Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 33

Full-Text Articles in Computer Engineering

Unsupervised Complex Condition Recognition Based On Stochastic Neighborhood Embedding, Lin Huang, Shanjun Liu, Wei Wang, Li Gong Jun 2024

Unsupervised Complex Condition Recognition Based On Stochastic Neighborhood Embedding, Lin Huang, Shanjun Liu, Wei Wang, Li Gong

Journal of System Simulation

Abstract: Modern industrial production equipment usually has a complex structure and runs alternately in different working conditions. Accurate working conditions identification based on monitoring data is the basis of health monitoring of the system, but the monitoring data of the system usually has a high dimension and a large data volume. To identify the complex equipment operating conditions, an unsupervised operating condition identification method based on stochastic neighborhood embedding is proposed. The stochastic neighborhood embedding algorithm can simultaneously preserve the local and global structural characteristics of the data, and also calculate the probability similarity of data points in high-dimensional and …


Just-In-Time Learning Energy Consumption Predictive Modeling Method In Multi-Condition Production Process, Sheng Wei, Yan Wang, Zhicheng Ji Jun 2024

Just-In-Time Learning Energy Consumption Predictive Modeling Method In Multi-Condition Production Process, Sheng Wei, Yan Wang, Zhicheng Ji

Journal of System Simulation

Abstract: Aiming at the problem that the global energy consumption prediction model is only suitable for part of the prediction sample and the model is computationally intensive, the idea of just-in-time learning is introduced, and the local weighted partial least squares method combined with the energy consumption model is used to establish a temporary local energy consumption prediction model. The inertia weights of the particle swarm algorithm are improved, considering the effects of particle fitness, number of iterations and population size on the convergence speed and convergence accuracy of the particle swarm algorithm, a nonlinear change adaptive inertia weight strategy …


Hyper-Heuristic Approach With K-Means Clustering For Inter-Cell Scheduling, Yanlin Zhao, Yunna Tian Apr 2024

Hyper-Heuristic Approach With K-Means Clustering For Inter-Cell Scheduling, Yanlin Zhao, Yunna Tian

Journal of System Simulation

Abstract: According to the actual production situation of China's manufacturing industry, a hyperheuristic algorithm based on K-means clustering is proposed for inter-cell scheduling problem of flexible job-shop. K-means clustering is applied to group entities with similar attributes into the corresponding work cluster decision blocks, and the ant colony algorithm is used to select heuristic rules for each decision block. The optimal scheduling solutions are generated by using corresponding heuristic rules for scheduling of entities in each decision block. Computational results show that, the computational granularity is properly increased by the form of decision blocks, and the computational efficiency of the …


Exploring Human Aging Proteins Based On Deep Autoencoders And K-Means Clustering, Sondos M. Hammad, Mohamed Talaat Saidahmed, Elsayed A. Sallam, Reda Elbasiony Mar 2024

Exploring Human Aging Proteins Based On Deep Autoencoders And K-Means Clustering, Sondos M. Hammad, Mohamed Talaat Saidahmed, Elsayed A. Sallam, Reda Elbasiony

Journal of Engineering Research

Aging significantly affects human health and the overall economy, yet understanding of the underlying molecular mechanisms remains limited. Among all human genes, almost three hundred and five have been linked to human aging. While certain subsets of these genes or specific aging-related genes have been extensively studied. There has been a lack of comprehensive examination encompassing the entire set of aging-related genes. Here, the main objective is to overcome understanding based on an innovative approach that combines the capabilities of deep learning. Particularly using One-Dimensional Deep AutoEncoder (1D-DAE). Followed by the K-means clustering technique as a means of unsupervised learning. …


Performance Analysis Of Whale Optimization Based Data Clustering, Ahamed Shafeeq B M, Zahid Ahmed Ansari, Shyam Karanth May 2021

Performance Analysis Of Whale Optimization Based Data Clustering, Ahamed Shafeeq B M, Zahid Ahmed Ansari, Shyam Karanth

Future Computing and Informatics Journal

Data clustering is the method of gathering of data points so that the more similar points will be in the same group. It is a key role in exploratory data mining and a popular technique used in many fields to analyze statistical data. Quality clusters are the key requirement of the cluster analysis result. There will be tradeoffs between the speed of the clustering algorithm and the quality of clusters it produces. Both the quality and speed criteria must be considered for the state-of-the-art clustering algorithm for applications. The Bio-inspired technique has ensured that the process is not trapped in …


