Volume 08 Issue 04, July 2020

Optimizing Initial Cluster Center Based on Data Analysis Using K-Means Clustering Algorithm and PAVSM

Chetali Makode, Kedar Nath Singh

Page no:01-06

Abstract

As a partition primarily based bunch algorithmic rule, K-Means is wide utilized in several areas for the options of its efficiency and simply understood. However, it's documented that the K-Means algorithmic rule could get suboptimal solutions, depending on the selection of the initial cluster centers. During this paper, they propose a projection-based K-Means data format algorithmic rule. The planned algorithmic rule initially uses a typical mathematician kernel density estimation technique to search out the extremely density information areas in one dimension. Then the projection step is to iteratively use density estimation from the lower variance dimensions to the upper variance ones till all the scale is computed. Experiments on actual datasets show that our technique will get similar results compared with different typical strategies with fewer computation tasks this paper reviews numerous strategies and techniques utilized in literature and its benefits and limitations, to research the more would like of improvement of the k-means algorithmic rule. Planned algorithmic rule (PAVSM) increased information analysis.

Protection of System from Data Breaches

Ankur Gupta, Bhupendra Malviya, shital Gupta

Page no:07-10

Abstract

the tremendous increase in computer users, internet & cyberspace is giving rise to more number to cybercrimes. Technocrats or popularly known as cybercriminals make use of technology, social engineering & other techniques to extract the confidential information. So there is a new need to have a comprehensive understanding of cyber-attacks and its classification & how one can get secured. In this paper, we provided a noble metric concept to test data breaches algorithm. Cybersecurity ensures the protection of information systems including software, hardware and information (data). The purpose of this paper is to give a review on Cybersecurity, its goals, impacts, issues and noble concept. The article also includes a brief description of various types of data breaches that have occurred in the past.

Review of Face Recognition System

Md. Azheruddin, Sudhir Goswami, Shital Gupta

Page no:11-15

Abstract

Face recognition is one of the most suitable applications of image analysis. It’s a true challenge to build an automated system which equals human ability to recognize faces. While traditional face recognition is typically based on still images, face recognition from video sequences has become popular recently due to more abundant information than still images. Video-based face recognition has been one of the hot topics in the field of pattern recognition in the last few decades. This paper presents an overview of face recognition scenarios and video-based face recognition system architecture and various approaches are used in video-based face recognition system which can not only discover more space-time semantic information hidden in video face sequence, but also make full use of the high level semantic concepts and the intrinsic nonlinear structure information to extract discriminative manifold features. We also compare our algorithm with other algorithms on our own database.