this paper expounds to mine up data with the DBSCAN algorithm in order to help teachers and students find which books they expect in the sea of library. In the first place, the model that DBSCAN algorithm applies in l...
详细信息
this paper expounds to mine up data with the DBSCAN algorithm in order to help teachers and students find which books they expect in the sea of library. In the first place, the model that DBSCAN algorithm applies in library data miner is proposed, followed by the DBSCAN algorithm improved on demands. In the end, an experiment is cited herein to validate this algorithm. The results show that the book price and the inventory level in the library produce a less impact on the resultant aggregation than the classification of books and the frequency of book borrowings. Library procurers should therefore purchase and subscribe data based on the results from cluster analysis thereby to improve hierarchies and structure distribution of library resources, forging on the library resources to be more scientific and reasonable, while it is also conducive to arousing readers' borrowing interest.
Invasive weed optimization (IWO), which is inspired from the invasive behavior of weeds growth in nature, is a population-based intelligence algorithm. However, competitive exclusion may shrink search space and place ...
详细信息
ISBN:
(纸本)9781467397148
Invasive weed optimization (IWO), which is inspired from the invasive behavior of weeds growth in nature, is a population-based intelligence algorithm. However, competitive exclusion may shrink search space and place most seeds in the same local area. Meanwhile, the accurate value of standard deviation is not easy to determine. These two shortcomings may lead to premature convergence and unable to achieve the global optimum. In order to overcome these two shortcomings, a clustering IWO (CIWO) is proposed by incorporating the core idea of clustering into IWO. We introduce a clustering strategy which is deployed before reproduction to disperse solution regions so that new seeds can locate in different areas. In addition, the value of standard deviation is based on statistical information and calculated from fittest individuals of each cluster so they can be accurate enough to the actual value and more representative. We compare it with the basic IWO, and a modified particle swarm optimization on a set of 14 benchmark functions. Experimental results indicate that CIWO is an effective and efficient algorithm can not only obtain the result superior to the standard invasive weed optimization but also explores and exploits the promising regions in the search space effectively.
Most of clustering algorithms are too complicated and some computations about several factors are not reasonable. To effectively solve those problems, this paper proposes a new efficient clustering algorithm based on ...
详细信息
ISBN:
(纸本)9783642275029;9783642275036
Most of clustering algorithms are too complicated and some computations about several factors are not reasonable. To effectively solve those problems, this paper proposes a new efficient clustering algorithm based on AOW, named EAOW. Then we use it to replace the minimum node ID clustering algorithm in CBRP routing protocol, i.e. EARP. New protocol takes into account the mobility and residual energy: it significantly improves network performance, enhance the overall network load balancing. Simulation experiments in NS2 validate its feasibility and correctness. The performance of EARP is much better than CBRP routing protocol.
In this paper, we propose and analyze a new relaying scheme for the three-node cooperative system, named as clustering-based relay selective decode-and-forward (CSDF). The source broadcasts a parallel concatenated rec...
详细信息
ISBN:
(纸本)9781509027088
In this paper, we propose and analyze a new relaying scheme for the three-node cooperative system, named as clustering-based relay selective decode-and-forward (CSDF). The source broadcasts a parallel concatenated recursive systematic convolutional (RSC) code to both the relay and the destination. When the decoding error is detected at the relay, a kernel K-Means clustering algorithm is applied to distinguish the reliable bits from the unreliable bits. The relay then forwards the bits that are deemed reliable and discards the bits that are not, resulting in less errors propagating to the destination. The closed-form expression of bit error rate(BER) is derived to demonstrate the relation between error propagation and system performance of our proposed relaying scheme. Simulation results show that the proposed scheme achieves better performance and efficiently reduce error propagation.
Chinese word segmentation plays an important role in Chinese text mining. It is the foundation of automatic relation extraction and identification in Chinese information processing. In this paper, we propose a method ...
详细信息
ISBN:
(纸本)9781509009220
Chinese word segmentation plays an important role in Chinese text mining. It is the foundation of automatic relation extraction and identification in Chinese information processing. In this paper, we propose a method for Chinese word segmentation based on conditional random fields (CRF) with character clustering. For the character clustering, we firstly use the Skip-Gram model to obtain character embedding from a raw corpus (without word delimiters). We then apply two different clustering algorithms, K-means and Brown clustering algorithm, to get the clusters of character embedding. The effect of different numbers of dimensions of character embedding, the number of clusters, and different clustering algorithms have been studied. We verify our method using the 4th CCF Conference on Natural Language Processing and Chinese Computing (NLPCC2015) Weibo text segmentation task. Our system achieves an F-score of 95.67% and an out of vocabulary (OOV) rate of 94.78%. The result shows that clustering character embedding based on character representation can improve the performance of Chinese word segmentation on short text.
