SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 9, Issue 5 (December 2013), PP. 23-26

A Review on Clustering Based Methods and Usage for
Pattern Recognition
Deepti Mishra
Department of computer science and engineering
I.T.S. Engineering College, Greater Noida
Abstract:- Pattern recognition is an important field of computer science concerned with recognizing patterns,
particularly visual and sound patterns. It is an area of work that has applications in many disciplines. Pattern
recognition is the science of making inferences based on data. It is the study of how machines can observe the
environment, learn to distinguish patterns of interest, make sound and reasonable decisions about the categories
of the patterns. The pattern recognition is based on the concept of supervised learning and unsupervised
learning. The approach based on supervised learning is called classification and the approach based on
unsupervised learning is called clustering. Both the approaches are the techniques of data mining. Data mining
is the approach which searches for new, valuable and nontrivial information from large volumes of data. The
study includes the techniques that are based on clustering and are useful for pattern recognition. The study aims
at providing the review of clustering techniques and their applications in pattern recognition. The discussion on
the study will guide the researchers for improving their research direction.
Keywords:- Pattern Recognition, Data Mining, Clustering, unsupervised learning, supervised learning.

I.

INTRODUCTION

In day to day life a person goes through an endless number of pattern recognition problems such as
smells, images, voices, faces, situations, and so on. Most of these problems we solve at a sensory level or
intuitively, without an explicit method or algorithm. As soon as we are able to provide an algorithm the problem
becomes trivial and we happily delegate it to the computer. Indeed, machines have confidently replaced humans
in many formerly difficult or impossible way, now just tedious pattern recognition tasks such as mail sorting,
medical test reading, military target recognition, signature verification, meteorological forecasting, DNA
matching, fingerprint recognition, and so on. Pattern Recognition (PR) is the scientific discipline whose goal is
the classification of data, objects or, in general, patterns into categories or classes. This involves capabilities of –
unsupervised learning – supervised learning [13].
Classification and clustering both are the important approaches of pattern recognition [5].
Classification is based on supervised learning. In supervised learning the class label of each training sample is
provided. Clustering can be considered the most important unsupervised learning problem; so, as every other
problem of this kind, it deals with finding a structure in a collection of unlabeled data. A loose definition of
clustering could be “the process of organizing objects into groups whose members are similar in some way”. A
cluster is therefore a collection of objects which are “similar” between them and are “dissimilar” to the objects
belonging to other clusters. Clustering techniques identify the clusters into which the data can be divided; the
similarity criterion is distance: two or more objects belong to the same cluster if they are “close” according to a
given distance (in this case geometrical distance). This is called distance-based clustering [1]. Another kind of
clustering is conceptual clustering: two or more objects belong to the same cluster if this one defines a concept
common to all that objects. In other words, objects are grouped according to their fit to descriptive concepts, not
according to simple similarity measures.
Clustering is applicable in many areas including pattern detection, Data mining, Information retrieval,
text mining, Web analysis, marketing, medical diagnostic and many more [6]. Here the study includes pattern
recognition and its techniques those are based on clustering. Clustering is a statistical tool, which helps
discovering the relative importance of various dimensions in defining the belongings of particular item to a
particular category.
II.
RELATED WORK
Pattern recognition has become a very important field over the last decade since automation and
computerization in many systems has led to large amount of data being stored in the databases. The primary
intention of pattern recognition is to automatically assist humans in analyzing the vast amount of available data
and extracting useful knowledge from it. Many algorithms have been developed for many applications,
especially for static pattern recognition [10].

23
A Review on Clustering Based Methods and Usage for Pattern Recognition
Clustering has its roots in many areas including data mining, statistics and pattern recognition [6]. By clustering,
one can identify dense and sparse regions and, therefore, discover overall distribution patterns and interesting
correlation among data attributes [6].
A new parametric approach has been proposed, which starts with an estimate of the local distribution
and efficiently avoids pre-assuming the cluster number. This clustering program is applied to both artificial and
benchmark data classification and its performance is proven better than the well-known k-means algorithm [9].
Research work has presented the Clustered Clause structure, which uses information-based clustering and
dependencies between sentence components to provide a simplified and generalized model of a grammatical
clause. Research work has done, which is based on dependencies within the sentence, enables us to detect
complex textual relations at a higher level of context. The relations we detect are of interest in themselves, as
linguistic phenomena, and are also highly suited for use in certain linguistic and cognitive tasks [7].
Clustering is the process of grouping of data, where the grouping is established by finding similarities
between data based on their characteristics [12]. Such groups are termed as Clusters. A comparative study of
clustering algorithms across two different data items has been done. The performance of the various clustering
algorithms is compared based on the time taken to form the estimated clusters. The experimental results of
various clustering algorithms to form clusters can be depicted as a graph. Thus it can be concluded as the time
taken to form the clusters increases such as the number of clusters increases. The farthest first clustering
algorithm takes very few seconds to cluster the data items whereas the simple K-Means takes the longest time to
perform clustering [3].
A simple and efficient implementation of Lloyd's k-means clustering algorithm has been presented in a
reference, which we call the filtering algorithm. This algorithm is easy to implement, requiring a kd-tree as the
only major data structure. It has established the practical efficiency of the filtering algorithm in two ways. First,
it presents a data-sensitive analysis of the algorithm's running time, which shows that the algorithm runs faster
as the separation between clusters increases. Second, it presents a number of empirical studies both on
synthetically generated data and on real data sets from applications in color quantization, data compression, and
image segmentation.
Research has been done with the artificial intelligence and pattern recognition i.e. how to teach a
computer to distinguish relevant signals from noise and how to use this information to make decisions [2].

