Overlapping Clusters in Genes – An Overview
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 7
Abstract
While the vast majority of clustering algorithms are partitional, many real world datasets have inherently overlapping clusters. Several approaches to nding overlapping clusters have come from work on analysis of biological datasets. In this paper, we inter-pret an overlapping clustering model proposed by Segal et al. [20] as a generalization of Gaussian mixture models, and we extend it to an overlapping clustering model based on mixtures of any regu-lar exponential family distribution and the corresponding Bregman divergence. We provide the necessary algorithm modi cations for this extension, and present results on synthetic data as well as sub-sets of 20-Newsgroups and EachMovie datasets.
Authors and Affiliations
Anuradha Bhatia, Shefali Patil, Gaurav Vaswani
RFID Based Bus Tracking System
The innovation in technology today has made our lifestyle much easier and fun. This research work proposes and implements a solution for enhancing public transportation management services based on RFID and GSM. The s...
A Hybrid Routing Protocol for Unobservable Security in Mobile Ad-hoc Networks
Security of mobile ad hoc network is crucial due to infra structure less network and mobility of wireless media. In this paper, we propose an Hybrid Routing Protocol for Unobservable Secured (HRPUS) to offer privacy...
UM: A Novel Seclusion Model for Defending Structural Information of Social Network Data
Publishing or sharing the social network data for social science research and business analysis lack of privacy. Existing technique k-anonymity is used to prevent identification of micro data. Even though an attacke...
Identifying the Top Demanding Technology Trends in the Field of Software Engineering
The rapid advancement of technology makes it difficult to choose the right domain for a software developer that will continue to exist in future. New inventions are replacing old technologies every day. Software compa...
A Survey on Password Attack Resist Tools
Passwords are the key to all digital secrets. Passwords remain the most widely used authentication method despite their well-known security weaknesses. Text password is the most popular form of user authentication on...