NATURAL CLUSTERING ANALYSIS
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 0, Vol 4, Issue 10
Abstract
Particle Swarm Optimization (PSO) is a biologically inspired computational search and optimization method based on the social behavior of birds flocking or fish schooling. A number of basic variations have been developed due to improved speed of convergence and quality of solution found by the PSO. In this paper the overview of PSO Technique is provided and the PSO System is compared with Evolutionary techniques with respect to genetic algorithm and artificial neural network (GA and ANN systems).
Authors and Affiliations
Anupama Vishwas Gajbhiye*
Survey for Mining Biomedical data from HTTP
Medical informatics has been rapidly growing in the technology of health care it seems that medical informatics the ever- changing and ever-broadening mass of information concerning diseases as well as the maintenance...
CFD SIMULATION AND EXPERIMENTAL VERIFICATION OF AIR FLOW THROUGH HEATED PIPE
The aim of this work is to validate the Dittus-Boelter equation by experimental, correlation and Simulation method. It used to find the value of heat transfer coefficient ‘h’ for turbulent flow in many fluid trans...
NUMERICAL INVESTIGATION OF CAPILLARY TUBE BY REPLACING THE INSIDE REFRIGERANT AND DIAMETER
The capillary tube used in the mostly in the refrigerant flow control devices. Hence performance of the capillary tube is best for good refrigerant flow. The many researchers had been concluding performance using experim...
A REVIEW OF COMPARATIVE EVALUATION OF THERMAL INSULATION MATERIALS FOR BUILDING WALL APPLICATIONS
Attention towards the thermal performance of building materials, particularly thermal insulation systems for buildings, has grown in recent years. Thermal insulation of building walls has a significant effect on t...
Implementation on Distributed Network Services Using SSO for Secure Mechanism
Key Agreement and User Authentication is an prime issues for creating and maintaining a security in distributed network .Legal User may able to access services of different providers. Recently there are some user...