SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3228
ENCODED POLYMORPHIC ASPECT OF CLUSTERING
Mrs. A.JACKULIN SAM GINI 1, A.SRINIVASAN 2, S.VIJAYAKUMAR 3
1 Assistant Professor, Dept. of IT, Jeppiaar SRR Engineering College, Chennai, Tamil Nadu
2,3B.TECH., Dept. of IT, Jeppiaar SRR Engineering College, Chennai, Tamil Nadu
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Data storage are constantly growing and
maintaining the large data it leads to more complex. We face
the difficulty of handling the data and storage problems. The
data can be getting from various sources and analysis in a
different views are referred to as multi-view data. So we
propose the Machine learning technologies have been
investigated for the scope of dealingwithmulti-viewdata. This
paper focuses on one of the unsupervised learning techniques,
namely, Clustering. It means that similar objects are grouped
into the same cluster, and dissimilar objects are divided into
different cluster. Compared to single-view clustering, multi
view clustering normally can access to more characteristics
and structural information hidden in the data, and intuitively
can exploit richer properties of data to improve the clustering
performance.
1. INTRODUCTION
Machine learning is to predict the future from past data.
Machine learning focuses on the development of Computer
Programs that can change when exposedto newdata andthe
basics of Machine Learning, implementation of a simple
machine learning algorithm using java. It feed the training
data to an algorithm, and the algorithm uses this training
data to give predictions on a new test data. Machinelearning
can be divided into three categories such as supervised
learning, unsupervised learning andreinforcementlearning.
In Supervised learning ,the machine is provided with a new
set of data so that supervised learning analyzing the dataset
and produces the correct ouput.InUnsupervisedlearningwe
don’t need any labels. It allowing the algorithm to access the
dataset without any guidance. This algorithm has to figure
out the clustering of the input data. Finally, Reinforcement
learning dynamically interacts with its environment and it
receives positive or negative feedback to improve its
performance. Data scientists use many different kinds of
machine learning algorithms todiscoverpatternsinjava that
lead to actionable insights. Clustering means dividing the
dataset into a number of groups such that similar datasets
are clustered in the same groups and more similar to other
datasets also in the same group and dissimilar dataset in
other groups. It is basically a collection of objects on the
basis of similarity and dissimilarity betweenthem. Thereare
no criteria for a good clustering. Clusteringbasedontheuser
requirement and grouping of data must satisfying the user
needs.
1.1 What is Unsupervised Machine Learning?
Unsupervised learning have a capability of self learning
algorithm without any associated trained datasets, this
algorithm easily determine the data patternsonitsown way.
This type of algorithm leads to restructuring the data into
something different, such as new features that may
represent in a new group of uncorrelated values.
Unsupervised learning is the training of machine using
information there is no classification or labeling of any data
its allowing the algorithm to act on that dataset without
guidance. Here the task for grouping the unsorted
information based on data similarities, analyzing in depth of
data patterns and differences without any previous trained
datasets. Unlike supervised learning, no trainer is provided
that means no previously trained datasets will be given to
the machine. So, machine is restricted to find the in depth
unlabeled data structure by its self. Unsupervised learning
have two categories of algorithms such as Clustering and
Association. Clustering method is where you want to
discover the grouping of polymorphic data,suchasgrouping
students based on their score. Wherever you want to
discover the rules and describing the big datasets then we
can use association algorithm.
1.2 What is BMVC ?
BMVC means Binary Multi-View Clusteringalgorithm, which
can analyzing the multi-view image data and easily scalable
of big datasets. To achieve this goal, we use two types of
BMVC methods. Collaborative discrete data representation
method and Clustering the structure of binary data, BMVC
collaboratively encoding the image in multiple way
descriptors into a common binary codespace byconsidering
their complementary data; For collaborative binary
representations of clustering are done by binary matrix
factorization method, such that the cluster structures are
optimized in the Hamming space by pure, and fast bit-
operations. K-means algorithm has severely unaffordable
computational time and storage requirement in real-world
applications with large data and a big number of clusters.
Recently, multi-view clustering by exploitingheterogeneous
features of data has attracted considerable attention. For
efficiency, the code balance constraints are imposedon both
binary data representations and cluster centroids. These
algorithms focus on speed and scalability.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3229
2. MODULES DESCRIPTION
2.1 UPLOAD THE DATASETS
The information istransferredfromtheestablishmentwhich
is situated in various areas transfers separately. All the
transferred information is gotten by the director and
afterward assembled in one spot. Candidates upload the
basic details. The exam conducted under four categories are
listening, reading, writing, speaking. After completion of
exam the result will be upload by admin that four categories
in listening, reading, writing, speaking. The score upload in
between the particular range from 8 to 40.
Fig-1 Upload the Datasets
2.2 BINARY CONVERSION
Before datasets are being uploaded it should convert into
binary. For the conversion, we use the binary matrix
factorization method. These algorithms focus on speed and
scalability they work with binary factors combined with bit-
wise operations and a few auxiliary integer ones. For binary
conversion we use in-built package java. lang. Inside the
java.lang package we calling the parseByte() method from
that package for conversion. All the upload dataset are
converted into binary code. So, the memory space of every
data is less. For safe and security purpose all the data should
be encoded. For encoding the data we use Base64method in
java. Base 64 is an encoding scheme that converts binary
data into text format so that encoded textual data can be
easily transported over network uncorrupted and without
any data loss. Binary File have less memory allocation and
quick access based on user query. Its save more time for
users or applicant.
Fig-2 Binary Conversion
2.3 CLUSTERING THE DATA
In unsupervised learning give the training to the machine
using data and there is no classification or labeled data and
allowing the algorithm to act on that data without guidance.
Machine is restricted to find the in depthdata structurefrom
unlabeled data by its self. There is an task for machine to
group the unsorted and unordered information depending
on their data similarities, data patterns and differences
without any past training of datasets. It is used as a process
to find meaningful data structure, underlying pattern
processes, generative the additional features,andgroupings
of data. Categorization of the data sets into a number of
