SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
InternationalJournal ofof Computer Science and Engineering
 International Journal Computer Science and Engineering Research and Development (IJCSERD),
                                                                        IJCSERD
Research and Development (IJCSERD), ISSN 2248-9363Number 2, May-October (2011)
 ISSN 2248-9363 (Print), ISSN 2248-9371 (Online) Volume 1, (Print),
ISSN 2248-9371 (Online), Volume 1,
Number 2, May-October (2011)
pp. 70-74 © PRJ Publication                                                    © PRJ
http://www.prjpublication.com/IJCSERD.asp                                 PUBLICATION




        A COMPREHENSIVE SURVEY OF CONTEMPORARY
       RESEARCHES ON IMAGE SEGMENTATION THROUGH
                       CLUSTERING

                          Ritu Agrawal1 , Prof. Manisha Sharma2
          1 Electronics and Telecommunication , C.I.T, Rajnandgaon, C.G, India
              2 Electronics and Telecommunication , B.I.T, Durg, C.G, India
                ritube_03@yahoo.co.in , manishasharma1@rediffmail.com

ABSTRACT
This paper presents an analysis on different clustering techniques for image
segmentation. Clustering is the unsupervised classification of patterns (observations, data
items, or feature vectors) into groups (clusters). Clustering is most widely spread
approach in Image segmentation because of its robust characteristics for data
classification. Clustering is done on different attributes of an image such as size, color,
texture etc. The purpose of clustering is to get meaningful result, effective storage and
fast retrieval in various areas.

Keywords: Clustering, Image segmentation, Exclusive Clustering ,Overlapping
Clustering , Hierarchical clustering , Probabilistic D-Clustering

1. INTRODUCTION

     Clustering in Image segmentation is defined as the process of identifying groups of
similar objects. A cluster is a collection of data points that are similar to one another
within the same cluster and dissimilar to data points in other clusters [1]. Clustering
techniques can broadly be classified as Unsupervised Clustering (calculated by software)
and Supervised (human-guided) clustering. Unsupervised clustering is defined as
groupings of pixels with common characteristics which are based on the software
analysis of an image. Supervised clustering is based on the idea that a user can select
sample pixels in an image that are representative of specific classes. Segmentation is a
process of subdividing an image into its constituent regions or objects. The level of
details, to which the subdivision is carried on, depends on the problem being solved So,
the segmentation should stop when the objects or regions of interest in an application
have been detected.
      Image segmentation is a technique that partitions an image into uniform and non-
overlapping regions. This technique has a variety of applications including computer
vision, image analysis, medical image processing, remote sensing and geographical
information system.


                                               70
International Journal of Computer Science and Engineering Research and Development (IJCSERD),
ISSN 2248-9363 (Print), ISSN 2248-9371 (Online) Volume 1, Number 2, May-October (2011)

2. CLUSTERING
     Clustering is a common technique for data analysis, which is used in many fields,
including machine learning, data mining, pattern recognition, image analysis and
bioinformatics. Clustering is the method of classification of similar
objects into different groups or more precisely the partitioning of a data set into subsets
(clusters), so that the data in each subset (ideally) share some common trait . The goal of
clustering algorithm is to maximize the intra-cluster similarity and minimize the inter-
cluster similarity.

    A variety of clustering technique has been introduced to make the segmentation
more effective. The clustering technique can be broadly classified as: 1. Exclusive
Clustering 2. Overlapping Clustering 3. Hierarchical Clustering 4. Probabilistic D-
Clustering.

3. SEGMENTATION
     Segmentation is a process of partitioning a digital image into multiple segments or a
sets of pixels. The goal of segmentation is to simplify an image into some more
meaningful and easier to analyze. Image segmentation is typically used to locate objects
and boundaries (lines, curves, etc.) in images. More precisely, image segmentation is the
process of assigning a label to every pixel in an image such that pixels with the same
label share certain visual characteristics.

     Segmentation has been used in a wide range of applications. Different applications
require different types of images. The most commonly used images are light intensity
(LI), range (depth) image(RI), computerized tomography(CT), magnetic resonance
images(MRI). Image segmentation is highly dependent on the image type, hence there is
no single generalized technique that is suitable for all images.
There are numerous image segmentation techniques in the literature , which can be
broadly classified into two categories, namely i) classical ii) fuzzy mathematical . Fuzzy
mathematical techniques are widely used in computer vision applications as they are far
better able to handle and segment images, particularly noisy images.

4. CLUSTERING TECHNIQUES
    An image may contain more than one objects and to segment an image in a
meaningful feature is a very difficult job.
    This paper is a review and summarizes different clustering technique.

