SlideShare a Scribd company logo
TOP CITED ARTICLES
2020
Advanced Computational Intelligence: An International
Journal (ACII)
ISSN:2454-3934
http://airccse.org/journal/acii/index.html
TEXT MINING: OPEN SOURCE TOKENIZATION TOOLS – AN
ANALYSIS
Dr. S.Vijayarani1 and Ms. R.Janani2
1
Assistant Professor,
2
Ph.D Research Scholar, Department of Computer Science, School of Computer
Science and Engineering, Bharathiar University, Coimbatore.
ABSTRACT
Text mining is the process of extracting interesting and non-trivial knowledge or information from
unstructured text data. Text mining is the multidisciplinary field which draws on data mining, machine
learning, information retrieval, omputational linguistics and statistics. Important text mining processes
are information extraction, information retrieval, natural language processing, text classification, content
analysis and text clustering. All these processes are required to complete the preprocessing step before
doing their intended task. Pre-processing significantly reduces the size of the input text documents and the
actions involved in this step are sentence boundary determination, natural language specific stop-word
elimination, tokenization and stemming. Among this, the most essential and important action is the
tokenization. Tokenization helps to divide the textual information into individual words. For performing
tokenization process, there are many open source tools are available. The main objective of this work is to
analyze the performance of the seven open source tokenization tools. For this comparative analysis, we
have taken Nlpdotnet Tokenizer, Mila Tokenizer, NLTK Word Tokenize, TextBlob Word Tokenize,
MBSP Word Tokenize, Pattern Word Tokenize and Word Tokenization with Python NLTK. Based on the
results, we observed that the Nlpdotnet Tokenizer tool performance is better than other tools.
KEYWORDS:
Text Mining, Preprocessing, Tokenization, machine learning, NLP
PDF Link: http://aircconline.com/acii/V3N1/3116acii04.pdf
Volume Link: http://airccse.org/journal/acii/vol3.html
REFERENCES
[1] C.Ramasubramanian , R.Ramya, “Effective Pre-Processing Activities in Text Mining
using Improved Porter’s Stemming Algorithm”, International Journal of Advanced Research
in Computer and Communication Engineering Vol. 2, Issue 12, December 2013
[2] Dr. S. Vijayarani , Ms. J. Ilamathi , Ms. Nithya, “Preprocessing Techniques for Text
Mining – An Overview”, International Journal of Computer Science & Communication
Networks,Vol 5(1),7-16
[3] I.Hemalatha, Dr. G. P Saradhi Varma, Dr. A.Govardhan, “Preprocessing the Informal Text
for efficient Sentiment Analysis”, International Journal of Emerging Trends & Technology in
Computer Science (IJETTCS) Volume 1, Issue 2, July – August 2012
[4] A.Anil Kumar, S.Chandrasekhar, “Text Data Pre-processing and Dimensionality
Reduction Techniques for Document Clustering”, International Journal of Engineering
Research & Technology (IJERT) Vol. 1 Issue 5, July - 2012 ISSN: 2278-0181
[5] Vairaprakash Gurusamy, SubbuKannan, “Preprocessing Techniques for Text Mining”,
Conference paper- October 2014
[6] ShaidahJusoh , Hejab M. Alfawareh, “Techniques, Applications and Challenging Issues in
Text Mining”, International Journal of Computer Science Issues, Vol. 9, Issue 6, No 2,
November -2012 ISSN (Online): 1694-0814
[7] Anna Stavrianou, PeriklisAndritsos, Nicolas Nicoloyannis, “Overview and Semantic Issues
of Text Mining”, Special Interest Group Management of Data (SIGMOD) Record, September-
2007, Vol. 36, No.3
[8] http://nlpdotnet.com/services/Tokenizer.aspx
[9] http://www.mila.cs.technion.ac.il/tools_token.html
[10] http://textanalysisonline.com/nltk-word-tokenize
[11] http://textanalysisonline.com/textblob-word-tokenize
[12] http://textanalysisonline.com/mbsp-word-tokenize
[13] http://textanalysisonline.com/pattern-word-tokenize
[14] http://text-processing.com/demo/tokenize
AUTHORS
Dr.S.Vijayarani, MCA, M.Phil, Ph.D., is working as Assistant Professor in the
Department of Computer Science, Bharathiar University, and Coimbatore. Her
fields of research interest are data mining, privacy and security issues in data
mining and data streams. She has published papers in the international journals
and presented research papers in international and national conferences.
Ms. R. Janani, MCA. M.Phil is currently pursuing her Ph.D in Computer Science
in the Department of Computer Science and Engineering, Bharathiar University,
Coimbatore. Her fields of interest are Data Mining, Text Mining and Natural
Language Processing.
WEB SPAM CLASSIFICATION USING SUPERVISED ARTIFICIAL
NEURAL NETWORK ALGORITHMS
Ashish Chandra, Mohammad Suaib, and Dr. Rizwan Beg
Department of Computer Science & Engineering, Integral University, Lucknow, India
ABSTRACT
Due to the rapid growth in technology employed by the spammers, there is a need of classifiers that are
more efficient, generic and highly adaptive. Neural Network based technologies have high ability of
adaption as well as generalization. As per our knowledge, very little work has been done in this field
using neural network. We present this paper to fill this gap. This paper evaluates performance of three
supervised learning algorithms of artificial neural network by creating classifiers for the complex problem
of latest web spam pattern classification. These algorithms are Conjugate Gradient algorithm, Resilient
Backpropagation learning, and Levenberg-Marquardt algorithm.
KEYWORDS
Web spam, artificial neural network, back-propagation algorithms, Conjugate Gradient, Resilient
Backpropagation, Levenberg-Marquardt, Web spam classification
PDF Link: http://airccse.org/journal/acii/papers/2115acii02.pdf
Volume Link: http://airccse.org/journal/acii/vol2.html
REFERENCES
[1] Svore, K.M., Wu, Q., Burges, C.J.: "Improving web spam classification using rank-time features,"
in Proc. of the 3rd AIRWeb, Banff, Alberta, Canada (2007) 9–16.
[2] Noi, L.D., Hagenbuchner, M., Scarselli, F., Tsoi, A., "Web spam detection by probability mapping
graphsoms and graph neural networks," in Proc. of the 20th ICANN, Thessaloniki, Greece (2010)
372–381.
[3] M. Erdelyi, A. Garzo, and A. A. Benczur, "Web spam classification: a few features worth more,"
in Proceedings of the 2011 Joint WICOW/AIRWeb Workshop on Web Quality, WebQuality'11,
Hyderabad, India, 2011.
