed, Gnutella sort peer-to-peer networks and learning the charismatic allied with widen of malware. Using a segmented sculpts,...
Design and Verification Eight Port Router for Network on Chip
Multiprocessor system on chip is emerging as a new trend for System on chip design but the wire and power design constraints are forcing adoption of new design methodologies. Researchers pursued a scalable soluti...
Biometrics Security Technology with Speaker Recognition
—An improved methodology is presented for voice recognition in real action. This paper describes designing of voice recognition system in MATLAB environment. Voice is one of the unique qualities of every man kind....
Improving the Performance of a Single Model and Test Prioritization Strategy for Event Driven Software
Event-driven software is very diverse, e.g., in form of Graphical User Interfaces (GUIs), Web applications, or embedded software. All EDS take sequences of events (e.g., messages and mouse-clicks) as input, change their...