SlideShare a Scribd company logo
International Journal of Modern Engineering Research (IJMER)
              www.ijmer.com                   Vol.2, Issue.4, July-Aug 2012 pp-1955-1957        ISSN: 2249-6645

         Protection of Privacy in Distributed Databases using Clustering
                                      Ganesh P.1, KamalRaj R2, Dr. Karthik S.3
                         1,2,3
                                 Department of Computer Science EngineeringSNS College of Technology


Abstract: Clustering is the technique which discovers              partitions of data, to obtain a representative subset of each
groups over huge amount of data, based on similarities,            local dataset. In the sequence these representative subsets
regardless of their structure (multi-dimensional or two            are sent to a central site, which performs a fusion of the
dimensional). We applied an algorithm (DSOM) to cluster            results and applies SOM and K-means algorithms to obtain
distributed datasets, based on self-organizing maps (SOM)          the final result.
and extends this approach presenting a strategy for efficient         The remainder of the article is organized as follows:
cluster analysis in distributed databases using SOM and K-         section 2 presents a brief review about distributed data
means. The proposed strategy applies SOM algorithm                 clustering algorithms and section 3 describes the main
separately in each distributed dataset, relative to database       aspects of the SOM. The proposed algorithm is presented in
horizontal partitions, to obtain a representative subset of        section 4 describes the methodology. Finally, section 5
each local dataset. In the sequence, these representative          presents conclusions and future research directions.
subsets are sent to a central site, which performs a fusion of
the partial results and applies SOM and K-means algorithms                      II.    Bibliography Review
to obtain a final result.                                                    Cluster analysis algorithms groups data based on
                                                                   the similarities between patterns. The complexity of cluster
                   I.     Introduction                             analysis process increases with data cardinality and
           In the recent years, there has been an increasing of    dimensionality. Cardinality :-(N, the number of objects in
data volume in organizations, due to many factors such as          a database) and dimensionality:- (p, the number of
the automation of the data acquisition and reduced storage         attributes).Clustering methods range from those that are
costs. For that reason, there has been also a growing interest     Largely heuristic method to statistic method. Several
in computational algorithms that can be used to extracting         algorithms have been developed based on different
relevant information from recorded data.                           strategies, including hierarchical clustering, vector
          Data mining is the process of applying various           quantization, graph theory, fuzzy logic, neural networks and
methods and techniques to databases, with the objective of         others. A recent survey of cluster analysis algorithms is
extract information hidden in large amounts of data. A             presented in Xu and Wunsch [1].
frequently used method is cluster analysis, which can be                     Searching clusters in high-dimensional databases is
defined as the process of partition data into a certain number     a non trivial task. Some common algorithms, such as
of clusters (or groups) of similar objects, where each group       traditional agglomerative hierarchical methods, are
consists of similar objects amongst themselves (internal           improper to large datasets. The increase in the number of
homogeneity) and different from the objects of the other           attributes of each entrance does not just influence negatively
groups (external heterogeneity), i.e., patterns in the same        in the time of processing of the algorithm, as well as it
cluster should be similar to each other, while patterns in         hinders the process of identification of the clusters. An
different clusters should not [1].                                 alternative approach is divide database into partitions and to
          More formally, given a set of N input patterns:          perform data clustering each one
X = {x1, …, xN}, where each xj = (xj1, …, xjp) represents          separately.
a p-dimensional vector and each measure xji represents a               Some current applications have so large databases that
attribute (or variable) from dataset, a clustering process         are not possible to maintain them integrally in the main
attempts to seek a K partition of X, denoted by C = {C1, …,        memory, even using robust machines. Kantardzic[2] points
CK}, (K <= N). Artificial neural networks are an important         three approaches to solve that problem:
computational tool with strong inspiration neurobiological
and widely used in the solution of complex problems, which            a) The data are stored in secondary memory and     data
cannot be handled with traditional algorithmic solutions           subsets are clustered separately. A subsequent stage is
[13]. Applications for RNA include pattern recognition,            needed to merge results;
signal analysis and processing, analysis tasks, diagnosis and         b) Usage of an incremental grouping algorithm. Each
prognostic, data classification and clustering.                    element is individually stored in the main memory and
          In some works, they presented a simple and               associated to one of the existent groups or allocated in a
efficient algorithm to cluster distributed datasets, based on      new group;
multiples parallel SOM, denominated partSOM [5]. The                  c) Usage of a parallel implementation. Several
algorithm is particularly interesting in situations where the      algorithms work simultaneously on the stored data.
data volume is very large or when data privacy and security
policies forbid data consolidation into a single location.             Two approaches are usually used to partition dataset: the
          This work extends this approach presenting a             first, and more usual, is to divide horizontally the database,
strategy for efficient cluster analysis in distributed databases   creating homogeneous subsets of the data. Each algorithm
using SOM and K-means. The strategy is to apply SOM                operates on the same attributes. Another approach is to
algorithm separately in each distributed dataset, horizontal       divide horizontally the database, creating heterogeneous

