K-centroid link: a novel hierarchical clustering linkage method

A Dogan, D Birant - Applied Intelligence, 2022 - Springer
In hierarchical clustering, the most important factor is the selection of the linkage method
which is the decision of how the distances between clusters will be calculated. It extremely …

A view on fuzzy systems for big data: progress and opportunities

A Fernandez, CJ Carmona, MJ del Jesus… - International Journal of …, 2016 - Springer
Currently, we are witnessing a growing trend in the study and application of problems in the
framework of Big Data. This is mainly due to the great advantages which come from the …

[PDF][PDF] A survey and systematic categorization of parallel k-means and fuzzy-c-means algorithms

A Jamel, B Akay - Computer Systems Science and Engineering, 2019 - cdn.techscience.cn
Parallel processing has turned into one of the emerging fields of machine learning due to
providing consistent work by performing several tasks simultaneously, enhancing reliability …

A dynamic resource allocation algorithm in cloud computing based on workflow and resource clustering

Q Shang - Journal of Internet Technology, 2021 - jit.ndhu.edu.tw
Since the complexity of large-scale and scientific computation, workflow has been used for
task decomposition in cloud computing. A dynamic resource allocation algorithm based on …

Granular aggregation of fuzzy rule-based models in distributed data environment

B Zhang, W Pedrycz, AR Fayek… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Quite often, complex systems or phenomena are observed from various points of view
yielding the particular subsets of data usually being composed of locally available attributes …

Scalable online-offline stream clustering in apache spark

O Backhoff, E Ntoutsi - 2016 IEEE 16th International …, 2016 - ieeexplore.ieee.org
Two of the most popular approaches for dealing with big data are distributed computing and
stream mining. In this paper, we incorporate both approaches in order to bring a competitive …

When can we test less?

T Menzies, JD Stefano, K Ammar… - … and Computing in …, 2004 - ieeexplore.ieee.org
When it is impractical to rigorously assess all parts of complex systems, test engineers use
defect detectors to focus their limited resources. We define some properties of an ideal …

Detecting image forgery using XOR and determinant of pixels for image forensics

P Mookdarsanit, L Soimart, M Ketcham… - … Conference on Signal …, 2015 - ieeexplore.ieee.org
Using images in case investigation may doubt that the image are forged or not. Image
forensics is an approach for image validity. In this paper, we propose a new method for …

An integrated framework for anomaly detection in big data of medical wireless sensors

B Saneja, R Rani - Modern physics letters b, 2018 - World Scientific
Wireless sensor networks (WSNs) are ubiquitous nowadays and have applications in variety
of domains such as machine surveillance, precision agriculture, intelligent buildings …

Cloud based k-means clustering running as a Mapreduce job for big data healthcare analytics using Apache mahout

S Rallapalli, RR Gondkar, GV Madhava Rao - Information Systems Design …, 2016 - Springer
Increase in data volume and need for analytics has led towards innovation of big data. To
speed up the query responses models like NoSQL has emerged. Virtualized platforms using …