IDOSI

Displaying 1-33 of 33 results

  • White Papers // Feb 2014

    Hiding Sensitive Association Rules

    In data mining, Apriori is a classic algorithm for learning association rules. Apriori is designed to operate on databases containing transactions (for example, collections of items bought by customers). The store owner might want to discover which of these items customers are likely to buy together. This can be used...

    Provided By IDOSI

  • White Papers // Nov 2013

    Protecting from Zero-Day Malware Attacks

    The menace of malware is becoming more harmful and ominous for the enterprises as well as the home users. The malware attacks usually cause users to render their critical data in the hands of nefarious persons. Shielding against the malware attacks seems a challenging job for IT administrators. The common...

    Provided By IDOSI

  • White Papers // Oct 2013

    Ensuring the Security of Critically Important Objects and Trends in the Development of Information Technology

    In this paper, the authors examine specific vectors in the development of the IT sphere in the context of the security of the information-technological infrastructure of critically important objects. In the context of prospects for the development of the IT industry (inclusive of social networks and social development, staffing and...

    Provided By IDOSI

  • White Papers // Oct 2013

    Denial of Service in Components of Information Telecommunication Systems Through the Example of \"Network Storm\" Attacks

    The paper is dedicated to the study of \"Network storm\" attacks aimed at disrupting the availability of information and information resources. The author has examined scenarios and models for \"Network storm\" attacks, which exploit the vulnerability of the hardware and information technology of attacked components of Information Tele-Communication Systems (ITCS)....

    Provided By IDOSI

  • White Papers // Sep 2013

    Prognostic Load Balancing Strategy for Latency Reduction in Mobile Cloud Computing

    In Mobile Cloud Computing (MCC), load balancing is essential to distribute the local workload evenly across all the nodes either statically or dynamically. A high level of user satisfaction and resource utilization ratio can be achieved by ensuring an efficient and fair allocation of all computing resources. In the absence...

    Provided By IDOSI

  • White Papers // Aug 2013

    Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

    Mobile Ad-hoc NETwork (MANET) is a self organized and self configurable network where the mobile nodes move arbitrarily. For faster data transmission, the authors need a routing protocol that adapts to topology changes. Secure data transmission is the main issue in MANET. The enhancement in the secure data transmission in...

    Provided By IDOSI

  • White Papers // Aug 2013

    Efficient Doubletree: An Algorithm for Large-Scale Topology Discovery

    Monitoring Internet topology was a tractable problem. Topology discovery systems are starting to be introduced in the form of easily and widely deployed software. Unfortunately, they have a problem of how to perform such measurements efficiently and in a network-friendly manner. When scaled up, such methods will generate so much...

    Provided By IDOSI

  • White Papers // Jul 2013

    DDoS Verification and Attack Packet Dropping Algorithm in Cloud Computing

    DDoS attacks on the World Wide Web (WWW) in broad-spectrum and predominantly in modern cloud computing has become a noticeable issue for researchers in academia and industry related to the field of computer sciences. DDoS attacks are cool to provoke but their uncovering is a very challenging and dingy task...

    Provided By IDOSI

  • White Papers // Jul 2013

    A Virtualized Information Indexing and Filtering Method for Web Contents Reside on Remotely Communicated Networks

    The utilization of clouds in accessing of remote resources has evolved tremendous advantages like parallel execution, virtualization and supremacy of processing. Rather to filter queried information through single remote server is many times better to process it from a centralized cloud. Present architecture of information indexing and filtering mechanism is...

    Provided By IDOSI

  • White Papers // Jul 2013

    Enterprise Intellectual Capital Management by Social Learning Environment Implementation

    The developed method for the corporate intellectual capital management through the introduction of distributed learning environment differs from existing methods because it implements the integration processes of corporate intellectual capital accumulation and professional staff adaptation. For effective functioning of the company a huge amount of knowledge is needed, which is...

    Provided By IDOSI

  • White Papers // Jun 2013

    An Artificial Intelligence Based X-AODV Routing Protocol for MANET

    In wireless network environment all nodes behave in multi-hope paradigm, in which every node contains information about the link and connectivity in infrastructure-less manner. If any node moves from its original place to another with or without prescribed manner it called mobile network MANET. To maintain the updated information about...

