718 research outputs found

    Certainty of outlier and boundary points processing in data mining

    Full text link
    Data certainty is one of the issues in the real-world applications which is caused by unwanted noise in data. Recently, more attentions have been paid to overcome this problem. We proposed a new method based on neutrosophic set (NS) theory to detect boundary and outlier points as challenging points in clustering methods. Generally, firstly, a certainty value is assigned to data points based on the proposed definition in NS. Then, certainty set is presented for the proposed cost function in NS domain by considering a set of main clusters and noise cluster. After that, the proposed cost function is minimized by gradient descent method. Data points are clustered based on their membership degrees. Outlier points are assigned to noise cluster and boundary points are assigned to main clusters with almost same membership degrees. To show the effectiveness of the proposed method, two types of datasets including 3 datasets in Scatter type and 4 datasets in UCI type are used. Results demonstrate that the proposed cost function handles boundary and outlier points with more accurate membership degrees and outperforms existing state of the art clustering methods.Comment: Conference Paper, 6 page

    A Novel Biometric Key Security System with Clustering and Convolutional Neural Network for WSN

    Get PDF
    Development in Wireless Communication technologies paves a way for the expansion of application and enhancement of security in Wireless Sensor Network using sensor nodes for communicating within the same or different clusters. In this work, a novel biometric key based security system is proposed with Optimized Convolutional Neural Network to differentiate authorized users from intruders to access network data and resources. Texture features are extracted from biometrics like Fingerprint, Retina and Facial expression to produce a biometric key, which is combined with pseudo random function for producing the secured private key for each user. Individually Adaptive Possibilistic C-Means Clustering and Kernel based Fuzzy C-Means Clustering are applied to the sensor nodes for grouping them into clusters based on the distance between the Cluster head and Cluster members. Group key obtained from fuzzy membership function of prime numbers is employed for packet transfer among groups. The three key security schemes proposed are Fingerprint Key based Security System, Retina Key based Security System, and Multibiometric Key based Security System with neural network for Wireless Sensor Networks. The results obtained from MATLAB Simulator indicates that the Multibiometric system with kernel clustering is highly secured and achieves simulation time less by 9%, energy consumption diminished by 20%, delay is reduced by 2%, Attack Detection Rate is improved by 5%, Packet Delivery Ratio increases by 6%, Packet Loss Ratio is decreased by 27%, Accuracy enhanced by 2%, and achieves 1% better precision compared to other methods

    Techniques for clustering gene expression data

    Get PDF
    Many clustering techniques have been proposed for the analysis of gene expression data obtained from microarray experiments. However, choice of suitable method(s) for a given experimental dataset is not straightforward. Common approaches do not translate well and fail to take account of the data profile. This review paper surveys state of the art applications which recognises these limitations and implements procedures to overcome them. It provides a framework for the evaluation of clustering in gene expression analyses. The nature of microarray data is discussed briefly. Selected examples are presented for the clustering methods considered

    Informational Paradigm, management of uncertainty and theoretical formalisms in the clustering framework: A review

    Get PDF
    Fifty years have gone by since the publication of the first paper on clustering based on fuzzy sets theory. In 1965, L.A. Zadeh had published “Fuzzy Sets” [335]. After only one year, the first effects of this seminal paper began to emerge, with the pioneering paper on clustering by Bellman, Kalaba, Zadeh [33], in which they proposed a prototypal of clustering algorithm based on the fuzzy sets theory

    Improvement for detection of microcalcifications through clustering algorithms and artificial neural networks

    Get PDF
    A new method for detecting microcalcifications in regions of interest (ROIs) extracted from digitized mammograms is proposed. The top-hat transform is a technique based on mathematical morphology operations and, in this paper, is used to perform contrast enhancement of the mi-crocalcifications. To improve microcalcification detection, a novel image sub-segmentation approach based on the possibilistic fuzzy c-means algorithm is used. From the original ROIs, window-based features, such as the mean and standard deviation, were extracted; these features were used as an input vector in a classifier. The classifier is based on an artificial neural network to identify patterns belonging to microcalcifications and healthy tissue. Our results show that the proposed method is a good alternative for automatically detecting microcalcifications, because this stage is an important part of early breast cancer detectio
    corecore