Zobrazeno 1 - 10
of 262
pro vyhledávání: '"Primary clustering"'
Autor:
Zahra Sahebkaram, Alireza Norouzi
Publikováno v:
Majlesi Journal of Electrical Engineering. 15:19-24
Ensemble Clustering (EC) methods became more popular in recent years. In this methods, some primary clustering algorithms are considered to be as inputs and a single cluster is generated to achieve the best results combined with each other. In this p
Publikováno v:
Journal of Intelligent Information Systems. 56:1-23
The Latent Dirichlet Allocation (LDA) topic model is a popular research topic in the field of text mining. In this paper, Sentiment Word Co-occurrence and Knowledge Pair Feature Extraction based LDA Short Text Clustering Algorithm (SKP-LDA) is propos
Publikováno v:
2020 3rd International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE).
To improve the pertinence and effectiveness of equipment maintenance work and reasonably reduce the maintenance cost, it is urgent to carry out research on the online diagnosis information collection of key equipment for power distribution. Based on
Publikováno v:
Pattern Analysis and Applications. 22:133-145
Clustering as a major task in data mining is responsible for discovering hidden patterns in unlabeled datasets. Finding the best clustering is also considered as one of the most challenging problems in data mining. Due to the problem complexity and t
Publikováno v:
Proceedings of the VLDB Endowment. 10:2021-2024
The past decade has been marked by the (continued) explosion of diverse data content and the fast development of intelligent data analytics techniques. One problem we identified in the mid-2000s was similarity search of feature-rich data. The challen
Publikováno v:
Wireless Personal Communications. 96:2289-2303
In recent years, considerable effort has been devoted to research on hash function. Nevertheless, it’s hard to obtain the proporties of sensitivity, confusion and diffusion, collision resistance, and high efficiency simultaneously. Based on researc
Publikováno v:
IEEE Transactions on Image Processing. 25:4514-4524
© 1992-2012 IEEE. Hash-based nearest neighbor search has become attractive in many applications. However, the quantization in hashing usually degenerates the discriminative power when using Hamming distance ranking. Besides, for large-scale visual s
Publikováno v:
Al-Riyami, A, Zhang, N & Keane, J 2016, ' Impact of Hash Value Truncation on ID Anonymity in Wireless Sensor Networks ', Ad Hoc Networks, vol. 45, pp. 80-103 . https://doi.org/10.1016/j.adhoc.2016.02.019
Hash functions have been used to address security requirements such as integrity, message authentication and non-repudiation. In WSNs, these functions are also used to preserve sensor nodes' identity (ID) anonymity, i.e., they are used to generate an
Publikováno v:
Information Systems. 58:105-125
This paper presents a memory-constrained hash join algorithm (PaMeCo Join) designed to operate with main-memory column-store database systems. Whilst RAM has become more affordable and the popularity of main-memory database systems continues to grow,
Autor:
Yantao Li
Publikováno v:
Optik. 127:4484-4489
We analyze the computational collision problem on a hash algorithm based on chaotic tent map, and then present an improvement of the original algorithm in this paper. More specifically, we utilize message extension to enhance the correlation of plain