    Provided By IDOSI

  • White Papers // Jun 2013

    RFID System: Design Parameters and Security Issues

    Radio Frequency IDentification (RFID) is a technology that automatically identifies the objects in its vicinity by incorporating readers, tags and backend servers all together, forming a system that has been proved to be a versatile system having applications in many areas, a lot has been revealed and rest is yet...

    Provided By IDOSI

  • White Papers // Apr 2013

    Multi-Path Routing Based on Network Coding in Wireless Sensor Networks

    Multi-path routing is an important technique for reliable data forwarding in prone to failure Wireless Sensor networks (WSNs), which it leads to consume more energy. In this paper, the authors propose a new routing mechanism that combines multi-path Routing with Network Coding (NCR). This combination decreases the number of required...

    Provided By IDOSI

  • White Papers // Apr 2013

    Enhancing Energy Efficiency in Wireless Sensor Networks Via Improving Elliptic Curve Digital Signature Algorithm

    The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA). It is used in wireless sensor networks in order to establish security and allow legitimate users to join in the network and disseminate messages into the networks. The ECDSA needs an addition...

    Provided By IDOSI

  • White Papers // Mar 2013

    Cryptanalysis of Transposition Ciphers with Long Key Lengths Using an Improved Genetic Algorithm

    In today's world, with increasing usage of computer networks and internet, the importance of network, computer and information security is obvious. One of the widely used approaches for information security is cryptography. Cryptanalysis is a way to break cryptography without having the encryption key. This paper presents an approach to...

    Provided By IDOSI

  • White Papers // Feb 2013

    Crime of the Millennium: Cyber Crime

    The 21st century appeared to be a century of possibilities and opportunities with the introduction of the advanced information technologies for both legal and illegal activities. Credit card fraud, as the fastest growing crime of the new millennium, puts a great burden on the economy affecting both customers and financial...

    Provided By IDOSI

  • White Papers // Feb 2013

    Specification, Analysis and Resolution of Anomalies in Firewall Security Policies

    Firewalls are essential components in network security solutions. Managers have to specify their organizational security policies using low level and order-dependent rules in firewalls. Furthermore, dependency of firewalls to the network topology, frequent changes in network topology and lack of an automatic method for analysis and verification of anomalies in...

    Provided By IDOSI

  • White Papers // Feb 2013

    SHSDAP: Secure Hierarchical Service Discovery and Advertisement Protocol in Cluster Based Mobile Ad hoc Network

    Mobile Ad-hoc NETworks (MANETs) have many potential applications in various fields such as military services, collaborative and distributed computing, emergency operations, wireless sensor networks and hybrid wireless networks. Dynamic Service Discovery and Advertisement (SDA) have also brought significant issues to the networking technologies. Since most protocols in mobile ad-hoc network...

    Provided By IDOSI

  • White Papers // Feb 2013

    Misuse Detection Using Hybrid of Association Rule Mining and Connectionist Modeling

    With the growing of computer networks, the number of attacks has grown extensively. Intrusion Detection System (IDS) is known as a critical technology to help protection. In this paper, a hybrid misuse-based IDS, using combined structure of an association rule mining algorithm and a connectionist model are presented. The key...

    Provided By IDOSI

  • White Papers // Feb 2013

    Fast Neural Intrusion Detection System Based on Hidden Weight Optimization Algorithm and Feature Selection

    Intrusion detection is known as an essential component to secure the systems in Information and Communication Technology (ICT). In this paper, two mechanisms are used to achieve a fast Intrusion Detection System (IDS): the training speed of neural attack classifier is improved by using Output Weight Optimization-Hidden Weight Optimization (OWO-HWO)...

    Provided By IDOSI

  • White Papers // Feb 2013

    An Efficient Hybrid Evolutionary Algorithm for Cluster Analysis

    Clustering problems appear in a wide range of unsupervised classification applications such as pattern recognition, vector quantization, data mining and knowledge discovery. The k-means algorithm is one of the most widely used clustering techniques. Unfortunately, k-means is extremely sensitive to the initial choice of centers and a poor choice of...

    Provided By IDOSI

  • White Papers // Feb 2013

    Designing a Framework for Convergent Information Security Management among Federated Organizations

    According to the developments in the businesses, organizations are dependent to information technology more than ever. Such dependency is followed by its own information security risk. On the other hand, the dependency of such organizations with information is also followed with the increase in information exchanges and electronic interactions. Specialists...