Clustered Mobile Data Collection In Wsns: An Energy-Delay Trade-Of, İzzet Fati̇h Şentürk Jan 2021

Clustered Mobile Data Collection In Wsns: An Energy-Delay Trade-Of, İzzet Fati̇h Şentürk

Turkish Journal of Electrical Engineering and Computer Sciences

Wireless sensor networks enable monitoring remote areas with limited human intervention. However, the network connectivity between sensor nodes and the base station (BS) may not be always possible due to the limited transmission range of the nodes. In such a case, one or more mobile data collectors (MDCs) can be employed to visit nodes for data collection. If multiple MDCs are available, it is desirable to minimize the energy cost of mobility while distributing the cost among the MDCs in a fair manner. Despite availability of various clustering algorithms, there is no single fits all clustering solution when different requirements …


Slashing Quality Index Modeling And Simulation Based On Data Dispersion Clustering, Yuxian Zhang, Xiaoyi Qian, Dong Xiao, Jianhui Wang Aug 2020

Slashing Quality Index Modeling And Simulation Based On Data Dispersion Clustering, Yuxian Zhang, Xiaoyi Qian, Dong Xiao, Jianhui Wang

Journal of System Simulation

Abstract: For the sensitivity of noise and outliers data in the typical partitioning clustering algorithm, a clustering algorithm based on data dispersion was proposed. The data dispersion was defined and introduced to a non-Euclidean distance. The similarity metric was established, and the data clustering was realized. The optimal clustering number was obtained by the validity function based on improved partition coefficient. Then the proposed clustering algorithm was applied to quality index model in slashing process. A size add-on quality index model was built by radial basis function neural networks. The node number of hidden layer was determined and the center …


Key Technologies Of Precaution And Prediction Of Abnormal Spatial-Temporal Trajectory: A Review Of Recent Advances, Gongda Qiu, He Ming, Yang Jie, Yuting Cao, Jihong Sun Jun 2020

Key Technologies Of Precaution And Prediction Of Abnormal Spatial-Temporal Trajectory: A Review Of Recent Advances, Gongda Qiu, He Ming, Yang Jie, Yuting Cao, Jihong Sun

Journal of System Simulation

Abstract: The ex-post disposition of a major incident, which is expected to transform into prediction and precaution of abnormal behavior, is increasingly unable to meet the urgent needs of the society.Therapid development and popularization of sensor network and positioning technology lay the foundation for mining spatial-temporal trajectory data. With the key objective of prediction and precaution of abnormal trajectory based on big data mining, the future research directions and prospects on trajectory clustering and recognitionareanalyzed, discussed and elaboratedinthis paper.Temporal trajectory prediction applied in prediction and precaution of abnormal spatial-temporal trajectory is also presented, providing a reference for further research on …


Bibsqlqc: Brown Infomax Boosted Sql Query Clustering Algorithm To Detectanti-Patterns In The Query Log, Vinothsaravanan Ramakrishnan, Palanisamy Chenniappan Jan 2020

Bibsqlqc: Brown Infomax Boosted Sql Query Clustering Algorithm To Detectanti-Patterns In The Query Log, Vinothsaravanan Ramakrishnan, Palanisamy Chenniappan

Turkish Journal of Electrical Engineering and Computer Sciences

Discovery of antipatterns from arbitrary SQL query log depends on the static code analysis used to enhance the quality and performance of software applications. The existence of antipatterns reduces the quality and leads to redundant SQL statements. SQL log includes a large load on the database and it is difficult for an analyst to extract large patterns in a minimal time. Existing techniques which discover antipatterns in SQL query face a lot of innumerable challenges to discover the normal sequences of queries within the log. In order to discover the antipatterns in the log, an efficient technique called Brown infomax …


An Efficient Storage-Optimizing Tick Data Clustering Model, Haleh Amintoosi, Masood Niazi Torshiz, Yahya Forghani, Sara Alinejad Jan 2020

An Efficient Storage-Optimizing Tick Data Clustering Model, Haleh Amintoosi, Masood Niazi Torshiz, Yahya Forghani, Sara Alinejad

Turkish Journal of Electrical Engineering and Computer Sciences

Tick data is a large volume of data, related to a phenomenon such as stock market or weather change, with data values changing rapidly over time. An important issue is to store tick data table in a way that it occupies minimum storage space while at the same time it can provide fast execution of queries. In this paper, a mathematical model is proposed to partition tick data tables into clusters with the aim of minimizing the required storage space. The genetic algorithm is then used to solve the mathematical model which is indeed a clustering model. The proposed method …