                                                     www.ijmer.com                                                1955 | P a g e
International Journal of Modern Engineering Research (IJMER)
               www.ijmer.com                Vol.2, Issue.4, July-Aug 2012 pp-1955-1957             ISSN: 2249-6645
data subsets. In this case, each algorithm operates on the         projections and 2D and 3D surface plots of distance
same registrations, but handle on different sets of attributes.    matrices. The U-matrix method [17] enables visualization of
          Some recent works about distributed data                 the topological relations of the neurons in an organized
clustering include Forman and Zhang [3] that describes a           SOM. A gradient image (2D) or a surface plot is generated
technique to parallels several algorithms in order to obtain       by computing distances between adjacent neurons. High
larger efficiency in data mining process of multiple               values in the U-matrix encode dissimilarities between
distributed databases. Authors reinforce the concern need in       neurons and correspond to cluster borders. Strategies for
relation to reducing communication                                 cluster detection using U-matrix were proposed by Costa
          Several organizations maintain geographically            and Netto [16]. The algorithms were developed for
distributed databases as a form of increasing the safety of        automatic partitioning and labeling of a trained SOM
their information. In that way, if safety policies fail, the       network. The result is a segmented SOM output with
invader has just access to a part of the existent information.     regions of neurons describing the data clusters.
Vaidya and Clifton [18] approaches vertically partitioned
databases using a distributed K-means algorithm.                               IV.      Proposed Methodology
Jagannathan et al. [11] present a variant of K-means                         Distributed clustering algorithms usually work in
algorithm to clustering horizontally partitioned databases.        two stages. Initially, the data are analyzed locally, in each
Oliveira and Zaïane [9] proposed a spatial data                    unit that is part of the distributed database. In a second
transformation method to protecting attributes values when         stage, a central instance gathers partial results and combines
sharing data for clustering, called RBT, that and is               them into an overall result.
independent of any clustering algorithm.                                     This section presents a strategy for clustering
          In databases with a large number of attributes,          similar objects located in distributed databases, using
another approach sometimes used is to accomplish the               parallel self-organizing maps and K-means algorithm. The
analysis considering only a subset of the attributes, instead      process is divided in three stages.
of considering all of them. An obvious difficulty of this            a) Traditional SOM algorithm is applied locally in each
approach is to identify which attributes are more important        one of the distributed bases, in order to elect a
in the process of clusters identification. Some papers related     representative subset from input data;
with this approach have frequently used statistical methods          b) Traditional SOM is applied again, this time to the
as Principal Components Analysis (PCA) and Factor                  representatives of each one of the distributed        bases that
Analysis to treat this problem. Kargupta et al. [10] presented     are unified in a central unit;
a PCA-based technique denominated Collective Principal               c) K-means algorithm is applied over trained self-
Component Analysis (CPCA) for cluster analysis of high-            organizing map, to create a definitive result.
dimensional heterogeneous distributed databases. The
authors demonstrated concern in reducing data transfers                The proposed algorithm, consisting of six steps: step 1
taxes among distributed sites.                                     applies local clustering in each local dataset (horizontal
          Other works consider the possibility to partition        parties from the database) using traditional SOM. Thus, the
attributes in subsets, but considering each one of them in         algorithm is applied to an attribute subset in each of the
data mining process. This is of particular interest for the        remote units, obtaining a reference vector from each data
maintenance of whole characteristics present in initial            subset. This reference vector, known as the codebook, is the
dataset. He et al. [12] analyzed the influence of data types in    self-organizing map trained.
clustering process and presented a strategy that divided the                 In step 2, a projection is made of the input data on
attributes in two subsets, one with the numerical attributes       the map in the previous stage, in each local unit. Each input
and other with the categorical ones. Subsequently, they            is presented to the trained map and the index corresponding
propose to cluster separately of each one of the subsets,          to the closest vector (BMU) present in the codebook is
using appropriate algorithms for each one of the types. The        stored in an index vector. So, a data index is created based
cluster results were combined in a new database, which was         on representative objects instead of original objects. Despite
again submitted to a clustering algorithm for categorical          the difference from the original dataset, representative
data.                                                              objects in the index vector are very similar to the original
                                                                   data, since maintenance of data topology is an important
             III.     Self-Organizing Map                          characteristic of the SOM.
          The self-organizing feature map (SOM) has been            In step 3, each remote unit sends its index and reference
widely used as a tool for visualization of high-dimensional        vector to the central unit, which is responsible for unifying
data. Important features include information compression           all partial results. An additional advantage of the proposed
while preserving topological and metric relationship of the        algorithm is that the amount of transferred data is
primary data items [14]. SOM is composed of two layers of          considerately reduced, since index vectors have only one
neurons, input and output layers. A neighbouring relation          column (containing an integer value) and the codebook is
with neurons defines the topology of the map. Training is          usually mush less than the original data. So, reducing data
similar to neural competitive learning, but the best match         transfer and communication overload are considered by the
unit (c or BMU) is updated as well as they neighbors. Each         proposed algorithm.
input is mapped to a BMU, which has weight vectors                             Step 4 is responsible for receiving the index
most similar to the presented data.                                vector and the codebook from each local unit and
          A number of methods for visualizing data relations       combining partial results to remount a database based on
in a trained SOM have been proposed [17], such as multiple         received data. To remount each dataset, index vector
views of component planes, mesh visualization using                indexes are substituted by the equivalent value in the

