SlideShare une entreprise Scribd logo
1  sur  3
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
Effective and Efficient Clustering Methods for Correlated 
Probabilistic Graphs 
Abstract 
Recently, probabilistic graphs have attracted significant interests of the 
data mining community. It is observed that correlations may exist among 
adjacent edges in various probabilistic graphs. As one of the basic mining 
techniques, graph clustering is widely used in exploratory data analysis, 
such as data compression, information retrieval, image segmentation, etc. 
Graph clustering aims to divide data into clusters according to their 
similarities, and a number of algorithms have been proposed for clustering 
graphs, such as the pKwikCluster algorithm, spectral clustering, k-path 
clustering, etc. However, little research has been performed to develop 
efficient clustering algorithms for probabilistic graphs. Particularly, it 
becomes more challenging to efficiently cluster probabilistic graphs when 
correlations are considered. In this paper, we define the problem of 
clustering correlated probabilistic graphs. To solve the challenging problem, 
we propose two algorithms, namely the PEEDR and the CPGS clustering 
algorithm. For each of the proposed algorithms, we develop several 
pruning techniques to further improve their efficiency. We evaluate the 
effectiveness and efficiency of our algorithms and pruning methods through 
comprehensive experiments.
Existing system 
Recently, probabilistic graphs have attracted significant interests of the 
data mining community. It is observed that correlations may exist among 
adjacent edges in various probabilistic graphs. As one of the basic mining 
techniques, graph clustering is widely used in exploratory data analysis, 
such as data compression, information retrieval, image segmentation, etc. 
Graph clustering aims to divide data into clusters according to their 
similarities, and a number of algorithms have been proposed for clustering 
graphs, such as the pKwikCluster algorithm, spectral clustering, k-path 
clustering, etc. However, little research has been performed to develop 
efficient clustering algorithms for probabilistic graphs. Particularly, it 
becomes more challenging to efficiently cluster probabilistic graphs when 
correlations are considered. 
Proposed system 
In this paper, we define the problem of clustering correlated probabilistic 
graphs. To solve the challenging problem, we propose two algorithms, 
namely the PEEDR and the CPGS clustering algorithm. For each of the 
proposed algorithms, we develop several pruning techniques to further 
improve their efficiency. We evaluate the effectiveness and efficiency of our 
algorithms and pruning methods through comprehensive experiments. 
System Configuration:- 
Hardware Configuration:- 
 Processor - Pentium –IV 
 Speed - 1.1 Ghz 
 RAM - 256 MB(min)
 Hard Disk - 20 GB 
 Key Board - Standard Windows Keyboard 
 Mouse - Two or Three Button Mouse 
 Monitor - SVGA 
Software Configuration:- 
 Operating System : Windows XP 
 Programming Language : JAVA 
 Java Version : JDK 1.6 & above.

Contenu connexe

En vedette

Crime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringCrime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means Clustering
Reuben George
 
Big Data v Data Mining
Big Data v Data MiningBig Data v Data Mining
Big Data v Data Mining
University of Hertfordshire
 
Data mining slides
Data mining slidesData mining slides
Data mining slides
smj
 
Data mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniquesData mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniques
Saif Ullah
 

En vedette (11)

Crime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringCrime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means Clustering
 
Crime Analysis & Prediction System
Crime Analysis & Prediction SystemCrime Analysis & Prediction System
Crime Analysis & Prediction System
 
Using Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime PatternUsing Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime Pattern
 
Data Mining and Business Intelligence Tools
Data Mining and Business Intelligence ToolsData Mining and Business Intelligence Tools
Data Mining and Business Intelligence Tools
 
Ch 1 Intro to Data Mining
Ch 1 Intro to Data MiningCh 1 Intro to Data Mining
Ch 1 Intro to Data Mining
 
DATA WAREHOUSING AND DATA MINING
DATA WAREHOUSING AND DATA MININGDATA WAREHOUSING AND DATA MINING
DATA WAREHOUSING AND DATA MINING
 
Big Data v Data Mining
Big Data v Data MiningBig Data v Data Mining
Big Data v Data Mining
 
Data mining slides
Data mining slidesData mining slides
Data mining slides
 
Data Mining Concepts
Data Mining ConceptsData Mining Concepts
Data Mining Concepts
 
Data mining
Data miningData mining
Data mining
 
Data mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniquesData mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniques
 

Plus de IEEEFINALYEARSTUDENTPROJECTS

Plus de IEEEFINALYEARSTUDENTPROJECTS (20)

IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Building a scalable system for steal...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Building a scalable system for steal...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Building a scalable system for steal...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Building a scalable system for steal...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Token mac a fair mac protocol for pa...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Token mac a fair mac protocol for pa...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Token mac a fair mac protocol for pa...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Token mac a fair mac protocol for pa...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Tag sense leveraging smartphones for...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Tag sense leveraging smartphones for...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Tag sense leveraging smartphones for...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Tag sense leveraging smartphones for...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Friendbook a semantic based friend r...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Friendbook a semantic based friend r...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Friendbook a semantic based friend r...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Friendbook a semantic based friend r...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS A low complexity algorithm for neigh...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS A low complexity algorithm for neigh...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS A low complexity algorithm for neigh...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS A low complexity algorithm for neigh...
 
