Krill Herd Clustering Algorithm using DBSCAN Technique
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 3
Abstract
The hybrid approach is proposed to show that the clusters also show the swarm behavior. Krill herd algorithm is used to show the simulation of the herding behavior of the krill individuals. Density based approach is used for discovering the clusters and to show the region with sufficiently high density into clusters of krill individuals that of the arbitrary shape in environment. The minimum distance of each individual krill from food and from high density of herds are considered as the objective function of the krill movement. A density based cluster is a set of density connected objects that is maximal with respect to density-reach ability and noisy objects. The movement of the krill individuals is considered by the foraging movement and random diffusion.
Authors and Affiliations
Varinder Singh , Mrs. Monica Sood
A STUDY ON CLOUD COMPUTING IN AVIATION AND AEROSPACE
Right from the time to establish aerospace and aviation industries till the air vehicle departures safely, passenger information, co-ordination and integration amongst several stakeholders are very crucial. The pressure...
Handling Highly Frequent Network Updates For K Nearest Neighbor Query On Road Networks
Outsourcing spatial databases to the cloud has provided the spatial query integrity which means that the third party service provider is Untrustworthy, therefore query integrity verifies the correctness and completeness...
A Brief Introduction of Different type of Security Attacks found in Mobile Ad-hoc Network
A structure less network is called the mobile ad-hoc network, where all the nodes are independent. In MANET, there is a collection of mobile nodes that from temporary network. Those nodes are act like a host or like a ro...
Human Computer Interface Through Biometric Iris Recognition System
Biometric recognition system is better reliable, roubst technique than traditional recognition system. Biometric iris recognition system is most secure and reliable than other biometric recognition system. Hence, we use...
Implementation of Multicloud Computing Deployment System of SAAS & IAAS for Effective Resource Utilization on MTC Application
Cloud computing is gaining acceptance in several IT organizations. In this paper, we have a tendency to explore this state of affairs to deploy a computing cluster on the highest of a multi cloud infrastructure, for reso...