                                                    www.ijmer.com                                                  1956 | P a g e
International Journal of Modern Engineering Research (IJMER)
               www.ijmer.com               Vol.2, Issue.4, July-Aug 2012 pp-1955-1957               ISSN: 2249-6645
codebook. Datasets are combined juxtaposing partial                     New      Privacy-Preserving       Distributed  k-Clustering
datasets; however, it is important to ensure that objects are           Algorithm”, In: Proceedings of the 2006 SIAM
in the same order as that of the original datasets. Note that           International Conference on Data Mining (SDM), 2006.
the new database is slightly different from the original data,    [12] Z. He, X. Xu and S. Deng, “Clustering Mixed Numeric and
                                                                        Categorical Data: A Cluster Ensemble Approach”,
but data topology is maintained.                                        Technical                                           Report,
          In step 5, the SOM algorithm is again applied over            http://aps.arxiv.org/ftp/cs/papers/0509/0509011.pdf, 2005.
the complete database obtained in step 4. The expectation is      [13] S. Haykin, “Neural networks: A comprehensive
that the results obtained in that stage can be generalized as           foundation”, 2nd ed., N. York: Macmillan College
being equivalent to the clustering process of the entire                Publishing Company, 1999.
database. The data obtained after the step 4 and that will        [14] T. Kohonen, Self-Organizing Maps, 3rd ed., New York:
serve as input in stage 5 correspond to values close to the             Springer-Verlag, 2001.
original, because vectors correspondents in codebook are          [15] J. Vesanto, “Using SOM in Data Mining”, Licentiate's
representatives of input dataset.                                       Thesis, Department of Computer Science and Engineering,
                                                                        Helsinki University of Technology, Espoo, Finland, 2000
          In step 6, K-means algorithm is applied over the        [16] J. A. F. Costa and M. L. de Andrade Netto, “Clustering of
final trained map, in order to improve the quality of the               complex shaped data sets via Kohonen maps and
visualization results.                                                  mathematical morphology”. In: Proceedings of the SPIE,
                                                                          Data Mining and Knowledge Discovery. B. Dasarathy
                   V.      Conclusion                                     (Ed.), Vol. 4384, 2001, pp. 16-27.
         Self-organizing map is neural network concept,            [17]   A. Ultsch, “Self-Organizing Neural Networks for
unsupervised learning strategy, has been widely used in                   Visualization and Classification”, In: O. Opitz et al. (Eds).
clustering applications. However, SOM approach is                         Information and Classification, Springer Berlin, 1993,
normally applied to single and local datasets. In one of the              pp.301-306.
research work, they introduced partSOM, an efficient               [18]   J. Vaidya and C. Clifton, “Privacy-preserving k-means
strategy SOM-based to perform distributed data clustering                 clustering over vertically partitioned data”. In: Proc. of the
                                                                          Ninth ACM SIGKDD Intl. Conf. on Knowledge Discovery
on geographically distributed databases.
                                                                          and Data Mining, New York, 2003,pp.206-215.
         However, SOM and partSOM approaches have
some limitations for presenting results. In this work we join
partSOM strategy with an alternative approach for cluster
detection using K-means algorithm.
                         References
[1]    R. Xu and D. Wunsch II. “Survey of Clustering
       Algorithms”, IEEE Trans. on Neural Networks, Vol.16,
       Iss.3, May 2005, pp. 645-678.
[2]    M. Kantardzic, Data Mining: Concepts, Models, Methods,
       and Algorithms, IEEE Press, 2003.
[3]    G. Forman and B. Zhang, “Distributed data clustering can
       be efficient and exact”. SIGKDD Explor. Newsl. 2, Dec.
       2000, pp 34-38.
[4]    Chak-Man Lam, Xiao-Feng Zhang and W. K. Cheung,
       “Mining Local Data Sources for Learning Global Cluster
       Models”, Web Intelligence, Proceedings IEEE/WIC/ACM
       International Conference on WI 2004, Iss. 20-24, Sept.
       2004, pp. 748-751.
[5]    F. L. Gorgônio and J. A. F. Costa, “Parallel Self-
       Organizing Maps with Applications in Clustering
       Distributed Data”, International Joint Conference on
       Neural Networks (IJCNN’2008), (Accepted).
[6]    A. Asuncion and D.J. Newman. UCI Machine Learning
       Repository,availableathttp://www.ics.uci.edu/~mlearn/ML
       Repository.html, Irvine, CA, 2007.
[7]    J. C. Silva and M. Klusch, “Inference in distributed data
       clustering”, Engineering Applications of Artificial
       Intelligence, vol. 19, 2006, pp. 363-369.
[8]    P. Berkhin, “A Survey of Clustering Data Mining
       Techniques”, In: J. Kogan et al., Grouping
       Multidimensional Data: Recent Advances in Clustering,
       New York: Springer- Verlag, 2006.
[9]    S. R. M. Oliveira and O. R. Zaïane, “Privacy Preservation
       When Sharing Data For Clustering”, In: Proceedings of the
       International Workshop on Secure Data Management in a
       Connected World, 2004.
[10]   H. Kargupta, W. Huang, K. Sivakumar and E. Johnson,
       “Distributed Clustering Using Collective Principal
       Component Analysis”, Knowledge and Information
       Systems Journal, Vol. 3, Num. 4, May 2001, pp. 422-448.
[11]   G. Jagannathan, K. Pillaipakkamnatt and R. N. Wright,“A

                                                    www.ijmer.com                                                      1957 | P a g e

More Related Content

What's hot

B colouring
B colouringB colouring
B colouringxs76250
 
A new link based approach for categorical data clustering
A new link based approach for categorical data clusteringA new link based approach for categorical data clustering
A new link based approach for categorical data clustering
International Journal of Science and Research (IJSR)
 
SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONS
SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONSSVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONS
SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONS
ijscmcj
 
K Means Clustering Algorithm for Partitioning Data Sets Evaluated From Horizo...
K Means Clustering Algorithm for Partitioning Data Sets Evaluated From Horizo...K Means Clustering Algorithm for Partitioning Data Sets Evaluated From Horizo...
K Means Clustering Algorithm for Partitioning Data Sets Evaluated From Horizo...
IOSR Journals
 
Ensemble based Distributed K-Modes Clustering
Ensemble based Distributed K-Modes ClusteringEnsemble based Distributed K-Modes Clustering
Ensemble based Distributed K-Modes Clustering
IJERD Editor
 
A0360109
A0360109A0360109
A0360109
iosrjournals
 
Cray HPC + D + A = HPDA
Cray HPC + D + A = HPDACray HPC + D + A = HPDA
Cray HPC + D + A = HPDA
inside-BigData.com
 
Data clustering using map reduce
Data clustering using map reduceData clustering using map reduce
Data clustering using map reduce
Varad Meru
 
An Efficient Clustering Method for Aggregation on Data Fragments
An Efficient Clustering Method for Aggregation on Data FragmentsAn Efficient Clustering Method for Aggregation on Data Fragments
An Efficient Clustering Method for Aggregation on Data Fragments
IJMER
 
A Novel Multi- Viewpoint based Similarity Measure for Document Clustering
A Novel Multi- Viewpoint based Similarity Measure for Document ClusteringA Novel Multi- Viewpoint based Similarity Measure for Document Clustering
A Novel Multi- Viewpoint based Similarity Measure for Document Clustering
IJMER
 
A fuzzy clustering algorithm for high dimensional streaming data
A fuzzy clustering algorithm for high dimensional streaming dataA fuzzy clustering algorithm for high dimensional streaming data
A fuzzy clustering algorithm for high dimensional streaming data
Alexander Decker
 
Dp33701704
Dp33701704Dp33701704
Dp33701704
IJERA Editor
 
Improved K-mean Clustering Algorithm for Prediction Analysis using Classifica...
Improved K-mean Clustering Algorithm for Prediction Analysis using Classifica...Improved K-mean Clustering Algorithm for Prediction Analysis using Classifica...
Improved K-mean Clustering Algorithm for Prediction Analysis using Classifica...
IJCSIS Research Publications
 
A0310112
A0310112A0310112
A0310112
iosrjournals
 
Az36311316
Az36311316Az36311316
Az36311316
IJERA Editor
 
Feature Subset Selection for High Dimensional Data Using Clustering Techniques
Feature Subset Selection for High Dimensional Data Using Clustering TechniquesFeature Subset Selection for High Dimensional Data Using Clustering Techniques
Feature Subset Selection for High Dimensional Data Using Clustering Techniques
IRJET Journal
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 

What's hot (17)

B colouring
B colouringB colouring
B colouring
 
A new link based approach for categorical data clustering
A new link based approach for categorical data clusteringA new link based approach for categorical data clustering
A new link based approach for categorical data clustering
 
SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONS
SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONSSVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONS
SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONS
 
K Means Clustering Algorithm for Partitioning Data Sets Evaluated From Horizo...
K Means Clustering Algorithm for Partitioning Data Sets Evaluated From Horizo...K Means Clustering Algorithm for Partitioning Data Sets Evaluated From Horizo...
K Means Clustering Algorithm for Partitioning Data Sets Evaluated From Horizo...
 
