SlideShare une entreprise Scribd logo
1  sur  25
Project title
ABSTRACT:
 Constrained spectral clustering (CSC) algorithms have
shown great promise in significantly improving
clustering accuracy by encoding side information into
spectral clustering algorithms. However, existing CSC
algorithms are inefficient in handling moderate and
large datasets. In this paper, we aim to develop a
scalable and efficient CSC algorithm by integrating
sparse coding based graph construction into a
framework called constrained normalized cuts.
EXISTING SYSTEM:
 Data in a wide variety of areas tend to large scales. For
many traditional learning based data mining
algorithms, it is a big challenge to efficiently mine
knowledge from the fast increasing data such as
information streams, images and even videos.
 To over-come the challenge, it is important to develop
scalable learning algorithms.
DISADVANTAGES OF EXISTING
SYSTEM:
 Straightforward integration of the constrained
normalized cuts and the sparse coding based graph
construction and the formulated scalable constrained
normalized-cuts problem.
PROPOSED SYSTEM:
 In this project, we develop an efficient and scalable
CSC algorithm that can well handle moderate and
large datasets. The SCACS algorithm can be
understood as a scalable version of the well-designed
but less efficient algorithm known as Flexible Con-
strained Spectral Clustering (FCSC).
 To our best knowledge, our algorithm is the first
efficient and scalable version in this area, which is
derived by an integration of two recent studies, the
constrained normalized cuts and the graph
construction method based on sparse coding.
ADVANTAGES OF PROPOSED
SYSTEM:
 We randomly sample sclabelled instances from a given
input dataset, and then obtain based on the rules of
The clustering accuracy is evaluated by the best
matching rate(ACC).
 Let h be the resulting label vector obtained from a
clustering algorithm. Let g be the ground truth label
vector.
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP/7.
 Coding Language : JAVA/J2EE
 IDE : Eclipse
 Database : MYSQL
Modules with their explanation
 A. Text anomaly detection
 B. Link anomaly detection
 C. Decision factor
A. Text anomaly detection
 Dataset of social networking site like Facebook, tweeter is
given to module of text anomaly detection. Content
preprocessing is next step which consists of many other
processes as follows:
 Word extraction: Words are extracted from text shared
by user over social networking site.
 Stemming: Variant forms of a word are reduced to a
common form. Stemming is the process of retrieving root
or stem of word.
 Weight assignment to word: Whatever words extracted
from previous steps are assigned weight to them depending
on prediction made from word.
 Frequency of words: how many times particular words
appear in a given time period is calculated.
B. Link anomaly detection
 Dataset of social networking site is also given to link
anomaly detection module. A step performed in this
module is as follows:
 a)Clustering of vertices having same features: We
can do clustering of vertices depending on same
communication behavior and build profile for each
cluster. Individual vertex profiles are also built
depending on the communication behavior of a vertex.
C. Decision factor:
 Result obtained from link anomaly module and text
anomaly module is compared in decision factor and
final anomaly is predicted.
SDLC
 Spiral Model design
The spiral model has four phases. A software project repeatedly passes
through these phases in iterations called Spirals.
 Identification
 This phase starts with gathering the business requirements in the
baseline spiral. In the subsequent spirals as the product matures,
identification of system requirements, subsystem requirements and
unit requirements are all done in this phase.
 This also includes understanding the system requirements by
continuous communication between the customer and the system
analyst. At the end of the spiral the product is deployed in the
identified market.
 Following is a diagrammatic representation of spiral model listing the
activities in each phase.
Design :Design phase starts with the conceptual design
in the baseline spiral and involves architectural design,
logical design of modules, physical product design and
final design in the subsequent spirals.
 Construct or Build
Construct phase refers to production of the actual
software product at every spiral. In the baseline spiral
when the product is just thought of and the design is
being developed a POC (Proof of Concept) is developed
in this phase to get customer feedback.
Then in the subsequent spirals with higher clarity on
requirements and design details a working model of the
software called build is produced with a version
number. These builds are sent to customer for
feedback.
 Evaluation and Risk Analysis
 Risk Analysis includes identifying, estimating, and monitoring
technical feasibility and management risks, such as schedule
slippage and cost overrun. After testing the build, at the end of first
iteration, the customer evaluates the software and provides feedback.
 Based on the customer evaluation, software development process
enters into the next iteration and subsequently follows the linear
approach to implement the feedback suggested by the customer. The
process of iterations along the spiral continues throughout the life of
the software.
Use Case Diagram
Active Diagram
Data Flow Diagram
Key Based Detection
Twitter Trends
Location Based Detection
Retweet Count
LocationSearch Word
Level 0:
Level 1:
Data Flow Diagram
Key Based
Detection
Spectral
Clustering
Location Based
Detection
Retweet
Count
Location Based
Detection
Spectral Clustering
Rewet Count
Aggregation
Search Word
Key Based Detection
Level 2:
ER Diagram
USER
father_nam
e
weight
height
skin_colo
r
languages
dob
birth_place
birth_state
age
Industry
gendername
c_id
mother_name
current_city
siblings
FILM dor
film_name
c_id
act
search
search search
LOCATION
location
texthash_tag
name
retweet
count
id
created at HASH TAG
location
texthash_tag
name
retweet
count
id
created at
RETWEET
location
texthash_tag
name
retweet
count
id
created at
1
N
N
N
N
NN
N
Conclusion:
 We have developed a new k-way scalable constrained
spectral clustering algorithm based on a closed-form
integration of the constrained normalized cuts and the
sparse coding based graph construction.
 with less side information, our algorithm can obtain
significant improvements in accuracy compared to the
unsupervised baseline
 with less computational time, our algorithm can
obtain high clustering accuracies close to those of the
state-of-the-art
Scalable constrained spectral clustering

