cluster analysis has been widely used in many fields since its appearance, and the validation method of clustering has received much less attention. In fact, the quality evaluation of clustering results is also a cruc...
详细信息
ISBN:
(纸本)9781538653739
cluster analysis has been widely used in many fields since its appearance, and the validation method of clustering has received much less attention. In fact, the quality evaluation of clustering results is also a crucial link in the whole clustering process. clustering validation are generally divided into external clustering validation, internal clustering validation and relative cluster validation. This paper studies the external clustering validation method. Firstly, the article selects several different categories of clustering verification methods. At the same time, the article introduces the Maclaurin symmetric mean (MSM) operator and multiple attribute decision making (MADM) method. Finally, an optimal clustering algorithm selection model for a certain data set can be obtained. The experimental results show that the proposed method can select the corresponding optimal algorithm for inhomogeneity data sets.
Intrusion is the use of unauthorized behavior, by scanning the loopholes in the system. access to user accounts, user file tampering. clustering is a clustering process, the clustering technique applied to intrusion d...
详细信息
ISBN:
(纸本)9783642293863
Intrusion is the use of unauthorized behavior, by scanning the loopholes in the system. access to user accounts, user file tampering. clustering is a clustering process, the clustering technique applied to intrusion detection in a supervised learning algorithm to overcome the requirements of the training set data in pure question mark, and can detect unknown intrusions. Discuss how the clustering algorithm is applied to intrusion detection and analysis of intrusion detection algorithm based on clustering problems.
K-Means algorithm is one of the mostly used foundation algorithm in data mining, it base on a greedy clustering algorithm. This paper will introduce this algorithm and analysis. Then prove the correctness of the algor...
详细信息
ISBN:
(纸本)9783037850770
K-Means algorithm is one of the mostly used foundation algorithm in data mining, it base on a greedy clustering algorithm. This paper will introduce this algorithm and analysis. Then prove the correctness of the algorithm. And then show the productivity of this algorithm. And at last, this paper will show some improvement to K-Means algorithm, including how to choose initial center points, and how to calculate the means. This will improve the algorithm at a certain extent.
Wireless sensor networks have attracted much research attention in recent years and can be used in many different applications. In this paper we analyze the impact of Energy efficiency in Wireless sensor networks, as ...
详细信息
ISBN:
(纸本)9781424436927
Wireless sensor networks have attracted much research attention in recent years and can be used in many different applications. In this paper we analyze the impact of Energy efficiency in Wireless sensor networks, as a result is clustering technique has been proven to be an effective approach for reducing energy consumption. It also can increase the scalability and lifetime of the network. we propose a novel cluster formation algorithm for wireless sensor networks according to considering the energy as an optimization parameter. Compared to other algorithms,the clustering algorithm increase the cluster head election mechanism, and the simulation results show that clustering algorithm achieves its intention of consuming less energy.
In this study, an advanced K-Medoids clustering algorithm has been developed by using an auto-stopped bisecting scheme and replacing the traditional Euclidean distance by cloud similarity. The proposed algorithm is de...
详细信息
In this study, an advanced K-Medoids clustering algorithm has been developed by using an auto-stopped bisecting scheme and replacing the traditional Euclidean distance by cloud similarity. The proposed algorithm is dedicated to cluster the users of Connected TV according to their behavior involved with connected TVs. According to the experimental results, the solutions obtained by the proposed algorithm are quite encouraging and the clustering results are much more stable than Euclidean-distance-based clustering method. The result shows that the proposed method has achieved good results in terms of cluster accuracy and time. (C) 2018, IFAC (International Federation of Automatic Control) Hosting by Elsevier Ltd. All rights reserved.
In this paper, combined with ant colony algorithm, particle swarm optimization algorithm, K-means clustering algorithm, we propose an APSO-K-means clustering algorithm applied to speaker recognition. The algorithm uti...
详细信息
ISBN:
(纸本)9780769538167
In this paper, combined with ant colony algorithm, particle swarm optimization algorithm, K-means clustering algorithm, we propose an APSO-K-means clustering algorithm applied to speaker recognition. The algorithm utilizes the strong ability of the ant colony algorithm to process local extremum to avoid the sensitivity to local optimization of the PSO algorithm (APSO). Meanwhile, it utilizes APSO to guide the initialization of the cluster centers to improve the deficiency of the K-means clustering algorithm which depends on the initial value, which makes it easy to converge toward global optimality. The experiments in speaker recognition show that the new approach is better than the traditional method and effectively reduces the error recognition rate.
In order to acquire the required knowledge from the vast amounts of government affairs data, accurate data mining has important practical significance. Therefore, a precision mining method of government affairs big da...
详细信息
ISBN:
(纸本)9781665458139
In order to acquire the required knowledge from the vast amounts of government affairs data, accurate data mining has important practical significance. Therefore, a precision mining method of government affairs big data based on E-OEM model is studied. The method firstly uses web crawlers to capture the vast amounts of government data. Government data then performs data cleaning, pattern normalization, format standardization, index information collection and preprocessing, and finally, according to the purpose of data mining, the Kirkpatrick model is used to complete the mining effect evaluation. Experimental comparison specifically includes correlation analysis, cluster analysis, classification analysis, exception analysis and evolution analysis as well as five others. The results show that: compared with the three methods in previous studies, the Fl-score obtained by the application of the research method is higher (0.852), which proves that the quality of government affairs big data mining is better.
In the present day technology creation, automation is a promising technology towards the achievement of constructive, innovative and sustainable designs and products in industry 4. The control system of machines that ...
详细信息
In the present day technology creation, automation is a promising technology towards the achievement of constructive, innovative and sustainable designs and products in industry 4. The control system of machines that involves the application of mechatronic objects or intelligent units which are envisioned as building blocks for design of the systems are rather configured than being designed. In order to meet dynamic customer needs, within minimal time frames, thereby achieving short-time-to-market. The crucial element in this scenario is that the customer drives the pace and direction of the manufacturing entity. The reality of the matter is that the manufacturer needs to produce customer-centric designed products, and this may be achieved through the use of machinery and a system configured to satisfy the need. Realizing this scenario, in this article, an automated agent-based control system methodology (ACSME) has been proposed for Reconfigurable Bending Press Machine (RBPM) application due to ongoing research. The proposed methodology will help manufacturer of RBPM to address the need for more flexible control systems and to demonstrate their industrial flexibility in several reconfigurable machines applications. (C) 2016 The Authors. Published by Elsevier B.V.
In this talk, we briefly comment on Sweeny and Gliozzi methods. cluster Monte Carlo method, and recent transition matrix Monte Carlo for Potts models. We mostly concentrate on a new algorithm known as 'binary tree...
详细信息
In this talk, we briefly comment on Sweeny and Gliozzi methods. cluster Monte Carlo method, and recent transition matrix Monte Carlo for Potts models. We mostly concentrate on a new algorithm known as 'binary tree summation'. Some of the most interesting features of this method will be highlighted-such as simulating fractional number of Potts states, as well as offering the partition function and thermodynamic quantities as functions of temperature in a single run. (C) 2003 Elsevier Science B.V. All rights reserved.
The cluster Monte Carlo method, where variables are updated in groups, is very efficient at second order phase transitions. Much better results can be obtained with less computer time. This article reviews the method ...
详细信息
The cluster Monte Carlo method, where variables are updated in groups, is very efficient at second order phase transitions. Much better results can be obtained with less computer time. This article reviews the method of Swendsen and Wang and some of its applications.
暂无评论