groups such that similar data are in the same groups and
dissimilar data sets are in other groups.
Fig-3 Clustering the data
2.4 RETRIEVING THE DATA
The data retrieval is the process ofidentifyingand extracting
data from a database. Based on a query provided by the user
or application the data should be retrieve fromthedatabase.
In our project all the data are stored in binary encoded
format. So, First we decoded the data and then view the data
based on query. Base 64 is an decoding scheme method that
converts text data into binary data format so that decoded
binary data can be easily transported over network. The
candidate data will be segregated, after the result uploaded
by the admin. The segregated data can be view under four
categories such as Listening, Reading, Writing andSpeaking.
The recruiter choose atleast any one of the field or all the
four fields for segregating the candidate results. This
segregation method is very useful forrecruitertoshortlistor
select the eligible candidate easily. For safe and security
purpose this encryption and decryption method is very
useful.
Fig-4 Retrieving the Data
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3230
3. SYSTEM TECHNIQUES
The Software Development Lifecycle is very helpful for the
completion of software development and implementation.
This process also helpful for developing a complex software
applications. SDLC is a process followed by the organization
for developing a software project, only by software
organization. SDLC contains detail plan for developing,
maintaining, testing, updating, replacing and altering or
enhancing the specific software.This lifecyclefordeveloping
a software defines a various ideas for improving the quality
of software product and the overall development of project.
The major concepts of this document is to present a
complete process of the Web application system. This
document is useful for both the stakeholders and the
developers.
3.1 SYSTEM ARCHITECTURE
Fig-5:Architecture Diagram
4. HARDWARE REQUIREMENTS
 Processor : i3/i4
 System : Pentium Dual-Core
 Hard disk : 120 GB and Above
 RAM : 2 GB and Above
4.1 SOFTWARE REQUIREMENTS
 Operating System : Windows
 Front end : Core Java,CSS, JSP,Servlet
 Web application : J2EE,Hibernate
 Back end : MySQL 5.1
 Tool : Eclipse
4.2 FUNCTIONAL REQUIREMENTS
Functional requirementdefinesasa specificationof behavior
between output and input in system and software
engineering. Based on that requirement engineering,
functional requirementsdescribingthe particularresults ofa
system. Some of the more typical functional requirements
include business rules, authentication, authorization, legal
requirements etc;
4.3 NON FUNCTIONAL REQUIREMENTS
Non-functional requirements define how the system works,
but in functional requirements.It describe what the system
should do. Non-functional requirements mainly focused on
the quality attributes of a system. They specify criteria that
judge the operation of a system, rather than specific
behavior such as performance, scalability, availability,
maintainability, reliability, data integrity, security etc;
5. INPUT
 The user must create the account for login. All the
user details have been stored the data in our
database for future purpose.
 The user view the exam schedule and book the date
for attending the test and upload the location and
timing also.
 The admin verify the candidate details and then
approve/deny based on their application.
 The admin upload the candidate result.
5.1 OUTPUT
 The Application owner can show the user details
and it can validate some sensitive information
details.
 The user can also get their admit card,
acknowledgement for enrollment and result from
the admin side.
 In this section recruiters/user can give theinputfor
segregating the result and get the output from the
admin side based on the user query.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3231
6. SNAPSHOT
Fig-6: Home page
Fig-7: Login page
Fig-8: Candidate Enrollement
Fig-9: Booking for Test
Fig-10: Institute Details
Fig-11: Upload the result
Fig-12: Result Segregation
Fig-13: Segregated Result
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3232
7. ADVANTAGES
The scope of this project stores the data is secured and fast
in performance and enhances storage capability.Moreover,
we use binary code conversion to reduce the more memory
consumption. BMVC techniques to increase the fast
optimization of the data viewing and analysis.When we use
BMVC, it give exact and accurate of information more than
the other clustering methods. Encoding ofdata isveryhelpfu
for safe and security purpose.
8. APPLICATION
The company recruiters want to select or shorlisted the
candidate based on there score. Admin uploadthecandidate
result under four category such as Listening, Speaking,
Reading and Writing. After the completion of the uploading
the result clustering and segregationprocesstobedone.The
user can also view the result login through with there
respective use account. Finally, the recruiters segregate the
candidate based on there needs.
9. FUTURE ENHANCEMENT
What's more, presenting the encoded bunching procedure
and improvement strategies were joint together and
increment the compelling calculation in the bigger datasets.
Later on, further encourage the presentation, we intend to
explore the administered and profound augmentation of
encoding in-see portrayal by theAIsystem.IntheAImethod,
the profound learning framework is utilized for directed
learning of the system. Be that as it may, it executes a
profound neural system to use the accessible name.
10. CONCLUSION
In this paper, a principled Binary Multi-View Clustering
(BMVC) method, was proposed for solving the challenging
problem of multi-view clustering on large-scale image data.
In BMVC, the collaborative discrete representations and
binary cluster structures were jointly learned, which could
effectively integrate the collaborative information from
multiple views. Moreover, an effective alternating
optimization algorithm with guaranteed convergence was
proposed to ensure the high-quality binary solutions.
11. REFERENCES
[1] A Survey on Learning to Hash, J. Wang, T. Zhang,02 May
2017, https://www.microsoft.com/en-us/research/wp-
content/uploads/2017/01/LTHSurvey.pdf
[2] Binary Multi View Clustering, Zheng Zhang, Ling Shao
,July 2019,https://ieeexplore.ieee.org/document/8387526
[3] Compressed K-Means for Large-ScaleClustering,X.Chen,
W.Liu.,2017,
https://www.semanticscholar.org/paper/Compressed-K-
Means-for-Large-Scale-Clustering-Shen-
Liu/93c03ff9421c49b74c234d6486e8884b6d744b54
[4] Fast K-Means with Accurate Bounds,J. Newling, F.
Fleuret,Sep 2016, https://arxiv.org/pdf/1602.02514.pdf
[5] Learning Short Binary Codes for Large-scale Image
Retrieval, Li Liu, Mengyang Yu.,11 January 2017,
https://www.freeprojectsforall.com/wp-
content/uploads/2018/09/Learning-Short-Binary-Codes-
for-Large-scale-Image-Retrieval.pdf
[6] Multiview Alignment Hashing for EfficientImageSearch,
Mengyang Yu,12 January 2015,
https://ieeexplore.ieee.org/abstract/document/7006770
[7] Multi-View Clustering via Joint Non-negative Matrix
Factorization,JialuLiu , Chi Wang , Jing Gao, and Jiawei
Han,May-2013,
https://www.researchgate.net/publication/279953559
Multi_View_Clustering_via_Joint_Nonnegative_Matrix_Factori
zation
[8] Unsupervised Deep Hashing with Similarity-Adaptive
and Discrete Optimization,FuminShen, YanXu,Yang Yang,05
January-2018,
https://ieeexplore.ieee.org/abstract/document/8247210
.