Ensemble based Distributed K-Modes Clustering
Ensemble based Distributed K-Modes ClusteringEnsemble based Distributed K-Modes Clustering
Ensemble based Distributed K-Modes Clustering
 
A0360109
A0360109A0360109
A0360109
 
Cray HPC + D + A = HPDA
Cray HPC + D + A = HPDACray HPC + D + A = HPDA
Cray HPC + D + A = HPDA
 
Data clustering using map reduce
Data clustering using map reduceData clustering using map reduce
Data clustering using map reduce
 
An Efficient Clustering Method for Aggregation on Data Fragments
An Efficient Clustering Method for Aggregation on Data FragmentsAn Efficient Clustering Method for Aggregation on Data Fragments
An Efficient Clustering Method for Aggregation on Data Fragments
 
A Novel Multi- Viewpoint based Similarity Measure for Document Clustering
A Novel Multi- Viewpoint based Similarity Measure for Document ClusteringA Novel Multi- Viewpoint based Similarity Measure for Document Clustering
A Novel Multi- Viewpoint based Similarity Measure for Document Clustering
 
A fuzzy clustering algorithm for high dimensional streaming data
A fuzzy clustering algorithm for high dimensional streaming dataA fuzzy clustering algorithm for high dimensional streaming data
A fuzzy clustering algorithm for high dimensional streaming data
 
Dp33701704
Dp33701704Dp33701704
Dp33701704
 
Improved K-mean Clustering Algorithm for Prediction Analysis using Classifica...
Improved K-mean Clustering Algorithm for Prediction Analysis using Classifica...Improved K-mean Clustering Algorithm for Prediction Analysis using Classifica...
Improved K-mean Clustering Algorithm for Prediction Analysis using Classifica...
 
A0310112
A0310112A0310112
A0310112
 
Az36311316
Az36311316Az36311316
Az36311316
 
Feature Subset Selection for High Dimensional Data Using Clustering Techniques
Feature Subset Selection for High Dimensional Data Using Clustering TechniquesFeature Subset Selection for High Dimensional Data Using Clustering Techniques
Feature Subset Selection for High Dimensional Data Using Clustering Techniques
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 

Viewers also liked

The everlasting gospel
The everlasting gospelThe everlasting gospel
The everlasting gospelRobert Taylor
 
How to get over your networking fears part 2
How to get over your networking fears part 2How to get over your networking fears part 2
How to get over your networking fears part 2denise2228
 
Ag2418141818
Ag2418141818Ag2418141818
Ag2418141818IJMER
 
Writing for pr #3
Writing for pr #3Writing for pr #3
Writing for pr #3Dicky Ahmad
 
Ay2419471950
Ay2419471950Ay2419471950
Ay2419471950IJMER
 
Bc2419681971
Bc2419681971Bc2419681971
Bc2419681971IJMER
 
My adventure with WebSockets
My adventure with WebSocketsMy adventure with WebSockets
My adventure with WebSockets
Michiel De Mey
 
Influence of Mineralogy and Fabric on the Engineering Properties of the Miang...
Influence of Mineralogy and Fabric on the Engineering Properties of the Miang...Influence of Mineralogy and Fabric on the Engineering Properties of the Miang...
Influence of Mineralogy and Fabric on the Engineering Properties of the Miang...
IJMER
 
F04011 04 4348
F04011 04 4348F04011 04 4348
F04011 04 4348IJMER
 
Measurement Of Rn222 Concentrations In The Air Of Peshraw & Darbandikhan Tu...
Measurement Of Rn222  Concentrations In The Air Of Peshraw &  Darbandikhan Tu...Measurement Of Rn222  Concentrations In The Air Of Peshraw &  Darbandikhan Tu...
Measurement Of Rn222 Concentrations In The Air Of Peshraw & Darbandikhan Tu...
IJMER
 
Improvement of Surface Roughness of Nickel Alloy Specimen by Removing Recast ...
Improvement of Surface Roughness of Nickel Alloy Specimen by Removing Recast ...Improvement of Surface Roughness of Nickel Alloy Specimen by Removing Recast ...
Improvement of Surface Roughness of Nickel Alloy Specimen by Removing Recast ...
IJMER
 
Marketing a small business
Marketing a small businessMarketing a small business
Marketing a small businessdenise2228
 
On ranges and null spaces of a special type of operator named 𝝀 − 𝒋𝒆𝒄𝒕𝒊𝒐𝒏. – ...
On ranges and null spaces of a special type of operator named 𝝀 − 𝒋𝒆𝒄𝒕𝒊𝒐𝒏. – ...On ranges and null spaces of a special type of operator named 𝝀 − 𝒋𝒆𝒄𝒕𝒊𝒐𝒏. – ...
On ranges and null spaces of a special type of operator named 𝝀 − 𝒋𝒆𝒄𝒕𝒊𝒐𝒏. – ...
IJMER
 
A Survey of User Authentication Schemes for Mobile Device
A Survey of User Authentication Schemes for Mobile DeviceA Survey of User Authentication Schemes for Mobile Device
A Survey of User Authentication Schemes for Mobile Device
IJMER
 
Die younger
Die youngerDie younger
Die youngeruca51
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
IJMER
 
Digital foot print
Digital foot printDigital foot print
Digital foot printeringolden24
 
Do2644844490
Do2644844490Do2644844490
Do2644844490IJMER
 
A Novel Approach To Answer Continuous Aggregation Queries Using Data Aggregat...
A Novel Approach To Answer Continuous Aggregation Queries Using Data Aggregat...A Novel Approach To Answer Continuous Aggregation Queries Using Data Aggregat...
A Novel Approach To Answer Continuous Aggregation Queries Using Data Aggregat...
IJMER
 
How to improve cash flow
How to improve cash flowHow to improve cash flow
How to improve cash flowdenise2228
 

Viewers also liked (20)

The everlasting gospel
The everlasting gospelThe everlasting gospel
The everlasting gospel
 
How to get over your networking fears part 2
How to get over your networking fears part 2How to get over your networking fears part 2
How to get over your networking fears part 2
 
Ag2418141818
Ag2418141818Ag2418141818
Ag2418141818
 
Writing for pr #3
Writing for pr #3Writing for pr #3
Writing for pr #3
 
Ay2419471950
Ay2419471950Ay2419471950
Ay2419471950
 
Bc2419681971
Bc2419681971Bc2419681971
Bc2419681971
 
My adventure with WebSockets
My adventure with WebSocketsMy adventure with WebSockets
My adventure with WebSockets
 
Influence of Mineralogy and Fabric on the Engineering Properties of the Miang...
Influence of Mineralogy and Fabric on the Engineering Properties of the Miang...Influence of Mineralogy and Fabric on the Engineering Properties of the Miang...
Influence of Mineralogy and Fabric on the Engineering Properties of the Miang...
 
