Pub Date : 2019-04-01DOI: 10.1109/ICACCE46606.2019.9079979
M. Pushpavalli, G. Janani
Mobile Adhoc Network is a self-configuring network in which the nodes can communicate with other node without getting help from the network infrastructure. For forwarding packets each node in the network can work both host and router. Various routing protocols like Dynamic Source Routing (DSR), Adhoc On demand Distance Vector, Destination Sequence Distance Vector (DSDV) and Routing Information Protocol (RIP) have been proposed. In this work the performance comparison of DSR and RIP routing protocols has been made by considering fault node and without fault node. The simulation is done to analyze different parameters of routing protocols like average delay, throughput, average jitter, number of packets enqueued and dequeued etc., using EXATA Network Simulator version 5.1.
{"title":"Quality of Service and Performance Evaluation of Proactive and Reactive Routing Protocols in MANET using Exata 5.1","authors":"M. Pushpavalli, G. Janani","doi":"10.1109/ICACCE46606.2019.9079979","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079979","url":null,"abstract":"Mobile Adhoc Network is a self-configuring network in which the nodes can communicate with other node without getting help from the network infrastructure. For forwarding packets each node in the network can work both host and router. Various routing protocols like Dynamic Source Routing (DSR), Adhoc On demand Distance Vector, Destination Sequence Distance Vector (DSDV) and Routing Information Protocol (RIP) have been proposed. In this work the performance comparison of DSR and RIP routing protocols has been made by considering fault node and without fault node. The simulation is done to analyze different parameters of routing protocols like average delay, throughput, average jitter, number of packets enqueued and dequeued etc., using EXATA Network Simulator version 5.1.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133894687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/ICACCE46606.2019.9079988
N. Paras, S. S. Chauhan
In this paper, an optimally designed vertical tunneling based dual metal dual gate tunnel field effect transistor (DMDG-VTFET) is presented. The design parameters are chosen so as to fulfill the high-performance ON-state current of 1.33 µA, low standby power OFF-state current nearly 50.5 aA and Subthreshold Swing (SS) of 11 mV/decade. Moreover, the proposed TFET follows the International Technology Roadmap for Semiconductors (ITRS) roadmap for low standby power switch performance as ON current/ OFF current ratio (Ion/ Ioff) of the order of 1012 is obtained. Such results are attributed to the dominant carrier tunneling of the device which is in line with the gate electric field. This suppressed the lateral tunneling path which was responsible for the depreciation of the subthreshold slope, thus resulting in a super-steep subthreshold slope. By selecting appropriate work function on tunnel gate and auxiliary gate; Ion, Ioff and threshold voltage VT are significantly improved. Impact of epitaxial region height, source, channel, drain and epitaxial region doping concentration, spacer and dielectric material on ambipolarity of the device is thoroughly studied.
{"title":"Optimization of Design Parameters for Vertical Tunneling Based Dual Metal Dual Gate TFET","authors":"N. Paras, S. S. Chauhan","doi":"10.1109/ICACCE46606.2019.9079988","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079988","url":null,"abstract":"In this paper, an optimally designed vertical tunneling based dual metal dual gate tunnel field effect transistor (DMDG-VTFET) is presented. The design parameters are chosen so as to fulfill the high-performance ON-state current of 1.33 µA, low standby power OFF-state current nearly 50.5 aA and Subthreshold Swing (SS) of 11 mV/decade. Moreover, the proposed TFET follows the International Technology Roadmap for Semiconductors (ITRS) roadmap for low standby power switch performance as ON current/ OFF current ratio (Ion/ Ioff) of the order of 1012 is obtained. Such results are attributed to the dominant carrier tunneling of the device which is in line with the gate electric field. This suppressed the lateral tunneling path which was responsible for the depreciation of the subthreshold slope, thus resulting in a super-steep subthreshold slope. By selecting appropriate work function on tunnel gate and auxiliary gate; Ion, Ioff and threshold voltage VT are significantly improved. Impact of epitaxial region height, source, channel, drain and epitaxial region doping concentration, spacer and dielectric material on ambipolarity of the device is thoroughly studied.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132981138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/ICACCE46606.2019.9080003
K. M, S. G, Aravindhraj N, Priyanka S
In these recent days, evaluation and review marks a most important role in achieving the name for a brand or an item and its administration. The basic idea behind this assessment and audit is to make the brands to be familiar with customers which empower the variety of utilization. Twitter data is used for testing the above scenario due its ample size and scattered behavior. This paper performs the hypothesis investigation about the individual's feelings depending on the collected data. The motive behind the proposed work is to assess many individual's positive view and negative view based on the content audit using the surveys from the twitter. The twitter data is estimated by applying different weighting schemes to improve the classifier accuracy.
