Imminent Rift Assortment Algorithm for Elevated Facet Data Using Wanton Collecting
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 10
Abstract
Feature subset clustering is a powerful technique to reduce the dimensionality of feature vectors for text classification. In this paper, we propose a similaritybased self-constructing algorithm for feature clustering with the help of K-Means strategy. The words in the feature vector of a document set are grouped into clusters, based on similarity test. Words that are similar to each other are grouped into the same cluster, and make a head to each cluster data sets. By the FAST algorithm, the derived membership functions match closely with and describe properly the real distribution of the training data. Besides, the user need not specify the number of extracted features in advance, and trial-and-error for determining the appropriate number of extracted features can then be avoided. Experimental results show that our FAST algorithm implementation can run faster and obtain better-extracted features than other methods.
Authors and Affiliations
Matta Rambabu| Student of M.Tech Department of Computer Science Engineering G.V.R & S college of Engineering & Technology, GUNTUR, Mayyappa Chakravarthi| Department of Computer Science Engineering G.V.R&S college of Engineering & Technology, GUNTUR
Digital Signature and Key Agreement
Diffie Hellman key exchange protocol is the most commonly used protocol. This protocol is used to exchange keys in a network. But it has bit m to exchange keys over a network but it has some drawbacks. This is the fi...
Power Flow Management In A Fuzzy Logic Control Of Solar PV System Supplying DC And AC Loads
PV based systems are being more and more in employment in diverse applications both at domestic and commercial levels. Photovoltaic systems can be largely confidential into stand-alone system and grid-connected syste...
Balancing the Computation-Intensive Function and User Privacy Disclosure at Different Security Levels
We propose a structure for protection safeguarding outsourced utilitarian calculation crosswise over substantial scale numerous encoded areas, which we allude to as POFD. With POFD, a client can get the yield of a ca...
Encounted Malware Using Spyware In Delay Tolerant Network
Delay Tolerant Network (DTN) have some kind of system attributes because of which discovering a pernicious and narrow minded conduct in the system is incredible test in DTN. So framework with iTrust, a probabilistic...
Dynamics Of Multi layered Composite Shell With Shape Memory Alloys
The use of different composite materials has been continuously growing in recent years. Although many applications for composite materials have been identified. Extensive research is still being carried out in order...