    Provided By IDOSI

  • White Papers // Feb 2013

    Data Mining on Structure-Activity/Property Relationships Models

    Molecular descriptors family on structure-activity/property relationships studies were carried out in order to identify the link between compounds structure and their activity/property. A number of fifty-five classes of properties or activities of different compounds sets were investigated. Single and multi-varied linear regression models using molecular descriptors as variables were identified....

    Provided By IDOSI

  • White Papers // Feb 2013

    A New Secure Mutual User Identification Scheme Based on ID-Based Cryptosystem

    Most of identification schemes based on identity that discussed up to now are performed in one direction. In these schemes only one side of communicational parties can introduce itself to observe but other side could not be sure that other user is legitimate or not. Therefore, one of the authors'...

    Provided By IDOSI

  • White Papers // Feb 2013

    Modeling and Simulation Firewall Using Colored Petri Net

    Data communications networks have become an Furthermore, synchronous and asynchronous events infrastructure resource for businesses corporations, present their prioritized relations and structural government agencies and academic institutions. In this paper, the methodology of firewalled LAN models construction in the form of colored petri net is introduced and model the ACL...

    Provided By IDOSI

  • White Papers // Oct 2011

    Discovery of Multiple Mobile Gateways in Wireless Mesh Networks

    In this paper, the authors propose an efficient discovery mechanism to select the best mobile gateway in Wireless Mesh Networks (WMN's). Their proposed scheme is based on mobile gateway learning mechanism, in which mobile gateways allow routers to discover them efficiently with minimal packet loss and packet delay. Simulation results...

    Provided By IDOSI

  • White Papers // Oct 2011

    Change Detection Methods for Computer Network Problems

    In previous research, the detection of network problems was performed using an appropriate subset of Management Information Base (MIB) variables. The changes in the behavior of the MIB variables were detected using different change detection algorithms; this change gives a clear image about any problem that might occur in the...

    Provided By IDOSI

  • White Papers // Oct 2011

    Network Intrusion Detection With Wiener Filter-Based Agent

    Over the years, network attacks have evolved into more complex and sophisticated methods for network intrusion. As network domains become bigger in terms of size, the number of external users increases and thus the systems become more open and subject to security threats. Thus, the intrusion detection system was introduced...

    Provided By IDOSI

  • White Papers // Sep 2011

    Improving Performance of on Demand Multicast Routing Protocol by Fuzzy Logic

    A Mobile ad hoc network is a collection of wireless communication nodes that dynamically organize themselves to form a network without the need for any fixed infrastructure or centralized administration. Multicasting can be considered as an efficient way to deliver information from source nodes to several client nodes. Although multicast...

    Provided By IDOSI

  • White Papers // Sep 2011

    Location Based Dynamic Probabilistic Broadcasting for MANETs

    Broadcasting has a central importance to Mobile Ad hoc NETworks (MANETs) wherein it is frequently executed for the route discovery, address resolution, the application of paging a host and many other network services. Use of simple flooding, for broadcasts, causes redundant rebroadcasts and contention and collision issues that may lead...

    Provided By IDOSI

  • White Papers // Apr 2011

    A New Algorithm Fault Management by Clustered in Wireless Sensor Network

    Some WSN by a lot of immobile node and with the limited energy and without further charge of energy. Whereas extension of many sensor nodes and their operation. Hence, it is normal unactive nodes miss their communication in network, hence split the network. For avoidance split of network, the authors...

    Provided By IDOSI

  • White Papers // Dec 2009

    Multi-Dimensional Poisson Distribution Heuristic for Maximum Lifetime Routing in Wireless Sensor Network

    Wireless Sensor Networks (WSNs) have gained a lot of attention in both public and research communities. One issue in wireless sensor networks is achieving efficient operation because of the limited available power. Many Heuristics were designed to enhance power reservoir of sensors and maximize their life time. Online Maximum Lifetime...

    Provided By IDOSI

  • White Papers // Oct 2009

    Proposing a Dynamic Routing Approach to Improve Performance of Iran Data Network

    In this paper, a logical three-layer design of Iran data network is presented using the hierarchical model. The results show that by applying the static routing approach to Iran data network, the topology of the network is changed when parameters of the initial configuration vary. In other words, using the...