Spatiotemporal Mode Analysis Of Urban Dockless Shared Bikes Based On Point Of Interests Clustering, Zhang Fang, Bin Chen, Yanghua Tang, Dong Jian, Chuan Ai, Xiaogang Qiu Dec 2019

Spatiotemporal Mode Analysis Of Urban Dockless Shared Bikes Based On Point Of Interests Clustering, Zhang Fang, Bin Chen, Yanghua Tang, Dong Jian, Chuan Ai, Xiaogang Qiu

Journal of System Simulation

Abstract: The city’s dockless shared bikes have developed rapidly, and its features of convenience, economy and efficiency have been widely welcomed. The digital footprint they generate reveals the movement of people in time and space within the city, which makes it possible to quantify the activities of people in the city using shared bikes. In this paper, based on the collected shared bikes data of Beijing, a clustering method based on the point of interests is proposed to divide the urban space, so as to construct a mobile network of urban shared bikes, and analysis the spatiotemporal mode of bike …


A New Model To Determine The Hierarchical Structure Of The Wireless Sensor Networks, Resmi̇ye Nasi̇boğlu, Zülküf Teki̇n Erten Jan 2019

A New Model To Determine The Hierarchical Structure Of The Wireless Sensor Networks, Resmi̇ye Nasi̇boğlu, Zülküf Teki̇n Erten

Turkish Journal of Electrical Engineering and Computer Sciences

Wireless sensor networks are one of the rising areas of scientific research. Common purpose of these investigations is usually constructing optimal structure of the network by prolonging its lifetime. In this study, a new model has been proposed to construct a hierarchical structure of wireless sensor networks. Methods used in the model to determine clusters and appropriate cluster heads are k-means clustering and fuzzy inference system (FIS), respectively. The weighted averaging based on levels (WABL) defuzzification method is used to calculate crisp outputs of the FIS. A new theorem for calculation of WABL values has been proved in order to …


Evaluating The Attributes Of Remote Sensing Image Pixels For Fast K-Means Clustering, Ali̇ Sağlam, Nurdan Baykan Jan 2019

Evaluating The Attributes Of Remote Sensing Image Pixels For Fast K-Means Clustering, Ali̇ Sağlam, Nurdan Baykan

Turkish Journal of Electrical Engineering and Computer Sciences

Clustering process is an important stage for many data mining applications. In this process, data elements are grouped according to their similarities. One of the most known clustering algorithms is the k-means algorithm. The algorithm initially requires the number of clusters as a parameter and runs iteratively. Many remote sensing image processing applications usually need the clustering stage like many image processing applications. Remote sensing images provide more information about the environments with the development of the multispectral sensor and laser technologies. In the dataset used in this paper, the infrared (IR) and the digital surface maps (DSM) are also …


Exploring Bigram Character Features For Arabic Text Clustering, Dia Eddin Abuzeina Jan 2019

Exploring Bigram Character Features For Arabic Text Clustering, Dia Eddin Abuzeina

Turkish Journal of Electrical Engineering and Computer Sciences

The vector space model (VSM) is an algebraic model that is widely used for data representation in text mining applications. However, the VSM poses a critical challenge, as it requires a high-dimensional feature space. Therefore, many feature selection techniques, such as employing roots or stems (i.e. words without infixes and prefixes, and/or suffixes) instead of using complete word forms, are proposed to tackle this space challenge problem. Recently, the literature shows that one more basic unit feature can be used to handle the textual features, which is the twoneighboring character form that we call microword. To evaluate this feature type, …


Efficient Hierarchical Temporal Segmentation Method For Facial Expression Sequences, Jiali Bian, Xue Mei, Yu Xue, Liang Wu, Yao Ding Jan 2019

Efficient Hierarchical Temporal Segmentation Method For Facial Expression Sequences, Jiali Bian, Xue Mei, Yu Xue, Liang Wu, Yao Ding

Turkish Journal of Electrical Engineering and Computer Sciences

Temporal segmentation of facial expression sequences is important to understand and analyze human facial expressions. It is, however, challenging to deal with the complexity of facial muscle movements by finding a suitable metric to distinguish among different expressions and to deal with the uncontrolled environmental factors in the real world. This paper presents a two-step unsupervised segmentation method composed of rough segmentation and fine segmentation stages to compute the optimal segmentation positions in video sequences to facilitate the segmentation of different facial expressions. The proposed method performs localization of facial expression patches to aid in recognition and extraction of specific …