III.

METHODS and TECHNIQUES

Pattern recognition is about assigning labels to objects. Objects are described by a set of measurements
called also attributes or features. If the data set is not given, an experiment is planned and a data set is collected.
The relevant features have to be nominated and measured. Pattern recognition is generally categorized according
to the type of learning procedure used to generate the output value. Supervised learning assumes that a set of
training data (the training set) has been provided, consisting of a set of instances that have been properly labeled
by hand with the correct output. A learning procedure then generates a model that attempts to meet two,
sometimes conflicting, objectives: Perform as well as possible on the training data, and generalize as well as
possible to new data. Unsupervised learning, on the other hand, assumes training data that has not been handlabeled, and attempts to find inherent patterns in the data that can then be used to determine the correct output
value for new data instances. Pattern recognition is the important application of clustering. The clustering is a
set of techniques for classification of samples into a number of groups. Therefore, the samples in one group are
grouped and samples belonging to different groups are grouped as another group. The input of clustering is a set
of samples and the process of clustering is to measure the similarity and or dissimilarity between given samples.
The output of the clustering is a number of groups or clusters in the form of graphs, histograms and normal
computer results showing group number.
Clustering algorithms may be classified as Partitioning Clustering, Density Based Clustering,
Hierarchical clustering [4][12].
Partitioning Clustering: The basic concept in partitioning clustering is to divide the data into proper
subset in recursive manner, and go through each subset and relocate points between clusters. Given a database
of n objects, a partitioning method constructs k(n) partitions of the data, where each partition represents a
cluster. That is, it classifies the data into k groups, which together satisfy the following requirements:
Each group must contain at least one object and each object must belong to exactly one group. K-means is the
basic technique of partitioning clustering which is based on calculating the Euclidean distance.
Hierarchical clustering: Use distance matrix as clustering criteria. This method does not require the
number of clusters k as an input, but needs a termination condition. It works by grouping data objects into tree
of clusters. They are either agglomerative (bottom-up) or divisive (top-down):

24
A Review on Clustering Based Methods and Usage for Pattern Recognition
(a) Agglomerative algorithms start with each object being a separate cluster itself, and successively merge
groups according to a distance measure. The clustering may stop when all objects are in a single group or at any
other point the user wants.
These methods generally follow a greedy-like bottom-up merging. Chameleon is the basic algorithm
for agglomerative clustering which merges all the set of points into a sparse graph and then partition them into
clusters. CURE is also the important approach for it.
(b) Divisive algorithms follow the opposite strategy. They start with one group of all objects and
successively split groups into smaller ones, until each object falls in one cluster, or as desired.
Divisive approaches divide the data objects in disjoint groups at every step, and follow the same pattern until all
objects fall into a separate cluster. This is similar to the approach followed by divide-and-conquer algorithms.
Density Based clustering: The general idea is to continue growing the given cluster as long as the density
(number of objects or data points) in the “neighborhood” exceeds some threshold i.e. for each data point within
a cluster, the neighborhood of a given radius has to contain at least a minimum number of points. Such a method
is used to filter out noise i.e. outliers; and discover clusters of arbitrary shapes. The basic approach used is
DBSCAN and OPTICS algorithms. DBSCAN algorithm grows regions with sufficiently high density into
clusters.
There are two major approaches to pattern recognition, which are: numerical and syntactic Approach
[11]. The former one can be further divided into different fields as shown in Figure 1.
Stages in clustering for pattern recognition

Figure 1
Data is collected both to train and to test the system. The selection of the distinguished features is a
typical design step. Prior knowledge plays a critical role. The process of using data to determine the classifier is
referred to as training the classifier. That trained classifier is used to define the clusters. Those patterns which
are similar to one another are kept in same group but those are different from patterns kept in other groups. The
loop iterates itself until the resulted pattern is calculated.

IV.

CONCLUSION

Tremendous volumes of data are filled in the computers and in the internet. The Government agencies,
scientific institutions and businesses have all dedicated enormous resources to collecting and storing data. In the
real world, only a small amount of these data is used due to the fact that volumes are simply too large to
manage, the data structures themselves are too complicated to be analyzed effectively. Pattern recognition
techniques are concerned with the theory and algorithms of putting abstract objects, e.g., measurements made on
physical objects, into categories. Typically the categories are assumed to be known in advance, although there
are techniques to learn the categories (clustering). In clustering there is no explicit teacher, and the system forms
clusters of the input patterns. Input patterns are not labeled.

REFERENCES
[1].
[2].
[3].
[4].

Pratima D. and Nimmakanti N., “ Pattern Recognition algorithms for cluster identification problem”,
Special Issue of International Journal of Computer Science & Informatics (IJCSI),vol.- II, Issue-1, 2.
Richard j. Morris, “Statistical pattern recognition for macromolecular crystallographers”, Acta
crystallographica, Biological crystallography, ISSN-0907-4449, 2004, D60, 2133-2143.
S.Revathi and Dr. T. Nalini, “Performance comparison of various clustering algorithm”, ijarcsse, vol 3,
issue 2, Feb 2013, pg 67-72.
Koteeswaran S., P.Visu and J.Janet, “A review on clustering and outlier analysis techniques in data
mining”, American journal of applied sciences 9(2), ISSN 1546-9239, 2012, pg 254-258.

