An efficient hybrid distributed document clustering algorithm
نویسندگان
چکیده
منابع مشابه
An efficient hybrid distributed document clustering algorithm
Recent advances in information technology have led to an increase in volumes of data thereby exceeding beyond petabytes. Clustering distributed document sets from a central location is difficult due to the massive demand of computational resources. So there is a need for distributed document clustering algorithms to cluster documents using distributed resources. The greatest challenge in this a...
متن کاملHierarchical Hybrid Energy Efficient Distributed Clustering Algorithm
The past few years have witnessed increased interest in the potential use of wireless sensor networks (WSNs) in applications such as environment monitoring, disaster management, healthcare and security surveillance. In wireless sensor network an efficient arrangement of network topology is required for energy optimization. Clustering has been proposed as an effective way of organizing sensor ne...
متن کاملAn Efficient Distributed Data Clustering Algorithm
The k-means algorithm is one of the most popular clustering algorithms in use today. The high running time complexity of serial k-means limits its applicability for very large databases. On the other hand, the existing parallel kmeans algorithms demand huge data transfer operations incorporating high communication complexity. Transfer of actual data from local sites is also unacceptable, in man...
متن کاملAn Effective and Efficient Algorithm for Document Clustering
This paper proposes an effective and efficient algorithm for clustering text documents. This algorithm is formulated by using the concept of well known k-means algorithm. The standard k-means algorithm suffers from the problem of random initialization of initial cluster centers. The proposed algorithm eliminates this problem by introducing a new approach for selection of initial cluster centroi...
متن کاملAn Efficient Hybrid Clustering-PSO Algorithm for Anomaly Intrusion Detection
Generally speaking, in anomaly intrusion detection, modeling the normal behavior of activities performed by a user or a program is an important issue. Currently most machine-learning algorithms which are widely used to establish user’s normal behaviors need labeled data for training first, so they are computational expensive and sometimes misled by artificial data. This study proposes a PSO-bas...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Scientific Research and Essays
سال: 2015
ISSN: 1992-2248
DOI: 10.5897/sre2014.6107