Traditional Fuzzy C-Means(FCM)and Possibilistic C-Means(PCM)clustering algorithms are data-driven,and their objective function minimization process is based on the available numeric ***,knowledge hints have been intro...
详细信息
Traditional Fuzzy C-Means(FCM)and Possibilistic C-Means(PCM)clustering algorithms are data-driven,and their objective function minimization process is based on the available numeric ***,knowledge hints have been introduced to formknowledge-driven clustering algorithms,which reveal a data structure that considers not only the relationships between data but also the compatibility with knowledge ***,these algorithms cannot produce the optimal number of clusters by the clustering algorithm itself;they require the assistance of evaluation ***,knowledge hints are usually used as part of the data structure(directly replacing some clustering centers),which severely limits the flexibility of the algorithm and can lead to *** solve this problem,this study designs a newknowledge-driven clustering algorithmcalled the PCM clusteringwith High-density Points(HP-PCM),in which domain knowledge is represented in the form of so-called high-density ***,a newdatadensitycalculation function is *** Density Knowledge Points Extraction(DKPE)method is established to filter out high-density points from the dataset to form knowledge ***,these hints are incorporated into the PCM objective function so that the clustering algorithm is guided by high-density points to discover the natural data ***,the initial number of clusters is set to be greater than the true one based on the number of knowledge ***,the HP-PCM algorithm automatically determines the final number of clusters during the clustering process by considering the cluster elimination *** experimental studies,including some comparative analyses,the results highlight the effectiveness of the proposed algorithm,such as the increased success rate in clustering,the ability to determine the optimal cluster number,and the faster convergence speed.
Malware analysis is a vital and challenging task in the ever-changing cyber threat landscape. Traditional signature-based methods cannot keep up with the fast-paced evolution of malware variants. This underscores the ...
详细信息
Cyberspace is massively expanding every day, and the users of these digital devices are looking for more innovative applications to ease their day-to-day work. The main objective of any device is to use available syst...
详细信息
In Medical question-answering (QA) tasks, the need for effective systems is pivotal in delivering accurate responses to intricate medical queries. However, existing approaches often struggle to grasp the intricate log...
详细信息
Steganography is the method that convert data into bits to make it suitable for hiding. While embedding data the factors such as stego image quality and distortion which cannot be observed by the human eyes. The aim o...
详细信息
Every nation's basic need is the agricultural products. Disease-ridden leaves have an effect on the nation's agricultural output and financial resources. This research provides a deep learning based plant leaf...
详细信息
DECO is one of the state-of-The-Art TLS evidence protocols that enables privacy-preserving verification without necessitating server-side modifications. It allows applications to extract verifiable data from websites....
详细信息
Smartphone/Tablet users are approximately 3 million all over the world. It is likely to increase by several 100 million in the next few years. Around 40% of these users read online. Explicit means of feedback system i...
详细信息
Allergy is the sudden response of the immunity system which arises later the disclosure of allergens like chemicals, proteins and peptides. In the early times, multiple techniques were formed for allergenicity forecas...
详细信息
Hindi is the mother tongue of nearly 133 crore Indians. Along with India, it is spoken in Nepal, Fiji, and Bangladesh. Since good knowledge of English is not common, there is a good opportunity for machine translation...
详细信息
暂无评论