Contenu connexe

Tendances

IEEE Projects on MATLAB Research Assistance
IEEE Projects on MATLAB Research AssistanceIEEE Projects on MATLAB Research Assistance
IEEE Projects on MATLAB Research AssistanceMatlab Simulation
 
Image Processing IEEE 2015 Projects
Image Processing IEEE 2015 ProjectsImage Processing IEEE 2015 Projects
Image Processing IEEE 2015 ProjectsVijay Karan
 
A TALE of DATA PATTERN DISCOVERY IN PARALLEL
A TALE of DATA PATTERN DISCOVERY IN PARALLELA TALE of DATA PATTERN DISCOVERY IN PARALLEL
A TALE of DATA PATTERN DISCOVERY IN PARALLELJenny Liu
 
MATLAB Based Projects for M.Tech Research Guidance
MATLAB Based Projects for M.Tech Research GuidanceMATLAB Based Projects for M.Tech Research Guidance
MATLAB Based Projects for M.Tech Research GuidanceMatlab Simulation
 
MATLAB Based Project List Research Topics
MATLAB Based Project List Research TopicsMATLAB Based Project List Research Topics
MATLAB Based Project List Research TopicsMatlab Simulation
 
IEEE Parallel and distributed system 2016 Title and Abstract
IEEE Parallel and distributed system 2016 Title and AbstractIEEE Parallel and distributed system 2016 Title and Abstract
IEEE Parallel and distributed system 2016 Title and Abstracttsysglobalsolutions
 
Recognition and Detection of Real-Time Objects Using Unified Network of Faste...
Recognition and Detection of Real-Time Objects Using Unified Network of Faste...Recognition and Detection of Real-Time Objects Using Unified Network of Faste...
Recognition and Detection of Real-Time Objects Using Unified Network of Faste...dbpublications
 
Signal Processing IEEE 2015 Projects
Signal Processing IEEE 2015 ProjectsSignal Processing IEEE 2015 Projects
Signal Processing IEEE 2015 ProjectsVijay Karan
 
Easy MATLAB Projects Research Help
Easy MATLAB Projects Research HelpEasy MATLAB Projects Research Help
Easy MATLAB Projects Research HelpMatlab Simulation
 
Image Processing IEEE 2015 Projects
Image Processing IEEE 2015 ProjectsImage Processing IEEE 2015 Projects
Image Processing IEEE 2015 ProjectsVijay Karan
 