{"title":"Machine Learning-Based Sentiment Analysis of Twitter Data","authors":"K. M, S. G, Aravindhraj N, Priyanka S","doi":"10.1109/ICACCE46606.2019.9080003","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9080003","url":null,"abstract":"In these recent days, evaluation and review marks a most important role in achieving the name for a brand or an item and its administration. The basic idea behind this assessment and audit is to make the brands to be familiar with customers which empower the variety of utilization. Twitter data is used for testing the above scenario due its ample size and scattered behavior. This paper performs the hypothesis investigation about the individual's feelings depending on the collected data. The motive behind the proposed work is to assess many individual's positive view and negative view based on the content audit using the surveys from the twitter. The twitter data is estimated by applying different weighting schemes to improve the classifier accuracy.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124006494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/ICACCE46606.2019.9079976
Md. Imran Hossain Showrov, Md. Abdullah Al Awal, Sadia Sazzad
Is there lying any actual difference in their posts between men and women or people of different religion or age? Today it is very important to know whether a text is written by male or female or is it possible to identify a person's gender by using their writing. Several works described a lot of differences between men and women and people of different religion. Besides, it is proved that there is actually linguistics, psychological and sociological difference between men and women or the difference between people of different religion. In this paper, we have find out the dissimilarities between different users by using several text classification algorithms, analyze the performance of these algorithms and reports their results on Facebook posts and comments.
{"title":"Identification of Users Feature Based on Facebook Snippets","authors":"Md. Imran Hossain Showrov, Md. Abdullah Al Awal, Sadia Sazzad","doi":"10.1109/ICACCE46606.2019.9079976","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079976","url":null,"abstract":"Is there lying any actual difference in their posts between men and women or people of different religion or age? Today it is very important to know whether a text is written by male or female or is it possible to identify a person's gender by using their writing. Several works described a lot of differences between men and women and people of different religion. Besides, it is proved that there is actually linguistics, psychological and sociological difference between men and women or the difference between people of different religion. In this paper, we have find out the dissimilarities between different users by using several text classification algorithms, analyze the performance of these algorithms and reports their results on Facebook posts and comments.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122454557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/ICACCE46606.2019.9079994
A. Sethi, Sandip Vijay, Anurag Aeron
In this paper, different scenario-based network performance parameters with optimization for heterogeneous ad-hoc are reviewed, observed and analyzed. Emergency services, traffic congestion and safety issues in transportation system can be resolute by intelligent communication heuristic and transforming information between vehicles and transportation infrastructure. Dynamic behavior of topology, high mobility, congestion, scalability and self-organization makes it difficult and costly to implement in real time deployment. Under different scenarios and conditions performance of different routing protocols and network lifetime are observed in literature by different authors using different simulation tools. Road conditions, variable speed of vehicles, driver unpredictable behavior and obstacles influence the performance of different routing protocols. Mobility and packet size put a great impact on network lifetime. In this paper we analyzed the throughput and packet delivery ratio at different BSMs in three different scenarios one for urban city and two scenarios for routing protocol with varying speed of vehicle. Mobility and link awareness can enhance the network lifetime and other parameters like throughput, goodput and packet delivery ratio of vehicular ad hoc network observed under simulation.
{"title":"Cross Layer Optimization with QoS for Heterogeneous ad-hoc Network","authors":"A. Sethi, Sandip Vijay, Anurag Aeron","doi":"10.1109/ICACCE46606.2019.9079994","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079994","url":null,"abstract":"In this paper, different scenario-based network performance parameters with optimization for heterogeneous ad-hoc are reviewed, observed and analyzed. Emergency services, traffic congestion and safety issues in transportation system can be resolute by intelligent communication heuristic and transforming information between vehicles and transportation infrastructure. Dynamic behavior of topology, high mobility, congestion, scalability and self-organization makes it difficult and costly to implement in real time deployment. Under different scenarios and conditions performance of different routing protocols and network lifetime are observed in literature by different authors using different simulation tools. Road conditions, variable speed of vehicles, driver unpredictable behavior and obstacles influence the performance of different routing protocols. Mobility and packet size put a great impact on network lifetime. In this paper we analyzed the throughput and packet delivery ratio at different BSMs in three different scenarios one for urban city and two scenarios for routing protocol with varying speed of vehicle. Mobility and link awareness can enhance the network lifetime and other parameters like throughput, goodput and packet delivery ratio of vehicular ad hoc network observed under simulation.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131495266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/ICACCE46606.2019.9079975
Kailash Chandra Giri, Mayank Patel, Amit Sinhal, Diwakar Gautam
Harmful Melanoma, basically the most extremely dangerous sort of epidermis malignancy, has a phenomenal conclusion whenever taken care of inside the reparable early ranges. Early determination and careful extraction is presumably the most vigorous cure of melanoma. This work utilizes a record set of 184 clinical dermatoscopic pictures of skin injuries, in which 144 pictures are of dangerous sores and 40 photos are of the amiable sore, picture pre-handling, and division techniques are utilized to separate melanoma from considerate pigmented sores. Otsu and Entropy fundamentally based picture division rules are cultivated which improves the execution. The appropriate outcomes demonstrate that Havrda Entropy and Harris Corner Detector based melanoma analysis approach accomplish greater affectability concerning Otsu and Harris based joined methodology. The separated geometrical, fringe and shading highlight set is conveyed to characterize an outlining limit among considerate and dangerous classes of melanoma, and it is seen that entropy-based neural learning approach outflanks to Otsu based neural learning approach individually.