[4] B. Biggio, B. Nelson, and P. Laskov, "Support vector machines under adversarial label noise," in
JMLR: Workshop and Conference Proceedings 20, Taoyuan, Taiwan, 2011, pp. 97–112.
[5] H. Xiao, H. Xiao, and C. Eckert, "Adversarial label flips attack on support vector machines,"
presented at the 20th European Conference on Artificial Intelligence (ECAI), Montpellier, France, 2012.
[6] Adeli H & Hong SL, "Machine learning neural networks genetic algorithms and fuzzy systems" (John
Wiley & Sons Inc., New York, NY, USA) 1995.
[7] Fletcher R & Reeves CM, Computer J, 7 (1964) 149-153.
[8] Reidmiller M & Brain H, "A direct adaptive method for faster back-propagation learning: The
RPROP algorithm," Proc IEEE Int. Conf. Neural Networks, 1993.
[9] More JJ, in "Numerical Analysis", edited by Watson GA, Lecture Notes in Mathematics 630,
(Springer Verlog, Germany) 1997, 105-116.
AUTOMATIC UNSUPERVISED DATA CLASSIFICATION USING JAYA
EVOLUTIONARY ALGORITHM
Ramachandra Rao Kurada1 and Dr. Karteeka Pavan Kanadam2
1
Asst. Prof., Department of Computer Science & Engineering, Shri Vishnu Engineering College for
Women, Bhimavaram
2
Professors, Department of Information Technology, RVR & JC College of Engineering, Guntur
ABSTRACT
In this paper we attempt to solve an automatic clustering problem by optimizing multiple objectives such
as automatic k-determination and a set of cluster validity indices concurrently. The proposed automatic
clustering technique uses the most recent optimization algorithm Jaya as an underlying optimization
stratagem. This evolutionary technique always aims to attain global best solution rather than a local best
solution in larger datasets. The explorations and exploitations imposed on the proposed work results to
detect the number of automatic clusters, appropriate partitioning present in data sets and mere optimal
values towards CVIs frontiers. Twelve datasets of different intricacy are used to endorse the performance
of aimed algorithm. The experiments lay bare that the conjectural advantages of multi objective clustering
optimized with evolutionary approaches decipher into realistic and scalable performance paybacks.
KEYWORDS
Multi objective optimization, evolutionary clustering, automatic clustering, cluster validity indexes, Jaya
evolutionary algorithm.
PDF Link: http://aircconline.com/acii/V3N2/3216acii04.pdf
Volume Link: http://airccse.org/journal/acii/vol3.html
REFERENCES
[1] Zitzler, Eckart, Marco Laumanns, and Stefan Bleuler. "A tutorial on evolutionary multiobjective
optimization." Metaheuristics for multi objective optimization. Springer Berlin Heidelberg, 2004. 3-37.
[2] Sriparna Saha, Sanghamitra Bandy opadhyay, "A new point symmetry based fuzzy genetic
clustering technique for automatic evolution of clusters", Information Sciences 179, 2009, pp. 3230–
3246, doi:10.1016/j.ins.2009.06.013
[3] Sriparna Saha, Sanghamitra Bandyopadhyay,"A symmetry based multiobjective clustering
technique for automatic evolution of clusters", Pattern Recognitions 43, 2010, pp. 738-751,
doi:10.1016/j.patcog.2009.07.004
[4] Eduardo Raul Hruschka, Ricardo J. G. B. Campello, Alex A. Freitas, and Andr´e C. Ponce Leon F. de
Carvalho, "A Survey of Evolutionary Algorithms for Clustering", IEEE transactions on systems, man,
and cybernetics—part c: applications and reviews, Vol. 39-2, 2009, pp. 133-155.
[5] NobukazuMatake, Tomoyuki Hiroyasu, Mitsunori Miki, TomoharuSenda, "Multiobjective
Clustering with Automatic k-determination for Large-scale Data", GECCO’07, July 7–11, 2007,
London, England, United Kingdom, ACM 978-1-59593-697-4/07/0007
[6] EréndiraRendón, Itzel Abundez, Alejandra Arizmendi and Elvia M. Quiroz., "Internal versus
External cluster validation indexes", International journal of computers and communications, 1(5),
2011.
[7] Mukhopadhyay, A., Maulik, U., &Bandyopadhyay, S. (2015). A Survey of Multiobjective
Evolutionary Clustering. ACM Computing Surveys (CSUR),47(4), 61. Advanced Computational
Intelligence: An International Journal (ACII), Vol.3, No.2, April 2016 42
[8] Abadi, M. F. H., &Rezaei, H. (2015). Data Clustering Using Hybridization Strategies of Continuous
Ant Colony Optimization, Particle Swarm Optimization and Genetic Algorithm. British Journal of
Mathematics & Computer Science, 6(4), 336.
[9] Ozturk, C., Hancer, E., &Karaboga, D. (2015). Dynamic clustering with improved binary artificial
bee colony algorithm. Applied Soft Computing, 28, 69-80.
[10] Kumar, V., Chhabra, J. K., & Kumar, D. (2014). “Automatic cluster evolution using gravitational
search algorithm and its application on image segmentation”. Engineering Applications of Artificial
Intelligence, 29, 93-103.
[11] Kuo, R. J., Huang, Y. D., Lin, C. C., Wu, Y. H., &Zulvia, F. E. (2014). “Automatic kernel clustering
with bee colony optimization algorithm”.Information Sciences, 283, 107-122.
[12] Wikaisuksakul, S. (2014). “A multi-objective genetic algorithm with fuzzy c-means for automatic
data clustering”. Applied Soft Computing, 24, 679-691.
[13] Mukhopadhyay, A., Maulik, U., Bandyopadhyay, S., &CoelloCoello, C. (2014). “A survey of
multiobjective evolutionary algorithms for data mining”: Part I. Evolutionary Computation, IEEE
Transactions on, 18(1), 4-19.
[14] Mukhopadhyay, A., Maulik, U., Bandyopadhyay, S., &Coello, C. (2014). “Survey of multiobjective
evolutionary algorithms for data mining”: Part II.Evolutionary Computation, IEEE Transactions on,
18(1), 20-35.
[15] R. Venkata Rao, "Jaya: “A simple and new optimization algorithm for solving constrained and
unconstrained optimization problems",International Journal of Industrial Engineering Computations, 7,
2016, doi: 10.5267/j.ijiec.2015.8.004
[16] Ramachandra Rao Kurada, KanadamKarteekaPavan, AllamAppaRao,"Automatic Teaching–
Learning-Based Optimization-A Novel Clustering Method for Gene Functional
Enrichments",Computational Intelligence Techniques for Comparative Genomics, SpringerBriefs in
Applied Sciences and Technology.2015. 10.1007/978-981-287-338-5.
[17] Ramachandra Rao Kurada, KarteekaPavanKanadam, "A generalized automatic clustering algorithm
using improved TLBO framework", Int. Journal of Applied Sciences and Engineering Research, Vol. 4,
Issue 4, 2015, ISSN 2277 – 9442.
[18] Lichman, M. (2013). UCI Machine Learning Repository [http://archive.ics.uci.edu/ml]. Irvine, CA:
University of California, School of Information and Computer Science.

