COMPARISON OF PURITY AND ENTROPY OF K-MEANS CLUSTERING AND FUZZY C MEANS CLUSTERING
Journal Title: Indian Journal of Computer Science and Engineering - Year 2011, Vol 2, Issue 3
Abstract
Clustering is one the main area in data mining literature. There are various algorithms for clustering. The evaluation of the performance is done by validation measures. The external validation measures are used to measure the extent to which cluster labels affirm with the externally given class labels. The aim of this paper is to compare the for K-means and Fuzzy C means clustering using the Purity and Entropy. The data used for evaluating the external measures is medical data.
Authors and Affiliations
Satya Chaitanya Sripada , Dr. M. Sreenivasa Rao
COLLABORATIVE WEB RECOMMENDATION SYSTEMS BASED ON AN EFFECTIVE FUZZY ASSOCIATION RULE MINING ALGORITHM (FARM)
With increasing popularity of the web-based systems that are applied in many different areas, they tend to deliver customized information for their users by means of utilization of recommendation methods. This recommenda...
RELATIVE QUERY RESULTS RANKING FOR ONLINE USERS IN WEB DATABASES
To handle with the problem of so many-answers replied from an online Web database in response to a relative query, this paper proposes a unique approach to rank the similar query results. Depending upon the on the databa...
An Efficient Algorithm for Image Enhancement
In the digital image processing field enhancement and removing the noise in the image is a critical issue. We have proposed a new algorithm to enhance color Image corrupted by Gaussian noise using fuzzy logic which descr...
Artificial Intelligence – Making an Intelligent personal assistant
A bot in computing is an autonomous program on a network (especially the Internet) which can interact with systems or users.[ Simpson, J., and Weiner, E. (1989)] This document gives the description of how memory of an Ar...
AN ENCRYPTION ALGORITHM FOR IMPROVING DATABASE SECURITY USING ROT & REA
Database is an organized collection of data, many user wants to store their personal and confidential data’s in such database. Unauthorized persons may try to get the data’s from database and misuse them without the owne...