25
A Review on Clustering Based Methods and Usage for Pattern Recognition
[5].
[6].
[7].
[8].
[9].

[10].
[11].
[12].
[13].
[14].
[15].

Richard o. Duda, Peter E. Hart, David G. Stork, “ Pattern Classification”,
Jiawei Han, M. Kamber, “ Data Mining: Concepts and techniques”.
Brody S., “Cluster based Pattern recognition in natural language text”, aug 2005.
Tapas Kanungo, David M. Mount, Nathan S. Netanyahu, Christine D. Piatko, Ruth Silverman, and
Angela Y. Wu, “An efficient K-means clustering algorithm: analysis and implementation”, IEEE
TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 24, NO. 7,
JULY 2002.
Zeng Y. and Starzyk J., “ Statistical approach to clustering in pattern recognition”,IEEE 2001.
Sadina Gagula-Palalic, “Fuzzy clustering models and algorithms for pattern recognition”.
Jain A.K., Murty M.N. and Flynn P.J., “Data Clustering : A review”, ACM Computing Surveys, Vol.
31, No. 3, Sep 1999.
Gupta A., Gupta A. and Mishra A., “Research paper on clustering techniques of data variations”,
IJATER, vol 1, 2011.
Pankaj Sharma, “Pattern Recognition”.
Jain A.K. and Maheshwari S., “ Survey of clustering techniques in data mining”, IJCSMR, Aug 2012.

26

More Related Content

What's hot

Bs31267274
Bs31267274Bs31267274
Bs31267274IJMER
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
DATA MINING.doc
DATA MINING.docDATA MINING.doc
DATA MINING.docbutest
 
Volume 2-issue-6-1930-1932
Volume 2-issue-6-1930-1932Volume 2-issue-6-1930-1932
Volume 2-issue-6-1930-1932Editor IJARCET
 
A statistical data fusion technique in virtual data integration environment
A statistical data fusion technique in virtual data integration environmentA statistical data fusion technique in virtual data integration environment
A statistical data fusion technique in virtual data integration environmentIJDKP
 
Review: Semi-Supervised Learning Methods for Word Sense Disambiguation
Review: Semi-Supervised Learning Methods for Word Sense DisambiguationReview: Semi-Supervised Learning Methods for Word Sense Disambiguation
Review: Semi-Supervised Learning Methods for Word Sense DisambiguationIOSR Journals
 
Analysis of Classification Algorithm in Data Mining
Analysis of Classification Algorithm in Data MiningAnalysis of Classification Algorithm in Data Mining
Analysis of Classification Algorithm in Data Miningijdmtaiir
 
Recommendation system using bloom filter in mapreduce
Recommendation system using bloom filter in mapreduceRecommendation system using bloom filter in mapreduce
Recommendation system using bloom filter in mapreduceIJDKP
 
A Survey Ondecision Tree Learning Algorithms for Knowledge Discovery
A Survey Ondecision Tree Learning Algorithms for Knowledge DiscoveryA Survey Ondecision Tree Learning Algorithms for Knowledge Discovery
A Survey Ondecision Tree Learning Algorithms for Knowledge DiscoveryIJERA Editor
 
Iaetsd a survey on one class clustering
Iaetsd a survey on one class clusteringIaetsd a survey on one class clustering
Iaetsd a survey on one class clusteringIaetsd Iaetsd
 
Literature Survey: Clustering Technique
Literature Survey: Clustering TechniqueLiterature Survey: Clustering Technique
Literature Survey: Clustering TechniqueEditor IJCATR
 
Comparison of relational and attribute-IEEE-1999-published ...
Comparison of relational and attribute-IEEE-1999-published ...Comparison of relational and attribute-IEEE-1999-published ...
Comparison of relational and attribute-IEEE-1999-published ...butest
 
Ontology Based PMSE with Manifold Preference
Ontology Based PMSE with Manifold PreferenceOntology Based PMSE with Manifold Preference
Ontology Based PMSE with Manifold PreferenceIJCERT
 
A Survey on Constellation Based Attribute Selection Method for High Dimension...
A Survey on Constellation Based Attribute Selection Method for High Dimension...A Survey on Constellation Based Attribute Selection Method for High Dimension...
A Survey on Constellation Based Attribute Selection Method for High Dimension...IJERA Editor
 
A NAIVE METHOD FOR ONTOLOGY CONSTRUCTION
A NAIVE METHOD FOR ONTOLOGY CONSTRUCTIONA NAIVE METHOD FOR ONTOLOGY CONSTRUCTION
A NAIVE METHOD FOR ONTOLOGY CONSTRUCTIONijscai
 

What's hot (19)

Bs31267274
Bs31267274Bs31267274
Bs31267274
 
AN IMPROVED TECHNIQUE FOR DOCUMENT CLUSTERING
AN IMPROVED TECHNIQUE FOR DOCUMENT CLUSTERINGAN IMPROVED TECHNIQUE FOR DOCUMENT CLUSTERING
AN IMPROVED TECHNIQUE FOR DOCUMENT CLUSTERING
 
