SlideShare uma empresa Scribd logo
1 de 13
Submitted by: Rohit Kansal
10103543, CSE
 A loose definition of clustering could be: the
process of organising objects into groups whose
members are similar in some ways. Its task is
grouping of set of objects in such a way that
objects in same group are more similar to each
other than to objects in other groups.
 The goal of clustering is to determine the
intrinsic grouping in a set of unlabeled data.
Thus, cluster analysis is sometimes referred to as
“unsupervised classification” and is distinct from
“supervised classification”, or more commonly
just “classification.
 Hierarchical clustering- It is based on the core idea of objects
being more related to nearby objects than to objects farther away.
 Centroid-based clustering- In this method clusters are
represented by central vector, which may not necessarily be a
member of the data set.
 Distribution-based clustering- The clustering model most
closely related to statistics is based on distribution models
 Density-based clustering- Clusters are defined as areas of
higher density than the remainder of the data set. Objects in these
sparse areas are usually considered to be the noise or border
points.
 Market Research: Market researchers use cluster analysis to
partition the general population of consumers into market
segments
 Social network analysis: In the study of social network,
clustering may be used to recognize communities within large
groups of people.
 Computer Science: Clustering is useful in software evolution
as it helps to reduce legacy properties in code by reforming
functionality that has become dispersed.
Contour tracing is used to extract boundaries; boarder pixels
of boundaries are extracted. Contour tracing is one of the
many pre-processing techniques performed on digital image in
order to extract information about general shape.
Contour detection is used because contour pixels are generally
a small subset of the total number of pixels representing a
pattern. Thus, amount of computation is reduced when run
feature extracting algorithm on contour instead on whole
pattern. Also, contour shares a lot of features with the original
pattern hence, the feature extraction process become much
more efficient.
 Moore’s neighbor
The Moore neighbourhood of a
pixel, P, is the set of 8 pixels
which share a vertex or edge with
that pixel.
 Square Tracing
Given a digital pattern; locate a
black pixel and declare it as your
"start" pixel. Locating a "start"
pixel can be done in a number of
ways; we'll start at the bottom left
corner of the grid, scan each
column of pixels from the bottom
going upwards starting from the
leftmost column and proceeding
to the right- until we encounter a
black pixel.
After reading books, research papers on clustering and application of
clustering, and reference material I gathered that though clustering is
widely used in many fields, including contour detection, to represent data
set into more understanding data set by removing noises and clustering
useful information, it still has many drawbacks. Like application of
effective clustering technique, selection of data set, number of clusters, and
validation of result. Especially, in marketing segmentation result validation
is neglected and when done procedure is usually ambiguous.
Clustering techniques used are very sensitive to selection of data set,
number of cluster, size of data set, etc. And different technique varies
accordingly in speed, time and size complexity, accuracy of final clusters.
Though there exist many algorithms and methods for contour extraction still
these methods lack efficiency. Also, these methods are not universal
solution; they need to be customized according to new data set. In addition,
a better clustering method, that can be use with contour detection, does not
exist.
 Data Selection- Selecting the appropriate variables used in the clustering
process is one of the most fundamental steps because the inclusion of
irrelevant variables may distort and render useless an otherwise useful
segmentation solution.
 Clustering algorithm selection- CA encompasses a number of different
algorithms and methods for grouping objects or subjects. The increasing
number of CA methods available, combined with their specific properties,
has led some researchers to consider the bewilderment problem of selecting
the best method in some sense. Because each technique is different and has
specific properties that lead to different segmentation solutions, it is very
important to carefully select the algorithm that will be used.
 Inefficiency of contour extraction algorithm- In the original description of
the algorithm used in Moore-Neighbour tracing, the stopping criterion is
visiting the start pixel for a second time.
The basic scenario is as follows: To extract a region coordinates from a 2D
grid. The value in each cell is the intensity of the area represented by that
cell. If this value is zero then the area represented by that cell represent an
empty area. Each connected set of cells with same intensity represents a
region of that intensity. A region can have holes, this means that in an
interior of a region there can be a cells of other intensity or intensity value
zero. So, problem is extract each such region with a set of hole cycles.
Many approaches are available for the study of the data; these include
representation of data in most defined form, reduction in noise, etc. While
the various methods have been developed for the above mentioned purpose
there still exist some complications. And sometimes these methods cannot
be applied on all kind of data set; data set with varying noise, dimensions,
variables.
In contour detection, cluster analysis is used for the study and to
organize of data obtained from survey. Whereas in this case,
clustering algorithm is being embedded to all the objects of the
data set including the objects not belonging to any cluster group.
Dealing with test data set and the data set, downloaded from the
UCI repository. Satisfactory results were obtained with test data
set however coordinates from contour detection data set are
showing ambiguity. One of the advantages of proposed algorithm
is that it is effectively applicable on large data set with small
dimensions. And the validation of clusters is also done
effectively. This makes the method highly robust against possible
attacks. Attacks such as clustering high dimensional data set can
be further carried out.
Experimentation with variable data set and different algorithms will enable
a better understanding of the proposed clustering scheme.
In contour detection cluster analysis, I applied clustering algorithm to the
test data set thus forming clusters with distance as similarity measure.
Variations of this approach can be considered. For example, instead of
applying my algorithm any other existing method can be used.
The clustering technique for test data set was extended for testing
validation and stability of clusters. Various type of attacks performed can
be carried out to test the robustness of the scheme.
Also, besides proposed clustering method another method can be used to
carry out the clustering, contour extraction and validation effectively.
Difficulty in comparing quality of the clusters produced (e.g. for different initial
partitions or values of K affect outcome).
Fixed number of clusters can make it difficult to predict what K should be.
Different initial partitions can result in different final clusters. It is helpful to return
the program using the same as well as different K values, to compare the results
achieved.
Euclidean distance measures can unequally weight underlying factors. If there are
two highly overlapping data then algorithm will not be able to resolve that there are
two clusters.
Output file generated may contain mixed coordinates of holes and pixels of
different intensity.
Thank You