F04011 04 4348
F04011 04 4348F04011 04 4348
F04011 04 4348
 
Measurement Of Rn222 Concentrations In The Air Of Peshraw & Darbandikhan Tu...
Measurement Of Rn222  Concentrations In The Air Of Peshraw &  Darbandikhan Tu...Measurement Of Rn222  Concentrations In The Air Of Peshraw &  Darbandikhan Tu...
Measurement Of Rn222 Concentrations In The Air Of Peshraw & Darbandikhan Tu...
 
Improvement of Surface Roughness of Nickel Alloy Specimen by Removing Recast ...
Improvement of Surface Roughness of Nickel Alloy Specimen by Removing Recast ...Improvement of Surface Roughness of Nickel Alloy Specimen by Removing Recast ...
Improvement of Surface Roughness of Nickel Alloy Specimen by Removing Recast ...
 
Marketing a small business
Marketing a small businessMarketing a small business
Marketing a small business
 
On ranges and null spaces of a special type of operator named 𝝀 − 𝒋𝒆𝒄𝒕𝒊𝒐𝒏. – ...
On ranges and null spaces of a special type of operator named 𝝀 − 𝒋𝒆𝒄𝒕𝒊𝒐𝒏. – ...On ranges and null spaces of a special type of operator named 𝝀 − 𝒋𝒆𝒄𝒕𝒊𝒐𝒏. – ...
On ranges and null spaces of a special type of operator named 𝝀 − 𝒋𝒆𝒄𝒕𝒊𝒐𝒏. – ...
 
A Survey of User Authentication Schemes for Mobile Device
A Survey of User Authentication Schemes for Mobile DeviceA Survey of User Authentication Schemes for Mobile Device
A Survey of User Authentication Schemes for Mobile Device
 
Die younger
Die youngerDie younger
Die younger
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Digital foot print
Digital foot printDigital foot print
Digital foot print
 
Do2644844490
Do2644844490Do2644844490
Do2644844490
 
A Novel Approach To Answer Continuous Aggregation Queries Using Data Aggregat...
A Novel Approach To Answer Continuous Aggregation Queries Using Data Aggregat...A Novel Approach To Answer Continuous Aggregation Queries Using Data Aggregat...
A Novel Approach To Answer Continuous Aggregation Queries Using Data Aggregat...
 
How to improve cash flow
How to improve cash flowHow to improve cash flow
How to improve cash flow
 

Similar to Ba2419551957

A SURVEY ON OPTIMIZATION APPROACHES TO TEXT DOCUMENT CLUSTERING
A SURVEY ON OPTIMIZATION APPROACHES TO TEXT DOCUMENT CLUSTERINGA SURVEY ON OPTIMIZATION APPROACHES TO TEXT DOCUMENT CLUSTERING
A SURVEY ON OPTIMIZATION APPROACHES TO TEXT DOCUMENT CLUSTERING
ijcsa
 
Paper id 26201478
Paper id 26201478Paper id 26201478
Paper id 26201478
IJRAT
 
SCAF – AN EFFECTIVE APPROACH TO CLASSIFY SUBSPACE CLUSTERING ALGORITHMS
SCAF – AN EFFECTIVE APPROACH TO CLASSIFY SUBSPACE CLUSTERING ALGORITHMSSCAF – AN EFFECTIVE APPROACH TO CLASSIFY SUBSPACE CLUSTERING ALGORITHMS
SCAF – AN EFFECTIVE APPROACH TO CLASSIFY SUBSPACE CLUSTERING ALGORITHMS
ijdkp
 
F04463437
F04463437F04463437
F04463437
IOSR-JEN
 
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
acijjournal
 
A Novel Approach for Clustering Big Data based on MapReduce
A Novel Approach for Clustering Big Data based on MapReduce A Novel Approach for Clustering Big Data based on MapReduce
A Novel Approach for Clustering Big Data based on MapReduce
IJECEIAES
 
A Review of Various Clustering Techniques
A Review of Various Clustering TechniquesA Review of Various Clustering Techniques
A Review of Various Clustering Techniques
IJEACS
 
A Comparative Study Of Various Clustering Algorithms In Data Mining
A Comparative Study Of Various Clustering Algorithms In Data MiningA Comparative Study Of Various Clustering Algorithms In Data Mining
A Comparative Study Of Various Clustering Algorithms In Data Mining
Natasha Grant
 
A frame work for clustering time evolving data
A frame work for clustering time evolving dataA frame work for clustering time evolving data
A frame work for clustering time evolving dataiaemedu
 
A PSO-Based Subtractive Data Clustering Algorithm
A PSO-Based Subtractive Data Clustering AlgorithmA PSO-Based Subtractive Data Clustering Algorithm
A PSO-Based Subtractive Data Clustering Algorithm
IJORCS
 
Similarity distance measures
Similarity  distance measuresSimilarity  distance measures
Similarity distance measures
thilagasna
 
K044055762
K044055762K044055762
K044055762
IJERA Editor
 
The improved k means with particle swarm optimization
The improved k means with particle swarm optimizationThe improved k means with particle swarm optimization
The improved k means with particle swarm optimization
Alexander Decker
 
A survey on Efficient Enhanced K-Means Clustering Algorithm
 A survey on Efficient Enhanced K-Means Clustering Algorithm A survey on Efficient Enhanced K-Means Clustering Algorithm
A survey on Efficient Enhanced K-Means Clustering Algorithm
ijsrd.com
 
Survey on classification algorithms for data mining (comparison and evaluation)
Survey on classification algorithms for data mining (comparison and evaluation)Survey on classification algorithms for data mining (comparison and evaluation)
Survey on classification algorithms for data mining (comparison and evaluation)
Alexander Decker
 