More Related Content

What's hot

An optimal unsupervised text data segmentation 3
An optimal unsupervised text data segmentation 3An optimal unsupervised text data segmentation 3
An optimal unsupervised text data segmentation 3
prj_publication
 
Automating Software Development Using Artificial Intelligence (AI)
Automating Software Development Using Artificial Intelligence (AI)Automating Software Development Using Artificial Intelligence (AI)
Automating Software Development Using Artificial Intelligence (AI)
Jeremy Bradbury
 
IRJET - Mobile Chatbot for Information Search
 IRJET - Mobile Chatbot for Information Search IRJET - Mobile Chatbot for Information Search
IRJET - Mobile Chatbot for Information Search
IRJET Journal
 
A scenario based approach for dealing with
A scenario based approach for dealing withA scenario based approach for dealing with
A scenario based approach for dealing with
ijcsa
 
IRJET - Conversion of Unsupervised Data to Supervised Data using Topic Mo...
IRJET -  	  Conversion of Unsupervised Data to Supervised Data using Topic Mo...IRJET -  	  Conversion of Unsupervised Data to Supervised Data using Topic Mo...
IRJET - Conversion of Unsupervised Data to Supervised Data using Topic Mo...
IRJET Journal
 
IRJET- Survey for Amazon Fine Food Reviews
IRJET- Survey for Amazon Fine Food ReviewsIRJET- Survey for Amazon Fine Food Reviews
IRJET- Survey for Amazon Fine Food Reviews
IRJET Journal
 
2. an efficient approach for web query preprocessing edit sat
2. an efficient approach for web query preprocessing edit sat2. an efficient approach for web query preprocessing edit sat
2. an efficient approach for web query preprocessing edit sat
IAESIJEECS
 
A Novel Approach for Keyword extraction in learning objects using text mining
A Novel Approach for Keyword extraction in learning objects using text miningA Novel Approach for Keyword extraction in learning objects using text mining
A Novel Approach for Keyword extraction in learning objects using text mining
IJSRD
 
SCCAI- A Student Career Counselling Artificial Intelligence
SCCAI- A Student Career Counselling Artificial IntelligenceSCCAI- A Student Career Counselling Artificial Intelligence
SCCAI- A Student Career Counselling Artificial Intelligence
vivatechijri
 
Survey on evolutionary computation tech techniques and its application in dif...
Survey on evolutionary computation tech techniques and its application in dif...Survey on evolutionary computation tech techniques and its application in dif...
Survey on evolutionary computation tech techniques and its application in dif...
ijitjournal
 
Keyword extraction and clustering for document recommendation in conversations.
Keyword extraction and clustering for document recommendation in conversations.Keyword extraction and clustering for document recommendation in conversations.
Keyword extraction and clustering for document recommendation in conversations.
LeMeniz Infotech
 