    Provided By IDOSI

  • White Papers // Apr 2013

    Multi-Path Routing Based on Network Coding in Wireless Sensor Networks

    Multi-path routing is an important technique for reliable data forwarding in prone to failure Wireless Sensor networks (WSNs), which it leads to consume more energy. In this paper, the authors propose a new routing mechanism that combines multi-path Routing with Network Coding (NCR). This combination decreases the number of required...

    Provided By IDOSI

  • White Papers // Apr 2013

    Enhancing Energy Efficiency in Wireless Sensor Networks Via Improving Elliptic Curve Digital Signature Algorithm

    The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA). It is used in wireless sensor networks in order to establish security and allow legitimate users to join in the network and disseminate messages into the networks. The ECDSA needs an addition...

    Provided By IDOSI

  • White Papers // Jul 2013

    Enterprise Intellectual Capital Management by Social Learning Environment Implementation

    The developed method for the corporate intellectual capital management through the introduction of distributed learning environment differs from existing methods because it implements the integration processes of corporate intellectual capital accumulation and professional staff adaptation. For effective functioning of the company a huge amount of knowledge is needed, which is...

    Provided By IDOSI

  • White Papers // Nov 2013

    Protecting from Zero-Day Malware Attacks

    The menace of malware is becoming more harmful and ominous for the enterprises as well as the home users. The malware attacks usually cause users to render their critical data in the hands of nefarious persons. Shielding against the malware attacks seems a challenging job for IT administrators. The common...

    Provided By IDOSI

  • White Papers // Jul 2013

    DDoS Verification and Attack Packet Dropping Algorithm in Cloud Computing

    DDoS attacks on the World Wide Web (WWW) in broad-spectrum and predominantly in modern cloud computing has become a noticeable issue for researchers in academia and industry related to the field of computer sciences. DDoS attacks are cool to provoke but their uncovering is a very challenging and dingy task...

    Provided By IDOSI

  • White Papers // Feb 2013

    Designing a Framework for Convergent Information Security Management among Federated Organizations

    According to the developments in the businesses, organizations are dependent to information technology more than ever. Such dependency is followed by its own information security risk. On the other hand, the dependency of such organizations with information is also followed with the increase in information exchanges and electronic interactions. Specialists...

    Provided By IDOSI

  • White Papers // Jun 2013

    RFID System: Design Parameters and Security Issues

    Radio Frequency IDentification (RFID) is a technology that automatically identifies the objects in its vicinity by incorporating readers, tags and backend servers all together, forming a system that has been proved to be a versatile system having applications in many areas, a lot has been revealed and rest is yet...

    Provided By IDOSI

  • White Papers // Oct 2013

    Ensuring the Security of Critically Important Objects and Trends in the Development of Information Technology

    In this paper, the authors examine specific vectors in the development of the IT sphere in the context of the security of the information-technological infrastructure of critically important objects. In the context of prospects for the development of the IT industry (inclusive of social networks and social development, staffing and...

    Provided By IDOSI

  • White Papers // Aug 2013

    Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

    Mobile Ad-hoc NETwork (MANET) is a self organized and self configurable network where the mobile nodes move arbitrarily. For faster data transmission, the authors need a routing protocol that adapts to topology changes. Secure data transmission is the main issue in MANET. The enhancement in the secure data transmission in...

    Provided By IDOSI

  • White Papers // Feb 2013

    Specification, Analysis and Resolution of Anomalies in Firewall Security Policies

    Firewalls are essential components in network security solutions. Managers have to specify their organizational security policies using low level and order-dependent rules in firewalls. Furthermore, dependency of firewalls to the network topology, frequent changes in network topology and lack of an automatic method for analysis and verification of anomalies in...

    Provided By IDOSI

  • White Papers // Feb 2013

    SHSDAP: Secure Hierarchical Service Discovery and Advertisement Protocol in Cluster Based Mobile Ad hoc Network

    Mobile Ad-hoc NETworks (MANETs) have many potential applications in various fields such as military services, collaborative and distributed computing, emergency operations, wireless sensor networks and hybrid wireless networks. Dynamic Service Discovery and Advertisement (SDA) have also brought significant issues to the networking technologies. Since most protocols in mobile ad-hoc network...

