slugAn Insight Into Concept ofCluster Analysis and Its Evaluation.
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 6
Abstract
Cluster analysis is a method for identification of homogeneous groupsof objects (observations, cases or events) based on the information found in the data describing the objects or their relationships. Themain goal is to find group of objects such that objects in a group will be similar (or related) to one another and different from (or unrelated to) the objects in other groups. If the similarity (or homogeneity) within a group and the difference between groups will be greater, there will be “better” or more distinct clustering. One of the clustering process issues is the evaluation of clustering results. Estimation of the obtained cluster structure quality is the main subject of cluster validity. This paper introduces the fundamental concepts of clustering and addresses an important issue of clustering process. This paper also describes various clustering methods, types of clusters and validity index used by clustering to categorize complex data into real and accurate knowledge.Furthermore it illustrates the variousIssues , Problems challenges and Tools of clustering analysis.
Authors and Affiliations
Nidhi Chawla, Ajmer Singh
Video Forgery Detection Using DWT, Optical Flow and SIFT Methods
Digital video offer many attributes for tamper detection algorithms to take advantage of, specifically the color and brightness of individual pixels as well as the resolution and format. These properties provide scope f...
Optimization of air brake system using rotary compressor in Locomotives
Air brake system comprises the brake system using compressed air. For getting the pressurized air we use the compressor. Air brake system is used to stop the running train locomotive which contain high amount of kinetic...
Forecasting Of Short Term Wind Power Using ARIMA Method
Wind power, i.e., electrical energy produced making use of the wind resource, is being nowadays constantly connected to the electrical system. This has a non-negligible impact, raising issues like network stability and...
Secured Login Authentication on Key Attackers
An innovative solution is proposed to avoid the problem such as password security at application layer. For password security all lower case characters, upper case characters, special characters and digits in password c...
Automatic Smart Home Monitoring System with Open Source Hardware
Smart home is an observing, controlling and investigating service which includes Wireless transmission technology and electronic sensor innovation. It allows the client to get the full scope of services, the opportunity...