More Related Content

What's hot

IRJET - Sentiment Analysis of Posts and Comments of OSN
IRJET -  	  Sentiment Analysis of Posts and Comments of OSNIRJET -  	  Sentiment Analysis of Posts and Comments of OSN
IRJET - Sentiment Analysis of Posts and Comments of OSNIRJET Journal
 
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...ijtsrd
 
Performance Analysis of Selected Classifiers in User Profiling
Performance Analysis of Selected Classifiers in User ProfilingPerformance Analysis of Selected Classifiers in User Profiling
Performance Analysis of Selected Classifiers in User Profilingijdmtaiir
 
IRJET-Scaling Distributed Associative Classifier using Big Data
IRJET-Scaling Distributed Associative Classifier using Big DataIRJET-Scaling Distributed Associative Classifier using Big Data
IRJET-Scaling Distributed Associative Classifier using Big DataIRJET Journal
 
IRJET- Classifying Twitter Data in Multiple Classes based on Sentiment Class ...
IRJET- Classifying Twitter Data in Multiple Classes based on Sentiment Class ...IRJET- Classifying Twitter Data in Multiple Classes based on Sentiment Class ...
IRJET- Classifying Twitter Data in Multiple Classes based on Sentiment Class ...IRJET Journal
 
MACHINE LEARNING ALGORITHMS FOR HETEROGENEOUS DATA: A COMPARATIVE STUDY
MACHINE LEARNING ALGORITHMS FOR HETEROGENEOUS DATA: A COMPARATIVE STUDYMACHINE LEARNING ALGORITHMS FOR HETEROGENEOUS DATA: A COMPARATIVE STUDY
MACHINE LEARNING ALGORITHMS FOR HETEROGENEOUS DATA: A COMPARATIVE STUDYIAEME Publication
 
Profile Analysis of Users in Data Analytics Domain
Profile Analysis of   Users in Data Analytics DomainProfile Analysis of   Users in Data Analytics Domain
Profile Analysis of Users in Data Analytics DomainDrjabez
 
IRJET- Semantics based Document Clustering
IRJET- Semantics based Document ClusteringIRJET- Semantics based Document Clustering
IRJET- Semantics based Document ClusteringIRJET Journal
 
Distributed Digital Artifacts on the Semantic Web
Distributed Digital Artifacts on the Semantic WebDistributed Digital Artifacts on the Semantic Web
Distributed Digital Artifacts on the Semantic WebEditor IJCATR
 
IRJET- Retrieval of Images & Text using Data Mining Techniques
IRJET-  	  Retrieval of Images & Text using Data Mining TechniquesIRJET-  	  Retrieval of Images & Text using Data Mining Techniques
IRJET- Retrieval of Images & Text using Data Mining TechniquesIRJET Journal
 
IRJET- Student Placement Prediction using Machine Learning
IRJET- Student Placement Prediction using Machine LearningIRJET- Student Placement Prediction using Machine Learning
IRJET- Student Placement Prediction using Machine LearningIRJET Journal
 
Framework to Avoid Similarity Attack in Big Streaming Data
Framework to Avoid Similarity Attack in Big Streaming Data Framework to Avoid Similarity Attack in Big Streaming Data
Framework to Avoid Similarity Attack in Big Streaming Data IJECEIAES
 