Seminar Presentation
Seminar PresentationSeminar Presentation
Seminar Presentation
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
DATA MINING.doc
DATA MINING.docDATA MINING.doc
DATA MINING.doc
 
G1803054653
G1803054653G1803054653
G1803054653
 
Volume 2-issue-6-1930-1932
Volume 2-issue-6-1930-1932Volume 2-issue-6-1930-1932
Volume 2-issue-6-1930-1932
 
A statistical data fusion technique in virtual data integration environment
A statistical data fusion technique in virtual data integration environmentA statistical data fusion technique in virtual data integration environment
A statistical data fusion technique in virtual data integration environment
 
Review: Semi-Supervised Learning Methods for Word Sense Disambiguation
Review: Semi-Supervised Learning Methods for Word Sense DisambiguationReview: Semi-Supervised Learning Methods for Word Sense Disambiguation
Review: Semi-Supervised Learning Methods for Word Sense Disambiguation
 
Analysis of Classification Algorithm in Data Mining
Analysis of Classification Algorithm in Data MiningAnalysis of Classification Algorithm in Data Mining
Analysis of Classification Algorithm in Data Mining
 
31 34
31 3431 34
31 34
 
Recommendation system using bloom filter in mapreduce
Recommendation system using bloom filter in mapreduceRecommendation system using bloom filter in mapreduce
Recommendation system using bloom filter in mapreduce
 
A Survey Ondecision Tree Learning Algorithms for Knowledge Discovery
A Survey Ondecision Tree Learning Algorithms for Knowledge DiscoveryA Survey Ondecision Tree Learning Algorithms for Knowledge Discovery
A Survey Ondecision Tree Learning Algorithms for Knowledge Discovery
 
Iaetsd a survey on one class clustering
Iaetsd a survey on one class clusteringIaetsd a survey on one class clustering
Iaetsd a survey on one class clustering
 
Literature Survey: Clustering Technique
Literature Survey: Clustering TechniqueLiterature Survey: Clustering Technique
Literature Survey: Clustering Technique
 
Comparison of relational and attribute-IEEE-1999-published ...
Comparison of relational and attribute-IEEE-1999-published ...Comparison of relational and attribute-IEEE-1999-published ...
Comparison of relational and attribute-IEEE-1999-published ...
 
Ontology Based PMSE with Manifold Preference
Ontology Based PMSE with Manifold PreferenceOntology Based PMSE with Manifold Preference
Ontology Based PMSE with Manifold Preference
 
A Survey on Constellation Based Attribute Selection Method for High Dimension...
A Survey on Constellation Based Attribute Selection Method for High Dimension...A Survey on Constellation Based Attribute Selection Method for High Dimension...
A Survey on Constellation Based Attribute Selection Method for High Dimension...
 
A NAIVE METHOD FOR ONTOLOGY CONSTRUCTION
A NAIVE METHOD FOR ONTOLOGY CONSTRUCTIONA NAIVE METHOD FOR ONTOLOGY CONSTRUCTION
A NAIVE METHOD FOR ONTOLOGY CONSTRUCTION
 

Viewers also liked

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
2015 south sudan cases
2015 south sudan cases2015 south sudan cases
2015 south sudan caseslosike edward
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
My Reversion to Islam
My Reversion to IslamMy Reversion to Islam
My Reversion to IslamTorabTabib
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Hotblok - Wie bauen - presentation
Hotblok - Wie bauen - presentationHotblok - Wie bauen - presentation
Hotblok - Wie bauen - presentationThermibauCom
 
Workers compensation coordinator performance appraisal
Workers compensation coordinator performance appraisalWorkers compensation coordinator performance appraisal
Workers compensation coordinator performance appraisalethanedison09
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
11 Δ ΣΧ ΚΟΜΟΤΗΝΗΣ
11 Δ ΣΧ ΚΟΜΟΤΗΝΗΣ11 Δ ΣΧ ΚΟΜΟΤΗΝΗΣ
11 Δ ΣΧ ΚΟΜΟΤΗΝΗΣKpe Maronias
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Resume depense publique_institut_montaigne
Resume depense publique_institut_montaigneResume depense publique_institut_montaigne
Resume depense publique_institut_montaigneHortense Billot
 

Viewers also liked (17)

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
2015 south sudan cases
2015 south sudan cases2015 south sudan cases
2015 south sudan cases
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
srgoc
srgocsrgoc
srgoc
 
My Reversion to Islam
My Reversion to IslamMy Reversion to Islam
My Reversion to Islam
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Hotblok - Wie bauen - presentation
Hotblok - Wie bauen - presentationHotblok - Wie bauen - presentation
Hotblok - Wie bauen - presentation
 
TME COMPANY PROFILE
TME COMPANY PROFILETME COMPANY PROFILE
TME COMPANY PROFILE
 
Business newspaper, x-mas
Business newspaper,  x-mas Business newspaper,  x-mas
Business newspaper, x-mas
 