Clustering Method Based On Graph Data Model And Reliability Detection, Yanyun Cheng, Huisong Bian, Changsheng Bian Jun 2018

Clustering Method Based On Graph Data Model And Reliability Detection, Yanyun Cheng, Huisong Bian, Changsheng Bian

Journal of System Simulation

Abstract: For the data in feature space, traditional clustering algorithm can take clustering analysis directly. High-dimensional spatial data cannot achieve intuitive and effective graphical visualization of clustering results in 2D plane. Graph data can clearly reflect the similarity relationship between objects. According to the distance of the data objects, the feature space data are modeled as graph data by iteration. Cluster analysis based on modularity is carried out on the modeling graph data. The two-dimensional visualization of non-spherical-shape distribution data cluster and result is achieved. The concept of credibility of the clustering result is proposed, and a method is proposed, …


Composite Vector Quantization For Optimizing Antenna Locations, Zekeri̇ya Uykan, Riku Jantti Jan 2018

Composite Vector Quantization For Optimizing Antenna Locations, Zekeri̇ya Uykan, Riku Jantti

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, we study the location optimization problem of remote antenna units (RAUs) in generalized distributed antenna systems (GDASs). We propose a composite vector quantization (CVQ) algorithm that consists of unsupervised and supervised terms for RAU location optimization. We show that the CVQ can be used i) to minimize an \textit{upper bound} to the cell-averaged SNR error for a desired/demanded location-specific SNR function, and ii) to maximize the cell-averaged \textit{effective} \textit{SNR}. The CVQ-DAS includes the standard VQ, and thus the well-known squared distance criterion (SDC) as a special case. Computer simulations confirm the findings and suggest that the proposed …


A Clustering Approach Using A Combination Of Gravitational Search Algorithm And K-Harmonic Means And Its Application In Text Document Clustering, Mina Mirhosseini Jan 2017

A Clustering Approach Using A Combination Of Gravitational Search Algorithm And K-Harmonic Means And Its Application In Text Document Clustering, Mina Mirhosseini

Turkish Journal of Electrical Engineering and Computer Sciences

Data clustering is one of the most popular techniques of information management, which is used in many applications of science and engineering such as machine learning, pattern reorganization, image processing, data mining, and web mining. Different algorithms have been suggested by researchers, where the evolutionary algorithms are the best in data clustering and especially in big datasets. It is illustrated that GSA-KM, which is a combination of the gravitational search algorithm (GSA) and K-means (KM), is superior over some other comparative evolutionary methods. One of the drawbacks of this approach is dependency on the initial seeds. In this paper, a …


An Intelligent Pso-Based Energy Efficient Load Balancing Multipath Technique In Wireless Sensor Networks, Sukhchandan Randhawa, Sushma Jain Jan 2017

An Intelligent Pso-Based Energy Efficient Load Balancing Multipath Technique In Wireless Sensor Networks, Sukhchandan Randhawa, Sushma Jain

Turkish Journal of Electrical Engineering and Computer Sciences

To provide a reliable and efficient service, load balancing plays an important role in wireless sensor networks (WSNs). There is a need to maximize the network lifetime for WSNs applications with periodic generation of data. Due to the relationship between energy consumption and network sensor node lifetime, energy consumption in a network should be minimized and balanced in order to increase network lifetime. Energy-efficient load-balancing techniques are needed to solve this problem. In this paper, a particle swarm optimization (PSO)-based energy-efficient load-balancing technique is proposed, in which the required number of routing paths and energy consumption of different nodes and …


Unsupervised Learning Of Allomorphs In Turkish, Burcu Can Jan 2017

Unsupervised Learning Of Allomorphs In Turkish, Burcu Can

Turkish Journal of Electrical Engineering and Computer Sciences

One morpheme may have several surface forms that correspond to allomorphs. In English, ed and $d$ are surface forms of the past tense morpheme, and $s$, es, and ies are surface forms of the plural or present tense morpheme. Turkish has a large number of allomorphs due to its morphophonemic processes. One morpheme can have tens of different surface forms in Turkish. This leads to a sparsity problem in natural language processing tasks in Turkish. Detection of allomorphs has not been studied much because of its difficulty. For example, tü and di are Turkish allomorphs (i.e. past tense morpheme), but …