The hierarchical topology of wireless sensor networks can effectively reduce the consumption in communication. clustering algorithm is the foundation to realize herarchical structure, so it has been extensive research...
详细信息
ISBN:
(纸本)9783037851937
The hierarchical topology of wireless sensor networks can effectively reduce the consumption in communication. clustering algorithm is the foundation to realize herarchical structure, so it has been extensive researched. On the basis of Leach algorithm, a distance density based clustering algorithm (DDBC) is proposed, considering synthetically the distribution density of around nodes and the remaining energy factors of the node to dynamically banlance energy usage of nodes when selecting cluster heads. We analyzed the performance of DDBC through compared with the existing other clustering algorithms in simulation experiment. Results show that the proposed method can generare stable quantity cluster heads and banlance the energy load effectively.
The classical Sobel edge detection operator has the shortcomings of low edge positioning accuracy and coarse edge, image edge detection based on improved Sobel operator and clustering algorithm was proposed. Four Sobe...
详细信息
ISBN:
(纸本)9783037850992
The classical Sobel edge detection operator has the shortcomings of low edge positioning accuracy and coarse edge, image edge detection based on improved Sobel operator and clustering algorithm was proposed. Four Sobel-like edge operators are used to improve the edge positioning accuracy and clustering algorithm are used to edge thinning. The experimental result demonstrates that the effect of the edge detection is greatly improved comparing with the traditional edge detection methods.
The WSN is a unique network and WSN contains sensors at huge scale as well as includes at least single base station. When building wireless sensor networks network there is critical issues are emerged such as preservi...
详细信息
ISBN:
(纸本)9781467395458
The WSN is a unique network and WSN contains sensors at huge scale as well as includes at least single base station. When building wireless sensor networks network there is critical issues are emerged such as preserving energy and load balancing. Lifetime of a sensor network is enhanced by implementing and mitigating energy consumption. Number of various parameters such as number of nodes, strength and range of area as well as connectivity of nodes in the network are responsible for the lifetime of network. Energy of battery is most important things for sensor nodes in wireless sensor network. Efficient energy is major part of in mitigate the overhead as well as limited transmission and aggregating data is also important for the enhancing network lifetime. We proposed a clustering routing protocol CRT2FLACO on the basis of type-2 fuzzy logic as well as ACO for balancing the network load and to enhance the lifetime of WSN. Our proposed protocol determines the three fundamental parts of residual energy, neighbor nodes as well as the distance to base station as inputs of a type-2 Mamdani FLS and after that calculate the possibility of a node upgrading as a candidate cluster head and the cluster head competition radius. Implementation of type-2 fuzzy logic is better way to control the overhead existing in WSN. Load of network is efficiently handled by fuzzy unequal competition radius as well as implementation of multi-hop routing protocol technique for data transmission. Additionally, security of data is determined by utilizing encryption algorithm in transmission of data. Network lifetime is enhanced due to system has high packet delivery rates.
The paper identifies the scope of improvement in the search result of a website using the clustering technique. Search option is extensively used at almost every website. The study uses hybrid clustering approach for ...
详细信息
ISBN:
(纸本)9788132227526;9788132227502
The paper identifies the scope of improvement in the search result of a website using the clustering technique. Search option is extensively used at almost every website. The study uses hybrid clustering approach for grouping the search results into the relevant folders for efficient analysis. Every clustering algorithm has some advantages and disadvantages. Some of the most commonly used clustering algorithm are experimented on same data set. The paper analyzed some research where clustering is being used for improving web elements in various way. Cross-validation method is adopted for the experiments, and performance parameters namely, relevance, speed and user satisfaction are considered for the evaluation.
Aiming at the problem of limited energy of sensors in Wireless Sensor Network, based on the classic clustering routing algorithm LEACH, a distance-energy cluster structure algorithm considering both the distance and r...
详细信息
Aiming at the problem of limited energy of sensors in Wireless Sensor Network, based on the classic clustering routing algorithm LEACH, a distance-energy cluster structure algorithm considering both the distance and residual energy of nodes is presented in the dissertation, which improves the process of cluster head election and the process of data transmission. It reduces the adverse effect on the energy consumption of the cluster head, resulting from the non-uniform distribution of nodes in network and avoids the direct communication between the base station and cluster head, which may has low energy and far away from base station The results of simulation indicate that the improved algorithm effectively balances the energy consumption, prolongs 31% of the lifetime, reduces 40% of the energy consumption and has a better performance than the original LEACH protocol.
暂无评论