Signal Processing IEEE 2015 Projects
Signal Processing IEEE 2015 ProjectsSignal Processing IEEE 2015 Projects
Signal Processing IEEE 2015 ProjectsVijay Karan
 
Fast aggregation scheduling in wireless sensor networks
Fast aggregation scheduling in wireless sensor networksFast aggregation scheduling in wireless sensor networks
Fast aggregation scheduling in wireless sensor networksLogicMindtech Nologies
 
M phil-computer-science-signal-processing-projects
M phil-computer-science-signal-processing-projectsM phil-computer-science-signal-processing-projects
M phil-computer-science-signal-processing-projectsVijay Karan
 
Novel design algorithm for low complexity
Novel design algorithm for low complexityNovel design algorithm for low complexity
Novel design algorithm for low complexityLogicMindtech Nologies
 
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...Ecway Technologies
 

Tendances (17)

IEEE Projects on MATLAB Research Assistance
IEEE Projects on MATLAB Research AssistanceIEEE Projects on MATLAB Research Assistance
IEEE Projects on MATLAB Research Assistance
 
Image Processing IEEE 2015 Projects
Image Processing IEEE 2015 ProjectsImage Processing IEEE 2015 Projects
Image Processing IEEE 2015 Projects
 
A TALE of DATA PATTERN DISCOVERY IN PARALLEL
A TALE of DATA PATTERN DISCOVERY IN PARALLELA TALE of DATA PATTERN DISCOVERY IN PARALLEL
A TALE of DATA PATTERN DISCOVERY IN PARALLEL
 
MATLAB Based Projects for M.Tech Research Guidance
MATLAB Based Projects for M.Tech Research GuidanceMATLAB Based Projects for M.Tech Research Guidance
MATLAB Based Projects for M.Tech Research Guidance
 
MATLAB Based Project List Research Topics
MATLAB Based Project List Research TopicsMATLAB Based Project List Research Topics
MATLAB Based Project List Research Topics
 
IEEE Parallel and distributed system 2016 Title and Abstract
IEEE Parallel and distributed system 2016 Title and AbstractIEEE Parallel and distributed system 2016 Title and Abstract
IEEE Parallel and distributed system 2016 Title and Abstract
 
Recognition and Detection of Real-Time Objects Using Unified Network of Faste...
Recognition and Detection of Real-Time Objects Using Unified Network of Faste...Recognition and Detection of Real-Time Objects Using Unified Network of Faste...
Recognition and Detection of Real-Time Objects Using Unified Network of Faste...
 
Binduhasini_S_latest
Binduhasini_S_latestBinduhasini_S_latest
Binduhasini_S_latest
 
Signal Processing IEEE 2015 Projects
Signal Processing IEEE 2015 ProjectsSignal Processing IEEE 2015 Projects
Signal Processing IEEE 2015 Projects
 
Easy MATLAB Projects Research Help
Easy MATLAB Projects Research HelpEasy MATLAB Projects Research Help
Easy MATLAB Projects Research Help
 
Resisting skew accumulation
Resisting skew accumulationResisting skew accumulation
Resisting skew accumulation
 
Image Processing IEEE 2015 Projects
Image Processing IEEE 2015 ProjectsImage Processing IEEE 2015 Projects
Image Processing IEEE 2015 Projects
 
Signal Processing IEEE 2015 Projects
Signal Processing IEEE 2015 ProjectsSignal Processing IEEE 2015 Projects
Signal Processing IEEE 2015 Projects
 
Fast aggregation scheduling in wireless sensor networks
Fast aggregation scheduling in wireless sensor networksFast aggregation scheduling in wireless sensor networks
Fast aggregation scheduling in wireless sensor networks
 
M phil-computer-science-signal-processing-projects
M phil-computer-science-signal-processing-projectsM phil-computer-science-signal-processing-projects
M phil-computer-science-signal-processing-projects
 
Novel design algorithm for low complexity
Novel design algorithm for low complexityNovel design algorithm for low complexity
Novel design algorithm for low complexity
 
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
 

Similaire à Scalable constrained spectral clustering

Hardware Design Practices For Modern Hardware
Hardware Design Practices For Modern HardwareHardware Design Practices For Modern Hardware
Hardware Design Practices For Modern HardwareWinstina Kennedy
 
