A Comparative Study on Clustering Methods for Grouping Related Tags
نویسندگان
چکیده
منابع مشابه
A Comparative Study of Some Clustering Algorithms on Shape Data
Recently, some statistical studies have been done using the shape data. One of these studies is clustering shape data, which is the main topic of this paper. We are going to study some clustering algorithms on shape data and then introduce the best algorithm based on accuracy, speed, and scalability criteria. In addition, we propose a method for representing the shape data that facilitates and ...
متن کاملreflections on taught courses of the iranian ma program in english translation: a mixed-methods study
the issue of curriculum and syllabus evaluation and revision has been in center of attention right from when curriculum came into attention of educational institutions. thus everywhere in the world in educational institutions curricula and syllabi are evaluated and revised based on the goals, the needs, existing content, etc.. in iran any curriculum is designed in a committee of specialists and...
a study on thermodynamic models for simulation of 1,3 butadiene purification columns
attempts have been made to study the thermodynamic behavior of 1,3 butadiene purification columns with the aim of retrofitting those columns to more energy efficient separation schemes. 1,3 butadiene is purified in two columns in series through being separated from methyl acetylene and 1,2 butadiene in the first and second column respectively. comparisons have been made among different therm...
Scalable Grouping-proof Protocol for RFID Tags
In this paper, we propose a grouping-proof protocol for RFID tags based on (n, n)-secret sharing. Our proposed protocol addresses the scalability issue of the previous protocols by removing the need for an RFID reader to relay messages from one tag to another tag. We also present a security model for a secure grouping-proof protocol which properly addresses the so called mafia fraud attack (som...
متن کاملProvably Secure Grouping-Proofs for RFID Tags
We investigate an application of RFIDs referred to in the literature as group scanning, in which several tags are “simultaneously” scanned by a reader device. Our goal is to study the group scanning problem in strong adversarial models. We present a security model for this application and give a formal description of the attending security requirements, focusing on the privacy (anonymity) of th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Korean Society for Library and Information Science
سال: 2009
ISSN: 1225-598X
DOI: 10.4275/kslis.2009.43.3.399