Survey on Clustering Techniques of Data Mining
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2016, Vol 7, Issue 10
Abstract
The goal of this survey is to provide a comprehensive review of different clustering techniques in data mining. Data mining refers to extracting useful information from vast amounts of data. It is the process of discovering interesting knowledge from large amounts of data stored either in databases, data warehouses, or other information repositories. An important technique in data analysis and data mining applications is Clustering.Cluster Analysis is an excellent data mining tool for a large and multivariate database. Clustering is a suitable example of unsupervised classification. Unsupervised means that clustering does not depend on predefined classes and training examples during classifying the data objects. Each group called cluster, consists of objects that are similar between themselves and dissimilar to objects of other groups. There are different types of clustering algorithms such as hierarchical, partitioning, grid, density based, model based, and constraint based algorithms. Hierarchical clustering is the connectivity based clustering. Partitioning is the centred based clustering; the value of k-mean is set. Density based clusters are defined as area of higher density then the remaining of the data set. Grid based clustering is the fastest processing time that typically depends on the size of the grid instead of the data. Model based clustering hypothesizes for each cluster and find the best fit of data to the given model. Constraint based clustering is performed by incorporation of user or application oriented constraints.In this survey paper, a review of different types of clustering techniques in data mining is done.
Authors and Affiliations
J. AROCKIA JEYANTHI
Performance Analysis of Ad Hoc Routing Protocols in WSNs
The field of communications networks continues to emerge, thus leading to the rapid growth in the field of wireless sensor networks (WSNs). WSNs are noticeably different from traditional Ad hoc networks. The conspicuous...
EFS: Enhanced FACES Protocol for Secure Routing In MANET
Mobile Ad-hoc Network (MANET) is an autonomous system of mobile hosts equipped with wireless communication devices. These mobile nodes can form a network anywhere and at anytime. But the topology of the network thereby f...
Alternative System for Data Communication based on Organic Devices and Links for Local Area Network
Organic devices and links offer considerable potential for data communication by virtue of their ability to transmit, modulate and detect light in an architecture that is low cost, flexible, lightweight and robust. Here...
A Literature Review: Cryptography Algorithms for Wireless sensor networks
Cryptography is that the observe and study of techniques for secure communication within the presence of third parties. It additionally plays important of wireless sensor networks. The cryptography drawback has addressed...
A Novel Cache Update Algorithm for Consistency Maintenance over Cluster Based MANET
Data Caching improves data availability among the mobile nodes (MNs) that are connected together through unreliable wireless links. The MNs are often updating the cached data due to its dynamism. The query access rate of...