An Investigation of Keywords Extraction from Textual Documents using Word2Ve...
 An Investigation of Keywords Extraction from Textual Documents using Word2Ve... An Investigation of Keywords Extraction from Textual Documents using Word2Ve...
An Investigation of Keywords Extraction from Textual Documents using Word2Ve...
IJCSIS Research Publications
 
COMPREHENSIVE ANALYSIS OF NATURAL LANGUAGE PROCESSING TECHNIQUE
COMPREHENSIVE ANALYSIS OF NATURAL LANGUAGE PROCESSING TECHNIQUECOMPREHENSIVE ANALYSIS OF NATURAL LANGUAGE PROCESSING TECHNIQUE
COMPREHENSIVE ANALYSIS OF NATURAL LANGUAGE PROCESSING TECHNIQUE
Journal For Research
 
Deep learning for genomics: Present and future
Deep learning for genomics: Present and futureDeep learning for genomics: Present and future
Deep learning for genomics: Present and future
Deakin University
 
Convolutional recurrent neural network with template based representation for...
Convolutional recurrent neural network with template based representation for...Convolutional recurrent neural network with template based representation for...
Convolutional recurrent neural network with template based representation for...
IJECEIAES
 
C0441216
C0441216C0441216
C0441216
IJERA Editor
 
76 s201906
76 s20190676 s201906
76 s201906
IJRAT
 
System Based Mining for Discovering Human Interaction in Meetings
System Based Mining for Discovering Human Interaction in MeetingsSystem Based Mining for Discovering Human Interaction in Meetings
System Based Mining for Discovering Human Interaction in Meetings
IRJET Journal
 

What's hot (20)

An optimal unsupervised text data segmentation 3
An optimal unsupervised text data segmentation 3An optimal unsupervised text data segmentation 3
An optimal unsupervised text data segmentation 3
 
Automating Software Development Using Artificial Intelligence (AI)
Automating Software Development Using Artificial Intelligence (AI)Automating Software Development Using Artificial Intelligence (AI)
Automating Software Development Using Artificial Intelligence (AI)
 
IRJET - Mobile Chatbot for Information Search
 IRJET - Mobile Chatbot for Information Search IRJET - Mobile Chatbot for Information Search
IRJET - Mobile Chatbot for Information Search
 
A scenario based approach for dealing with
A scenario based approach for dealing withA scenario based approach for dealing with
A scenario based approach for dealing with
 
IRJET - Conversion of Unsupervised Data to Supervised Data using Topic Mo...
IRJET -  	  Conversion of Unsupervised Data to Supervised Data using Topic Mo...IRJET -  	  Conversion of Unsupervised Data to Supervised Data using Topic Mo...
IRJET - Conversion of Unsupervised Data to Supervised Data using Topic Mo...
 
IRJET- Survey for Amazon Fine Food Reviews
IRJET- Survey for Amazon Fine Food ReviewsIRJET- Survey for Amazon Fine Food Reviews
IRJET- Survey for Amazon Fine Food Reviews
 
2. an efficient approach for web query preprocessing edit sat
2. an efficient approach for web query preprocessing edit sat2. an efficient approach for web query preprocessing edit sat
2. an efficient approach for web query preprocessing edit sat
 
A Novel Approach for Keyword extraction in learning objects using text mining
A Novel Approach for Keyword extraction in learning objects using text miningA Novel Approach for Keyword extraction in learning objects using text mining
A Novel Approach for Keyword extraction in learning objects using text mining
 
SCCAI- A Student Career Counselling Artificial Intelligence
SCCAI- A Student Career Counselling Artificial IntelligenceSCCAI- A Student Career Counselling Artificial Intelligence
SCCAI- A Student Career Counselling Artificial Intelligence
 
Survey on evolutionary computation tech techniques and its application in dif...
Survey on evolutionary computation tech techniques and its application in dif...Survey on evolutionary computation tech techniques and its application in dif...
Survey on evolutionary computation tech techniques and its application in dif...
 
Keyword extraction and clustering for document recommendation in conversations.
Keyword extraction and clustering for document recommendation in conversations.Keyword extraction and clustering for document recommendation in conversations.
Keyword extraction and clustering for document recommendation in conversations.
 
An Investigation of Keywords Extraction from Textual Documents using Word2Ve...
 An Investigation of Keywords Extraction from Textual Documents using Word2Ve... An Investigation of Keywords Extraction from Textual Documents using Word2Ve...
An Investigation of Keywords Extraction from Textual Documents using Word2Ve...
 
COMPREHENSIVE ANALYSIS OF NATURAL LANGUAGE PROCESSING TECHNIQUE
COMPREHENSIVE ANALYSIS OF NATURAL LANGUAGE PROCESSING TECHNIQUECOMPREHENSIVE ANALYSIS OF NATURAL LANGUAGE PROCESSING TECHNIQUE
COMPREHENSIVE ANALYSIS OF NATURAL LANGUAGE PROCESSING TECHNIQUE
 
FINALCV - Copy
FINALCV - CopyFINALCV - Copy
FINALCV - Copy
 
Deep learning for genomics: Present and future
Deep learning for genomics: Present and futureDeep learning for genomics: Present and future
Deep learning for genomics: Present and future
 
Convolutional recurrent neural network with template based representation for...
Convolutional recurrent neural network with template based representation for...Convolutional recurrent neural network with template based representation for...
Convolutional recurrent neural network with template based representation for...
 