    Provided By IDOSI

  • White Papers // Feb 2013

    A New Secure Mutual User Identification Scheme Based on ID-Based Cryptosystem

    Most of identification schemes based on identity that discussed up to now are performed in one direction. In these schemes only one side of communicational parties can introduce itself to observe but other side could not be sure that other user is legitimate or not. Therefore, one of the authors'...

    Provided By IDOSI

  • White Papers // Feb 2013

    Crime of the Millennium: Cyber Crime

    The 21st century appeared to be a century of possibilities and opportunities with the introduction of the advanced information technologies for both legal and illegal activities. Credit card fraud, as the fastest growing crime of the new millennium, puts a great burden on the economy affecting both customers and financial...

    Provided By IDOSI

  • White Papers // Mar 2013

    Cryptanalysis of Transposition Ciphers with Long Key Lengths Using an Improved Genetic Algorithm

    In today's world, with increasing usage of computer networks and internet, the importance of network, computer and information security is obvious. One of the widely used approaches for information security is cryptography. Cryptanalysis is a way to break cryptography without having the encryption key. This paper presents an approach to...

    Provided By IDOSI

  • White Papers // Jun 2013

    An Artificial Intelligence Based X-AODV Routing Protocol for MANET

    In wireless network environment all nodes behave in multi-hope paradigm, in which every node contains information about the link and connectivity in infrastructure-less manner. If any node moves from its original place to another with or without prescribed manner it called mobile network MANET. To maintain the updated information about...

    Provided By IDOSI

  • White Papers // Feb 2013

    Modeling and Simulation Firewall Using Colored Petri Net

    Data communications networks have become an Furthermore, synchronous and asynchronous events infrastructure resource for businesses corporations, present their prioritized relations and structural government agencies and academic institutions. In this paper, the methodology of firewalled LAN models construction in the form of colored petri net is introduced and model the ACL...

    Provided By IDOSI

  • White Papers // Sep 2013

    Prognostic Load Balancing Strategy for Latency Reduction in Mobile Cloud Computing

    In Mobile Cloud Computing (MCC), load balancing is essential to distribute the local workload evenly across all the nodes either statically or dynamically. A high level of user satisfaction and resource utilization ratio can be achieved by ensuring an efficient and fair allocation of all computing resources. In the absence...

    Provided By IDOSI

  • White Papers // Jul 2013

    A Virtualized Information Indexing and Filtering Method for Web Contents Reside on Remotely Communicated Networks

    The utilization of clouds in accessing of remote resources has evolved tremendous advantages like parallel execution, virtualization and supremacy of processing. Rather to filter queried information through single remote server is many times better to process it from a centralized cloud. Present architecture of information indexing and filtering mechanism is...

    Provided By IDOSI

  • White Papers // Feb 2013

    Data Mining on Structure-Activity/Property Relationships Models

    Molecular descriptors family on structure-activity/property relationships studies were carried out in order to identify the link between compounds structure and their activity/property. A number of fifty-five classes of properties or activities of different compounds sets were investigated. Single and multi-varied linear regression models using molecular descriptors as variables were identified....

    Provided By IDOSI

  • White Papers // Oct 2013

    Denial of Service in Components of Information Telecommunication Systems Through the Example of \"Network Storm\" Attacks

    The paper is dedicated to the study of \"Network storm\" attacks aimed at disrupting the availability of information and information resources. The author has examined scenarios and models for \"Network storm\" attacks, which exploit the vulnerability of the hardware and information technology of attacked components of Information Tele-Communication Systems (ITCS)....

    Provided By IDOSI

  • White Papers // Aug 2013

    Efficient Doubletree: An Algorithm for Large-Scale Topology Discovery

    Monitoring Internet topology was a tractable problem. Topology discovery systems are starting to be introduced in the form of easily and widely deployed software. Unfortunately, they have a problem of how to perform such measurements efficiently and in a network-friendly manner. When scaled up, such methods will generate so much...

    Provided By IDOSI

  • White Papers // Feb 2013

    Misuse Detection Using Hybrid of Association Rule Mining and Connectionist Modeling

    With the growing of computer networks, the number of attacks has grown extensively. Intrusion Detection System (IDS) is known as a critical technology to help protection. In this paper, a hybrid misuse-based IDS, using combined structure of an association rule mining algorithm and a connectionist model are presented. The key...

