Does 3D Cellular Automata Using WordNet Can Improve Text Clustering?

2014 ◽  
Vol 4 (2) ◽  
pp. 16-28
Author(s):  
Abdelmalek Amine ◽  
Reda Mohamed Hamou ◽  
Michel Simonet
2015 ◽  
Vol 6 (4) ◽  
pp. 39-68 ◽  
Author(s):  
Reda Mohamed Hamou ◽  
Hadj Ahmed Bouarara ◽  
Abdelmalek Amine

Today, the development of a large scale access network internet/intranet has increased the amount of textual information available online/offline, where billions of documents have been created. In the last few years, bio inspired techniques which invaded the world of text-mining such, as clustering, represents a critical problem in the digital society especially over the world of information retrieval (IR). The content of this article is a recapitulation of a set of works as a comparative study between the authors' experiments realized by applying a set of bio-inspired techniques (social spiders(SS), 2D Cellular automata (2D-CA), 3D cellular automata (3D-CA), Artificial immune system (AIS), Particle swarm optimization (PSO)) and other techniques founded in literature (Ants Colony Optimization (ACO) and Genetic algorithms (GAs)) for solving the text clustering challenge by using the benchmark Reuter 21785. They analyse the different results in term of entropy, f-measure, execution time, and clusters number in order to find the ideal configuration (similarity measure and text representation method) for each technique. Their objectives are to improve the efficiency of text clustering systems and make decisions that can be the starting point for other researchers.


2001 ◽  
Vol 11 (PR3) ◽  
pp. Pr3-205-Pr3-212
Author(s):  
G. Ch. Sirakoulis ◽  
I. Karafyllidis ◽  
A. Thanailakis
Keyword(s):  

1998 ◽  
Vol 4 (4) ◽  
pp. 49-54
Author(s):  
V.А. Val'kovskii ◽  
◽  
D.D. Zerbino ◽  
Keyword(s):  

2014 ◽  
Vol 2014 (1) ◽  
pp. 37-44 ◽  
Author(s):  
Arighna Sarkar ◽  
◽  
Debarka Mukhopadhyay ◽  

Author(s):  
Mohd Javed ◽  
Khaleel Ahmad ◽  
Ahmad Talha Siddiqui

WiMAX is the innovation and upgradation of 802.16 benchmarks given by IEEE. It has numerous remarkable qualities, for example, high information rate, the nature of the service, versatility, security and portability putting it heads and shoulder over the current advancements like broadband link, DSL and remote systems. Though like its competitors the concern for security remains mandatory. Since the remote medium is accessible to call, the assailants can undoubtedly get into the system, making the powerless against the client. Many modern confirmations and encryption methods have been installed into WiMAX; however, regardless it opens with up different dangers. In this paper, we proposed Elliptic curve Cryptography based on Cellular Automata (EC3A) for encryption and decryption the message for improving the WiMAX security


Sign in / Sign up

Export Citation Format

Share Document