Web-Based System for Software Requirements Quality Analysis Using Case-Based ...
Web-Based System for Software Requirements Quality Analysis Using Case-Based ...Web-Based System for Software Requirements Quality Analysis Using Case-Based ...
Web-Based System for Software Requirements Quality Analysis Using Case-Based ...IOSR Journals
 
Software Architecture - Quiz Questions
Software Architecture - Quiz QuestionsSoftware Architecture - Quiz Questions
Software Architecture - Quiz QuestionsGanesh Samarthyam
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsMuhammadTalha436
 
Software Engineering concept
Software Engineering concept Software Engineering concept
Software Engineering concept Atamjitsingh92
 
Software architacture recovery
Software architacture recoverySoftware architacture recovery
Software architacture recoveryImdad Ul Haq
 
Axsys Technologies Software Offerings
Axsys Technologies Software OfferingsAxsys Technologies Software Offerings
Axsys Technologies Software OfferingsSuvadeep Sarkar
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...IEEEGLOBALSOFTTECHNOLOGIES
 
Proto Spiral.ppt Proto Spiral.ppt Proto Spiral.ppt Proto Spiral.ppt
Proto Spiral.ppt Proto Spiral.ppt Proto Spiral.ppt Proto Spiral.pptProto Spiral.ppt Proto Spiral.ppt Proto Spiral.ppt Proto Spiral.ppt
Proto Spiral.ppt Proto Spiral.ppt Proto Spiral.ppt Proto Spiral.pptAnirbanBhar3
 
A Comparative Study of Forward and Reverse Engineering
A Comparative Study of Forward and Reverse EngineeringA Comparative Study of Forward and Reverse Engineering
A Comparative Study of Forward and Reverse Engineeringijsrd.com
 
Identifying parameters for Code Offloading as a practical solution to optimiz...
Identifying parameters for Code Offloading as a practical solution to optimiz...Identifying parameters for Code Offloading as a practical solution to optimiz...
Identifying parameters for Code Offloading as a practical solution to optimiz...Anindya Duti Dhar
 
Mi0033 software engineering...
Mi0033  software engineering...Mi0033  software engineering...
Mi0033 software engineering...smumbahelp
 
2012 ieee projects software engineering @ Seabirds ( Trichy, Chennai, Pondich...
2012 ieee projects software engineering @ Seabirds ( Trichy, Chennai, Pondich...2012 ieee projects software engineering @ Seabirds ( Trichy, Chennai, Pondich...
2012 ieee projects software engineering @ Seabirds ( Trichy, Chennai, Pondich...SBGC
 
Finding Bad Code Smells with Neural Network Models
Finding Bad Code Smells with Neural Network Models Finding Bad Code Smells with Neural Network Models
Finding Bad Code Smells with Neural Network Models IJECEIAES
 
National%20 online%20examination%20system%20an%20architectural%20perspective
National%20 online%20examination%20system%20an%20architectural%20perspectiveNational%20 online%20examination%20system%20an%20architectural%20perspective
National%20 online%20examination%20system%20an%20architectural%20perspectivekalimullahmohd89
 
National%20 online%20examination%20system%20an%20architectural%20perspective
National%20 online%20examination%20system%20an%20architectural%20perspectiveNational%20 online%20examination%20system%20an%20architectural%20perspective
National%20 online%20examination%20system%20an%20architectural%20perspectivekalimullahmohd89
 

Similaire à Scalable constrained spectral clustering (20)

Hardware Design Practices For Modern Hardware
Hardware Design Practices For Modern HardwareHardware Design Practices For Modern Hardware
Hardware Design Practices For Modern Hardware
 
Web-Based System for Software Requirements Quality Analysis Using Case-Based ...
Web-Based System for Software Requirements Quality Analysis Using Case-Based ...Web-Based System for Software Requirements Quality Analysis Using Case-Based ...
Web-Based System for Software Requirements Quality Analysis Using Case-Based ...
 
