52
Views
2
CrossRef citations to date
0
Altmetric
Articles

Evaluating performance of agglomerative clustering for extended NMF

&

References

  • Bhandari, N. & Pahwa, P., 2019. Comparative Analysis of Privacy-Preserving Data Mining Techniques. In: Bhattacharyya S., Hassanien A., Gupta D., Khanna A., Pan I. (eds) International Conference on Innovative Computing and Communications. Lecture Notes in Networks and Systems, Vol. 56, Singapore: Springer.
  • Purohit, R. and Bhargava, D., 2017. An illustration to secured way of data mining using privacy preserving data mining. Journal of Statistics & Management Systems, Vol. 20 (2017), No. 4, 637-645. doi: 10.1080/09720510.2017.1395183
  • Fang, W., Wen, X.Z., Zheng, Y., and Zhou, M., 2016. A Survey of Big Data Security and Privacy Preserving. IETE Technical Review, 544–560.
  • Popat, S.K., and Emmanuel, N., 2014. Review and Comparative Study of Clustering Techniques. International Journal of Computer Science and Information Technologies, Vol. 5 (1), 805-812.
  • Han, J. and Kamber, M., 2006. Data Mining: Concepts and Techniques. Morgan Kaufmann Publishers, 2nd ed., New Delhi.
  • Bhandari, N. and Pahwa, Prof. P., 2019. Achieving Data Privacy using Extended NMF. (Communicated).
  • Nagalakshmi, M. and Rani, K.S., 2013. Privacy Preserving Clustering by Hybrid Data Transformation Approach. International Journal of Emerging Technology and Advanced Engineering, 3(8).
  • Wang, J., Zhong, W. and Zhang, J., 2006. NNMF-Based Factorization Techniques for High-Accuracy Protection on Non-negative Valued Datasets. IEEE Xplore, 6th International Conference on Data Mining – Workshops.
  • Balajee, M. and Narasimham, C., 2012. Double-Reflecting Data Perturbation Method for Information Security. Oriental Journal of Computer Science and Technology, 5(2), 283-288.
  • Li, L. and Zhang, Q., 2009. A Privacy Preserving Clustering Technique using Hybrid Data Transformation Method. IEEE Xplore, IEEE International Conference on Grey Systems and Intelligent Services.
  • Sagar, H.K. and Sharma, V., 2014. Error Evaluation of K-Means and Hierarchical Clustering with Effect of Distance Functions for Iris Dataset. International Journal of Computer Applications (0975 – 8887), Vol. 86, No. 16.
  • Kianimajd, A., Ruano, M.G., Carvalho, P., Henriques, J., Rocha, T., Paredes, S., and Ruano, A.E., 2017. Comparison of different methods of measuring similarity in physiologic time series. International Federation of Automatic Control, PapersOnLine, Elsevier
  • Dabhi, D.P., and Patel, M.R., 2016. Extensive Survey on Hierarchical Clustering Methods in Data Mining. International Research Journal of Engineering and Technology, Vol. 03.
  • Nisha and Kaur, P.J., 2015. Cluster Quality Based Performance Evaluation of Hierarchical Clustering Method. IEEE, 1st International Conference on Next Generation Computing Technologies.
  • Hirano, S., Sun, X. and Tsumoto, S., 2003. Comparison of clustering methods for clinical databases. Information Sciences 159(2004), 155–165, Elsevier. doi: 10.1016/j.ins.2003.03.011
  • Pandove, D., Goel, S. and Rani, R., 2019. General correlation coefficient based agglomerative clustering. Cluster Comput (2019) 22: 553. https://doi.org/10.1007/s10586-018-2863-y.
  • Singh, W., Hjorleifsson, E. and Stefansson, G., 2011. Robustness of fish assemblages derived from three hierarchical agglomerative clustering algorithms performed on Icelandic groundfish survey data. ICES Journal of Marine Science, 68(1), 189-200. doi: 10.1093/icesjms/fsq144
  • Renaud Gaujoux, Cathal Seoighe 2010. A flexible R package for nonnegative matrix factorization. BMC Bioinformatics 2010, 11:367. [http://www.biomedcentral.com/1471-2105/11/367] doi: 10.1186/1471-2105-11-367
  • Maechler, M., Rousseeuw, P., Struyf, A., Hubert, M., Hornik, K. 2019. cluster: Cluster Analysis Basics and Extensions. R package version 2.1.0.
  • https://archive.ics.uci.edu/ml/index.php

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.