Comparative Study of Clustering Algorithms Used in CounterTerrorism

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6

Abstract

 Abstract: Data mining can be used to model crime detection problems, detect unusual patterns, terroristactivities and fraudulent behaviour. We will look at k-means clustering with some enhancements to aid in theprocess of identification of crime patterns. The k-means algorithm is one of the frequently used clusteringmethod in data mining, due to its performance in clustering massive data sets. The final clustering result of thek-means clustering algorithm greatly depends upon the correctness of the initial centroids, which are selectedrandomly. The original k-means algorithm converges to local minimum, not the global optimum. Manyimprovements were already proposed to improve the performance of the k-means, but most of these requireadditional inputs like threshold values for the number of data points in a set. In this paper a new method isproposed for finding the better initial centroids and to provide an efficient way of assigning the data points tosuitable clusters with reduced time complexity

Authors and Affiliations

Sanjay Dwivedi, MCA, MPhil, , Prabhat Pandey, PhD, DSc. OSD, , Manmohan Singh Tiwari, PhD, , Mohd. Athar Kalam

Keywords

Related Articles

Performance Evaluation of Voice and video conferencing For WIMAX Network under Various Modulation techniques

Abstract: Worldwide interoperability for Microwave Access (WIMAX) that based on 802.16d/e Orthogonal Frequency Division Multiplexing (OFDM) and based on adaptive Physical Layer (PHY), It provides wireless broadband to fi...

 Color Based Image Retrieval System

 Advances in the data storage and image acquisition technologies have enabled the creation of large datasets. It is necessary to develop appropriate information systems to efficiently manage these collections. T...

 Efficient Refining Of Why-Not Questions on Top-K Queries

Abstract: After decades of effort working on database performance, the quality and the usability of databasesystems have received more attention in recent years. In particular, answering the why-not questions after asear...

 Language Mobile Learning Design: The Tamazight Language

 Even though Tamazight language in Morocco has been legitimate for eleven years and official for almost two years, its learning needs a huge effort to successfully make it in this enormous batch of existing unformat...

Analysis of Effect of Compressive Sensing Theory and Watermarking on Verification and Authentication Performance of Multibiometric System

Abstract: In this paper, watermarking technique with compressive sensing theory have been analysed for security of biometric image against imposter manipulations in the multibiometric system. The compressive sensing theo...

Download PDF file
  • EP ID EP116447
  • DOI -
  • Views 118
  • Downloads 0

How To Cite

Sanjay Dwivedi, MCA, MPhil, , Prabhat Pandey, PhD, DSc. OSD, , Manmohan Singh Tiwari, PhD, , Mohd. Athar Kalam (2014).  Comparative Study of Clustering Algorithms Used in CounterTerrorism. IOSR Journals (IOSR Journal of Computer Engineering), 16(6), 13-17. https://europub.co.uk/articles/-A-116447