Introduction to Multi-Objective Clustering Ensemble
Introduction to Multi-Objective Clustering EnsembleIntroduction to Multi-Objective Clustering Ensemble
Introduction to Multi-Objective Clustering Ensemble
IJSRD
 
Grid computing for load balancing strategies
Grid computing for load balancing strategiesGrid computing for load balancing strategies
Grid computing for load balancing strategies
International Journal of Science and Research (IJSR)
 

Similar to Ba2419551957 (20)

A SURVEY ON OPTIMIZATION APPROACHES TO TEXT DOCUMENT CLUSTERING
A SURVEY ON OPTIMIZATION APPROACHES TO TEXT DOCUMENT CLUSTERINGA SURVEY ON OPTIMIZATION APPROACHES TO TEXT DOCUMENT CLUSTERING
A SURVEY ON OPTIMIZATION APPROACHES TO TEXT DOCUMENT CLUSTERING
 
Paper id 26201478
Paper id 26201478Paper id 26201478
Paper id 26201478
 
SCAF – AN EFFECTIVE APPROACH TO CLASSIFY SUBSPACE CLUSTERING ALGORITHMS
SCAF – AN EFFECTIVE APPROACH TO CLASSIFY SUBSPACE CLUSTERING ALGORITHMSSCAF – AN EFFECTIVE APPROACH TO CLASSIFY SUBSPACE CLUSTERING ALGORITHMS
SCAF – AN EFFECTIVE APPROACH TO CLASSIFY SUBSPACE CLUSTERING ALGORITHMS
 
F04463437
F04463437F04463437
F04463437
 
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
 
A Novel Approach for Clustering Big Data based on MapReduce
A Novel Approach for Clustering Big Data based on MapReduce A Novel Approach for Clustering Big Data based on MapReduce
A Novel Approach for Clustering Big Data based on MapReduce
 
A Review of Various Clustering Techniques
A Review of Various Clustering TechniquesA Review of Various Clustering Techniques
A Review of Various Clustering Techniques
 
A Comparative Study Of Various Clustering Algorithms In Data Mining
A Comparative Study Of Various Clustering Algorithms In Data MiningA Comparative Study Of Various Clustering Algorithms In Data Mining
A Comparative Study Of Various Clustering Algorithms In Data Mining
 
Ir3116271633
Ir3116271633Ir3116271633
Ir3116271633
 
Bl24409420
Bl24409420Bl24409420
Bl24409420
 
A frame work for clustering time evolving data
A frame work for clustering time evolving dataA frame work for clustering time evolving data
A frame work for clustering time evolving data
 
50120130406008
5012013040600850120130406008
50120130406008
 
A PSO-Based Subtractive Data Clustering Algorithm
A PSO-Based Subtractive Data Clustering AlgorithmA PSO-Based Subtractive Data Clustering Algorithm
A PSO-Based Subtractive Data Clustering Algorithm
 
Similarity distance measures
Similarity  distance measuresSimilarity  distance measures
Similarity distance measures
 
K044055762
K044055762K044055762
K044055762
 
The improved k means with particle swarm optimization
The improved k means with particle swarm optimizationThe improved k means with particle swarm optimization
The improved k means with particle swarm optimization
 
A survey on Efficient Enhanced K-Means Clustering Algorithm
 A survey on Efficient Enhanced K-Means Clustering Algorithm A survey on Efficient Enhanced K-Means Clustering Algorithm
A survey on Efficient Enhanced K-Means Clustering Algorithm
 
Survey on classification algorithms for data mining (comparison and evaluation)
Survey on classification algorithms for data mining (comparison and evaluation)Survey on classification algorithms for data mining (comparison and evaluation)
Survey on classification algorithms for data mining (comparison and evaluation)
 
Introduction to Multi-Objective Clustering Ensemble
Introduction to Multi-Objective Clustering EnsembleIntroduction to Multi-Objective Clustering Ensemble
Introduction to Multi-Objective Clustering Ensemble
 
Grid computing for load balancing strategies
Grid computing for load balancing strategiesGrid computing for load balancing strategies
Grid computing for load balancing strategies
 

More from IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
IJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
IJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
IJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
IJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
IJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
IJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
IJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
IJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
IJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
IJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
IJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
IJMER
 
Application of Parabolic Trough Collectorfor Reduction of Pressure Drop in Oi...
Application of Parabolic Trough Collectorfor Reduction of Pressure Drop in Oi...Application of Parabolic Trough Collectorfor Reduction of Pressure Drop in Oi...
Application of Parabolic Trough Collectorfor Reduction of Pressure Drop in Oi...
IJMER
 

More from IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 
Application of Parabolic Trough Collectorfor Reduction of Pressure Drop in Oi...
Application of Parabolic Trough Collectorfor Reduction of Pressure Drop in Oi...Application of Parabolic Trough Collectorfor Reduction of Pressure Drop in Oi...
Application of Parabolic Trough Collectorfor Reduction of Pressure Drop in Oi...
 

Recently uploaded

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 

Recently uploaded (20)

