Decentralized Probabilistic Text Clustering by using Distributed Hierarchical peer to peer Clustering
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
Document clustering (or text clustering) is the application of cluster analysis to textual documents. It has applications in automatic document organization, topic extraction and fast information retrieval or filtering. For text clustering we are using decentralized probabilistic text clustering Algorithm to mine the data, it is an traditional centralized approach by using this approach analyzing massive distributed data. But it is extremely difficult to draw conclusions based on the collective characteristics of disparate data. The goal is to achieve modularity and scalability. Decentralized probabilistic text clustering Algorithm is less scalable in distributed clustering. Distributed Hierarchically Peer-to-Peer Clustering (DHP2PC) Algorithm is scalable and efficient algorithm. In this a subset of the document collection is centrally partitioned into clusters, for which cluster signatures are created. The DHP2PC algorithm finds its roots in a parallel implementation. By using cluster signatures we can mine the Massive distributed data. The algorithm offers probabilistic guarantees for the correctness of each document assignment to a cluster.
Authors and Affiliations
Attuluri Uday Kiran, Rakesh Nayak
A dynamic variant of AP clustering to achieve comparable clustering performance
AP clustering is a model based system that fathoms by handover every information point to its closest model, where models are recognized by passing messages on bipartite chart. There are two sorts of messages going o...
A novel Cut Detection Technique in WSN
If some of the nodes fails in wireless sensor network it can get separated into multiple connected components which is called as “cut”. This paper concentrates on the problem of detecting cuts by the help remaining n...
Double Standard Security Mechanism In The Management Cloud Based Mobile Application
Patient care is the focus of many clinical disciplines application but it is very complex as patient care is the essential information for direct patient care is defined on the applications. The present applications...
Intelligent encoding with added puzzle & TESLA security of packets Against Jamming Attacks in Wireless Network
Wireless network never has certain defined boundaries that can’t be extended due to this nature security flaws may get developed. Broadcast nature of wireless network makes it easy for intentional attacks to disturb...
UINN: Preventing Reidentification Of Senstive Social Network Data
Publishing or sharing the social network data for social science research and business analysis lack of privacy. Existing technique k-anonymity is used to prevent identification of microdata. Even though an attacker m...