Revanth Vemulapalli_pdf
Revanth Vemulapalli_pdfRevanth Vemulapalli_pdf
Revanth Vemulapalli_pdf
 
C0441216
C0441216C0441216
C0441216
 
76 s201906
76 s20190676 s201906
76 s201906
 
System Based Mining for Discovering Human Interaction in Meetings
System Based Mining for Discovering Human Interaction in MeetingsSystem Based Mining for Discovering Human Interaction in Meetings
System Based Mining for Discovering Human Interaction in Meetings
 

Similar to Top cited articles 2020 - Advanced Computational Intelligence: An International Journal (ACII)

June 2020: Top Download Articles in Advanced Computational Intelligence
June 2020: Top Download Articles in Advanced Computational IntelligenceJune 2020: Top Download Articles in Advanced Computational Intelligence
June 2020: Top Download Articles in Advanced Computational Intelligence
aciijournal
 
Applying Soft Computing Techniques in Information Retrieval
Applying Soft Computing Techniques in Information RetrievalApplying Soft Computing Techniques in Information Retrieval
Applying Soft Computing Techniques in Information Retrieval
IJAEMSJORNAL
 
A Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic AlgorithmA Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic Algorithm
ijtsrd
 
Survey on MapReduce in Big Data Clustering using Machine Learning Algorithms
Survey on MapReduce in Big Data Clustering using Machine Learning AlgorithmsSurvey on MapReduce in Big Data Clustering using Machine Learning Algorithms
Survey on MapReduce in Big Data Clustering using Machine Learning Algorithms
IRJET Journal
 
A Review on Text Mining in Data Mining
A Review on Text Mining in Data Mining  A Review on Text Mining in Data Mining
A Review on Text Mining in Data Mining
ijsc
 
Top 10 cited articles in nlp
Top 10 cited articles in nlpTop 10 cited articles in nlp
Top 10 cited articles in nlp
kevig
 
Top 10 neural networks
Top 10 neural networksTop 10 neural networks
Top 10 neural networks
ijsc
 
Extraction and Retrieval of Web based Content in Web Engineering
Extraction and Retrieval of Web based Content in Web EngineeringExtraction and Retrieval of Web based Content in Web Engineering
Extraction and Retrieval of Web based Content in Web Engineering
IRJET Journal
 
Semantically Enriched Knowledge Extraction With Data Mining
Semantically Enriched Knowledge Extraction With Data MiningSemantically Enriched Knowledge Extraction With Data Mining
Semantically Enriched Knowledge Extraction With Data MiningEditor IJCATR
 
Mining in Ontology with Multi Agent System in Semantic Web : A Novel Approach
Mining in Ontology with Multi Agent System in Semantic Web : A Novel ApproachMining in Ontology with Multi Agent System in Semantic Web : A Novel Approach
Mining in Ontology with Multi Agent System in Semantic Web : A Novel Approach
ijma
 
IRJET- Improved Model for Big Data Analytics using Dynamic Multi-Swarm Op...
IRJET-  	  Improved Model for Big Data Analytics using Dynamic Multi-Swarm Op...IRJET-  	  Improved Model for Big Data Analytics using Dynamic Multi-Swarm Op...
IRJET- Improved Model for Big Data Analytics using Dynamic Multi-Swarm Op...
IRJET Journal
 
research Paper face recognition attendance system
research Paper face recognition attendance systemresearch Paper face recognition attendance system
research Paper face recognition attendance system
AnkitRao82
 
A genetic based research framework 3
A genetic based research framework 3A genetic based research framework 3
A genetic based research framework 3
prj_publication
 
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
ijujournal
 
IRJET- Factoid Question and Answering System
IRJET-  	  Factoid Question and Answering SystemIRJET-  	  Factoid Question and Answering System
IRJET- Factoid Question and Answering System
IRJET Journal
 
Integrating compression technique for data mining
Integrating compression technique for data  miningIntegrating compression technique for data  mining
Integrating compression technique for data mining
Dr.Manmohan Singh
 
Book of abstract volume 8 no 9 ijcsis december 2010
Book of abstract volume 8 no 9 ijcsis december 2010Book of abstract volume 8 no 9 ijcsis december 2010
Book of abstract volume 8 no 9 ijcsis december 2010Oladokun Sulaiman
 
April 2022 - Top 10 cited articles.pdf
April 2022 - Top 10 cited articles.pdfApril 2022 - Top 10 cited articles.pdf
April 2022 - Top 10 cited articles.pdf
kevig
 
Introduction_PPT.pptx
Introduction_PPT.pptxIntroduction_PPT.pptx
Introduction_PPT.pptx
tariqqureshi33
 
Evaluation of Different Machine.pptx
Evaluation of Different Machine.pptxEvaluation of Different Machine.pptx
Evaluation of Different Machine.pptx
tariqqureshi33
 

Similar to Top cited articles 2020 - Advanced Computational Intelligence: An International Journal (ACII) (20)

June 2020: Top Download Articles in Advanced Computational Intelligence
June 2020: Top Download Articles in Advanced Computational IntelligenceJune 2020: Top Download Articles in Advanced Computational Intelligence
June 2020: Top Download Articles in Advanced Computational Intelligence
 
Applying Soft Computing Techniques in Information Retrieval
Applying Soft Computing Techniques in Information RetrievalApplying Soft Computing Techniques in Information Retrieval
Applying Soft Computing Techniques in Information Retrieval
 
A Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic AlgorithmA Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic Algorithm
 
Survey on MapReduce in Big Data Clustering using Machine Learning Algorithms
Survey on MapReduce in Big Data Clustering using Machine Learning AlgorithmsSurvey on MapReduce in Big Data Clustering using Machine Learning Algorithms
Survey on MapReduce in Big Data Clustering using Machine Learning Algorithms
 
