An efficient robust automatic clustering algorithm for interval data

Author(s):  
Tai Vo-Van ◽  
Lethikim Ngoc ◽  
Thao Nguyen-Trang
2020 ◽  
Vol 8 (1) ◽  
pp. 84-90
Author(s):  
R. Lalchhanhima ◽  
◽  
Debdatta Kandar ◽  
R. Chawngsangpuii ◽  
Vanlalmuansangi Khenglawt ◽  
...  

Fuzzy C-Means is an unsupervised clustering algorithm for the automatic clustering of data. Synthetic Aperture Radar Image Segmentation has been a challenging task because of the presence of speckle noise. Therefore the segmentation process can not directly rely on the intensity information alone but must consider several derived features in order to get satisfactory segmentation results. In this paper, it is attempted to use the fuzzy nature of classification for the purpose of unsupervised region segmentation in which FCM is employed. Different features are obtained by filtering of the image by using different spatial filters and are selected for segmentation criteria. The segmentation performance is determined by the accuracy compared with a different state of the art techniques proposed recently.


Author(s):  
Seyed Jalaleddin Mousavirad ◽  
Gerald Schaefer ◽  
Mahshid Helali Moghadam ◽  
Mehrdad Saadatmand ◽  
Mahdi Pedram

2015 ◽  
Vol 2015 ◽  
pp. 1-9 ◽  
Author(s):  
Cheng Lu ◽  
Shiji Song ◽  
Cheng Wu

The Affinity Propagation (AP) algorithm is an effective algorithm for clustering analysis, but it can not be directly applicable to the case of incomplete data. In view of the prevalence of missing data and the uncertainty of missing attributes, we put forward a modified AP clustering algorithm based onK-nearest neighbor intervals (KNNI) for incomplete data. Based on an Improved Partial Data Strategy, the proposed algorithm estimates the KNNI representation of missing attributes by using the attribute distribution information of the available data. The similarity function can be changed by dealing with the interval data. Then the improved AP algorithm can be applicable to the case of incomplete data. Experiments on several UCI datasets show that the proposed algorithm achieves impressive clustering results.


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Juan Moreno García-Loygorri ◽  
César Briso-Rodríguez ◽  
Israel Arnedo ◽  
César Calvo ◽  
Miguel A. G. Laso ◽  
...  

Passenger trains and especially metro trains have been identified as one of the key scenarios for 5G deployments. The wireless channel inside a train car is reported in the frequency range between 26.5 GHz and 40 GHz. These bands have received a lot of interest for high-density scenarios with a high-traffic demand, two of the most relevant aspects of a 5G network. In this paper we provide a full description of the wideband channel estimating Power-Delay Profiles (PDP), Saleh-Valenzuela model parameters, time-of-arrival (TOA) ranging, and path-loss results. Moreover, the performance of an automatic clustering algorithm is evaluated. The results show a remarkable degree of coherence and general conclusions are obtained.


2015 ◽  
Vol 15 (03n04) ◽  
pp. 1540002
Author(s):  
YANJING HU ◽  
QINGQI PEI ◽  
LIAOJUN PANG

Protocol's abnormal behavior analysis is an important task in protocol reverse analysis. Traditional protocol reverse analysis focus on the protocol message format, but protocol behavior especially the abnormal behavior is rare studied. In this paper, protocol behavior is represented by the labeled behavior instruction sequences. Similar behavior instruction sequences mean the similar protocol behavior. Using our developed virtual analysis platform HiddenDisc, we can capture a variety of known or unknown protocols' behavior instruction sequences. All kinds of executed or unexecuted instruction sequences can automatic clustering by our designed instruction clustering algorithm. Thereby we can distinguish and mine the unknown protocols' potential abnormal behavior. The mined potential abnormal behavior instruction sequences are executed, monitored and analyzed on HiddenDisc to determine whether it is an abnormal behavior and what is the behavior's nature. Using the instruction clustering algorithm, we have analyzed 1297 protocol samples, mined 193 potential abnormal instruction sequences, and determined 187 malicious abnormal behaviors by regression testing. Experimental results show that our proposed instruction clustering algorithm has high efficiency and accuracy, can mine unknown protocols' abnormal behaviors effectively, and enhance the initiative defense capability of network security.


Sign in / Sign up

Export Citation Format

Share Document