• No results found

cluster-based method

Document Clustering Using Cluster Based Method

Document Clustering Using Cluster Based Method

... D. Text Summarization Using Cluster Based Method Documents are usually written such that they address different topics one after the other in an organized manner. They are normally broken up ...

8

Improve the Data Security based on Cluster Method for the Mobile Sink in WSN

Improve the Data Security based on Cluster Method for the Mobile Sink in WSN

... the cluster-based method has been proven to be effective [8], ...the cluster-based algorithm, all sensor nodes in the network are divided into two categories: cluster heads and ...

6

Clustering-based k-nearest neighbor classification for large-scale data with neural codes representation

Clustering-based k-nearest neighbor classification for large-scale data with neural codes representation

... the cluster- augmentation strategy against the initial cluster-based method for the raw initial features (Original) and the Neural Codes representation ...the cluster-augmentation ...

38

Congestion Control in Mobile Ad Hoc Network: A Review
                 

Congestion Control in Mobile Ad Hoc Network: A Review  

... 4.9 Congestion Aware Routing (CAR) [22] Ye et al. proposed Congestion Aware Routing (CAR). This approach modifies routing based on the distributed congestion information, to separate TCP flows spatially. In this ...

7

Fixed Cluster Based Cluster Head Selection Algorithm in Vehicular Adhoc Network

Fixed Cluster Based Cluster Head Selection Algorithm in Vehicular Adhoc Network

... a cluster head wisely, because the cluster head (CH) will be responsible for communicating with RSU and other ...CH based on vehicle position, average speed and trust values in authenticated V2V ...

67

Investigation on the Clusterability of Heterogeneous Dataset by Retaining the Scale of Variables

Investigation on the Clusterability of Heterogeneous Dataset by Retaining the Scale of Variables

... formations based on the selection of K from DB, D, ΓC, and S indexes presented in Figure ...to cluster 5, 7, and 8 should be classified as one class, while data points in cluster 2, 4, and 9 as ...

9

Survey of ACO and PSO based Secure Routing protocols for Wireless networks

Survey of ACO and PSO based Secure Routing protocols for Wireless networks

... PSO was proposed by Dr.Eberhart and Dr.Kennedy in 1995. The process of PSO algorithm in finding optimal values follows the work of this animal society [21]. Particle PSO is one the swarm intelligence technique. It deals ...

13

Applications of Cluster Analysis Method in Surface Water Quality Assessment: A Case Study in Balihe Lake, China

Applications of Cluster Analysis Method in Surface Water Quality Assessment: A Case Study in Balihe Lake, China

... Z-score method was selected as the standardized method in the CA ...as cluster 1, cluster 2 and cluster 3, ...each cluster should have similar features and pollution source ...

6

A new genetic algorithm based clustering for binary and imbalanced class data sets

A new genetic algorithm based clustering for binary and imbalanced class data sets

... Incremental K-means (IKM) [Ordonez, 2003, Pham et al., 2004, Sanjay et al., 2011, San- jay Chakraborty, 2011] was proposed to improve the performance of the standard K-means with different objectives. Chakraborty and ...

36

Survey on Certificate Revocation Scheme for
          Mobile Ad Hoc Networks

Survey on Certificate Revocation Scheme for Mobile Ad Hoc Networks

... voting based can significantly expedite the revocation ...proposed method a Cluster-based Certificate Revocation with Vindication Capability (CCRVC) scheme inherits the advantages of both ...

6

ASSOCIATION RULE MINING BASED VIDEO CLASSIFIER WITH LATE ACCEPTANCE HILL 
CLIMBING APPROACH

ASSOCIATION RULE MINING BASED VIDEO CLASSIFIER WITH LATE ACCEPTANCE HILL CLIMBING APPROACH

... In general sense, the procedure of a clustering is to group limited data objects in a limited spatial domain, and its ultimate goal is to divide these data objects into different clusters with low inter-cluster ...

5

Analyzing Gene Expressions in Saccharomyces Cerevisiae using Hierarchical Clustering of DNA Microarray Data

Analyzing Gene Expressions in Saccharomyces Cerevisiae using Hierarchical Clustering of DNA Microarray Data

... Statistical method devoted to detection in DNA from microarray data, the inherent challenges in data quality associated with most filter techniques remains a challenging problem in microarray association ...

6

Cluster tree topology construction method based on PSO algorithm to prolong the lifetime of ZigBee wireless sensor networks

Cluster tree topology construction method based on PSO algorithm to prolong the lifetime of ZigBee wireless sensor networks

... coordinator nodes powered by stable power supply, routers and end-devices are generally powered by dry batteries or storage batteries. The end-devices send data directly or through routers to the coordinator, and the low ...

13

Location based cluster joining method for Load balancing and Energy efficiency in WSN

Location based cluster joining method for Load balancing and Energy efficiency in WSN

... Tree based routing is very useful for load ...tree based routing for load balancing ...tree based routing .Author has used cluster based routing for node centric load balancing ...

7

EFFICIENT REQUIREMENT PRIORITIZATION BASED ON ENHANCED MULTI VERSE OPTIMIZER

EFFICIENT REQUIREMENT PRIORITIZATION BASED ON ENHANCED MULTI VERSE OPTIMIZER

... In cluster analysis, a group (ensemble) approach is actively developing ...solutions based on the composition of simple algorithms is actively used in modern theory and practice of machine learning and data ...

13

ID-Based Data Integrity Scheme Using Cluster Method For Wireless Sensor Networks

ID-Based Data Integrity Scheme Using Cluster Method For Wireless Sensor Networks

... To let a signature scheme function, the public key has to be bound with the identity of the owner of the public key. Traditionally, this is provided by the public key infrastructure (PKI) in which a third party known as ...

6

Spectrum aware cluster based routing protocol (SACBRP)

Spectrum aware cluster based routing protocol (SACBRP)

... a cluster head i assesses the Q-esteem ( , ) for each and every SU neighbour node , which demonstrates the OFF- state likelihood of the bottleneck channel along a course and redesigns its steering table of ...A ...

7

Spatial Clustering based Meteorological Fields Construction for Regional Vulnerability Assessment

Spatial Clustering based Meteorological Fields Construction for Regional Vulnerability Assessment

... The location of each chemical company in the dataset is an address made up of natural language, so it should be coded into a point on a two-dimensional plane. In this study, hybrid geocoding [11] was applied. Hybrid ...

6

Dubbing Modernization: The United States, France, and the Politics of Development in the Ivory Coast, 1946 1968

Dubbing Modernization: The United States, France, and the Politics of Development in the Ivory Coast, 1946 1968

... of cluster analysis are examined for their accuracy in clustering on both real CPILS dataset and simulated ...hierarchical cluster analysis (Ward's method), model-based clustering of raw data, ...

83

Show all 10000 documents...

Related subjects