Comparative Analysis: Effective Information Retrieval Using Different Learnin...
Comparative Analysis: Effective Information Retrieval Using Different Learnin...Comparative Analysis: Effective Information Retrieval Using Different Learnin...
Comparative Analysis: Effective Information Retrieval Using Different Learnin...RSIS International
 
Clustering of Big Data Using Different Data-Mining Techniques
Clustering of Big Data Using Different Data-Mining TechniquesClustering of Big Data Using Different Data-Mining Techniques
Clustering of Big Data Using Different Data-Mining TechniquesIRJET Journal
 
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINEA NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINEaciijournal
 
Unstructured multidimensional array multimedia retrival model based xml database
Unstructured multidimensional array multimedia retrival model based xml databaseUnstructured multidimensional array multimedia retrival model based xml database
Unstructured multidimensional array multimedia retrival model based xml databaseeSAT Journals
 
Data mining Algorithm’s Variant Analysis
Data mining Algorithm’s Variant AnalysisData mining Algorithm’s Variant Analysis
Data mining Algorithm’s Variant AnalysisIOSR Journals
 

What's hot (20)

IRJET - Sentiment Analysis of Posts and Comments of OSN
IRJET -  	  Sentiment Analysis of Posts and Comments of OSNIRJET -  	  Sentiment Analysis of Posts and Comments of OSN
IRJET - Sentiment Analysis of Posts and Comments of OSN
 
[IJET-V1I3P11] Authors : Hemangi Bhalekar, Swati Kumbhar, Hiral Mewada, Prati...
[IJET-V1I3P11] Authors : Hemangi Bhalekar, Swati Kumbhar, Hiral Mewada, Prati...[IJET-V1I3P11] Authors : Hemangi Bhalekar, Swati Kumbhar, Hiral Mewada, Prati...
[IJET-V1I3P11] Authors : Hemangi Bhalekar, Swati Kumbhar, Hiral Mewada, Prati...
 
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
 
Performance Analysis of Selected Classifiers in User Profiling
Performance Analysis of Selected Classifiers in User ProfilingPerformance Analysis of Selected Classifiers in User Profiling
Performance Analysis of Selected Classifiers in User Profiling
 
IRJET-Scaling Distributed Associative Classifier using Big Data
IRJET-Scaling Distributed Associative Classifier using Big DataIRJET-Scaling Distributed Associative Classifier using Big Data
IRJET-Scaling Distributed Associative Classifier using Big Data
 
IRJET- Classifying Twitter Data in Multiple Classes based on Sentiment Class ...
IRJET- Classifying Twitter Data in Multiple Classes based on Sentiment Class ...IRJET- Classifying Twitter Data in Multiple Classes based on Sentiment Class ...
IRJET- Classifying Twitter Data in Multiple Classes based on Sentiment Class ...
 
MACHINE LEARNING ALGORITHMS FOR HETEROGENEOUS DATA: A COMPARATIVE STUDY
MACHINE LEARNING ALGORITHMS FOR HETEROGENEOUS DATA: A COMPARATIVE STUDYMACHINE LEARNING ALGORITHMS FOR HETEROGENEOUS DATA: A COMPARATIVE STUDY
MACHINE LEARNING ALGORITHMS FOR HETEROGENEOUS DATA: A COMPARATIVE STUDY
 
Profile Analysis of Users in Data Analytics Domain
Profile Analysis of   Users in Data Analytics DomainProfile Analysis of   Users in Data Analytics Domain
Profile Analysis of Users in Data Analytics Domain
 
IRJET- Semantics based Document Clustering
IRJET- Semantics based Document ClusteringIRJET- Semantics based Document Clustering
IRJET- Semantics based Document Clustering
 
Distributed Digital Artifacts on the Semantic Web
Distributed Digital Artifacts on the Semantic WebDistributed Digital Artifacts on the Semantic Web
Distributed Digital Artifacts on the Semantic Web
 
COMPARATIVE ANALYSIS OF DIFFERENT MACHINE LEARNING ALGORITHMS FOR PLANT DISEA...
COMPARATIVE ANALYSIS OF DIFFERENT MACHINE LEARNING ALGORITHMS FOR PLANT DISEA...COMPARATIVE ANALYSIS OF DIFFERENT MACHINE LEARNING ALGORITHMS FOR PLANT DISEA...
COMPARATIVE ANALYSIS OF DIFFERENT MACHINE LEARNING ALGORITHMS FOR PLANT DISEA...
 
IRJET- Retrieval of Images & Text using Data Mining Techniques
IRJET-  	  Retrieval of Images & Text using Data Mining TechniquesIRJET-  	  Retrieval of Images & Text using Data Mining Techniques
IRJET- Retrieval of Images & Text using Data Mining Techniques
 
IRJET- Student Placement Prediction using Machine Learning
IRJET- Student Placement Prediction using Machine LearningIRJET- Student Placement Prediction using Machine Learning
IRJET- Student Placement Prediction using Machine Learning
 
Framework to Avoid Similarity Attack in Big Streaming Data
Framework to Avoid Similarity Attack in Big Streaming Data Framework to Avoid Similarity Attack in Big Streaming Data
Framework to Avoid Similarity Attack in Big Streaming Data
 
Comparative Analysis: Effective Information Retrieval Using Different Learnin...
Comparative Analysis: Effective Information Retrieval Using Different Learnin...Comparative Analysis: Effective Information Retrieval Using Different Learnin...
Comparative Analysis: Effective Information Retrieval Using Different Learnin...
 
