Multiple View Point on Cluster Analysis
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 12
Abstract
The clustering methods have to assume some cluster relationship among the data objects that they are applies on. Similarity between a pair of objects can be defines either explicitly or implicitly. In this paper we introduces a novel multi viewpoint based similarity measure and two related clustering methods. The major difference between a traditional dissimilarity/similarity measure and ours is that the former uses only a single viewpoint which is the origin while the latter utilizes many different viewpoints which are objects assumed to not be in the same cluster with the two objects being measures. Using multiple viewpoints more informative assessment of similarity could be achieves. Theoretical analysis and empirical study are conductes to support this claim.
Authors and Affiliations
D. Satya Prasad, Y. Jayababu
Cloud-based Mobile Social Networking Video Monitoring
The latest cloud computing knowledge with wealthy possessions to recompense for the limitations of mobile devices and connections can potentially provide a perfect proposal to hold up the desired mobile services. We...
To Measure The Average Delay Experienced By A Subscriber To Connect In An Attribute Tree
Validation of publishers and subscribers is not simple to get due to the loose coupling ofpublishers and subscribers.We also present extensions of the cryptographic methods to proffer capable routing of encrypted eve...
E-IHRB Decoder Architectures for Non-Binary LDPC Codes
In the information theory, the non- binary low density parity check (NB-LDPC) code is a linear error correcting code, a method of transmitting message over a noisy transmission channel. LDPCcodes are capacityapproachi...
Transforming Digital Unstructured and Semi-structured Data into Structured Data with the Aid of IE and KDT
Data growth has seen an exponential acceleration with the advent of computer and network, which have imparted the digital form to data. Data can be classified into three categories: Unstructured data, Semi-structured...
An Improved Performance of MANET using AODV Protocol for Black Hole Detection
Routing attacks have been identified for single path routing in wireless ad hoc networks. The effects of routing attacks on multipath routing have not been addressed so far. In this paper, an approach have been propo...