Workers compensation coordinator performance appraisal
Workers compensation coordinator performance appraisalWorkers compensation coordinator performance appraisal
Workers compensation coordinator performance appraisal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
11 Δ ΣΧ ΚΟΜΟΤΗΝΗΣ
11 Δ ΣΧ ΚΟΜΟΤΗΝΗΣ11 Δ ΣΧ ΚΟΜΟΤΗΝΗΣ
11 Δ ΣΧ ΚΟΜΟΤΗΝΗΣ
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Resume depense publique_institut_montaigne
Resume depense publique_institut_montaigneResume depense publique_institut_montaigne
Resume depense publique_institut_montaigne
 
Milan_Resume
Milan_ResumeMilan_Resume
Milan_Resume
 

Similar to International Journal of Engineering Research and Development (IJERD)

An Analysis of Outlier Detection through clustering method
An Analysis of Outlier Detection through clustering methodAn Analysis of Outlier Detection through clustering method
An Analysis of Outlier Detection through clustering methodIJAEMSJORNAL
 
A Novel Clustering Method for Similarity Measuring in Text Documents
A Novel Clustering Method for Similarity Measuring in Text DocumentsA Novel Clustering Method for Similarity Measuring in Text Documents
A Novel Clustering Method for Similarity Measuring in Text DocumentsIJMER
 
Privacy preservation techniques in data mining
Privacy preservation techniques in data miningPrivacy preservation techniques in data mining
Privacy preservation techniques in data miningeSAT Journals
 
Privacy preservation techniques in data mining
Privacy preservation techniques in data miningPrivacy preservation techniques in data mining
Privacy preservation techniques in data miningeSAT Publishing House
 
A SURVEY ON OPTIMIZATION APPROACHES TO TEXT DOCUMENT CLUSTERING
A SURVEY ON OPTIMIZATION APPROACHES TO TEXT DOCUMENT CLUSTERINGA SURVEY ON OPTIMIZATION APPROACHES TO TEXT DOCUMENT CLUSTERING
A SURVEY ON OPTIMIZATION APPROACHES TO TEXT DOCUMENT CLUSTERINGijcsa
 
Applications Of Clustering Techniques In Data Mining A Comparative Study
Applications Of Clustering Techniques In Data Mining  A Comparative StudyApplications Of Clustering Techniques In Data Mining  A Comparative Study
Applications Of Clustering Techniques In Data Mining A Comparative StudyFiona Phillips
 
Volume 2-issue-6-1969-1973
Volume 2-issue-6-1969-1973Volume 2-issue-6-1969-1973
Volume 2-issue-6-1969-1973Editor IJARCET
 
A Hierarchical and Grid Based Clustering Method for Distributed Systems (Hgd ...
A Hierarchical and Grid Based Clustering Method for Distributed Systems (Hgd ...A Hierarchical and Grid Based Clustering Method for Distributed Systems (Hgd ...
A Hierarchical and Grid Based Clustering Method for Distributed Systems (Hgd ...iosrjce
 
Clustering Algorithm with a Novel Similarity Measure
Clustering Algorithm with a Novel Similarity MeasureClustering Algorithm with a Novel Similarity Measure
Clustering Algorithm with a Novel Similarity MeasureIOSR Journals
 
An Iterative Improved k-means Clustering
An Iterative Improved k-means ClusteringAn Iterative Improved k-means Clustering
An Iterative Improved k-means ClusteringIDES Editor
 
EXPLORING DATA MINING TECHNIQUES AND ITS APPLICATIONS
EXPLORING DATA MINING TECHNIQUES AND ITS APPLICATIONSEXPLORING DATA MINING TECHNIQUES AND ITS APPLICATIONS
EXPLORING DATA MINING TECHNIQUES AND ITS APPLICATIONSeditorijettcs
 
EXPLORING DATA MINING TECHNIQUES AND ITS APPLICATIONS
EXPLORING DATA MINING TECHNIQUES AND ITS APPLICATIONSEXPLORING DATA MINING TECHNIQUES AND ITS APPLICATIONS
EXPLORING DATA MINING TECHNIQUES AND ITS APPLICATIONSeditorijettcs
 
84cc04ff77007e457df6aa2b814d2346bf1b
84cc04ff77007e457df6aa2b814d2346bf1b84cc04ff77007e457df6aa2b814d2346bf1b
84cc04ff77007e457df6aa2b814d2346bf1bPRAWEEN KUMAR
 
Data Mining Framework for Network Intrusion Detection using Efficient Techniques
Data Mining Framework for Network Intrusion Detection using Efficient TechniquesData Mining Framework for Network Intrusion Detection using Efficient Techniques
Data Mining Framework for Network Intrusion Detection using Efficient TechniquesIJAEMSJORNAL
 
Comparative Analysis: Effective Information Retrieval Using Different Learnin...
Comparative Analysis: Effective Information Retrieval Using Different Learnin...Comparative Analysis: Effective Information Retrieval Using Different Learnin...
Comparative Analysis: Effective Information Retrieval Using Different Learnin...RSIS International
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 

Similar to International Journal of Engineering Research and Development (IJERD) (20)

An Analysis of Outlier Detection through clustering method
An Analysis of Outlier Detection through clustering methodAn Analysis of Outlier Detection through clustering method
An Analysis of Outlier Detection through clustering method
 
A Novel Clustering Method for Similarity Measuring in Text Documents
A Novel Clustering Method for Similarity Measuring in Text DocumentsA Novel Clustering Method for Similarity Measuring in Text Documents
A Novel Clustering Method for Similarity Measuring in Text Documents
 