Mais conteúdo relacionado

Mais procurados

A Survey on Constellation Based Attribute Selection Method for High Dimension...
A Survey on Constellation Based Attribute Selection Method for High Dimension...A Survey on Constellation Based Attribute Selection Method for High Dimension...
A Survey on Constellation Based Attribute Selection Method for High Dimension...
IJERA Editor
 
Juha vesanto esa alhoniemi 2000:clustering of the som
Juha vesanto esa alhoniemi 2000:clustering of the somJuha vesanto esa alhoniemi 2000:clustering of the som
Juha vesanto esa alhoniemi 2000:clustering of the som
ArchiLab 7
 

Mais procurados (20)

Dp33701704
Dp33701704Dp33701704
Dp33701704
 
A Survey on Constellation Based Attribute Selection Method for High Dimension...
A Survey on Constellation Based Attribute Selection Method for High Dimension...A Survey on Constellation Based Attribute Selection Method for High Dimension...
A Survey on Constellation Based Attribute Selection Method for High Dimension...
 
Accurate time series classification using shapelets
Accurate time series classification using shapeletsAccurate time series classification using shapelets
Accurate time series classification using shapelets
 
An Approach to Mixed Dataset Clustering and Validation with ART-2 Artificial ...
An Approach to Mixed Dataset Clustering and Validation with ART-2 Artificial ...An Approach to Mixed Dataset Clustering and Validation with ART-2 Artificial ...
An Approach to Mixed Dataset Clustering and Validation with ART-2 Artificial ...
 
Detection of Outliers in Large Dataset using Distributed Approach
Detection of Outliers in Large Dataset using Distributed ApproachDetection of Outliers in Large Dataset using Distributed Approach
Detection of Outliers in Large Dataset using Distributed Approach
 
Comparison Between Clustering Algorithms for Microarray Data Analysis
Comparison Between Clustering Algorithms for Microarray Data AnalysisComparison Between Clustering Algorithms for Microarray Data Analysis
Comparison Between Clustering Algorithms for Microarray Data Analysis
 
Feature Subset Selection for High Dimensional Data using Clustering Techniques
Feature Subset Selection for High Dimensional Data using Clustering TechniquesFeature Subset Selection for High Dimensional Data using Clustering Techniques
Feature Subset Selection for High Dimensional Data using Clustering Techniques
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Deep vs diverse architectures for classification problems
Deep vs diverse architectures for classification problemsDeep vs diverse architectures for classification problems
Deep vs diverse architectures for classification problems
 