{"title":"A Novel Paradigm of Melanoma Diagnosis Using Machine Learning and Information Theory","authors":"Kailash Chandra Giri, Mayank Patel, Amit Sinhal, Diwakar Gautam","doi":"10.1109/ICACCE46606.2019.9079975","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079975","url":null,"abstract":"Harmful Melanoma, basically the most extremely dangerous sort of epidermis malignancy, has a phenomenal conclusion whenever taken care of inside the reparable early ranges. Early determination and careful extraction is presumably the most vigorous cure of melanoma. This work utilizes a record set of 184 clinical dermatoscopic pictures of skin injuries, in which 144 pictures are of dangerous sores and 40 photos are of the amiable sore, picture pre-handling, and division techniques are utilized to separate melanoma from considerate pigmented sores. Otsu and Entropy fundamentally based picture division rules are cultivated which improves the execution. The appropriate outcomes demonstrate that Havrda Entropy and Harris Corner Detector based melanoma analysis approach accomplish greater affectability concerning Otsu and Harris based joined methodology. The separated geometrical, fringe and shading highlight set is conveyed to characterize an outlining limit among considerate and dangerous classes of melanoma, and it is seen that entropy-based neural learning approach outflanks to Otsu based neural learning approach individually.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"17 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131573897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/ICACCE46606.2019.9079955
K. S. Kumar, R. A. Kumar, V. P. Kumar
The yield estimation in agricultural field plays a vital role for the better utilization of resources and to enhance total yield per unit area within the time. The yield estimation of fruit is currently computed manually which leads to labour extensive and also expensive. It also takes much time for yield estimation. This manual sampling may also results in imprecise yield calculation. This makes the demand in machine vision based systems to address the above mentioned problem in detecting the yield estimation and thus reduces the error in counting the number of fruits on each tree. The multilayer CNN proposed here is used to classify the fruit from the tree image and also gives better result even in case of diminished images. Overlapped fruits also counted separately to give better result.
{"title":"Automated Yield Estimation Of Fruits Using Multilayer Convolution Neural Networks","authors":"K. S. Kumar, R. A. Kumar, V. P. Kumar","doi":"10.1109/ICACCE46606.2019.9079955","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079955","url":null,"abstract":"The yield estimation in agricultural field plays a vital role for the better utilization of resources and to enhance total yield per unit area within the time. The yield estimation of fruit is currently computed manually which leads to labour extensive and also expensive. It also takes much time for yield estimation. This manual sampling may also results in imprecise yield calculation. This makes the demand in machine vision based systems to address the above mentioned problem in detecting the yield estimation and thus reduces the error in counting the number of fruits on each tree. The multilayer CNN proposed here is used to classify the fruit from the tree image and also gives better result even in case of diminished images. Overlapped fruits also counted separately to give better result.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129021960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/ICACCE46606.2019.9079968
Sudheendra Harwalkar, D. Sitaram, Shivangi Jadon, Dhanaraj V Kidiyoor, Ornella D'souza
Storage as a Service (STaaS) is in a very advanced stage and 80-90% of the users trust and use public cloud storage. However, enterprises and communities are still skeptical and are concerned with data safety and theft, and are investing to build their own private storage system, where cost of storage space is not the most important concern. This limits resource (compute and network) scale at the peak on demand in hybrid/multi-cloud environment as one cannot keep buying and upgrading computing hardware resources to support peak workloads in private cloud [9]. There are commercial solutions offered by few public cloud service providers/brokers to maintain the data in a private cloud in a hybrid environment, but this may have vendor/broker lock-in and portability/migration issues. In this paper, we explore OpenStack cloud for private Storage as a Service in hybrid/multi-cloud environment and demonstrate with our framework (middleware), which is built upon OpenStack [16], an open source cloud and by leveraging existing OpenStack functionalities.