Privacy preservation techniques in data mining
Privacy preservation techniques in data miningPrivacy preservation techniques in data mining
Privacy preservation techniques in data mining
 
Privacy preservation techniques in data mining
Privacy preservation techniques in data miningPrivacy preservation techniques in data mining
Privacy preservation techniques in data mining
 
A SURVEY ON OPTIMIZATION APPROACHES TO TEXT DOCUMENT CLUSTERING
A SURVEY ON OPTIMIZATION APPROACHES TO TEXT DOCUMENT CLUSTERINGA SURVEY ON OPTIMIZATION APPROACHES TO TEXT DOCUMENT CLUSTERING
A SURVEY ON OPTIMIZATION APPROACHES TO TEXT DOCUMENT CLUSTERING
 
Applications Of Clustering Techniques In Data Mining A Comparative Study
Applications Of Clustering Techniques In Data Mining  A Comparative StudyApplications Of Clustering Techniques In Data Mining  A Comparative Study
Applications Of Clustering Techniques In Data Mining A Comparative Study
 
Volume 2-issue-6-1969-1973
Volume 2-issue-6-1969-1973Volume 2-issue-6-1969-1973
Volume 2-issue-6-1969-1973
 
A Hierarchical and Grid Based Clustering Method for Distributed Systems (Hgd ...
A Hierarchical and Grid Based Clustering Method for Distributed Systems (Hgd ...A Hierarchical and Grid Based Clustering Method for Distributed Systems (Hgd ...
A Hierarchical and Grid Based Clustering Method for Distributed Systems (Hgd ...
 
H017625354
H017625354H017625354
H017625354
 
Clustering Algorithm with a Novel Similarity Measure
Clustering Algorithm with a Novel Similarity MeasureClustering Algorithm with a Novel Similarity Measure
Clustering Algorithm with a Novel Similarity Measure
 
An Iterative Improved k-means Clustering
An Iterative Improved k-means ClusteringAn Iterative Improved k-means Clustering
An Iterative Improved k-means Clustering
 
Dp33701704
Dp33701704Dp33701704
Dp33701704
 
Dp33701704
Dp33701704Dp33701704
Dp33701704
 
EXPLORING DATA MINING TECHNIQUES AND ITS APPLICATIONS
EXPLORING DATA MINING TECHNIQUES AND ITS APPLICATIONSEXPLORING DATA MINING TECHNIQUES AND ITS APPLICATIONS
EXPLORING DATA MINING TECHNIQUES AND ITS APPLICATIONS
 
EXPLORING DATA MINING TECHNIQUES AND ITS APPLICATIONS
EXPLORING DATA MINING TECHNIQUES AND ITS APPLICATIONSEXPLORING DATA MINING TECHNIQUES AND ITS APPLICATIONS
EXPLORING DATA MINING TECHNIQUES AND ITS APPLICATIONS
 
F04463437
F04463437F04463437
F04463437
 
84cc04ff77007e457df6aa2b814d2346bf1b
84cc04ff77007e457df6aa2b814d2346bf1b84cc04ff77007e457df6aa2b814d2346bf1b
84cc04ff77007e457df6aa2b814d2346bf1b
 
Data Mining Framework for Network Intrusion Detection using Efficient Techniques
Data Mining Framework for Network Intrusion Detection using Efficient TechniquesData Mining Framework for Network Intrusion Detection using Efficient Techniques
Data Mining Framework for Network Intrusion Detection using Efficient Techniques
 
Comparative Analysis: Effective Information Retrieval Using Different Learnin...
Comparative Analysis: Effective Information Retrieval Using Different Learnin...Comparative Analysis: Effective Information Retrieval Using Different Learnin...
Comparative Analysis: Effective Information Retrieval Using Different Learnin...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 

International Journal of Engineering Research and Development (IJERD)