A Review on Text Mining in Data Mining
A Review on Text Mining in Data Mining  A Review on Text Mining in Data Mining
A Review on Text Mining in Data Mining
 
Top 10 cited articles in nlp
Top 10 cited articles in nlpTop 10 cited articles in nlp
Top 10 cited articles in nlp
 
Top 10 neural networks
Top 10 neural networksTop 10 neural networks
Top 10 neural networks
 
Extraction and Retrieval of Web based Content in Web Engineering
Extraction and Retrieval of Web based Content in Web EngineeringExtraction and Retrieval of Web based Content in Web Engineering
Extraction and Retrieval of Web based Content in Web Engineering
 
Semantically Enriched Knowledge Extraction With Data Mining
Semantically Enriched Knowledge Extraction With Data MiningSemantically Enriched Knowledge Extraction With Data Mining
Semantically Enriched Knowledge Extraction With Data Mining
 
Mining in Ontology with Multi Agent System in Semantic Web : A Novel Approach
Mining in Ontology with Multi Agent System in Semantic Web : A Novel ApproachMining in Ontology with Multi Agent System in Semantic Web : A Novel Approach
Mining in Ontology with Multi Agent System in Semantic Web : A Novel Approach
 
IRJET- Improved Model for Big Data Analytics using Dynamic Multi-Swarm Op...
IRJET-  	  Improved Model for Big Data Analytics using Dynamic Multi-Swarm Op...IRJET-  	  Improved Model for Big Data Analytics using Dynamic Multi-Swarm Op...
IRJET- Improved Model for Big Data Analytics using Dynamic Multi-Swarm Op...
 
research Paper face recognition attendance system
research Paper face recognition attendance systemresearch Paper face recognition attendance system
research Paper face recognition attendance system
 
A genetic based research framework 3
A genetic based research framework 3A genetic based research framework 3
A genetic based research framework 3
 
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
 
IRJET- Factoid Question and Answering System
IRJET-  	  Factoid Question and Answering SystemIRJET-  	  Factoid Question and Answering System
IRJET- Factoid Question and Answering System
 
Integrating compression technique for data mining
Integrating compression technique for data  miningIntegrating compression technique for data  mining
Integrating compression technique for data mining
 
Book of abstract volume 8 no 9 ijcsis december 2010
Book of abstract volume 8 no 9 ijcsis december 2010Book of abstract volume 8 no 9 ijcsis december 2010
Book of abstract volume 8 no 9 ijcsis december 2010
 
April 2022 - Top 10 cited articles.pdf
April 2022 - Top 10 cited articles.pdfApril 2022 - Top 10 cited articles.pdf
April 2022 - Top 10 cited articles.pdf
 
Introduction_PPT.pptx
Introduction_PPT.pptxIntroduction_PPT.pptx
Introduction_PPT.pptx
 
Evaluation of Different Machine.pptx
Evaluation of Different Machine.pptxEvaluation of Different Machine.pptx
Evaluation of Different Machine.pptx
 

Recently uploaded

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 

Recently uploaded (20)

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 

Top cited articles 2020 - Advanced Computational Intelligence: An International Journal (ACII)

