Integrating Mutiview clusters with Tensor Methods
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 10
Abstract
Integrating multiview cluster is an crucial issue in heterogeneous environment. Spectral clustering is used for integrating cluster in heterogeneous environment. In this paper, we used Principal Modularity Maximization based tensor decomposition for identifying hidden pattern in the context of spectral clustering. This gives the good result when compared to other methods. Here synthetic datasets are used for evaluating the results by comparing with Average Modularity Maximization and Total Modularity Maximization methods.
Authors and Affiliations
Dr. A. Bharathi , S. Anitha
MODIFIED AODV TO ELIMINATE THE EFFECTS OF BLACK HOLE NODE IN MANET
Mobile Adhoc Network (MANET) consists of a collection of wireless mobile hosts without the required intervention of any existing infrastructure or centralized access point such as base station. The dynamic topology of MA...
A KEY MANAGEMENT PROTOCOL FOR HIERACHICAL WIRELESS SENSOR NETWORKS
Wireless sensor networks (WSNs) are deployed in hostile environments in many applications. In order to resist security threats, sensor nodes of WSNs often use pre-shared secret keys to encrypt and exchange confidential d...
Performance and Accuracy Analysis of Range-free Localization Algorithms in Wireless Sensor Network
Wireless sensor networks (WSN) are widely used in many environments to perform various monitoring tasks. In many such tasks, node location exists as permanent system parameter and to determine the exact position or locat...
Li-Fi - The Future of Internet
Wireless network has now become the most common form of internet. The use of wireless internet either at home or public places can sometimes lead to slow internet speed and increased processing time as more than one devi...
Secure Image Steganography Algorithm using RGB Image Format and Encryption Technique
The aim of this research is to design a steganography algorithm which not only hide the message behind the image but also provide more security than others. For the purpose of security, encryption technique is used with...