Comparative Study of Clustering Algorithms Used in CounterTerrorism
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6
Abstract
Abstract: Data mining can be used to model crime detection problems, detect unusual patterns, terroristactivities and fraudulent behaviour. We will look at k-means clustering with some enhancements to aid in theprocess of identification of crime patterns. The k-means algorithm is one of the frequently used clusteringmethod in data mining, due to its performance in clustering massive data sets. The final clustering result of thek-means clustering algorithm greatly depends upon the correctness of the initial centroids, which are selectedrandomly. The original k-means algorithm converges to local minimum, not the global optimum. Manyimprovements were already proposed to improve the performance of the k-means, but most of these requireadditional inputs like threshold values for the number of data points in a set. In this paper a new method isproposed for finding the better initial centroids and to provide an efficient way of assigning the data points tosuitable clusters with reduced time complexity
Authors and Affiliations
Sanjay Dwivedi, MCA, MPhil, , Prabhat Pandey, PhD, DSc. OSD, , Manmohan Singh Tiwari, PhD, , Mohd. Athar Kalam
Energy Conservation in Wireless Sensor Networks: A Review
A wireless sensor network consists of a large number of sensor nodes which are deployed over an area to perform local computations based on information gathered from the surroundings. Each node in the netw...
A Survey of the Internet of Things
Abstract: This paper studies the state-of-art of Internet of Things (IoT). By enabling new forms of communication between people and things, and between things themselves, IoT would add a new dimension to the world of in...
Comparative Study of Ids for Manet
Abstract: Recent advancements in wireless communication and the miniaturization of computers have led to a new concept called the mobile ad hoc network (MANET), where two or more mobile nodes can form a temporary n...
A Compound Metric for Identification of Fault Prone Modules
Abstract: Software Quality is a significant non-functional requirement that is not fulfilled by many software products. Faulty modules tend to degrade the software quality which may cause customer’s dissatisfaction. Faul...
Simple Load Rebalancing For Distributed Hash Tables In Cloud
Distributed file systems are key building blocks for cloud computing applications based on the Map Reduce programming paradigm. In such file systems, nodes simultaneously serve computing and storage functi...