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 

Ba2419551957

  • 1. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.2, Issue.4, July-Aug 2012 pp-1955-1957 ISSN: 2249-6645 Protection of Privacy in Distributed Databases using Clustering Ganesh P.1, KamalRaj R2, Dr. Karthik S.3 1,2,3 Department of Computer Science EngineeringSNS College of Technology Abstract: Clustering is the technique which discovers partitions of data, to obtain a representative subset of each groups over huge amount of data, based on similarities, local dataset. In the sequence these representative subsets regardless of their structure (multi-dimensional or two are sent to a central site, which performs a fusion of the dimensional). We applied an algorithm (DSOM) to cluster results and applies SOM and K-means algorithms to obtain distributed datasets, based on self-organizing maps (SOM) the final result. and extends this approach presenting a strategy for efficient The remainder of the article is organized as follows: cluster analysis in distributed databases using SOM and K- section 2 presents a brief review about distributed data means. The proposed strategy applies SOM algorithm clustering algorithms and section 3 describes the main separately in each distributed dataset, relative to database aspects of the SOM. The proposed algorithm is presented in horizontal partitions, to obtain a representative subset of section 4 describes the methodology. Finally, section 5 each local dataset. In the sequence, these representative presents conclusions and future research directions. subsets are sent to a central site, which performs a fusion of the partial results and applies SOM and K-means algorithms II. Bibliography Review to obtain a final result. Cluster analysis algorithms groups data based on the similarities between patterns. The complexity of cluster I. Introduction analysis process increases with data cardinality and In the recent years, there has been an increasing of dimensionality. Cardinality :-(N, the number of objects in data volume in organizations, due to many factors such as a database) and dimensionality:- (p, the number of the automation of the data acquisition and reduced storage attributes).Clustering methods range from those that are costs. For that reason, there has been also a growing interest Largely heuristic method to statistic method. Several in computational algorithms that can be used to extracting algorithms have been developed based on different relevant information from recorded data. strategies, including hierarchical clustering, vector Data mining is the process of applying various quantization, graph theory, fuzzy logic, neural networks and methods and techniques to databases, with the objective of others. A recent survey of cluster analysis algorithms is extract information hidden in large amounts of data. A presented in Xu and Wunsch [1]. frequently used method is cluster analysis, which can be Searching clusters in high-dimensional databases is defined as the process of partition data into a certain number a non trivial task. Some common algorithms, such as of clusters (or groups) of similar objects, where each group traditional agglomerative hierarchical methods, are consists of similar objects amongst themselves (internal improper to large datasets. The increase in the number of homogeneity) and different from the objects of the other attributes of each entrance does not just influence negatively groups (external heterogeneity), i.e., patterns in the same in the time of processing of the algorithm, as well as it cluster should be similar to each other, while patterns in hinders the process of identification of the clusters. An different clusters should not [1]. alternative approach is divide database into partitions and to More formally, given a set of N input patterns: perform data clustering each one X = {x1, …, xN}, where each xj = (xj1, …, xjp) represents separately. a p-dimensional vector and each measure xji represents a Some current applications have so large databases that attribute (or variable) from dataset, a clustering process are not possible to maintain them integrally in the main attempts to seek a K partition of X, denoted by C = {C1, …, memory, even using robust machines. Kantardzic[2] points CK}, (K <= N). Artificial neural networks are an important three approaches to solve that problem: computational tool with strong inspiration neurobiological and widely used in the solution of complex problems, which a) The data are stored in secondary memory and data cannot be handled with traditional algorithmic solutions subsets are clustered separately. A subsequent stage is [13]. Applications for RNA include pattern recognition, needed to merge results; signal analysis and processing, analysis tasks, diagnosis and b) Usage of an incremental grouping algorithm. Each prognostic, data classification and clustering. element is individually stored in the main memory and In some works, they presented a simple and associated to one of the existent groups or allocated in a efficient algorithm to cluster distributed datasets, based on new group; multiples parallel SOM, denominated partSOM [5]. The c) Usage of a parallel implementation. Several algorithm is particularly interesting in situations where the algorithms work simultaneously on the stored data. data volume is very large or when data privacy and security policies forbid data consolidation into a single location. Two approaches are usually used to partition dataset: the This work extends this approach presenting a first, and more usual, is to divide horizontally the database, strategy for efficient cluster analysis in distributed databases creating homogeneous subsets of the data. Each algorithm using SOM and K-means. The strategy is to apply SOM operates on the same attributes. Another approach is to algorithm separately in each distributed dataset, horizontal divide horizontally the database, creating heterogeneous www.ijmer.com 1955 | P a g e
  • 2. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.2, Issue.4, July-Aug 2012 pp-1955-1957 ISSN: 2249-6645 data subsets. In this case, each algorithm operates on the projections and 2D and 3D surface plots of distance same registrations, but handle on different sets of attributes. matrices. The U-matrix method [17] enables visualization of Some recent works about distributed data the topological relations of the neurons in an organized clustering include Forman and Zhang [3] that describes a SOM. A gradient image (2D) or a surface plot is generated technique to parallels several algorithms in order to obtain by computing distances between adjacent neurons. High larger efficiency in data mining process of multiple values in the U-matrix encode dissimilarities between distributed databases. Authors reinforce the concern need in neurons and correspond to cluster borders. Strategies for relation to reducing communication cluster detection using U-matrix were proposed by Costa Several organizations maintain geographically and Netto [16]. The algorithms were developed for distributed databases as a form of increasing the safety of automatic partitioning and labeling of a trained SOM their information. In that way, if safety policies fail, the network. The result is a segmented SOM output with invader has just access to a part of the existent information. regions of neurons describing the data clusters. Vaidya and Clifton [18] approaches vertically partitioned databases using a distributed K-means algorithm. IV. Proposed Methodology Jagannathan et al. [11] present a variant of K-means Distributed clustering algorithms usually work in algorithm to clustering horizontally partitioned databases. two stages. Initially, the data are analyzed locally, in each Oliveira and Zaïane [9] proposed a spatial data unit that is part of the distributed database. In a second transformation method to protecting attributes values when stage, a central instance gathers partial results and combines sharing data for clustering, called RBT, that and is them into an overall result. independent of any clustering algorithm. This section presents a strategy for clustering In databases with a large number of attributes, similar objects located in distributed databases, using another approach sometimes used is to accomplish the parallel self-organizing maps and K-means algorithm. The analysis considering only a subset of the attributes, instead process is divided in three stages. of considering all of them. An obvious difficulty of this a) Traditional SOM algorithm is applied locally in each approach is to identify which attributes are more important