An Adaptive Clustering Segmentation Algorithm Based On Fcm, Jun Yang, Yun-Sheng Ke, Mao-Zheng Wang Jan 2017

An Adaptive Clustering Segmentation Algorithm Based On Fcm, Jun Yang, Yun-Sheng Ke, Mao-Zheng Wang

Turkish Journal of Electrical Engineering and Computer Sciences

The cluster number and the initial clustering centers must be reasonably set before the analysis of clustering in most cases. Traditional clustering segmentation algorithms have many shortcomings, such as high reliance on the specially established initial clustering center, tendency to fall into the local maximum point, and poor performance with multithreshold values. To overcome these defects, an adaptive fuzzy C-means segmentation algorithm based on a histogram (AFCMH), which synthesizes both main peaks of the histogram and optimized Otsu criterion, is proposed. First, the main peaks of the histogram are chosen by operations like histogram smoothing, merging of adjacent peaks, and …


Proposing A New Clustering Method To Detect Phishing Websites, Morteza Arab, Mohammad Karim Sohrabi Jan 2017

Proposing A New Clustering Method To Detect Phishing Websites, Morteza Arab, Mohammad Karim Sohrabi

Turkish Journal of Electrical Engineering and Computer Sciences

Phishing websites are fake ones that are developed by ill-intentioned people to imitate real and legal websites. Most of these types of web pages have high visual similarities to hustle the victims. The victims of phishing websites may give their bank accounts, passwords, credit card numbers, and other important information to the designers and owners of phishing websites. The increasing number of phishing websites has become a great challenge in e-business in general and in electronic banking specifically. In the present study, a novel framework based on model-based clustering is introduced to fight against phishing websites. First, a model is …


A Novel Approach For Extracting Ideal Exemplars By Clustering For Massivetime-Ordered Datasets, Ömer Faruk Ertuğrul Jan 2017

A Novel Approach For Extracting Ideal Exemplars By Clustering For Massivetime-Ordered Datasets, Ömer Faruk Ertuğrul

Turkish Journal of Electrical Engineering and Computer Sciences

The number and length of massive datasets have increased day by day and this yields more complex machine learning stages due to the high computational costs. To decrease the computational cost many methods were proposed in the literature such as data condensing, feature selection, and filtering. Although clustering methods are generally employed to divide samples into groups, another way of data condensing is by determining ideal exemplars (or prototypes), which can be used instead of the whole dataset. In this study, first the efficiency of traditional data condensing by clustering approach was confirmed according to obtained accuracies and condensing ratios …


Comparison Of Clustering Techniques For Traffic Accident Detection, Nejdet Doğru, Abdülhami̇t Subaşi Jan 2015

Comparison Of Clustering Techniques For Traffic Accident Detection, Nejdet Doğru, Abdülhami̇t Subaşi

Turkish Journal of Electrical Engineering and Computer Sciences

Transportation infrastructure in intelligent transportation systems (ITSs) is complemented with information and communication technologies to achieve better passenger safety and reduced transportation time, fuel consumption, and vehicle wear and tear. This paper shows how data mining techniques are used in ITSs for accident detection and prevention on motorways. In traffic, vehicles show similar behavior to that of vehicles in closed neighborhoods. Vehicles that show different behaviors than neighbor vehicles in cases like accidents, inappropriate lane changes, and speeding can be considered as anomalies and detected. In this paper, a traffic accident is simulated and the effectiveness of different clustering techniques …


Hot Zone Identification: Analyzing Effects Of Data Sampling On Spam Clustering, Rasib Khan, Mainul Mizan, Ragib Hasan, Alan Sprague Jan 2014

Hot Zone Identification: Analyzing Effects Of Data Sampling On Spam Clustering, Rasib Khan, Mainul Mizan, Ragib Hasan, Alan Sprague

Journal of Digital Forensics, Security and Law

Email is the most common and comparatively the most efficient means of exchanging information in today's world. However, given the widespread use of emails in all sectors, they have been the target of spammers since the beginning. Filtering spam emails has now led to critical actions such as forensic activities based on mining spam email. The data mine for spam emails at the University of Alabama at Birmingham is considered to be one of the most prominent resources for mining and identifying spam sources. It is a widely researched repository used by researchers from different global organizations. The usual process …