Juha vesanto esa alhoniemi 2000:clustering of the som
Juha vesanto esa alhoniemi 2000:clustering of the somJuha vesanto esa alhoniemi 2000:clustering of the som
Juha vesanto esa alhoniemi 2000:clustering of the som
 
Outlier detection method introduction
Outlier detection method introductionOutlier detection method introduction
Outlier detection method introduction
 
Morse-Smale Regression
Morse-Smale RegressionMorse-Smale Regression
Morse-Smale Regression
 
Novel Ensemble Tree for Fast Prediction on Data Streams
Novel Ensemble Tree for Fast Prediction on Data StreamsNovel Ensemble Tree for Fast Prediction on Data Streams
Novel Ensemble Tree for Fast Prediction on Data Streams
 
A Novel Clustering Method for Similarity Measuring in Text Documents
A Novel Clustering Method for Similarity Measuring in Text DocumentsA Novel Clustering Method for Similarity Measuring in Text Documents
A Novel Clustering Method for Similarity Measuring in Text Documents
 
Enhanced Clustering Algorithm for Processing Online Data
Enhanced Clustering Algorithm for Processing Online DataEnhanced Clustering Algorithm for Processing Online Data
Enhanced Clustering Algorithm for Processing Online Data
 
Ijartes v1-i2-006
Ijartes v1-i2-006Ijartes v1-i2-006
Ijartes v1-i2-006
 
Forecasting time series for business and operations data: A tutorial
Forecasting time series for business and operations data: A tutorialForecasting time series for business and operations data: A tutorial
Forecasting time series for business and operations data: A tutorial
 
Survey on classification algorithms for data mining (comparison and evaluation)
Survey on classification algorithms for data mining (comparison and evaluation)Survey on classification algorithms for data mining (comparison and evaluation)
Survey on classification algorithms for data mining (comparison and evaluation)
 
Tracking of Fluorescent Cells Based on the Wavelet Otsu Model
Tracking of Fluorescent Cells Based on the Wavelet Otsu ModelTracking of Fluorescent Cells Based on the Wavelet Otsu Model
Tracking of Fluorescent Cells Based on the Wavelet Otsu Model
 
New Feature Selection Model Based Ensemble Rule Classifiers Method for Datase...
New Feature Selection Model Based Ensemble Rule Classifiers Method for Datase...New Feature Selection Model Based Ensemble Rule Classifiers Method for Datase...
New Feature Selection Model Based Ensemble Rule Classifiers Method for Datase...
 

Destaque

A szemelyes markaepites_eloadas_pja
A szemelyes markaepites_eloadas_pjaA szemelyes markaepites_eloadas_pja
A szemelyes markaepites_eloadas_pja
Palluch József
 
B tech ii year i (r07) semester supplementary
B tech ii year i (r07) semester supplementaryB tech ii year i (r07) semester supplementary
B tech ii year i (r07) semester supplementary
prasadmvreddy
 
B tech ii year i semester regular examinations november 2011 results
B tech ii year i semester regular examinations november 2011 resultsB tech ii year i semester regular examinations november 2011 results
B tech ii year i semester regular examinations november 2011 results
prasadmvreddy
 
B tech iv year i (r07) semester supplementary
B tech iv year i (r07) semester supplementaryB tech iv year i (r07) semester supplementary
B tech iv year i (r07) semester supplementary
prasadmvreddy
 
Iii b.tech. ii sem r09 regular april 2013
Iii b.tech. ii sem r09 regular april 2013Iii b.tech. ii sem r09 regular april 2013
Iii b.tech. ii sem r09 regular april 2013
prasadmvreddy
 
B tech ii year ii (r07) semester supplementary
B tech ii year ii (r07) semester supplementaryB tech ii year ii (r07) semester supplementary
B tech ii year ii (r07) semester supplementary
prasadmvreddy
 
B tech iii year i (r07) semester supplementary
B tech iii year i (r07) semester supplementaryB tech iii year i (r07) semester supplementary
B tech iii year i (r07) semester supplementary
prasadmvreddy
 
B tech iii year ii (r07) semester supplementary
B tech iii year ii (r07) semester supplementaryB tech iii year ii (r07) semester supplementary
B tech iii year ii (r07) semester supplementary
prasadmvreddy
 
B.Tech I Year (R09) Regular , Supplementary June 2013
B.Tech I Year (R09) Regular , Supplementary June 2013B.Tech I Year (R09) Regular , Supplementary June 2013
B.Tech I Year (R09) Regular , Supplementary June 2013
prasadmvreddy
 