one of the distributed bases, in order to elect a in the process of clusters identification. Some papers related representative subset from input data; with this approach have frequently used statistical methods b) Traditional SOM is applied again, this time to the as Principal Components Analysis (PCA) and Factor representatives of each one of the distributed bases that Analysis to treat this problem. Kargupta et al. [10] presented are unified in a central unit; a PCA-based technique denominated Collective Principal c) K-means algorithm is applied over trained self- Component Analysis (CPCA) for cluster analysis of high- organizing map, to create a definitive result. dimensional heterogeneous distributed databases. The authors demonstrated concern in reducing data transfers The proposed algorithm, consisting of six steps: step 1 taxes among distributed sites. applies local clustering in each local dataset (horizontal Other works consider the possibility to partition parties from the database) using traditional SOM. Thus, the attributes in subsets, but considering each one of them in algorithm is applied to an attribute subset in each of the data mining process. This is of particular interest for the remote units, obtaining a reference vector from each data maintenance of whole characteristics present in initial subset. This reference vector, known as the codebook, is the dataset. He et al. [12] analyzed the influence of data types in self-organizing map trained. clustering process and presented a strategy that divided the In step 2, a projection is made of the input data on attributes in two subsets, one with the numerical attributes the map in the previous stage, in each local unit. Each input and other with the categorical ones. Subsequently, they is presented to the trained map and the index corresponding propose to cluster separately of each one of the subsets, to the closest vector (BMU) present in the codebook is using appropriate algorithms for each one of the types. The stored in an index vector. So, a data index is created based cluster results were combined in a new database, which was on representative objects instead of original objects. Despite again submitted to a clustering algorithm for categorical the difference from the original dataset, representative data. objects in the index vector are very similar to the original data, since maintenance of data topology is an important III. Self-Organizing Map characteristic of the SOM. The self-organizing feature map (SOM) has been In step 3, each remote unit sends its index and reference widely used as a tool for visualization of high-dimensional vector to the central unit, which is responsible for unifying data. Important features include information compression all partial results. An additional advantage of the proposed while preserving topological and metric relationship of the algorithm is that the amount of transferred data is primary data items [14]. SOM is composed of two layers of considerately reduced, since index vectors have only one neurons, input and output layers. A neighbouring relation column (containing an integer value) and the codebook is with neurons defines the topology of the map. Training is usually mush less than the original data. So, reducing data similar to neural competitive learning, but the best match transfer and communication overload are considered by the unit (c or BMU) is updated as well as they neighbors. Each proposed algorithm. input is mapped to a BMU, which has weight vectors Step 4 is responsible for receiving the index most similar to the presented data. vector and the codebook from each local unit and A number of methods for visualizing data relations combining partial results to remount a database based on in a trained SOM have been proposed [17], such as multiple received data. To remount each dataset, index vector views of component planes, mesh visualization using indexes are substituted by the equivalent value in the www.ijmer.com 1956 | P a g e
  • 3. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.2, Issue.4, July-Aug 2012 pp-1955-1957 ISSN: 2249-6645 codebook. Datasets are combined juxtaposing partial New Privacy-Preserving Distributed k-Clustering datasets; however, it is important to ensure that objects are Algorithm”, In: Proceedings of the 2006 SIAM in the same order as that of the original datasets. Note that International Conference on Data Mining (SDM), 2006. the new database is slightly different from the original data, [12] Z. He, X. Xu and S. Deng, “Clustering Mixed Numeric and Categorical Data: A Cluster Ensemble Approach”, but data topology is maintained. Technical Report, In step 5, the SOM algorithm is again applied over http://aps.arxiv.org/ftp/cs/papers/0509/0509011.pdf, 2005. the complete database obtained in step 4. The expectation is [13] S. Haykin, “Neural networks: A comprehensive that the results obtained in that stage can be generalized as foundation”, 2nd ed., N. York: Macmillan College being equivalent to the clustering process of the entire Publishing Company, 1999. database. The data obtained after the step 4 and that will [14] T. Kohonen, Self-Organizing Maps, 3rd ed., New York: serve as input in stage 5 correspond to values close to the Springer-Verlag, 2001. original, because vectors correspondents in codebook are [15] J. Vesanto, “Using SOM in Data Mining”, Licentiate's representatives of input dataset. Thesis, Department of Computer Science and Engineering, Helsinki University of Technology, Espoo, Finland, 2000 In step 6, K-means algorithm is applied over the [16] J. A. F. Costa and M. L. de Andrade Netto, “Clustering of final trained map, in order to improve the quality of the complex shaped data sets via Kohonen maps and visualization results. mathematical morphology”. In: Proceedings of the SPIE, Data Mining and Knowledge Discovery. B. Dasarathy V. Conclusion (Ed.), Vol. 4384, 2001, pp. 16-27. Self-organizing map is neural network concept, [17] A. Ultsch, “Self-Organizing Neural Networks for unsupervised learning strategy, has been widely used in Visualization and Classification”, In: O. Opitz et al. (Eds). clustering applications. However, SOM approach is Information and Classification, Springer Berlin, 1993, normally applied to single and local datasets. In one of the pp.301-306. research work, they introduced partSOM, an efficient [18] J. Vaidya and C. Clifton, “Privacy-preserving k-means strategy SOM-based to perform distributed data clustering clustering over vertically partitioned data”. In: Proc. of the Ninth ACM SIGKDD Intl. Conf. on Knowledge Discovery on geographically distributed databases. and Data Mining, New York, 2003,pp.206-215. However, SOM and partSOM approaches have some limitations for presenting results. In this work we join partSOM strategy with an alternative approach for cluster detection using K-means algorithm. References [1] R. Xu and D. Wunsch II. “Survey of Clustering Algorithms”, IEEE Trans. on Neural Networks, Vol.16, Iss.3, May 2005, pp. 645-678. [2] M. Kantardzic, Data Mining: Concepts, Models, Methods, and Algorithms, IEEE Press, 2003. [3] G. Forman and B. Zhang, “Distributed data clustering can be efficient and exact”. SIGKDD Explor. Newsl. 2, Dec. 2000, pp 34-38. [4] Chak-Man Lam, Xiao-Feng Zhang and W. K. Cheung, “Mining Local Data Sources for Learning Global Cluster Models”, Web Intelligence, Proceedings IEEE/WIC/ACM International Conference on WI 2004, Iss. 20-24, Sept. 2004, pp. 748-751. [5] F. L. Gorgônio and J. A. F. Costa, “Parallel Self- Organizing Maps with Applications in Clustering Distributed Data”, International Joint Conference on Neural Networks (IJCNN’2008), (Accepted). [6] A. Asuncion and D.J. Newman. UCI Machine Learning Repository,availableathttp://www.ics.uci.edu/~mlearn/ML Repository.html, Irvine, CA, 2007. [7] J. C. Silva and M. Klusch, “Inference in distributed data clustering”, Engineering Applications of Artificial Intelligence, vol. 19, 2006, pp. 363-369. [8] P. Berkhin, “A Survey of Clustering Data Mining Techniques”, In: J. Kogan et al., Grouping Multidimensional Data: Recent Advances in Clustering, New York: Springer- Verlag, 2006. [9] S. R. M. Oliveira and O. R. Zaïane, “Privacy Preservation When Sharing Data For Clustering”, In: Proceedings of the International Workshop on Secure Data Management in a Connected World, 2004. [10] H. Kargupta, W. Huang, K. Sivakumar and E. Johnson, “Distributed Clustering Using Collective Principal Component Analysis”, Knowledge and Information Systems Journal, Vol. 3, Num. 4, May 2001, pp. 422-448. [11] G. Jagannathan, K. Pillaipakkamnatt and R. N. Wright,“A www.ijmer.com 1957 | P a g e