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 9, Issue 5 (December 2013), PP. 23-26 A Review on Clustering Based Methods and Usage for Pattern Recognition Deepti Mishra Department of computer science and engineering I.T.S. Engineering College, Greater Noida Abstract:- Pattern recognition is an important field of computer science concerned with recognizing patterns, particularly visual and sound patterns. It is an area of work that has applications in many disciplines. Pattern recognition is the science of making inferences based on data. It is the study of how machines can observe the environment, learn to distinguish patterns of interest, make sound and reasonable decisions about the categories of the patterns. The pattern recognition is based on the concept of supervised learning and unsupervised learning. The approach based on supervised learning is called classification and the approach based on unsupervised learning is called clustering. Both the approaches are the techniques of data mining. Data mining is the approach which searches for new, valuable and nontrivial information from large volumes of data. The study includes the techniques that are based on clustering and are useful for pattern recognition. The study aims at providing the review of clustering techniques and their applications in pattern recognition. The discussion on the study will guide the researchers for improving their research direction. Keywords:- Pattern Recognition, Data Mining, Clustering, unsupervised learning, supervised learning. I. INTRODUCTION In day to day life a person goes through an endless number of pattern recognition problems such as smells, images, voices, faces, situations, and so on. Most of these problems we solve at a sensory level or intuitively, without an explicit method or algorithm. As soon as we are able to provide an algorithm the problem becomes trivial and we happily delegate it to the computer. Indeed, machines have confidently replaced humans in many formerly difficult or impossible way, now just tedious pattern recognition tasks such as mail sorting, medical test reading, military target recognition, signature verification, meteorological forecasting, DNA matching, fingerprint recognition, and so on. Pattern Recognition (PR) is the scientific discipline whose goal is the classification of data, objects or, in general, patterns into categories or classes. This involves capabilities of – unsupervised learning – supervised learning [13]. Classification and clustering both are the important approaches of pattern recognition [5]. Classification is based on supervised learning. In supervised learning the class label of each training sample is provided. Clustering can be considered the most important unsupervised learning problem; so, as every other problem of this kind, it deals with finding a structure in a collection of unlabeled data. A loose definition of clustering could be “the process of organizing objects into groups whose members are similar in some way”. A cluster is therefore a collection of objects which are “similar” between them and are “dissimilar” to the objects belonging to other clusters. Clustering techniques identify the clusters into which the data can be divided; the similarity criterion is distance: two or more objects belong to the same cluster if they are “close” according to a given distance (in this case geometrical distance). This is called distance-based clustering [1]. Another kind of clustering is conceptual clustering: two or more objects belong to the same cluster if this one defines a concept common to all that objects. In other words, objects are grouped according to their fit to descriptive concepts, not according to simple similarity measures. Clustering is applicable in many areas including pattern detection, Data mining, Information retrieval, text mining, Web analysis, marketing, medical diagnostic and many more [6]. Here the study includes pattern recognition and its techniques those are based on clustering. Clustering is a statistical tool, which helps discovering the relative importance of various dimensions in defining the belongings of particular item to a particular category. II. RELATED WORK Pattern recognition has become a very important field over the last decade since automation and computerization in many systems has led to large amount of data being stored in the databases. The primary intention of pattern recognition is to automatically assist humans in analyzing the vast amount of available data and extracting useful knowledge from it. Many algorithms have been developed for many applications, especially for static pattern recognition [10]. 23
  • 2. A Review on Clustering Based Methods and Usage for Pattern Recognition Clustering has its roots in many areas including data mining, statistics and pattern recognition [6]. By clustering, one can identify dense and sparse regions and, therefore, discover overall distribution patterns and interesting correlation among data attributes [6]. A new parametric approach has been proposed, which starts with an estimate of the local distribution and efficiently avoids pre-assuming the cluster number. This clustering program is applied to both artificial and benchmark data classification and its performance is proven better than the well-known k-means algorithm [9]. Research work has presented the Clustered Clause structure, which uses information-based clustering and dependencies between sentence components to provide a simplified and generalized model of a grammatical clause. Research work has done, which is based on dependencies within the sentence, enables us to detect complex textual relations at a higher level of context. The relations we detect are of interest in themselves, as linguistic phenomena, and are also highly suited for use in certain linguistic and cognitive tasks [7]. Clustering is the process of grouping of data, where the grouping is established by finding similarities between data based on their characteristics [12]. Such groups are termed as Clusters. A comparative study of clustering algorithms across two different data items has been done. The performance of the various clustering algorithms is compared based on the time taken to form the estimated clusters. The experimental results of various clustering algorithms to form clusters can be depicted as a graph. Thus it can be concluded as the time taken to form the clusters increases such as the number of clusters increases. The farthest first clustering algorithm takes very few seconds to cluster the data items whereas the simple K-Means takes the longest time to perform clustering [3]. A simple and efficient implementation of Lloyd's k-means clustering algorithm has been presented in a reference, which we call the filtering algorithm. This algorithm is easy to implement, requiring a kd-tree as the only major data structure. It has established the practical efficiency of the filtering algorithm in two ways. First, it presents a data-sensitive analysis of the algorithm's running time, which shows that the algorithm runs faster as the separation between clusters increases. Second, it presents a number of empirical studies both on synthetically generated data and on real data sets from applications in color quantization, data compression, and image segmentation. Research has been done with the artificial intelligence and pattern recognition i.e. how to teach a computer to distinguish relevant signals from noise and how to use this information to make decisions [2]. III. METHODS and TECHNIQUES Pattern recognition is about assigning labels to objects. Objects are