{"title":"Private STaaS with OpenStack Cinder Volumes for Hybrid/Multi-cloud","authors":"Sudheendra Harwalkar, D. Sitaram, Shivangi Jadon, Dhanaraj V Kidiyoor, Ornella D'souza","doi":"10.1109/ICACCE46606.2019.9079968","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079968","url":null,"abstract":"Storage as a Service (STaaS) is in a very advanced stage and 80-90% of the users trust and use public cloud storage. However, enterprises and communities are still skeptical and are concerned with data safety and theft, and are investing to build their own private storage system, where cost of storage space is not the most important concern. This limits resource (compute and network) scale at the peak on demand in hybrid/multi-cloud environment as one cannot keep buying and upgrading computing hardware resources to support peak workloads in private cloud [9]. There are commercial solutions offered by few public cloud service providers/brokers to maintain the data in a private cloud in a hybrid environment, but this may have vendor/broker lock-in and portability/migration issues. In this paper, we explore OpenStack cloud for private Storage as a Service in hybrid/multi-cloud environment and demonstrate with our framework (middleware), which is built upon OpenStack [16], an open source cloud and by leveraging existing OpenStack functionalities.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"501 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134319323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/ICACCE46606.2019.9079950
Abin Satheesan, S. Geethiga
Nowadays, the rapid improvement in CMOS technology to reduce power and area and to increase the speed of chip is mainly consideredin research field. In this paper power dissipation and delay are reduced using Transmission Gate Logic(TGL), which are the most challenging factor in CMOS VLSI Design. The power reduction is achieved without compromising the performance. It is difficult to design such devices because tradeoff between power consumption and speed is a major concern. The encoders and decoders in this paper are designed using proposed TGL by which trade off problems can be eliminated to a greater extend. The number of transistors reducedis four in AND Gate. In OR Gate the power is reduced more than half even with two transistors increased in proposed design. The circuits are designed using 45nm technology in CADENCE VIRTUOSO and the performance parameters are analyzed.
{"title":"A Design of Low Power and High Speed Encoder and Decoder Circuits by Re-Evaluating High Speed Design Values","authors":"Abin Satheesan, S. Geethiga","doi":"10.1109/ICACCE46606.2019.9079950","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079950","url":null,"abstract":"Nowadays, the rapid improvement in CMOS technology to reduce power and area and to increase the speed of chip is mainly consideredin research field. In this paper power dissipation and delay are reduced using Transmission Gate Logic(TGL), which are the most challenging factor in CMOS VLSI Design. The power reduction is achieved without compromising the performance. It is difficult to design such devices because tradeoff between power consumption and speed is a major concern. The encoders and decoders in this paper are designed using proposed TGL by which trade off problems can be eliminated to a greater extend. The number of transistors reducedis four in AND Gate. In OR Gate the power is reduced more than half even with two transistors increased in proposed design. The circuits are designed using 45nm technology in CADENCE VIRTUOSO and the performance parameters are analyzed.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128772762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/ICACCE46606.2019.9079956
L. Shalin, A. Bharathi, T. Prasanth
Clustering algorithm is frequently used for extending a distance metric or a similarity evaluation for the separation of data from database. The divided data points are more similar and they are categorized significantly to cluster in high dimensional data spaces. Then, clustered data points are projected with different diverse set of proportions. Clustering high dimensional data is a proficient research field. High-dimensional data are wide-ranging in numerous areas of forest scenario, machine learning, signal and image processing, computer vision, pattern recognition, bioinformatics and so on. Let us consider the forest scenario for clustering the information about the trees among dissimilar tree structure. Based on the clustering of forest information, they combine diverse areas of capability and equipment.
{"title":"Analysis of Multi Cluster Projection on High Dimensional Data Based on Forest Scenario","authors":"L. Shalin, A. Bharathi, T. Prasanth","doi":"10.1109/ICACCE46606.2019.9079956","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079956","url":null,"abstract":"Clustering algorithm is frequently used for extending a distance metric or a similarity evaluation for the separation of data from database. The divided data points are more similar and they are categorized significantly to cluster in high dimensional data spaces. Then, clustered data points are projected with different diverse set of proportions. Clustering high dimensional data is a proficient research field. High-dimensional data are wide-ranging in numerous areas of forest scenario, machine learning, signal and image processing, computer vision, pattern recognition, bioinformatics and so on. Let us consider the forest scenario for clustering the information about the trees among dissimilar tree structure. Based on the clustering of forest information, they combine diverse areas of capability and equipment.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127838540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}