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Hierarchical prediction and context ...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Hierarchical prediction and context ...IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Hierarchical prediction and context ...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Hierarchical prediction and context ...
 
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...
 
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Click prediction-for-web-image-reran...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Click prediction-for-web-image-reran...IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Click prediction-for-web-image-reran...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Click prediction-for-web-image-reran...
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Web service recommendation via expl...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Web service recommendation via expl...IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Web service recommendation via expl...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Web service recommendation via expl...
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Scalable and accurate prediction of...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Scalable and accurate prediction of...IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Scalable and accurate prediction of...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Scalable and accurate prediction of...
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Privacy enhanced web service compos...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Privacy enhanced web service compos...IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Privacy enhanced web service compos...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Privacy enhanced web service compos...
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Decentralized enactment of bpel pro...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Decentralized enactment of bpel pro...IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Decentralized enactment of bpel pro...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Decentralized enactment of bpel pro...
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS A novel time obfuscated algorithm ...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS  A novel time obfuscated algorithm ...IEEE 2014 JAVA SERVICE COMPUTING PROJECTS  A novel time obfuscated algorithm ...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS A novel time obfuscated algorithm ...
 
IEEE 2014 JAVA SOFTWARE ENGINEER PROJECTS Conservation of information softwar...
IEEE 2014 JAVA SOFTWARE ENGINEER PROJECTS Conservation of information softwar...IEEE 2014 JAVA SOFTWARE ENGINEER PROJECTS Conservation of information softwar...
IEEE 2014 JAVA SOFTWARE ENGINEER PROJECTS Conservation of information softwar...
 
IEEE 2014 JAVA DATA MINING PROJECTS Xs path navigation on xml schemas made easy
IEEE 2014 JAVA DATA MINING PROJECTS Xs path navigation on xml schemas made easyIEEE 2014 JAVA DATA MINING PROJECTS Xs path navigation on xml schemas made easy
IEEE 2014 JAVA DATA MINING PROJECTS Xs path navigation on xml schemas made easy
 

Dernier

"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Dernier (20)

Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 

IEEE 2014 JAVA DATA MINING PROJECTS Effective and efficient clustering methods for correlated probabilistic graphs

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com Effective and Efficient Clustering Methods for Correlated Probabilistic Graphs Abstract Recently, probabilistic graphs have attracted significant interests of the data mining community. It is observed that correlations may exist among adjacent edges in various probabilistic graphs. As one of the basic mining techniques, graph clustering is widely used in exploratory data analysis, such as data compression, information retrieval, image segmentation, etc. Graph clustering aims to divide data into clusters according to their similarities, and a number of algorithms have been proposed for clustering graphs, such as the pKwikCluster algorithm, spectral clustering, k-path clustering, etc. However, little research has been performed to develop efficient clustering algorithms for probabilistic graphs. Particularly, it becomes more challenging to efficiently cluster probabilistic graphs when correlations are considered. In this paper, we define the problem of clustering correlated probabilistic graphs. To solve the challenging problem, we propose two algorithms, namely the PEEDR and the CPGS clustering algorithm. For each of the proposed algorithms, we develop several pruning techniques to further improve their efficiency. We evaluate the effectiveness and efficiency of our algorithms and pruning methods through comprehensive experiments.
  • 2. Existing system Recently, probabilistic graphs have attracted significant interests of the data mining community. It is observed that correlations may exist among adjacent edges in various probabilistic graphs. As one of the basic mining techniques, graph clustering is widely used in exploratory data analysis, such as data compression, information retrieval, image segmentation, etc. Graph clustering aims to divide data into clusters according to their similarities, and a number of algorithms have been proposed for clustering graphs, such as the pKwikCluster algorithm, spectral clustering, k-path clustering, etc. However, little research has been performed to develop efficient clustering algorithms for probabilistic graphs. Particularly, it becomes more challenging to efficiently cluster probabilistic graphs when correlations are considered. Proposed system In this paper, we define the problem of clustering correlated probabilistic graphs. To solve the challenging problem, we propose two algorithms, namely the PEEDR and the CPGS clustering algorithm. For each of the proposed algorithms, we develop several pruning techniques to further improve their efficiency. We evaluate the effectiveness and efficiency of our algorithms and pruning methods through comprehensive experiments. System Configuration:- Hardware Configuration:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)
  • 3.  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA Software Configuration:-  Operating System : Windows XP  Programming Language : JAVA  Java Version : JDK 1.6 & above.