Survey on Clustering Techniques of Data Mining
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2016, Vol 7, Issue 10
Abstract
The goal of this survey is to provide a comprehensive review of different clustering techniques in data mining. Data mining refers to extracting useful information from vast amounts of data. It is the process of discovering interesting knowledge from large amounts of data stored either in databases, data warehouses, or other information repositories. An important technique in data analysis and data mining applications is Clustering.Cluster Analysis is an excellent data mining tool for a large and multivariate database. Clustering is a suitable example of unsupervised classification. Unsupervised means that clustering does not depend on predefined classes and training examples during classifying the data objects. Each group called cluster, consists of objects that are similar between themselves and dissimilar to objects of other groups. There are different types of clustering algorithms such as hierarchical, partitioning, grid, density based, model based, and constraint based algorithms. Hierarchical clustering is the connectivity based clustering. Partitioning is the centred based clustering; the value of k-mean is set. Density based clusters are defined as area of higher density then the remaining of the data set. Grid based clustering is the fastest processing time that typically depends on the size of the grid instead of the data. Model based clustering hypothesizes for each cluster and find the best fit of data to the given model. Constraint based clustering is performed by incorporation of user or application oriented constraints.In this survey paper, a review of different types of clustering techniques in data mining is done.
Authors and Affiliations
J. AROCKIA JEYANTHI
A Neural Network Inverse Modeling Approach for the Design of Spiral Inductor
Artificial Neural networks (ANN’s) have now a days become efficient alternatives to conventional methods such as numerical modeling methods which could be computationally expensive, or analytical methods which could be d...
Comparative Study of Reactive/On Demand Routing Protocols for Mobile Adhoc Network
In an ad hoc network, mobile nodes communicate with each other using multi-hop wireless links. There is no stationary infrastructure such as base stations. The routing protocol must be able to keep up with the high degre...
Implementation of Dadda and Array Multiplier Architectures Using Tanner Tool
The heart of the MAC unit is the multiplier. Multipliers are the fundamental components in all digital processing systems. Many research efforts have been devoted to reducing the power dissipation of different multiplier...
Secure Socket Layer Implementations-A Review
Secure Socket Layer (SSL), is the protocol developed by Netscape for transmitting private documents securely over the Internet. SSL can be effectively used to protect the data in transmission. SSL protocol comes in betwe...
A review of Coupling and Cohesion metrics in Object Oriented Environment
Software metrics are used to check and evaluate various aspects of the complexity of a software product. Coupling and Cohesion are considered to be the most important attributes. The increasing need for software quality...