4.1 Exclusive Clustering
     In this case data are grouped in an exclusive way, so that if a certain datum belongs
to a definite cluster then it could not be included in another cluster. K-means clustering is
one of the type of exclusive clustering and is one of the simplest unsupervised learning
algorithms.
     In case of K means clustering , k centroid must be defined for each cluster. The
algorithm is composed of the following steps:
Step 1: Place K points into the space represented by the objects that are being clustered .
These points represent initial group centroids.

                                                71
International Journal of Computer Science and Engineering Research and Development (IJCSERD),
ISSN 2248-9363 (Print), ISSN 2248-9371 (Online) Volume 1, Number 2, May-October (2011)

Step2: Assign each object to the group that has the closest centroid.
Step3: When all objects have been assigned, recalculate the positions of the K centroids.
Step 4: Repeat Step2 and 3 until the centriods no longer moves. This produces a
separation of the objects into groups which the metric to be minimized can be calculated.
4.2 Overlapping Clustering

     The overlapping clustering, uses fuzzy sets to cluster data, so that each point may
belong to two or more clusters with different degrees of membership. In this case, data
will be associated to an appropriate membership value. Fuzzy C means is one of the type
of overlapping clustering algorithm. Fuzzy c-means (FCM) is a method of clustering
which allows one piece of data to belong to two or more clusters. This method is
frequently used in pattern recognition.
The algorithm is composed of the following steps:
Step1: Initialize prototype
V= {v1,v2,…vc}
Repeat Vprevious ← V
Compute membership function using equation
                  k
µci(x) = 1 /     ∑      [(║ x-vi ║2) /
                 i =1
(║ x-vj ║2 )] 1/m-1 1≤i≤ k, xЄ X
update the prototype , vi in V using equation
                               n
vi= ∑ (µci(x))m X x / ∑ (µci(x))m 1≤i≤ k
   x∈X                        x∈ X
         c
until   ∑      ║ vi previous - vi ║ ≤ ε
        i =1
where, X : an unlabeled data set
c: the number of clusters to form
m: the parameter in the objective function.
ε: a threshold for the convergence criteria.

4.3 Hierarchical clustering

     Hierarchical clustering creates a hierarchy of clusters which may be represented in a
tree structure. The root of the tree consists of a single cluster containing all observations,
and the leaves correspond to individual observations.
For example, suppose this data is to be clustered
                                       a



                                   b       d

                                   c       e   f




                                                   72
International Journal of Computer Science and Engineering Research and Development (IJCSERD),
ISSN 2248-9363 (Print), ISSN 2248-9371 (Online) Volume 1, Number 2, May-October (2011)

In this example, we have six elements {a} {b} {c} {d} {e} and {f}. The first step is to
determine which elements is to merge in a cluster. Usually, we want to take the two
closest elements, according to the chosen distance by using Euclidian distance.
In this example, cutting the row yield clusters {a} {b c} {d e} {f}. Then again Cutting
another row yields clusters {a} {b c} {d e f}.The combination of clusters depend on the
distace between the clusters. As clustering progresses, rows and columns are merged and
as the clusters are merged, the distances updated. This is a common way to implement
this type of clustering.

  a           b        c   d     e      f



                  bc           de



                               de


                  bcde


      abcde

Hierarchical representation

To stop clustering either when the clusters are too far apart to be merged or when there is
a sufficiently small number of clusters.
      The algorithm used are Given a set of N items to be clustered, and an N*N distance
matrix then.
      The basic algorithm of hierarchical clustering is the N*N matrix is D = [d(i,j)]. The
clustering’s are assigned sequence numbers 0,1,......, (n-1) and L(k) is the level of the kth
clustering. A cluster with sequence number “m” is denoted (m) and the proximity
between clusters (r) and (s) is denoted d [(r),(s)].
The algorithm is composed of the following steps:
Step1: Begin with the disjoint clustering having level L(0)= 0 and the sequence number
m=0 .
Step2: Find the least dissimilar pair of clusters in the current clustering , say pair (r ), (s)
according to d[(r ),(s)]= min
d[(i),(j)] where the minimum is over all pairs of clusters in the current clustering. Step 3:
Increment the sequence number m= m+1 . Merge clusters (r )and (s) into single clusters
to form the next clustering m. Set the level of this clustering to L(m)= d[(r ),(s)].
Step 4: Update the proximity matrix D , by deleting the rows and columns corresponding
to clusters (r ) and (s) and adding a row and columns corresponding to the newly formed
cluster. The proximity between the new cluster, denoted(r,s) and the old cluster (k) is
defined in this way
d[(k),(r,s)] = min d[(k),(r )],d[(k),(s)]
if all objects are in one cluster , stop else go to Step 2 .