Software Architecture - Quiz Questions
Software Architecture - Quiz QuestionsSoftware Architecture - Quiz Questions
Software Architecture - Quiz Questions
 
Software Architecture - Quiz Questions
Software Architecture - Quiz QuestionsSoftware Architecture - Quiz Questions
Software Architecture - Quiz Questions
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
 
Software Engineering concept
Software Engineering concept Software Engineering concept
Software Engineering concept
 
Software architacture recovery
Software architacture recoverySoftware architacture recovery
Software architacture recovery
 
Axsys Technologies Software Offerings
Axsys Technologies Software OfferingsAxsys Technologies Software Offerings
Axsys Technologies Software Offerings
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
 
Proto Spiral.ppt Proto Spiral.ppt Proto Spiral.ppt Proto Spiral.ppt
Proto Spiral.ppt Proto Spiral.ppt Proto Spiral.ppt Proto Spiral.pptProto Spiral.ppt Proto Spiral.ppt Proto Spiral.ppt Proto Spiral.ppt
Proto Spiral.ppt Proto Spiral.ppt Proto Spiral.ppt Proto Spiral.ppt
 
A Comparative Study of Forward and Reverse Engineering
A Comparative Study of Forward and Reverse EngineeringA Comparative Study of Forward and Reverse Engineering
A Comparative Study of Forward and Reverse Engineering
 
Resume
ResumeResume
Resume
 
Documentation
DocumentationDocumentation
Documentation
 
Identifying parameters for Code Offloading as a practical solution to optimiz...
Identifying parameters for Code Offloading as a practical solution to optimiz...Identifying parameters for Code Offloading as a practical solution to optimiz...
Identifying parameters for Code Offloading as a practical solution to optimiz...
 
Mi0033 software engineering...
Mi0033  software engineering...Mi0033  software engineering...
Mi0033 software engineering...
 
2012 ieee projects software engineering @ Seabirds ( Trichy, Chennai, Pondich...
2012 ieee projects software engineering @ Seabirds ( Trichy, Chennai, Pondich...2012 ieee projects software engineering @ Seabirds ( Trichy, Chennai, Pondich...
2012 ieee projects software engineering @ Seabirds ( Trichy, Chennai, Pondich...
 
Prasad_CTP
Prasad_CTPPrasad_CTP
Prasad_CTP
 
Finding Bad Code Smells with Neural Network Models
Finding Bad Code Smells with Neural Network Models Finding Bad Code Smells with Neural Network Models
Finding Bad Code Smells with Neural Network Models
 
National%20 online%20examination%20system%20an%20architectural%20perspective
National%20 online%20examination%20system%20an%20architectural%20perspectiveNational%20 online%20examination%20system%20an%20architectural%20perspective
National%20 online%20examination%20system%20an%20architectural%20perspective
 
National%20 online%20examination%20system%20an%20architectural%20perspective
National%20 online%20examination%20system%20an%20architectural%20perspectiveNational%20 online%20examination%20system%20an%20architectural%20perspective
National%20 online%20examination%20system%20an%20architectural%20perspective
 

Plus de Nishanth Harapanahalli

Rural marketing mod 5 hand loom industry
Rural marketing mod 5  hand loom industryRural marketing mod 5  hand loom industry
Rural marketing mod 5 hand loom industryNishanth Harapanahalli
 
Rural marketing mod 4 Indian agrochemicals market
Rural marketing mod 4  Indian agrochemicals marketRural marketing mod 4  Indian agrochemicals market
Rural marketing mod 4 Indian agrochemicals marketNishanth Harapanahalli
 
Rural MARKETING mod 4 fertilizer industry in India
Rural MARKETING mod 4  fertilizer industry in IndiaRural MARKETING mod 4  fertilizer industry in India
Rural MARKETING mod 4 fertilizer industry in IndiaNishanth Harapanahalli
 
Rural marketing mod 3 rural marketing of fmcg's
Rural marketing mod 3  rural marketing of fmcg's Rural marketing mod 3  rural marketing of fmcg's
Rural marketing mod 3 rural marketing of fmcg's Nishanth Harapanahalli
 
Rural marketing mod 3 rural marketing of financial services
Rural marketing mod 3  rural marketing of financial servicesRural marketing mod 3  rural marketing of financial services
Rural marketing mod 3 rural marketing of financial servicesNishanth Harapanahalli
 