B tech ii year i (r09) semester regular supplementary examinations november 2...
B tech ii year i (r09) semester regular supplementary examinations november 2...B tech ii year i (r09) semester regular supplementary examinations november 2...
B tech ii year i (r09) semester regular supplementary examinations november 2...
prasadmvreddy
 
Ridge Regression with Conformal Prediction
Ridge Regression with Conformal PredictionRidge Regression with Conformal Prediction
Ridge Regression with Conformal Prediction
mgriffiths1966
 
Introduction to the theory of computation
Introduction to the theory of computationIntroduction to the theory of computation
Introduction to the theory of computation
prasadmvreddy
 
License keys 2012115
License keys 2012115License keys 2012115
License keys 2012115
prasadmvreddy
 

Destaque (16)

A szemelyes markaepites_eloadas_pja
A szemelyes markaepites_eloadas_pjaA szemelyes markaepites_eloadas_pja
A szemelyes markaepites_eloadas_pja
 
Bp
BpBp
Bp
 
Pulkit 10103644
Pulkit 10103644Pulkit 10103644
Pulkit 10103644
 
B tech ii year i (r07) semester supplementary
B tech ii year i (r07) semester supplementaryB tech ii year i (r07) semester supplementary
B tech ii year i (r07) semester supplementary
 
Basic html tutoirialp2
Basic html tutoirialp2Basic html tutoirialp2
Basic html tutoirialp2
 
B tech ii year i semester regular examinations november 2011 results
B tech ii year i semester regular examinations november 2011 resultsB tech ii year i semester regular examinations november 2011 results
B tech ii year i semester regular examinations november 2011 results
 
B tech iv year i (r07) semester supplementary
B tech iv year i (r07) semester supplementaryB tech iv year i (r07) semester supplementary
B tech iv year i (r07) semester supplementary
 
Iii b.tech. ii sem r09 regular april 2013
Iii b.tech. ii sem r09 regular april 2013Iii b.tech. ii sem r09 regular april 2013
Iii b.tech. ii sem r09 regular april 2013
 
B tech ii year ii (r07) semester supplementary
B tech ii year ii (r07) semester supplementaryB tech ii year ii (r07) semester supplementary
B tech ii year ii (r07) semester supplementary
 
B tech iii year i (r07) semester supplementary
B tech iii year i (r07) semester supplementaryB tech iii year i (r07) semester supplementary
B tech iii year i (r07) semester supplementary
 
B tech iii year ii (r07) semester supplementary
B tech iii year ii (r07) semester supplementaryB tech iii year ii (r07) semester supplementary
B tech iii year ii (r07) semester supplementary
 
B.Tech I Year (R09) Regular , Supplementary June 2013
B.Tech I Year (R09) Regular , Supplementary June 2013B.Tech I Year (R09) Regular , Supplementary June 2013
B.Tech I Year (R09) Regular , Supplementary June 2013
 
B tech ii year i (r09) semester regular supplementary examinations november 2...
B tech ii year i (r09) semester regular supplementary examinations november 2...B tech ii year i (r09) semester regular supplementary examinations november 2...
B tech ii year i (r09) semester regular supplementary examinations november 2...
 
Ridge Regression with Conformal Prediction
Ridge Regression with Conformal PredictionRidge Regression with Conformal Prediction
Ridge Regression with Conformal Prediction
 
Introduction to the theory of computation
Introduction to the theory of computationIntroduction to the theory of computation
Introduction to the theory of computation
 
License keys 2012115
License keys 2012115License keys 2012115
License keys 2012115
 

Semelhante a Rohit 10103543

Clusteranalysis 121206234137-phpapp01
Clusteranalysis 121206234137-phpapp01Clusteranalysis 121206234137-phpapp01
Clusteranalysis 121206234137-phpapp01
deepti gupta
 

Semelhante a Rohit 10103543 (20)

Cluster analysis
Cluster analysisCluster analysis
Cluster analysis
 
Clustering in data Mining (Data Mining)
Clustering in data Mining (Data Mining)Clustering in data Mining (Data Mining)
Clustering in data Mining (Data Mining)
 
clustering and distance metrics.pptx
clustering and distance metrics.pptxclustering and distance metrics.pptx
clustering and distance metrics.pptx
 
pratik meshram-Unit 5 (contemporary mkt r sch)
pratik meshram-Unit 5 (contemporary mkt r sch)pratik meshram-Unit 5 (contemporary mkt r sch)
pratik meshram-Unit 5 (contemporary mkt r sch)
 
