您现在的位置: 首页> 研究主题> clustering

clustering

clustering的相关文献在1994年到2022年内共计337篇,主要集中在自动化技术、计算机技术、肿瘤学、无线电电子学、电信技术 等领域,其中期刊论文313篇、会议论文3篇、专利文献21篇;相关期刊98种,包括计算机科学、计算机、材料和连续体(英文)、软件工程与应用(英文)等; 相关会议2种,包括第二届中国传感器网络学术会议暨第一届中韩传感器网络学术研讨会(CWSN2008\CKWSN2008)、第二十四届中国数据库学术会议等;clustering的相关文献由1011位作者贡献,包括Abdelwahed Motwakel、Anwer Mustafa Hilal、Denis A.Pustokhin等。

clustering—发文量

期刊论文>

论文:313 占比:92.88%

会议论文>

论文:3 占比:0.89%

专利文献>

论文:21 占比:6.23%

总计:337篇

clustering—发文趋势图

clustering

-研究学者

  • Abdelwahed Motwakel
  • Anwer Mustafa Hilal
  • Denis A.Pustokhin
  • Irina V.Pustokhina
  • Ishfaq Yaseen
  • K.Shankar
  • Manar Ahmed Hamza
  • Fahd N.Al-Wesabi
  • Mesfer Al Duhayyim
  • Wei Hu
  • 期刊论文
  • 会议论文
  • 专利文献

搜索

排序:

年份

期刊

    • Rogério Edivaldo Freitas
    • 摘要: Food production remains one of the main challenges for humankind in this century, and Brazil is one of the largest food-producing countries that have yet some land for economically or technically profitable farming expansion. Moreover, knowing which areas constitute the Brazilian agricultural frontier is crucial for improving public policies and logistics infrastructure decisions. Data from the Brazilian Institute of Geography and Statistics from 1995 to 2019 were used in this study. We aimed to map and measure the expansion of agricultural areas in Brazil from 1995 to 2019 for temporary crops according to their mesoregions. We used a four-stage methodology, compared the results of two agglomerative clustering methods, and identified similar mesoregions based on their share trends in the Brazilian agricultural seeded area. Some mesoregions had higher positive trend values for their share of the Brazilian agricultural seeded area: Mato-grossense North (MT), Mato-grossense Northeast (MT), Mato Grosso do Sul Southwest (MS), Goiano South (GO), Extreme West Bahia (BA), Maranhense South (MA), Piauiense Southwest (PI), and Tocantins Eastern (TO). As a second leading group, the Paranaíba Upstream (MG), São José do Rio Preto (SP), Mato-grossense Southeast (MT), and Goiano East (GO), must be emphasized. Further research is recommended, including extending the study to permanent crops and applying top-down analysis targeting microregions or municipalities in the identified mesoregions.
    • Elaheh Gavagsaz
    • 摘要: The k-Nearest Neighbor method is one of the most popular techniques for both classification and regression purposes.Because of its operation,the application of this classification may be limited to problems with a certain number of instances,particularly,when run time is a consideration.However,the classification of large amounts of data has become a fundamental task in many real-world applications.It is logical to scale the k-Nearest Neighbor method to large scale datasets.This paper proposes a new k-Nearest Neighbor classification method(KNN-CCL)which uses a parallel centroid-based and hierarchical clustering algorithm to separate the sample of training dataset into multiple parts.The introduced clustering algorithm uses four stages of successive refinements and generates high quality clusters.The k-Nearest Neighbor approach subsequently makes use of them to predict the test datasets.Finally,sets of experiments are conducted on the UCI datasets.The experimental results confirm that the proposed k-Nearest Neighbor classification method performs well with regard to classification accuracy and performance.
    • Kabukila Kilotwa Michel; Hairong Yan; Njiraini Immaculate; Biaye Yaye
    • 摘要: In recent years, the demand for Wireless Sensor Network (WSN) in smart farming has had a tremendous increase in demand for its efficiency. Wireless sensor networks have very many nodes, and it is of no use when the battery dies. This is why there are several routing protocols being take into consideration to cub this problem. In this paper, in order to increase the heterogeneity and energy levels of the network, the M-LEACH protocol is proposed. The key aim of the Leach protocol is to prolong the existence of wireless sensor network by lowering the energy consumption needed for Cluster Head creation and maintenance, the proposed algorithm instructs a node to use high power amplification as it acts as the Cluster heads, and low power amplification when it becomes a Cluster Member, in the next stage. Finally, for better effectiveness, M-LEACH employs hard and soft threshold systems. Since it eliminates collisions and reduces the packet drop ratio for other signals, the M-LEACH protocol proposed works better than the Leach protocol.
    • Wenjing You; Chao Dong; Qihui Wu; Yuben Qu; Yulei Wu; Rong He
    • 摘要: This paper establishes a new layered flying ad hoc networks(FANETs) system of mobile edge computing(MEC) supported by multiple UAVs,where the first layer of user UAVs can perform tasks such as area coverage, and the second layer of MEC UAVs are deployed as flying MEC sever for user UAVs with computing-intensive tasks. In this system, we first divide the user UAVs into multiple clusters, and transmit the tasks of the cluster members(CMs) within a cluster to its cluster head(CH). Then, we need to determine whether each CH’ tasks are executed locally or offloaded to one of the MEC UAVs for remote execution(i.e., task scheduling), and how much resources should be allocated to each CH(i.e., resource allocation), as well as the trajectories of all MEC UAVs.We formulate an optimization problem with the aim of minimizing the overall energy consumption of all user UAVs, under the constraints of task completion deadline and computing resource, which is a mixed integer non-convex problem and hard to solve. We propose an iterative algorithm by applying block coordinate descent methods. To be specific, the task scheduling between CH UAVs and MEC UAVs, computing resource allocation, and MEC UAV trajectory are alternately optimized in each iteration. For the joint task scheduling and computing resource allocation subproblem and MEC UAV trajectory subproblem, we employ branch and bound method and continuous convex approximation technique to solve them,respectively. Extensive simulation results validate the superiority of our proposed approach to several benchmarks.
    • Dalia H.Elkamchouchi; Jaber S.Alzahrani; Hany Mahgoub; Amal S.Mehanna; Anwer Mustafa Hilal; Abdelwahed Motwakel; Abu Sarwar Zamani; Ishfaq Yaseen
    • 摘要: The recent technological developments have revolutionized the functioning of Wireless Sensor Network(WSN)-based industries with the development of Internet of Things(IoT).Internet of Drones(IoD)is a division under IoT and is utilized for communication amongst drones.While drones are naturally mobile,it undergoes frequent topological changes.Such alterations in the topology cause route election,stability,and scalability problems in IoD.Encryption is considered as an effective method to transmit the images in IoD environment.The current study introduces an Atom Search Optimization basedClusteringwith Encryption Technique for Secure Internet of Drones(ASOCE-SIoD)environment.The key objective of the presented ASOCE-SIoD technique is to group the drones into clusters and encrypt the images captured by drones.The presented ASOCE-SIoD technique follows ASO-based Cluster Head(CH)and cluster construction technique.In addition,signcryption technique is also applied to effectually encrypt the images captured by drones in IoD environment.This process enables the secure transmission of images to the ground station.In order to validate the efficiency of the proposed ASOCE-SIoD technique,several experimental analyses were conducted and the outcomes were inspected under different aspects.The comprehensive comparative analysis results established the superiority of the proposed ASOCE-SIoD model over recent approaches.
    • Shuwen Wang; Xingquan Zhu; Weiping Ding; Amir Alipour Yengejeh