Rural mktg mod 3 rural marketing of consumer durables (milon & govind)
Rural mktg mod 3  rural marketing of consumer durables (milon & govind)Rural mktg mod 3  rural marketing of consumer durables (milon & govind)
Rural mktg mod 3 rural marketing of consumer durables (milon & govind)Nishanth Harapanahalli
 

Plus de Nishanth Harapanahalli (18)

Rural marketing mod 5 hand loom industry
Rural marketing mod 5  hand loom industryRural marketing mod 5  hand loom industry
Rural marketing mod 5 hand loom industry
 
Rural marketing mod 4 Indian agrochemicals market
Rural marketing mod 4  Indian agrochemicals marketRural marketing mod 4  Indian agrochemicals market
Rural marketing mod 4 Indian agrochemicals market
 
Rural MARKETING mod 4 fertilizer industry in India
Rural MARKETING mod 4  fertilizer industry in IndiaRural MARKETING mod 4  fertilizer industry in India
Rural MARKETING mod 4 fertilizer industry in India
 
Rural marketing mod 3 rural marketing of fmcg's
Rural marketing mod 3  rural marketing of fmcg's Rural marketing mod 3  rural marketing of fmcg's
Rural marketing mod 3 rural marketing of fmcg's
 
Rural marketing mod 3 rural marketing of financial services
Rural marketing mod 3  rural marketing of financial servicesRural marketing mod 3  rural marketing of financial services
Rural marketing mod 3 rural marketing of financial services
 
Rural mktg mod 3 rural marketing of consumer durables (milon & govind)
Rural mktg mod 3  rural marketing of consumer durables (milon & govind)Rural mktg mod 3  rural marketing of consumer durables (milon & govind)
Rural mktg mod 3 rural marketing of consumer durables (milon & govind)
 
International retailing
International retailingInternational retailing
International retailing
 
International logistics
International logisticsInternational logistics
International logistics
 
Service marketing module 7
Service marketing module 7Service marketing module 7
Service marketing module 7
 
Jio questionnare
Jio questionnareJio questionnare
Jio questionnare
 
Internal recruitment
Internal recruitmentInternal recruitment
Internal recruitment
 
Industrial relations
Industrial relationsIndustrial relations
Industrial relations
 
Financial instruments
Financial instrumentsFinancial instruments
Financial instruments
 
Equal remuneration act
Equal remuneration actEqual remuneration act
Equal remuneration act
 
Securitization of debt
Securitization of debtSecuritization of debt
Securitization of debt
 
Factoring financial services
Factoring financial servicesFactoring financial services
Factoring financial services
 
Housing finance
Housing financeHousing finance
Housing finance
 
Credit rating agency
Credit rating agencyCredit rating agency
Credit rating agency
 

Dernier

Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 

Dernier (20)

Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 

Scalable constrained spectral clustering

  • 2. ABSTRACT:  Constrained spectral clustering (CSC) algorithms have shown great promise in significantly improving clustering accuracy by encoding side information into spectral clustering algorithms. However, existing CSC algorithms are inefficient in handling moderate and large datasets. In this paper, we aim to develop a scalable and efficient CSC algorithm by integrating sparse coding based graph construction into a framework called constrained normalized cuts.
  • 3. EXISTING SYSTEM:  Data in a wide variety of areas tend to large scales. For many traditional learning based data mining algorithms, it is a big challenge to efficiently mine knowledge from the fast increasing data such as information streams, images and even videos.  To over-come the challenge, it is important to develop scalable learning algorithms.
  • 4. DISADVANTAGES OF EXISTING SYSTEM:  Straightforward integration of the constrained normalized cuts and the sparse coding based graph construction and the formulated scalable constrained normalized-cuts problem.
  • 5. PROPOSED SYSTEM:  In this project, we develop an efficient and scalable CSC algorithm that can well handle moderate and large datasets. The SCACS algorithm can be understood as a scalable version of the well-designed but less efficient algorithm known as Flexible Con- strained Spectral Clustering (FCSC).  To our best knowledge, our algorithm is the first efficient and scalable version in this area, which is derived by an integration of two recent studies, the constrained normalized cuts and the graph construction method based on sparse coding.
  • 6. ADVANTAGES OF PROPOSED SYSTEM:  We randomly sample sclabelled instances from a given input dataset, and then obtain based on the rules of The clustering accuracy is evaluated by the best matching rate(ACC).  Let h be the resulting label vector obtained from a clustering algorithm. Let g be the ground truth label vector.
  • 7. HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb.
  • 8. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Eclipse  Database : MYSQL
  • 9. Modules with their explanation  A. Text anomaly detection  B. Link anomaly detection  C. Decision factor
  • 10. A. Text anomaly detection  Dataset of social networking site like Facebook, tweeter is given to module of text anomaly detection. Content preprocessing is next step which consists of many other processes as follows:  Word extraction: Words are extracted from text shared by user over social networking site.  Stemming: Variant forms of a word are reduced to a common form. Stemming is the process of retrieving root or stem of word.  Weight assignment to word: Whatever words extracted from previous steps are assigned weight to them depending on prediction made from word.  Frequency of words: how many times particular words appear in a given time period is calculated.
  • 11. B. Link anomaly detection  Dataset of social networking site is also given to link anomaly detection module. A step performed in this module is as follows:  a)Clustering of vertices having same features: We can do clustering of vertices depending on same communication behavior and build profile for each cluster. Individual vertex profiles are also built depending on the communication behavior of a vertex.
  • 12. C. Decision factor:  Result obtained from link anomaly module and text anomaly module is compared in decision factor and final anomaly is predicted.
  • 13. SDLC  Spiral Model design The spiral model has four phases. A software project repeatedly passes through these phases in iterations called Spirals.  Identification  This phase starts with gathering the business requirements in the baseline spiral. In the subsequent spirals as the product matures, identification of system requirements, subsystem requirements and unit requirements are all done in this phase.  This also includes understanding the system requirements by continuous communication between the customer and the system analyst. At the end of the spiral the product is deployed in the identified market.  Following is a diagrammatic representation of spiral model listing the activities in each phase.
  • 14. Design :Design phase starts with the conceptual design in the baseline spiral and involves architectural design, logical design of modules, physical product design and final design in the subsequent spirals.  Construct or Build Construct phase refers to production of the actual software product at every spiral. In the baseline spiral when the product is just thought of and the design is being developed a POC (Proof of Concept) is developed in this phase to get customer feedback. Then in the subsequent spirals with higher clarity on requirements and design details a working model of the software called build is produced with a version number. These builds are sent to customer for feedback.
  • 15.  Evaluation and Risk Analysis  Risk Analysis includes identifying, estimating, and monitoring technical feasibility and management risks, such as schedule slippage and cost overrun. After testing the build, at the end of first iteration, the customer evaluates the software and provides feedback.  Based on the customer evaluation, software development process enters into the next iteration and subsequently follows the linear approach to implement the feedback suggested by the customer. The process of iterations along the spiral continues throughout the life of the software.
  • 18. Data Flow Diagram Key Based Detection Twitter Trends Location Based Detection Retweet Count LocationSearch Word Level 0: Level 1:
  • 19. Data Flow Diagram Key Based Detection Spectral Clustering Location Based Detection Retweet Count Location Based Detection Spectral Clustering Rewet Count Aggregation Search Word Key Based Detection Level 2:
  • 20. ER Diagram USER father_nam e weight height skin_colo r languages dob birth_place birth_state age Industry gendername c_id mother_name current_city siblings FILM dor film_name c_id act search search search LOCATION location texthash_tag name retweet count id created at HASH TAG location texthash_tag name retweet count id created at RETWEET location texthash_tag name retweet count id created at 1 N N N N NN N
  • 21.
  • 22.
  • 23.
  • 24. Conclusion:  We have developed a new k-way scalable constrained spectral clustering algorithm based on a closed-form integration of the constrained normalized cuts and the sparse coding based graph construction.  with less side information, our algorithm can obtain significant improvements in accuracy compared to the unsupervised baseline  with less computational time, our algorithm can obtain high clustering accuracies close to those of the state-of-the-art