Comparative analysis of clustering of spatial databases with various DBSCAN Algorithms
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 6
Abstract
Clustering is still an important research issue in the data mining, because there is a continuous research in data mining for optimum clusters on spatial data. There are so many types of partition based and hierarchal algorithms implemented for clustering and the clusters which are formed based on the density are easy to understand and it does not limit itself to certain shapes of the clusters. This paper presents the comparative analysis of the various density based clustering mechanisms. There is certain problem on existing density based algorithms because they are not capable of finding the meaningful clusters whenever the density is so much varied. VDBSCAN is introduced to compensate this problem. It is same as DBSCAN (Density Based Spatial Clustering of Applications with Noise) but only the difference is VDBSCAN selects several values of parameter Eps for different densities according to k-dist plot. The problem is the value of parameter k in k-dist plot is user defined. This paper introduces a new method to find out the value of parameter k automatically based on the characteristics of the datasets. In this method we consider spatial distance from a point to all others points in the datasets. The proposed method has potential to find out optimal value for parameter k .In this paper a synthetic database with two dimensional data is used for demonstration.
Authors and Affiliations
K. Ganga Swathi, K N V S S K Rajesh
Cybernetic Technology Utility: Scrupulous Heroes v. Unscrupulous Individuals – Ending Corruption in SA
Corruption on South African (SA) roads is so overwhelming that it has reached such proportions where some motorists now see it as the only way to go. On the contrary, things seem to have started turning the other way...
Implementation of Multinomial Standard Product for RSA State Identify Algorithm
This paper presents architecture and modeling of public key RSA encryption/decryption systems. The RSA(rivest -shamir-adleman)algorithm is a secure, high quality public key algorithm.public key supports confidential...
Efficient Anonymity Profile Comparison Techniques To Filter Unwanted Messages From OSN User Walls
Social networking creates digital communication technologieshone tools for make bigger the social ring of people.It has by nowturned intoasignificant integral part of our dailylives;allow us to contact our friends an...
Scale Down Speculation and Exalt Network Performance
In mobile Ad hoc Networks are having dynamic nature of its network infrastructure and it is vulnerable to all types of attacks. Among these attacks the routing attacks getting more attention because its changing the...
Enhancement of the image by using Histogram Modification and High-pass Filtering Mask
Generally the major problem is low contrast image analysis in medical Field. Low contrast digital images reduce the ability of observer in analyzing the image. This low contrast images are obtained from low radiated...