    Provided By IDOSI

  • White Papers // Feb 2013

    Fast Neural Intrusion Detection System Based on Hidden Weight Optimization Algorithm and Feature Selection

    Intrusion detection is known as an essential component to secure the systems in Information and Communication Technology (ICT). In this paper, two mechanisms are used to achieve a fast Intrusion Detection System (IDS): the training speed of neural attack classifier is improved by using Output Weight Optimization-Hidden Weight Optimization (OWO-HWO)...

    Provided By IDOSI

  • White Papers // Feb 2014

    Hiding Sensitive Association Rules

    In data mining, Apriori is a classic algorithm for learning association rules. Apriori is designed to operate on databases containing transactions (for example, collections of items bought by customers). The store owner might want to discover which of these items customers are likely to buy together. This can be used...

    Provided By IDOSI

  • White Papers // Oct 2009

    Proposing a Dynamic Routing Approach to Improve Performance of Iran Data Network

    In this paper, a logical three-layer design of Iran data network is presented using the hierarchical model. The results show that by applying the static routing approach to Iran data network, the topology of the network is changed when parameters of the initial configuration vary. In other words, using the...

    Provided By IDOSI

  • White Papers // Dec 2009

    Multi-Dimensional Poisson Distribution Heuristic for Maximum Lifetime Routing in Wireless Sensor Network

    Wireless Sensor Networks (WSNs) have gained a lot of attention in both public and research communities. One issue in wireless sensor networks is achieving efficient operation because of the limited available power. Many Heuristics were designed to enhance power reservoir of sensors and maximize their life time. Online Maximum Lifetime...

    Provided By IDOSI

  • White Papers // Apr 2011

    A New Algorithm Fault Management by Clustered in Wireless Sensor Network

    Some WSN by a lot of immobile node and with the limited energy and without further charge of energy. Whereas extension of many sensor nodes and their operation. Hence, it is normal unactive nodes miss their communication in network, hence split the network. For avoidance split of network, the authors...

    Provided By IDOSI

  • White Papers // Oct 2011

    Discovery of Multiple Mobile Gateways in Wireless Mesh Networks

    In this paper, the authors propose an efficient discovery mechanism to select the best mobile gateway in Wireless Mesh Networks (WMN's). Their proposed scheme is based on mobile gateway learning mechanism, in which mobile gateways allow routers to discover them efficiently with minimal packet loss and packet delay. Simulation results...

    Provided By IDOSI

  • White Papers // Sep 2011

    Improving Performance of on Demand Multicast Routing Protocol by Fuzzy Logic

    A Mobile ad hoc network is a collection of wireless communication nodes that dynamically organize themselves to form a network without the need for any fixed infrastructure or centralized administration. Multicasting can be considered as an efficient way to deliver information from source nodes to several client nodes. Although multicast...

    Provided By IDOSI

  • White Papers // Sep 2011

    Location Based Dynamic Probabilistic Broadcasting for MANETs

    Broadcasting has a central importance to Mobile Ad hoc NETworks (MANETs) wherein it is frequently executed for the route discovery, address resolution, the application of paging a host and many other network services. Use of simple flooding, for broadcasts, causes redundant rebroadcasts and contention and collision issues that may lead...

    Provided By IDOSI

  • White Papers // Oct 2011

    Change Detection Methods for Computer Network Problems

    In previous research, the detection of network problems was performed using an appropriate subset of Management Information Base (MIB) variables. The changes in the behavior of the MIB variables were detected using different change detection algorithms; this change gives a clear image about any problem that might occur in the...

    Provided By IDOSI

  • White Papers // Oct 2011

    Network Intrusion Detection With Wiener Filter-Based Agent

    Over the years, network attacks have evolved into more complex and sophisticated methods for network intrusion. As network domains become bigger in terms of size, the number of external users increases and thus the systems become more open and subject to security threats. Thus, the intrusion detection system was introduced...

    Provided By IDOSI

  • White Papers // Feb 2013

    An Efficient Hybrid Evolutionary Algorithm for Cluster Analysis

    Clustering problems appear in a wide range of unsupervised classification applications such as pattern recognition, vector quantization, data mining and knowledge discovery. The k-means algorithm is one of the most widely used clustering techniques. Unfortunately, k-means is extremely sensitive to the initial choice of centers and a poor choice of...

    Provided By IDOSI