Clustering of Big Data Using Different Data-Mining Techniques
Clustering of Big Data Using Different Data-Mining TechniquesClustering of Big Data Using Different Data-Mining Techniques
Clustering of Big Data Using Different Data-Mining Techniques
 
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINEA NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE
 
Unstructured multidimensional array multimedia retrival model based xml database
Unstructured multidimensional array multimedia retrival model based xml databaseUnstructured multidimensional array multimedia retrival model based xml database
Unstructured multidimensional array multimedia retrival model based xml database
 
L016136369
L016136369L016136369
L016136369
 
Data mining Algorithm’s Variant Analysis
Data mining Algorithm’s Variant AnalysisData mining Algorithm’s Variant Analysis
Data mining Algorithm’s Variant Analysis
 

Similar to Clustering multi-view datasets

IRJET- Intelligence Extraction using Various Machine Learning Algorithms
IRJET- Intelligence Extraction using Various Machine Learning AlgorithmsIRJET- Intelligence Extraction using Various Machine Learning Algorithms
IRJET- Intelligence Extraction using Various Machine Learning AlgorithmsIRJET Journal
 
Smart Health Guide App
Smart Health Guide AppSmart Health Guide App
Smart Health Guide AppIRJET Journal
 
Email Spam Detection Using Machine Learning
Email Spam Detection Using Machine LearningEmail Spam Detection Using Machine Learning
Email Spam Detection Using Machine LearningIRJET Journal
 
IRJET- Automated CV Classification using Clustering Technique
IRJET- Automated CV Classification using Clustering TechniqueIRJET- Automated CV Classification using Clustering Technique
IRJET- Automated CV Classification using Clustering TechniqueIRJET Journal
 
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET Journal
 
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile DevicesIRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile DevicesIRJET Journal
 
IRJET- Noisy Content Detection on Web Data using Machine Learning
IRJET- Noisy Content Detection on Web Data using Machine LearningIRJET- Noisy Content Detection on Web Data using Machine Learning
IRJET- Noisy Content Detection on Web Data using Machine LearningIRJET Journal
 
IRJET- Comparison of Classification Algorithms using Machine Learning
IRJET- Comparison of Classification Algorithms using Machine LearningIRJET- Comparison of Classification Algorithms using Machine Learning
IRJET- Comparison of Classification Algorithms using Machine LearningIRJET Journal
 
IRJET- A Comparative Research of Rule based Classification on Dataset using W...
IRJET- A Comparative Research of Rule based Classification on Dataset using W...IRJET- A Comparative Research of Rule based Classification on Dataset using W...
IRJET- A Comparative Research of Rule based Classification on Dataset using W...IRJET Journal
 
IRJET- Recommendation System for Electronic Products using BigData
IRJET- Recommendation System for Electronic Products using BigDataIRJET- Recommendation System for Electronic Products using BigData
IRJET- Recommendation System for Electronic Products using BigDataIRJET Journal
 
IRJET- Priviledge Level Attribute Based Encryption Policy for Big Data Ac...
IRJET-  	  Priviledge Level Attribute Based Encryption Policy for Big Data Ac...IRJET-  	  Priviledge Level Attribute Based Encryption Policy for Big Data Ac...
IRJET- Priviledge Level Attribute Based Encryption Policy for Big Data Ac...IRJET Journal
 
E-Healthcare monitoring System for diagnosis of Heart Disease using Machine L...
E-Healthcare monitoring System for diagnosis of Heart Disease using Machine L...E-Healthcare monitoring System for diagnosis of Heart Disease using Machine L...
E-Healthcare monitoring System for diagnosis of Heart Disease using Machine L...IRJET Journal
 
A Generic Model for Student Data Analytic Web Service (SDAWS)
A Generic Model for Student Data Analytic Web Service (SDAWS)A Generic Model for Student Data Analytic Web Service (SDAWS)
A Generic Model for Student Data Analytic Web Service (SDAWS)Editor IJCATR
 
Fast Range Aggregate Queries for Big Data Analysis
Fast Range Aggregate Queries for Big Data AnalysisFast Range Aggregate Queries for Big Data Analysis
Fast Range Aggregate Queries for Big Data AnalysisIRJET Journal
 
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...IRJET Journal
 
IRJET- Sentiment Analysis to Segregate Attributes using Machine Learning Tech...
IRJET- Sentiment Analysis to Segregate Attributes using Machine Learning Tech...IRJET- Sentiment Analysis to Segregate Attributes using Machine Learning Tech...
IRJET- Sentiment Analysis to Segregate Attributes using Machine Learning Tech...IRJET Journal
 
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET Journal
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET Journal
 
A Web-based Attendance System Using Face Recognition
A Web-based Attendance System Using Face RecognitionA Web-based Attendance System Using Face Recognition
A Web-based Attendance System Using Face RecognitionIRJET Journal
 
IRJET- Confidential Data Access through Deep Learning Iris Biometrics
IRJET- Confidential Data Access through Deep Learning Iris BiometricsIRJET- Confidential Data Access through Deep Learning Iris Biometrics
IRJET- Confidential Data Access through Deep Learning Iris BiometricsIRJET Journal
 

Similar to Clustering multi-view datasets (20)