  • 1. TOP CITED ARTICLES 2020 Advanced Computational Intelligence: An International Journal (ACII) ISSN:2454-3934 http://airccse.org/journal/acii/index.html
  • 2. TEXT MINING: OPEN SOURCE TOKENIZATION TOOLS – AN ANALYSIS Dr. S.Vijayarani1 and Ms. R.Janani2 1 Assistant Professor, 2 Ph.D Research Scholar, Department of Computer Science, School of Computer Science and Engineering, Bharathiar University, Coimbatore. ABSTRACT Text mining is the process of extracting interesting and non-trivial knowledge or information from unstructured text data. Text mining is the multidisciplinary field which draws on data mining, machine learning, information retrieval, omputational linguistics and statistics. Important text mining processes are information extraction, information retrieval, natural language processing, text classification, content analysis and text clustering. All these processes are required to complete the preprocessing step before doing their intended task. Pre-processing significantly reduces the size of the input text documents and the actions involved in this step are sentence boundary determination, natural language specific stop-word elimination, tokenization and stemming. Among this, the most essential and important action is the tokenization. Tokenization helps to divide the textual information into individual words. For performing tokenization process, there are many open source tools are available. The main objective of this work is to analyze the performance of the seven open source tokenization tools. For this comparative analysis, we have taken Nlpdotnet Tokenizer, Mila Tokenizer, NLTK Word Tokenize, TextBlob Word Tokenize, MBSP Word Tokenize, Pattern Word Tokenize and Word Tokenization with Python NLTK. Based on the results, we observed that the Nlpdotnet Tokenizer tool performance is better than other tools. KEYWORDS: Text Mining, Preprocessing, Tokenization, machine learning, NLP PDF Link: http://aircconline.com/acii/V3N1/3116acii04.pdf Volume Link: http://airccse.org/journal/acii/vol3.html
  • 3. REFERENCES [1] C.Ramasubramanian , R.Ramya, “Effective Pre-Processing Activities in Text Mining using Improved Porter’s Stemming Algorithm”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 12, December 2013 [2] Dr. S. Vijayarani , Ms. J. Ilamathi , Ms. Nithya, “Preprocessing Techniques for Text Mining – An Overview”, International Journal of Computer Science & Communication Networks,Vol 5(1),7-16 [3] I.Hemalatha, Dr. G. P Saradhi Varma, Dr. A.Govardhan, “Preprocessing the Informal Text for efficient Sentiment Analysis”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Volume 1, Issue 2, July – August 2012 [4] A.Anil Kumar, S.Chandrasekhar, “Text Data Pre-processing and Dimensionality Reduction Techniques for Document Clustering”, International Journal of Engineering Research & Technology (IJERT) Vol. 1 Issue 5, July - 2012 ISSN: 2278-0181 [5] Vairaprakash Gurusamy, SubbuKannan, “Preprocessing Techniques for Text Mining”, Conference paper- October 2014 [6] ShaidahJusoh , Hejab M. Alfawareh, “Techniques, Applications and Challenging Issues in Text Mining”, International Journal of Computer Science Issues, Vol. 9, Issue 6, No 2, November -2012 ISSN (Online): 1694-0814 [7] Anna Stavrianou, PeriklisAndritsos, Nicolas Nicoloyannis, “Overview and Semantic Issues of Text Mining”, Special Interest Group Management of Data (SIGMOD) Record, September- 2007, Vol. 36, No.3 [8] http://nlpdotnet.com/services/Tokenizer.aspx [9] http://www.mila.cs.technion.ac.il/tools_token.html [10] http://textanalysisonline.com/nltk-word-tokenize [11] http://textanalysisonline.com/textblob-word-tokenize [12] http://textanalysisonline.com/mbsp-word-tokenize [13] http://textanalysisonline.com/pattern-word-tokenize [14] http://text-processing.com/demo/tokenize
  • 4. AUTHORS Dr.S.Vijayarani, MCA, M.Phil, Ph.D., is working as Assistant Professor in the Department of Computer Science, Bharathiar University, and Coimbatore. Her fields of research interest are data mining, privacy and security issues in data mining and data streams. She has published papers in the international journals and presented research papers in international and national conferences. Ms. R. Janani, MCA. M.Phil is currently pursuing her Ph.D in Computer Science in the Department of Computer Science and Engineering, Bharathiar University, Coimbatore. Her fields of interest are Data Mining, Text Mining and Natural Language Processing.
  • 5. WEB SPAM CLASSIFICATION USING SUPERVISED ARTIFICIAL NEURAL NETWORK ALGORITHMS Ashish Chandra, Mohammad Suaib, and Dr. Rizwan Beg Department of Computer Science & Engineering, Integral University, Lucknow, India ABSTRACT Due to the rapid growth in technology employed by the spammers, there is a need of classifiers that are more efficient, generic and highly adaptive. Neural Network based technologies have high ability of adaption as well as generalization. As per our knowledge, very little work has been done in this field using neural network. We present this paper to fill this gap. This paper evaluates performance of three supervised learning algorithms of artificial neural network by creating classifiers for the complex problem of latest web spam pattern classification. These algorithms are Conjugate Gradient algorithm, Resilient Backpropagation learning, and Levenberg-Marquardt algorithm. KEYWORDS Web spam, artificial neural network, back-propagation algorithms, Conjugate Gradient, Resilient Backpropagation, Levenberg-Marquardt, Web spam classification PDF Link: http://airccse.org/journal/acii/papers/2115acii02.pdf Volume Link: http://airccse.org/journal/acii/vol2.html