An Analysis On Clustering Algorithms In Data Mining
An Analysis On Clustering Algorithms In Data MiningAn Analysis On Clustering Algorithms In Data Mining
An Analysis On Clustering Algorithms In Data Mining
 
Dp33701704
Dp33701704Dp33701704
Dp33701704
 
Multilevel techniques for the clustering problem
Multilevel techniques for the clustering problemMultilevel techniques for the clustering problem
Multilevel techniques for the clustering problem
 
Cluster analysis (2).docx
Cluster analysis (2).docxCluster analysis (2).docx
Cluster analysis (2).docx
 
F04463437
F04463437F04463437
F04463437
 
Read first few slides cluster analysis
Read first few slides cluster analysisRead first few slides cluster analysis
Read first few slides cluster analysis
 
Clusteranalysis 121206234137-phpapp01
Clusteranalysis 121206234137-phpapp01Clusteranalysis 121206234137-phpapp01
Clusteranalysis 121206234137-phpapp01
 
Clusteranalysis
Clusteranalysis Clusteranalysis
Clusteranalysis
 
Extended pso algorithm for improvement problems k means clustering algorithm
Extended pso algorithm for improvement problems k means clustering algorithmExtended pso algorithm for improvement problems k means clustering algorithm
Extended pso algorithm for improvement problems k means clustering algorithm
 
Clustering
ClusteringClustering
Clustering
 
84cc04ff77007e457df6aa2b814d2346bf1b
84cc04ff77007e457df6aa2b814d2346bf1b84cc04ff77007e457df6aa2b814d2346bf1b
84cc04ff77007e457df6aa2b814d2346bf1b
 
Literature Survey: Clustering Technique
Literature Survey: Clustering TechniqueLiterature Survey: Clustering Technique
Literature Survey: Clustering Technique
 
Literature Survey On Clustering Techniques
Literature Survey On Clustering TechniquesLiterature Survey On Clustering Techniques
Literature Survey On Clustering Techniques
 
UNIT - 4: Data Warehousing and Data Mining
UNIT - 4: Data Warehousing and Data MiningUNIT - 4: Data Warehousing and Data Mining
UNIT - 4: Data Warehousing and Data Mining
 
Cure, Clustering Algorithm
Cure, Clustering AlgorithmCure, Clustering Algorithm
Cure, Clustering Algorithm
 
Cluster analysis foundations.docx
Cluster analysis foundations.docxCluster analysis foundations.docx
Cluster analysis foundations.docx
 

Último

VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 

Último (20)

Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 

Rohit 10103543

  • 1. Submitted by: Rohit Kansal 10103543, CSE
  • 2.  A loose definition of clustering could be: the process of organising objects into groups whose members are similar in some ways. Its task is grouping of set of objects in such a way that objects in same group are more similar to each other than to objects in other groups.  The goal of clustering is to determine the intrinsic grouping in a set of unlabeled data. Thus, cluster analysis is sometimes referred to as “unsupervised classification” and is distinct from “supervised classification”, or more commonly just “classification.
  • 3.  Hierarchical clustering- It is based on the core idea of objects being more related to nearby objects than to objects farther away.  Centroid-based clustering- In this method clusters are represented by central vector, which may not necessarily be a member of the data set.  Distribution-based clustering- The clustering model most closely related to statistics is based on distribution models  Density-based clustering- Clusters are defined as areas of higher density than the remainder of the data set. Objects in these sparse areas are usually considered to be the noise or border points.
  • 4.  Market Research: Market researchers use cluster analysis to partition the general population of consumers into market segments  Social network analysis: In the study of social network, clustering may be used to recognize communities within large groups of people.  Computer Science: Clustering is useful in software evolution as it helps to reduce legacy properties in code by reforming functionality that has become dispersed.
  • 5. Contour tracing is used to extract boundaries; boarder pixels of boundaries are extracted. Contour tracing is one of the many pre-processing techniques performed on digital image in order to extract information about general shape. Contour detection is used because contour pixels are generally a small subset of the total number of pixels representing a pattern. Thus, amount of computation is reduced when run feature extracting algorithm on contour instead on whole pattern. Also, contour shares a lot of features with the original pattern hence, the feature extraction process become much more efficient.
  • 6.  Moore’s neighbor The Moore neighbourhood of a pixel, P, is the set of 8 pixels which share a vertex or edge with that pixel.  Square Tracing Given a digital pattern; locate a black pixel and declare it as your "start" pixel. Locating a "start" pixel can be done in a number of ways; we'll start at the bottom left corner of the grid, scan each column of pixels from the bottom going upwards starting from the leftmost column and proceeding to the right- until we encounter a black pixel.
  • 7. After reading books, research papers on clustering and application of clustering, and reference material I gathered that though clustering is widely used in many fields, including contour detection, to represent data set into more understanding data set by removing noises and clustering useful information, it still has many drawbacks. Like application of effective clustering technique, selection of data set, number of clusters, and validation of result. Especially, in marketing segmentation result validation is neglected and when done procedure is usually ambiguous. Clustering techniques used are very sensitive to selection of data set, number of cluster, size of data set, etc. And different technique varies accordingly in speed, time and size complexity, accuracy of final clusters. Though there exist many algorithms and methods for contour extraction still these methods lack efficiency. Also, these methods are not universal solution; they need to be customized according to new data set. In addition, a better clustering method, that can be use with contour detection, does not exist.
  • 8.  Data Selection- Selecting the appropriate variables used in the clustering process is one of the most fundamental steps because the inclusion of irrelevant variables may distort and render useless an otherwise useful segmentation solution.  Clustering algorithm selection- CA encompasses a number of different algorithms and methods for grouping objects or subjects. The increasing number of CA methods available, combined with their specific properties, has led some researchers to consider the bewilderment problem of selecting the best method in some sense. Because each technique is different and has specific properties that lead to different segmentation solutions, it is very important to carefully select the algorithm that will be used.  Inefficiency of contour extraction algorithm- In the original description of the algorithm used in Moore-Neighbour tracing, the stopping criterion is visiting the start pixel for a second time.
  • 9. The basic scenario is as follows: To extract a region coordinates from a 2D grid. The value in each cell is the intensity of the area represented by that cell. If this value is zero then the area represented by that cell represent an empty area. Each connected set of cells with same intensity represents a region of that intensity. A region can have holes, this means that in an interior of a region there can be a cells of other intensity or intensity value zero. So, problem is extract each such region with a set of hole cycles. Many approaches are available for the study of the data; these include representation of data in most defined form, reduction in noise, etc. While the various methods have been developed for the above mentioned purpose there still exist some complications. And sometimes these methods cannot be applied on all kind of data set; data set with varying noise, dimensions, variables.
  • 10. In contour detection, cluster analysis is used for the study and to organize of data obtained from survey. Whereas in this case, clustering algorithm is being embedded to all the objects of the data set including the objects not belonging to any cluster group. Dealing with test data set and the data set, downloaded from the UCI repository. Satisfactory results were obtained with test data set however coordinates from contour detection data set are showing ambiguity. One of the advantages of proposed algorithm is that it is effectively applicable on large data set with small dimensions. And the validation of clusters is also done effectively. This makes the method highly robust against possible attacks. Attacks such as clustering high dimensional data set can be further carried out.
  • 11. Experimentation with variable data set and different algorithms will enable a better understanding of the proposed clustering scheme. In contour detection cluster analysis, I applied clustering algorithm to the test data set thus forming clusters with distance as similarity measure. Variations of this approach can be considered. For example, instead of applying my algorithm any other existing method can be used. The clustering technique for test data set was extended for testing validation and stability of clusters. Various type of attacks performed can be carried out to test the robustness of the scheme. Also, besides proposed clustering method another method can be used to carry out the clustering, contour extraction and validation effectively.
  • 12. Difficulty in comparing quality of the clusters produced (e.g. for different initial partitions or values of K affect outcome). Fixed number of clusters can make it difficult to predict what K should be. Different initial partitions can result in different final clusters. It is helpful to return the program using the same as well as different K values, to compare the results achieved. Euclidean distance measures can unequally weight underlying factors. If there are two highly overlapping data then algorithm will not be able to resolve that there are two clusters. Output file generated may contain mixed coordinates of holes and pixels of different intensity.