IRJET- Intelligence Extraction using Various Machine Learning Algorithms
IRJET- Intelligence Extraction using Various Machine Learning AlgorithmsIRJET- Intelligence Extraction using Various Machine Learning Algorithms
IRJET- Intelligence Extraction using Various Machine Learning Algorithms
 
Smart Health Guide App
Smart Health Guide AppSmart Health Guide App
Smart Health Guide App
 
Email Spam Detection Using Machine Learning
Email Spam Detection Using Machine LearningEmail Spam Detection Using Machine Learning
Email Spam Detection Using Machine Learning
 
IRJET- Automated CV Classification using Clustering Technique
IRJET- Automated CV Classification using Clustering TechniqueIRJET- Automated CV Classification using Clustering Technique
IRJET- Automated CV Classification using Clustering Technique
 
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
 
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile DevicesIRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
 
IRJET- Noisy Content Detection on Web Data using Machine Learning
IRJET- Noisy Content Detection on Web Data using Machine LearningIRJET- Noisy Content Detection on Web Data using Machine Learning
IRJET- Noisy Content Detection on Web Data using Machine Learning
 
IRJET- Comparison of Classification Algorithms using Machine Learning
IRJET- Comparison of Classification Algorithms using Machine LearningIRJET- Comparison of Classification Algorithms using Machine Learning
IRJET- Comparison of Classification Algorithms using Machine Learning
 
IRJET- A Comparative Research of Rule based Classification on Dataset using W...
IRJET- A Comparative Research of Rule based Classification on Dataset using W...IRJET- A Comparative Research of Rule based Classification on Dataset using W...
IRJET- A Comparative Research of Rule based Classification on Dataset using W...
 
IRJET- Recommendation System for Electronic Products using BigData
IRJET- Recommendation System for Electronic Products using BigDataIRJET- Recommendation System for Electronic Products using BigData
IRJET- Recommendation System for Electronic Products using BigData
 
IRJET- Priviledge Level Attribute Based Encryption Policy for Big Data Ac...
IRJET-  	  Priviledge Level Attribute Based Encryption Policy for Big Data Ac...IRJET-  	  Priviledge Level Attribute Based Encryption Policy for Big Data Ac...
IRJET- Priviledge Level Attribute Based Encryption Policy for Big Data Ac...
 
E-Healthcare monitoring System for diagnosis of Heart Disease using Machine L...
E-Healthcare monitoring System for diagnosis of Heart Disease using Machine L...E-Healthcare monitoring System for diagnosis of Heart Disease using Machine L...
E-Healthcare monitoring System for diagnosis of Heart Disease using Machine L...
 
A Generic Model for Student Data Analytic Web Service (SDAWS)
A Generic Model for Student Data Analytic Web Service (SDAWS)A Generic Model for Student Data Analytic Web Service (SDAWS)
A Generic Model for Student Data Analytic Web Service (SDAWS)
 
Fast Range Aggregate Queries for Big Data Analysis
Fast Range Aggregate Queries for Big Data AnalysisFast Range Aggregate Queries for Big Data Analysis
Fast Range Aggregate Queries for Big Data Analysis
 
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
 
IRJET- Sentiment Analysis to Segregate Attributes using Machine Learning Tech...
IRJET- Sentiment Analysis to Segregate Attributes using Machine Learning Tech...IRJET- Sentiment Analysis to Segregate Attributes using Machine Learning Tech...
IRJET- Sentiment Analysis to Segregate Attributes using Machine Learning Tech...
 
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
 
A Web-based Attendance System Using Face Recognition
A Web-based Attendance System Using Face RecognitionA Web-based Attendance System Using Face Recognition
A Web-based Attendance System Using Face Recognition
 
IRJET- Confidential Data Access through Deep Learning Iris Biometrics
IRJET- Confidential Data Access through Deep Learning Iris BiometricsIRJET- Confidential Data Access through Deep Learning Iris Biometrics
IRJET- Confidential Data Access through Deep Learning Iris Biometrics
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 

Recently uploaded (20)