M-Fdbscan: A Multicore Density-Based Uncertain Data Clustering Algorithm, Atakan Erdem, Taflan İmre Gündem Jan 2014

M-Fdbscan: A Multicore Density-Based Uncertain Data Clustering Algorithm, Atakan Erdem, Taflan İmre Gündem

Turkish Journal of Electrical Engineering and Computer Sciences

In many data mining applications, we use a clustering algorithm on a large amount of uncertain data. In this paper, we adapt an uncertain data clustering algorithm called fast density-based spatial clustering of applications with noise (FDBSCAN) to multicore systems in order to have fast processing. The new algorithm, which we call multicore FDBSCAN (M-FDBSCAN), splits the data domain into c rectangular regions, where c is the number of cores in the system. The FDBSCAN algorithm is then applied to each rectangular region simultaneously. After the clustering operation is completed, semiclusters that occur during splitting are detected and merged to …


Motion Clustering On Video Sequences Using A Competitive Learning Network, Sali̇h Görgünoğlu, Şafak Altay Jan 2014

Motion Clustering On Video Sequences Using A Competitive Learning Network, Sali̇h Görgünoğlu, Şafak Altay

Turkish Journal of Electrical Engineering and Computer Sciences

It is necessary to track human movements in crowded places and environments such as stations, subways, metros, and schoolyards, where security is of great importance. As a result, undesired injuries, accidents, and unusual movements can be determined and various precautionary measures can be taken against them. In this study, real-time or existing video sequences are used within the system. These video sequences are obtained from objects such as humans or vehicles, moving actively in various environments. At first, some preprocesses are made respectively, such as converting gray scale, finding the edges of the objects existing in the images, and thresholding …


Eetbr: Energy Efficient Token-Based Routing For Wireless Sensor Networks, Taner Çevi̇k, Abdül Hali̇m Zai̇m Jan 2013

Eetbr: Energy Efficient Token-Based Routing For Wireless Sensor Networks, Taner Çevi̇k, Abdül Hali̇m Zai̇m

Turkish Journal of Electrical Engineering and Computer Sciences

The most significant drawback of wireless sensor networks is energy scarcity. As there is an increasing need for operating these networks for relatively long times, energy saving becomes the key challenge in the design of the architectures and protocols for sensor networks. Therefore, several research studies have been performed for making contributions to the analysis of this energy shortage problem. Most of these research activities have been focused on finding solutions for the energy consumption of the communication unit, which is the dominant energy dissipating component of the sensor nodes. In this paper, a novel, token-based routing protocol adapted with …


A Reputation-Based Privacy Management System For Social Networking Sites, Mehmet Erkan Yüksel, Asim Si̇nan Yüksel, Abdül Hali̇m Zai̇m Jan 2013

A Reputation-Based Privacy Management System For Social Networking Sites, Mehmet Erkan Yüksel, Asim Si̇nan Yüksel, Abdül Hali̇m Zai̇m

Turkish Journal of Electrical Engineering and Computer Sciences

Social networking sites form a special type of virtual community where we share our personal information with people and develop new relationships on the Internet. These sites allow the users to share just about everything, including photos, videos, favorite music, and games, and record all user interactions and retain them for potential use in social data mining. This storing and sharing of large amounts of information causes privacy problems for the users of these websites. In order to prevent these problems, we have to provide strict privacy policies, data protection mechanisms, and trusted and built-in applications that help to protect …


Outlier Rejection Fuzzy C-Means (Orfcm) Algorithm For Image Segmentation, Fasahat Ullah Siddiqui, Nor Ashidi Mat Isa, Abid Yahya Jan 2013

Outlier Rejection Fuzzy C-Means (Orfcm) Algorithm For Image Segmentation, Fasahat Ullah Siddiqui, Nor Ashidi Mat Isa, Abid Yahya

Turkish Journal of Electrical Engineering and Computer Sciences

This paper presents a fuzzy clustering-based technique for image segmentation. Many attempts have been put into practice to increase the conventional fuzzy c-means (FCM) performance. In this paper, the sensitivity of the soft membership function of the FCM algorithm to the outlier is considered and the new exponent operator on the Euclidean distance is implemented in the membership function to improve the outlier rejection characteristics of the FCM. The comparative quantitative and qualitative studies are performed among the conventional k-means (KM), moving KM, and FCM algorithms; the latest state-of-the-art clustering algorithms, namely the adaptive fuzzy moving KM , adaptive fuzzy …