    • 摘要: Recent years have witnessed the increasing popularity of mobile and networking devices,as well as social networking sites,where users engage in a variety of activities in the cyberspace on a daily and real-time basis.While such systems provide tremendous convenience and enjoyment for users,malicious usages,such as bullying,cruelty,extremism,and toxicity behaviors,also grow noticeably,and impose significant threats to individuals and communities.In this paper,we review computational approaches for cyberbullying and cyberviolence detection,in order to understand two major factors:1)What are the defining features of online bullying users,and 2)How to detect cyberbullying and cyberviolence.To achieve the goal,we propose a user-activities-content(UAC)triangular view,which defines that users in the cyberspace are centered around the UAC triangle to carry out activities and generate content.Accordingly,we categorize cyberbully features into three main categories:1)User centered features,2)Content centered features,and 3)Activity centered features.After that,we review methods for cyberbully detection,by taking supervised,unsupervised,transfer learning,and deep learning,etc.,into consideration.The UAC centered view provides a coherent and complete summary about features and characteristics of online users(their activities),approaches to detect bullying users(and malicious content),and helps defend cyberspace from bullying and toxicity.
    • Anwer Mustafa Hilal; Aisha Hassan Abdalla Hashim; Sami Dhahbi; Dalia H.Elkamchouchi; Jaber S.Alzahrani; Mrim M.Alnfiai; Amira Sayed A.Aziz; Abdelwahed Motwakel
    • 摘要: Wireless Sensor Networks(WSN)interlink numerous Sensor Nodes(SN)to support Internet of Things(loT)services.But the data gathered from SNs can be divulged,tempered,and forged.Conventional WSN data processes manage the data in a centralized format at terminal gadgets.These devices are prone to attacks and the security of systems can get compromised.Blockchain is a distributed and decentralized technique that has the ability to handle security issues in WSN.The security issues include transactions that may be copied and spread across numerous nodes in a peer-peer network system.This breaches the mutual trust and allows data immutability which in turn permits the network to go on.At some instances,few nodes die or get compromised due to heavy power utilization.The current article develops an Energy Aware Chaotic Pigeon Inspired Optimization based Clustering scheme for Blockchain assisted WSN technique abbreviated as EACPIO-CB technique.The primary objective of the proposed EACPIO-CB model is to proficiently group the sensor nodes into clusters and exploit Blockchain(BC)for inter-cluster communication in the network.To select ClusterHeads(CHs)and organize the clusters,the presented EACPIO-CB model designs a fitness function that involves distinct input parameters.Further,BC technology enables the communication between one CH and the other and with the Base Station(BS)in the network.The authors conducted comprehensive set of simulations and the outcomes were investigated under different aspects.The simulation results confirmed the better performance of EACPIO-CB method over recent methodologies.
    • Mohd Afizi Mohd Shukran; Mohd Sidek Fadhil Mohd Yunus; Muhammad Naim Abdullah; Mohd Rizal Mohd Isa; Mohammad Adib Khairuddin; Kamaruzaman Maskat; Suhaila Ismail; Abdul Samad Shibghatullah
    • 摘要: Content Based Image Retrieval, CBIR, performed an automated classification task for a queried image. It could relieve a user from the laborious and time-consuming metadata assigning for an image while working on massive image collection. For an image, user’s definition or description is subjective where it could belong to different categories as defined by different users. Human based categorization and computer-based categorization might produce different results due to different categorization criteria that rely on dataset structure and the clustering techniques. This paper is aimed to exhibit an idea for planning the dataset structure and choosing the clustering algorithm for CBIR implementation. There are 5 sections arranged in this paper;CBIR and QBE concepts are introduced in Section 1, related image categorization research is listed in Section 2, the 5 type of image clustering are described in Section 3, comparative analysis in Section 4, and Section 5 conclude this study. Outcome of this paper will be benefiting CBIR developer for various applications.
    • Mahmoud Ragab; Diaa Hamed
    • 摘要: Medical data classification becomes a hot research topic in the healthcare sector to aid physicians in the healthcare sector for decision making.Besides,the advances of machine learning(ML)techniques assist to perform the effective classification task.With this motivation,this paper presents a Fuzzy Clustering Approach Based on Breadth-first Search Algorithm(FCA-BFS)with optimal support vector machine(OSVM)model,named FCABFS-OSVM for medical data classification.The proposed FCABFS-OSVM technique intends to classify the healthcare data by the use of clustering and classification models.Besides,the proposed FCABFSOSVM technique involves the design of FCABFS technique to cluster the medical data which helps to boost the classification performance.Moreover,the OSVM model investigates the clustered medical data to perform classification process.Furthermore,Archimedes optimization algorithm(AOA)is utilized to the SVM parameters and boost the medical data classification results.A wide range of simulations takes place to highlight the promising performance of the FCABFS-OSVM technique.Extensive comparison studies reported the enhanced outcomes of the FCABFS-OSVM technique over the recent state of art approaches.
    • Ahmed S.Almasoud; Taiseer Abdalla Elfadil Eisa; Marwa Obayya; Abdelzahir Abdelmaboud; Mesfer Al Duhayyim; Ishfaq Yaseen; Manar Ahmed Hamza; Abdelwahed Motwakel
    • 摘要: In recent days,internet of things is widely implemented in Wireless Sensor Network(WSN).It comprises of sensor hubs associated together through the WSNs.The WSNis generally affected by the power in battery due to the linked sensor nodes.In order to extend the lifespan of WSN,clustering techniques are used for the improvement of energy consumption.Clustering methods divide the nodes in WSN and form a cluster.Moreover,it consists of unique Cluster Head(CH)in each cluster.In the existing system,Soft-K means clustering techniques are used in energy consumption in WSN.The soft-k means algorithm does not work with the large-scale wireless sensor networks,therefore it causes reliability and energy consumption problems.To overcome this,the proposed Load-Balanced Clustering conjunction with Coyote Optimization with Fuzzy Logic(LBC-COFL)algorithm is used.The main objective is to perform the lifespan by balancing the gateways with the load of less energy.The proposed algorithm is evaluated using the metrics such as energy consumption,throughput,central tendency,network lifespan,and total energy utilization.
  • 查看更多

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号