(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 

Clustering multi-view datasets

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3228 ENCODED POLYMORPHIC ASPECT OF CLUSTERING Mrs. A.JACKULIN SAM GINI 1, A.SRINIVASAN 2, S.VIJAYAKUMAR 3 1 Assistant Professor, Dept. of IT, Jeppiaar SRR Engineering College, Chennai, Tamil Nadu 2,3B.TECH., Dept. of IT, Jeppiaar SRR Engineering College, Chennai, Tamil Nadu ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Data storage are constantly growing and maintaining the large data it leads to more complex. We face the difficulty of handling the data and storage problems. The data can be getting from various sources and analysis in a different views are referred to as multi-view data. So we propose the Machine learning technologies have been investigated for the scope of dealingwithmulti-viewdata. This paper focuses on one of the unsupervised learning techniques, namely, Clustering. It means that similar objects are grouped into the same cluster, and dissimilar objects are divided into different cluster. Compared to single-view clustering, multi view clustering normally can access to more characteristics and structural information hidden in the data, and intuitively can exploit richer properties of data to improve the clustering performance. 1. INTRODUCTION Machine learning is to predict the future from past data. Machine learning focuses on the development of Computer Programs that can change when exposedto newdata andthe basics of Machine Learning, implementation of a simple machine learning algorithm using java. It feed the training data to an algorithm, and the algorithm uses this training data to give predictions on a new test data. Machinelearning can be divided into three categories such as supervised learning, unsupervised learning andreinforcementlearning. In Supervised learning ,the machine is provided with a new set of data so that supervised learning analyzing the dataset and produces the correct ouput.InUnsupervisedlearningwe don’t need any labels. It allowing the algorithm to access the dataset without any guidance. This algorithm has to figure out the clustering of the input data. Finally, Reinforcement learning dynamically interacts with its environment and it receives positive or negative feedback to improve its performance. Data scientists use many different kinds of machine learning algorithms todiscoverpatternsinjava that lead to actionable insights. Clustering means dividing the dataset into a number of groups such that similar datasets are clustered in the same groups and more similar to other datasets also in the same group and dissimilar dataset in other groups. It is basically a collection of objects on the basis of similarity and dissimilarity betweenthem. Thereare no criteria for a good clustering. Clusteringbasedontheuser requirement and grouping of data must satisfying the user needs. 1.1 What is Unsupervised Machine Learning? Unsupervised learning have a capability of self learning algorithm without any associated trained datasets, this algorithm easily determine the data patternsonitsown way. This type of algorithm leads to restructuring the data into something different, such as new features that may represent in a new group of uncorrelated values. Unsupervised learning is the training of machine using information there is no classification or labeling of any data its allowing the algorithm to act on that dataset without guidance. Here the task for grouping the unsorted information based on data similarities, analyzing in depth of data patterns and differences without any previous trained datasets. Unlike supervised learning, no trainer is provided that means no previously trained datasets will be given to the machine. So, machine is restricted to find the in depth unlabeled data structure by its self. Unsupervised learning have two categories of algorithms such as Clustering and Association. Clustering method is where you want to discover the grouping of polymorphic data,suchasgrouping students based on their score. Wherever you want to discover the rules and describing the big datasets then we can use association algorithm. 1.2 What is BMVC ? BMVC means Binary Multi-View Clusteringalgorithm, which can analyzing the multi-view image data and easily scalable of big datasets. To achieve this goal, we use two types of BMVC methods. Collaborative discrete data representation method and Clustering the structure of binary data, BMVC collaboratively encoding the image in multiple way descriptors into a common binary codespace byconsidering their complementary data; For collaborative binary representations of clustering are done by binary matrix factorization method, such that the cluster structures are optimized in the Hamming space by pure, and fast bit- operations. K-means algorithm has severely unaffordable computational time and storage requirement in real-world applications with large data and a big number of clusters. Recently, multi-view clustering by exploitingheterogeneous features of data has attracted considerable attention. For efficiency, the code balance constraints are imposedon both binary data representations and cluster centroids. These algorithms focus on speed and scalability.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3229 2. MODULES DESCRIPTION 2.1 UPLOAD THE DATASETS The information istransferredfromtheestablishmentwhich is situated in various areas transfers separately. All the transferred information is gotten by the director and afterward assembled in one spot. Candidates upload the basic details. The exam conducted under four categories are listening, reading, writing, speaking. After completion of exam the result will be upload by admin that four categories in listening, reading, writing, speaking. The score upload in between the particular range from 8 to 40. Fig-1 Upload the Datasets 2.2 BINARY CONVERSION Before datasets are being uploaded it should convert into binary. For the conversion, we use the binary matrix factorization method. These algorithms focus on speed and scalability they work with binary factors combined with bit- wise operations and a few auxiliary integer ones. For binary conversion we use in-built package java. lang. Inside the java.lang package we calling the parseByte() method from that package for conversion. All the upload dataset are converted into binary code. So, the memory space of every data is less. For safe and security purpose all the data should be encoded. For encoding the data we use Base64method in java. Base 64 is an encoding scheme that converts binary data into text format so that encoded textual data can be easily transported over network uncorrupted and without any data loss. Binary File have less memory allocation and quick access based on user query. Its save more time for users or applicant. Fig-2 Binary Conversion 2.3 CLUSTERING THE DATA In unsupervised learning give the training to the machine using data and there is no classification or labeled data and allowing the algorithm to act on that data without guidance. Machine is restricted to find the in depthdata structurefrom unlabeled data by its self. There is an task for machine to group the unsorted and unordered information depending on their data similarities, data patterns and differences without any past training of datasets. It is used as a process to find meaningful data structure, underlying pattern processes, generative the additional features,andgroupings of data. Categorization