  • 6. REFERENCES [1] Svore, K.M., Wu, Q., Burges, C.J.: "Improving web spam classification using rank-time features," in Proc. of the 3rd AIRWeb, Banff, Alberta, Canada (2007) 9–16. [2] Noi, L.D., Hagenbuchner, M., Scarselli, F., Tsoi, A., "Web spam detection by probability mapping graphsoms and graph neural networks," in Proc. of the 20th ICANN, Thessaloniki, Greece (2010) 372–381. [3] M. Erdelyi, A. Garzo, and A. A. Benczur, "Web spam classification: a few features worth more," in Proceedings of the 2011 Joint WICOW/AIRWeb Workshop on Web Quality, WebQuality'11, Hyderabad, India, 2011. [4] B. Biggio, B. Nelson, and P. Laskov, "Support vector machines under adversarial label noise," in JMLR: Workshop and Conference Proceedings 20, Taoyuan, Taiwan, 2011, pp. 97–112. [5] H. Xiao, H. Xiao, and C. Eckert, "Adversarial label flips attack on support vector machines," presented at the 20th European Conference on Artificial Intelligence (ECAI), Montpellier, France, 2012. [6] Adeli H & Hong SL, "Machine learning neural networks genetic algorithms and fuzzy systems" (John Wiley & Sons Inc., New York, NY, USA) 1995. [7] Fletcher R & Reeves CM, Computer J, 7 (1964) 149-153. [8] Reidmiller M & Brain H, "A direct adaptive method for faster back-propagation learning: The RPROP algorithm," Proc IEEE Int. Conf. Neural Networks, 1993. [9] More JJ, in "Numerical Analysis", edited by Watson GA, Lecture Notes in Mathematics 630, (Springer Verlog, Germany) 1997, 105-116.
  • 7. AUTOMATIC UNSUPERVISED DATA CLASSIFICATION USING JAYA EVOLUTIONARY ALGORITHM Ramachandra Rao Kurada1 and Dr. Karteeka Pavan Kanadam2 1 Asst. Prof., Department of Computer Science & Engineering, Shri Vishnu Engineering College for Women, Bhimavaram 2 Professors, Department of Information Technology, RVR & JC College of Engineering, Guntur ABSTRACT In this paper we attempt to solve an automatic clustering problem by optimizing multiple objectives such as automatic k-determination and a set of cluster validity indices concurrently. The proposed automatic clustering technique uses the most recent optimization algorithm Jaya as an underlying optimization stratagem. This evolutionary technique always aims to attain global best solution rather than a local best solution in larger datasets. The explorations and exploitations imposed on the proposed work results to detect the number of automatic clusters, appropriate partitioning present in data sets and mere optimal values towards CVIs frontiers. Twelve datasets of different intricacy are used to endorse the performance of aimed algorithm. The experiments lay bare that the conjectural advantages of multi objective clustering optimized with evolutionary approaches decipher into realistic and scalable performance paybacks. KEYWORDS Multi objective optimization, evolutionary clustering, automatic clustering, cluster validity indexes, Jaya evolutionary algorithm. PDF Link: http://aircconline.com/acii/V3N2/3216acii04.pdf Volume Link: http://airccse.org/journal/acii/vol3.html
  • 8. REFERENCES [1] Zitzler, Eckart, Marco Laumanns, and Stefan Bleuler. "A tutorial on evolutionary multiobjective optimization." Metaheuristics for multi objective optimization. Springer Berlin Heidelberg, 2004. 3-37. [2] Sriparna Saha, Sanghamitra Bandy opadhyay, "A new point symmetry based fuzzy genetic clustering technique for automatic evolution of clusters", Information Sciences 179, 2009, pp. 3230– 3246, doi:10.1016/j.ins.2009.06.013 [3] Sriparna Saha, Sanghamitra Bandyopadhyay,"A symmetry based multiobjective clustering technique for automatic evolution of clusters", Pattern Recognitions 43, 2010, pp. 738-751, doi:10.1016/j.patcog.2009.07.004 [4] Eduardo Raul Hruschka, Ricardo J. G. B. Campello, Alex A. Freitas, and Andr´e C. Ponce Leon F. de Carvalho, "A Survey of Evolutionary Algorithms for Clustering", IEEE transactions on systems, man, and cybernetics—part c: applications and reviews, Vol. 39-2, 2009, pp. 133-155. [5] NobukazuMatake, Tomoyuki Hiroyasu, Mitsunori Miki, TomoharuSenda, "Multiobjective Clustering with Automatic k-determination for Large-scale Data", GECCO’07, July 7–11, 2007, London, England, United Kingdom, ACM 978-1-59593-697-4/07/0007 [6] EréndiraRendón, Itzel Abundez, Alejandra Arizmendi and Elvia M. Quiroz., "Internal versus External cluster validation indexes", International journal of computers and communications, 1(5), 2011. [7] Mukhopadhyay, A., Maulik, U., &Bandyopadhyay, S. (2015). A Survey of Multiobjective Evolutionary Clustering. ACM Computing Surveys (CSUR),47(4), 61. Advanced Computational Intelligence: An International Journal (ACII), Vol.3, No.2, April 2016 42 [8] Abadi, M. F. H., &Rezaei, H. (2015). Data Clustering Using Hybridization Strategies of Continuous Ant Colony Optimization, Particle Swarm Optimization and Genetic Algorithm. British Journal of Mathematics & Computer Science, 6(4), 336. [9] Ozturk, C., Hancer, E., &Karaboga, D. (2015). Dynamic clustering with improved binary artificial bee colony algorithm. Applied Soft Computing, 28, 69-80. [10] Kumar, V., Chhabra, J. K., & Kumar, D. (2014). “Automatic cluster evolution using gravitational search algorithm and its application on image segmentation”. Engineering Applications of Artificial Intelligence, 29, 93-103. [11] Kuo, R. J., Huang, Y. D., Lin, C. C., Wu, Y. H., &Zulvia, F. E. (2014). “Automatic kernel clustering with bee colony optimization algorithm”.Information Sciences, 283, 107-122. [12] Wikaisuksakul, S. (2014). “A multi-objective genetic algorithm with fuzzy c-means for automatic data clustering”. Applied Soft Computing, 24, 679-691. [13] Mukhopadhyay, A., Maulik, U., Bandyopadhyay, S., &CoelloCoello, C. (2014). “A survey of multiobjective evolutionary algorithms for data mining”: Part I. Evolutionary Computation, IEEE Transactions on, 18(1), 4-19.
  • 9. [14] Mukhopadhyay, A., Maulik, U., Bandyopadhyay, S., &Coello, C. (2014). “Survey of multiobjective evolutionary algorithms for data mining”: Part II.Evolutionary Computation, IEEE Transactions on, 18(1), 20-35. [15] R. Venkata Rao, "Jaya: “A simple and new optimization algorithm for solving constrained and unconstrained optimization problems",International Journal of Industrial Engineering Computations, 7, 2016, doi: 10.5267/j.ijiec.2015.8.004 [16] Ramachandra Rao Kurada, KanadamKarteekaPavan, AllamAppaRao,"Automatic Teaching– Learning-Based Optimization-A Novel Clustering Method for Gene Functional Enrichments",Computational Intelligence Techniques for Comparative Genomics, SpringerBriefs in Applied Sciences and Technology.2015. 10.1007/978-981-287-338-5. [17] Ramachandra Rao Kurada, KarteekaPavanKanadam, "A generalized automatic clustering algorithm using improved TLBO framework", Int. Journal of Applied Sciences and Engineering Research, Vol. 4, Issue 4, 2015, ISSN 2277 – 9442. [18] Lichman, M. (2013). UCI Machine Learning Repository [http://archive.ics.uci.edu/ml]. Irvine, CA: University of California, School of Information and Computer Science.