described by a set of measurements called also attributes or features. If the data set is not given, an experiment is planned and a data set is collected. The relevant features have to be nominated and measured. Pattern recognition is generally categorized according to the type of learning procedure used to generate the output value. Supervised learning assumes that a set of training data (the training set) has been provided, consisting of a set of instances that have been properly labeled by hand with the correct output. A learning procedure then generates a model that attempts to meet two, sometimes conflicting, objectives: Perform as well as possible on the training data, and generalize as well as possible to new data. Unsupervised learning, on the other hand, assumes training data that has not been handlabeled, and attempts to find inherent patterns in the data that can then be used to determine the correct output value for new data instances. Pattern recognition is the important application of clustering. The clustering is a set of techniques for classification of samples into a number of groups. Therefore, the samples in one group are grouped and samples belonging to different groups are grouped as another group. The input of clustering is a set of samples and the process of clustering is to measure the similarity and or dissimilarity between given samples. The output of the clustering is a number of groups or clusters in the form of graphs, histograms and normal computer results showing group number. Clustering algorithms may be classified as Partitioning Clustering, Density Based Clustering, Hierarchical clustering [4][12]. Partitioning Clustering: The basic concept in partitioning clustering is to divide the data into proper subset in recursive manner, and go through each subset and relocate points between clusters. Given a database of n objects, a partitioning method constructs k(n) partitions of the data, where each partition represents a cluster. That is, it classifies the data into k groups, which together satisfy the following requirements: Each group must contain at least one object and each object must belong to exactly one group. K-means is the basic technique of partitioning clustering which is based on calculating the Euclidean distance. Hierarchical clustering: Use distance matrix as clustering criteria. This method does not require the number of clusters k as an input, but needs a termination condition. It works by grouping data objects into tree of clusters. They are either agglomerative (bottom-up) or divisive (top-down): 24
  • 3. A Review on Clustering Based Methods and Usage for Pattern Recognition (a) Agglomerative algorithms start with each object being a separate cluster itself, and successively merge groups according to a distance measure. The clustering may stop when all objects are in a single group or at any other point the user wants. These methods generally follow a greedy-like bottom-up merging. Chameleon is the basic algorithm for agglomerative clustering which merges all the set of points into a sparse graph and then partition them into clusters. CURE is also the important approach for it. (b) Divisive algorithms follow the opposite strategy. They start with one group of all objects and successively split groups into smaller ones, until each object falls in one cluster, or as desired. Divisive approaches divide the data objects in disjoint groups at every step, and follow the same pattern until all objects fall into a separate cluster. This is similar to the approach followed by divide-and-conquer algorithms. Density Based clustering: The general idea is to continue growing the given cluster as long as the density (number of objects or data points) in the “neighborhood” exceeds some threshold i.e. for each data point within a cluster, the neighborhood of a given radius has to contain at least a minimum number of points. Such a method is used to filter out noise i.e. outliers; and discover clusters of arbitrary shapes. The basic approach used is DBSCAN and OPTICS algorithms. DBSCAN algorithm grows regions with sufficiently high density into clusters. There are two major approaches to pattern recognition, which are: numerical and syntactic Approach [11]. The former one can be further divided into different fields as shown in Figure 1. Stages in clustering for pattern recognition Figure 1 Data is collected both to train and to test the system. The selection of the distinguished features is a typical design step. Prior knowledge plays a critical role. The process of using data to determine the classifier is referred to as training the classifier. That trained classifier is used to define the clusters. Those patterns which are similar to one another are kept in same group but those are different from patterns kept in other groups. The loop iterates itself until the resulted pattern is calculated. IV. CONCLUSION Tremendous volumes of data are filled in the computers and in the internet. The Government agencies, scientific institutions and businesses have all dedicated enormous resources to collecting and storing data. In the real world, only a small amount of these data is used due to the fact that volumes are simply too large to manage, the data structures themselves are too complicated to be analyzed effectively. Pattern recognition techniques are concerned with the theory and algorithms of putting abstract objects, e.g., measurements made on physical objects, into categories. Typically the categories are assumed to be known in advance, although there are techniques to learn the categories (clustering). In clustering there is no explicit teacher, and the system forms clusters of the input patterns. Input patterns are not labeled. REFERENCES [1]. [2]. [3]. [4]. Pratima D. and Nimmakanti N., “ Pattern Recognition algorithms for cluster identification problem”, Special Issue of International Journal of Computer Science & Informatics (IJCSI),vol.- II, Issue-1, 2. Richard j. Morris, “Statistical pattern recognition for macromolecular crystallographers”, Acta crystallographica, Biological crystallography, ISSN-0907-4449, 2004, D60, 2133-2143. S.Revathi and Dr. T. Nalini, “Performance comparison of various clustering algorithm”, ijarcsse, vol 3, issue 2, Feb 2013, pg 67-72. Koteeswaran S., P.Visu and J.Janet, “A review on clustering and outlier analysis techniques in data mining”, American journal of applied sciences 9(2), ISSN 1546-9239, 2012, pg 254-258. 25
  • 4. A Review on Clustering Based Methods and Usage for Pattern Recognition [5]. [6]. [7]. [8]. [9]. [10]. [11]. [12]. [13]. [14]. [15]. Richard o. Duda, Peter E. Hart, David G. Stork, “ Pattern Classification”, Jiawei Han, M. Kamber, “ Data Mining: Concepts and techniques”. Brody S., “Cluster based Pattern recognition in natural language text”, aug 2005. Tapas Kanungo, David M. Mount, Nathan S. Netanyahu, Christine D. Piatko, Ruth Silverman, and Angela Y. Wu, “An efficient K-means clustering algorithm: analysis and implementation”, IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 24, NO. 7, JULY 2002. Zeng Y. and Starzyk J., “ Statistical approach to clustering in pattern recognition”,IEEE 2001. Sadina Gagula-Palalic, “Fuzzy clustering models and algorithms for pattern recognition”. Jain A.K., Murty M.N. and Flynn P.J., “Data Clustering : A review”, ACM Computing Surveys, Vol. 31, No. 3, Sep 1999. Gupta A., Gupta A. and Mishra A., “Research paper on clustering techniques of data variations”, IJATER, vol 1, 2011. Pankaj Sharma, “Pattern Recognition”. Jain A.K. and Maheshwari S., “ Survey of clustering techniques in data mining”, IJCSMR, Aug 2012. 26