of the data sets into a number of groups such that similar data are in the same groups and dissimilar data sets are in other groups. Fig-3 Clustering the data 2.4 RETRIEVING THE DATA The data retrieval is the process ofidentifyingand extracting data from a database. Based on a query provided by the user or application the data should be retrieve fromthedatabase. In our project all the data are stored in binary encoded format. So, First we decoded the data and then view the data based on query. Base 64 is an decoding scheme method that converts text data into binary data format so that decoded binary data can be easily transported over network. The candidate data will be segregated, after the result uploaded by the admin. The segregated data can be view under four categories such as Listening, Reading, Writing andSpeaking. The recruiter choose atleast any one of the field or all the four fields for segregating the candidate results. This segregation method is very useful forrecruitertoshortlistor select the eligible candidate easily. For safe and security purpose this encryption and decryption method is very useful. Fig-4 Retrieving the Data
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3230 3. SYSTEM TECHNIQUES The Software Development Lifecycle is very helpful for the completion of software development and implementation. This process also helpful for developing a complex software applications. SDLC is a process followed by the organization for developing a software project, only by software organization. SDLC contains detail plan for developing, maintaining, testing, updating, replacing and altering or enhancing the specific software.This lifecyclefordeveloping a software defines a various ideas for improving the quality of software product and the overall development of project. The major concepts of this document is to present a complete process of the Web application system. This document is useful for both the stakeholders and the developers. 3.1 SYSTEM ARCHITECTURE Fig-5:Architecture Diagram 4. HARDWARE REQUIREMENTS  Processor : i3/i4  System : Pentium Dual-Core  Hard disk : 120 GB and Above  RAM : 2 GB and Above 4.1 SOFTWARE REQUIREMENTS  Operating System : Windows  Front end : Core Java,CSS, JSP,Servlet  Web application : J2EE,Hibernate  Back end : MySQL 5.1  Tool : Eclipse 4.2 FUNCTIONAL REQUIREMENTS Functional requirementdefinesasa specificationof behavior between output and input in system and software engineering. Based on that requirement engineering, functional requirementsdescribingthe particularresults ofa system. Some of the more typical functional requirements include business rules, authentication, authorization, legal requirements etc; 4.3 NON FUNCTIONAL REQUIREMENTS Non-functional requirements define how the system works, but in functional requirements.It describe what the system should do. Non-functional requirements mainly focused on the quality attributes of a system. They specify criteria that judge the operation of a system, rather than specific behavior such as performance, scalability, availability, maintainability, reliability, data integrity, security etc; 5. INPUT  The user must create the account for login. All the user details have been stored the data in our database for future purpose.  The user view the exam schedule and book the date for attending the test and upload the location and timing also.  The admin verify the candidate details and then approve/deny based on their application.  The admin upload the candidate result. 5.1 OUTPUT  The Application owner can show the user details and it can validate some sensitive information details.  The user can also get their admit card, acknowledgement for enrollment and result from the admin side.  In this section recruiters/user can give theinputfor segregating the result and get the output from the admin side based on the user query.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3231 6. SNAPSHOT Fig-6: Home page Fig-7: Login page Fig-8: Candidate Enrollement Fig-9: Booking for Test Fig-10: Institute Details Fig-11: Upload the result Fig-12: Result Segregation Fig-13: Segregated Result
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3232 7. ADVANTAGES The scope of this project stores the data is secured and fast in performance and enhances storage capability.Moreover, we use binary code conversion to reduce the more memory consumption. BMVC techniques to increase the fast optimization of the data viewing and analysis.When we use BMVC, it give exact and accurate of information more than the other clustering methods. Encoding ofdata isveryhelpfu for safe and security purpose. 8. APPLICATION The company recruiters want to select or shorlisted the candidate based on there score. Admin uploadthecandidate result under four category such as Listening, Speaking, Reading and Writing. After the completion of the uploading the result clustering and segregationprocesstobedone.The user can also view the result login through with there respective use account. Finally, the recruiters segregate the candidate based on there needs. 9. FUTURE ENHANCEMENT What's more, presenting the encoded bunching procedure and improvement strategies were joint together and increment the compelling calculation in the bigger datasets. Later on, further encourage the presentation, we intend to explore the administered and profound augmentation of encoding in-see portrayal by theAIsystem.IntheAImethod, the profound learning framework is utilized for directed learning of the system. Be that as it may, it executes a profound neural system to use the accessible name. 10. CONCLUSION In this paper, a principled Binary Multi-View Clustering (BMVC) method, was proposed for solving the challenging problem of multi-view clustering on large-scale image data. In BMVC, the collaborative discrete representations and binary cluster structures were jointly learned, which could effectively integrate the collaborative information from multiple views. Moreover, an effective alternating optimization algorithm with guaranteed convergence was proposed to ensure the high-quality binary solutions. 11. REFERENCES [1] A Survey on Learning to Hash, J. Wang, T. Zhang,02 May 2017, https://www.microsoft.com/en-us/research/wp- content/uploads/2017/01/LTHSurvey.pdf [2] Binary Multi View Clustering, Zheng Zhang, Ling Shao ,July 2019,https://ieeexplore.ieee.org/document/8387526 [3] Compressed K-Means for Large-ScaleClustering,X.Chen, W.Liu.,2017, https://www.semanticscholar.org/paper/Compressed-K- Means-for-Large-Scale-Clustering-Shen- Liu/93c03ff9421c49b74c234d6486e8884b6d744b54 [4] Fast K-Means with Accurate Bounds,J. Newling, F. Fleuret,Sep 2016, https://arxiv.org/pdf/1602.02514.pdf [5] Learning Short Binary Codes for Large-scale Image Retrieval, Li Liu, Mengyang Yu.,11 January 2017, https://www.freeprojectsforall.com/wp- content/uploads/2018/09/Learning-Short-Binary-Codes- for-Large-scale-Image-Retrieval.pdf [6] Multiview Alignment Hashing for EfficientImageSearch, Mengyang Yu,12 January 2015, https://ieeexplore.ieee.org/abstract/document/7006770 [7] Multi-View Clustering via Joint Non-negative Matrix Factorization,JialuLiu , Chi Wang , Jing Gao, and Jiawei Han,May-2013, https://www.researchgate.net/publication/279953559 Multi_View_Clustering_via_Joint_Nonnegative_Matrix_Factori zation [8] Unsupervised Deep Hashing with Similarity-Adaptive and Discrete Optimization,FuminShen, YanXu,Yang Yang,05 January-2018, https://ieeexplore.ieee.org/abstract/document/8247210 .