                                                73
International Journal of Computer Science and Engineering Research and Development (IJCSERD),
ISSN 2248-9363 (Print), ISSN 2248-9371 (Online) Volume 1, Number 2, May-October (2011)

4.4 Probabilistic – D Clustering
 Here the word D means distance (Euclidean/ Exponential). The probability of cluster
membership at any point is assumed to be inversely proportional to the distance from the
centre of cluster.
   If, Pk(x) = probability that the point x belongs to cluster Ck.
dk(x) = distance of point x from cluster            Ck.
Then: Pk(x) . dk(x) = constant , depending on (x).
The clustering criterion used here is Euclidean distance

Mathematically
                            k
Pk(x) =   ∏
          j ≠k
                 dj(x) /   ∑∏ di( x)
                           i =1 j ≠ i

If we consider the distance as Exponential then, Probability equation will be changed as
dj(x) will be replaced by e dj(x).

5   CONCLUSION

     The paper presents an analysis on different clustering techniques used for image
segmentation. Through clustering algorithms, image segmentation can be done in an
effective way. Fuzzy C-means algorithm proved to be superior over other clustering
approaches in terms of segmentation efficiency. The major drawback of FCM is the huge
computational time required for convergence. To avoid the computational time of FCM ,
probabilistic – D clustering is proposed .

REFERENCES
[1] www.wikipedia.com
[2] Andrew Moore: “K-means and Hierarchical Clustering - Tutorial Slides”
[3]          Brian          T.         Luke:           “K-Means             Clustering”
[4] J. C. Dunn (1973): "A Fuzzy Relative of the ISODATA Process and Its Use in
Detecting Compact Well-Separated Clusters", Journal of Cybernetics 3: 32-5
[5] J. C. Bezdek (1981): "Pattern Recognition with Fuzzy Objective Function
Algorithms", Plenum Press, New York.
[6]Data Clustering A Review ACM Computing Surveys, Vol. 31, No. 3, September 1999
[7] Paper 193-2011
Comparison of Probabilistic-D and k-Means Clustering in Segment Profiles for B2B
Markets SAS Global Forum 2011
[8] A Survey on Image Segmentation Through Clustering International Journal
of Research and Reviews in Information Sciences Vol. 1, No. 1, March 2011
[9] Image Segmentation using Fuzzy Clustering: A Survey. 6th International Conference
on Emerging Technologies (ICET) 2010




                                                74

Weitere ähnliche Inhalte

Was ist angesagt?

Paper id 21201483
Paper id 21201483Paper id 21201483
Paper id 21201483IJRAT
 
A new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsA new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsTELKOMNIKA JOURNAL
 
Improved probabilistic distance based locality preserving projections method ...
Improved probabilistic distance based locality preserving projections method ...Improved probabilistic distance based locality preserving projections method ...
Improved probabilistic distance based locality preserving projections method ...IJECEIAES
 
AUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGES
AUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGESAUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGES
AUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGEScscpconf
 
AUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGES
AUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGESAUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGES
AUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGEScsitconf
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Survey on Unsupervised Learning in Datamining
Survey on Unsupervised Learning in DataminingSurvey on Unsupervised Learning in Datamining
Survey on Unsupervised Learning in DataminingIOSR Journals
 
FUZZY SET THEORETIC APPROACH TO IMAGE THRESHOLDING
FUZZY SET THEORETIC APPROACH TO IMAGE THRESHOLDINGFUZZY SET THEORETIC APPROACH TO IMAGE THRESHOLDING
FUZZY SET THEORETIC APPROACH TO IMAGE THRESHOLDINGIJCSEA Journal
 
Types of clustering and different types of clustering algorithms
Types of clustering and different types of clustering algorithmsTypes of clustering and different types of clustering algorithms
Types of clustering and different types of clustering algorithmsPrashanth Guntal
 
A Novel Algorithm for Design Tree Classification with PCA
A Novel Algorithm for Design Tree Classification with PCAA Novel Algorithm for Design Tree Classification with PCA
A Novel Algorithm for Design Tree Classification with PCAEditor Jacotech
 
Fractal Image Compression By Range Block Classification
Fractal Image Compression By Range Block ClassificationFractal Image Compression By Range Block Classification
Fractal Image Compression By Range Block ClassificationIRJET Journal
 
Texture Unit based Approach to Discriminate Manmade Scenes from Natural Scenes
Texture Unit based Approach to Discriminate Manmade Scenes from Natural ScenesTexture Unit based Approach to Discriminate Manmade Scenes from Natural Scenes
Texture Unit based Approach to Discriminate Manmade Scenes from Natural Scenesidescitation
 
New Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral RecognitionNew Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral RecognitionIJERA Editor
 
Finding Relationships between the Our-NIR Cluster Results
Finding Relationships between the Our-NIR Cluster ResultsFinding Relationships between the Our-NIR Cluster Results
Finding Relationships between the Our-NIR Cluster ResultsCSCJournals
 
Clustering, k-means clustering
Clustering, k-means clusteringClustering, k-means clustering
Clustering, k-means clusteringMegha Sharma
 

Was ist angesagt? (18)

Paper id 21201483
Paper id 21201483Paper id 21201483
Paper id 21201483
 
A new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsA new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systems
 
Improved probabilistic distance based locality preserving projections method ...
Improved probabilistic distance based locality preserving projections method ...Improved probabilistic distance based locality preserving projections method ...
Improved probabilistic distance based locality preserving projections method ...
 
AUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGES
AUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGESAUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGES
AUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGES
 
AUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGES
AUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGESAUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGES
AUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGES
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Survey on Unsupervised Learning in Datamining
Survey on Unsupervised Learning in DataminingSurvey on Unsupervised Learning in Datamining
Survey on Unsupervised Learning in Datamining
 
FUZZY SET THEORETIC APPROACH TO IMAGE THRESHOLDING
FUZZY SET THEORETIC APPROACH TO IMAGE THRESHOLDINGFUZZY SET THEORETIC APPROACH TO IMAGE THRESHOLDING
FUZZY SET THEORETIC APPROACH TO IMAGE THRESHOLDING
 
Types of clustering and different types of clustering algorithms
Types of clustering and different types of clustering algorithmsTypes of clustering and different types of clustering algorithms
Types of clustering and different types of clustering algorithms
 
A Novel Algorithm for Design Tree Classification with PCA
A Novel Algorithm for Design Tree Classification with PCAA Novel Algorithm for Design Tree Classification with PCA
A Novel Algorithm for Design Tree Classification with PCA
 
Journal_IJABME
Journal_IJABMEJournal_IJABME
Journal_IJABME
 
Fractal Image Compression By Range Block Classification
Fractal Image Compression By Range Block ClassificationFractal Image Compression By Range Block Classification
Fractal Image Compression By Range Block Classification
 
Texture Unit based Approach to Discriminate Manmade Scenes from Natural Scenes
Texture Unit based Approach to Discriminate Manmade Scenes from Natural ScenesTexture Unit based Approach to Discriminate Manmade Scenes from Natural Scenes
Texture Unit based Approach to Discriminate Manmade Scenes from Natural Scenes
 
50120140501016
5012014050101650120140501016
50120140501016
 
Extended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy imagesExtended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy images
 
New Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral RecognitionNew Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral Recognition
 
Finding Relationships between the Our-NIR Cluster Results
Finding Relationships between the Our-NIR Cluster ResultsFinding Relationships between the Our-NIR Cluster Results
Finding Relationships between the Our-NIR Cluster Results
 
Clustering, k-means clustering
Clustering, k-means clusteringClustering, k-means clustering
Clustering, k-means clustering
 

Andere mochten auch

Prevalence and factors of smoking among the saudi youth in the northern borde...
Prevalence and factors of smoking among the saudi youth in the northern borde...Prevalence and factors of smoking among the saudi youth in the northern borde...
Prevalence and factors of smoking among the saudi youth in the northern borde...prjpublications
 
Determination of the value of selected oscillation frequency measurement poin...
Determination of the value of selected oscillation frequency measurement poin...Determination of the value of selected oscillation frequency measurement poin...
Determination of the value of selected oscillation frequency measurement poin...prjpublications
 
A parallel rough set based smoothing filter
A parallel rough set based smoothing filterA parallel rough set based smoothing filter
A parallel rough set based smoothing filterprjpublications
 
Is the higher quality financial reporting improves csr investment efficiency ...
Is the higher quality financial reporting improves csr investment efficiency ...Is the higher quality financial reporting improves csr investment efficiency ...
Is the higher quality financial reporting improves csr investment efficiency ...prjpublications
 
Design of l band truncated corner printed rectangular monopole antenna
Design of l   band truncated corner printed rectangular monopole antennaDesign of l   band truncated corner printed rectangular monopole antenna
Design of l band truncated corner printed rectangular monopole antennaprjpublications
 
Dualfrequency oshaped 3 way bagley power divider based on tlt
Dualfrequency oshaped 3 way bagley power divider based on tltDualfrequency oshaped 3 way bagley power divider based on tlt
Dualfrequency oshaped 3 way bagley power divider based on tltprjpublications
 
Smes role in reduction of the unemployment problem in the area located in sa...
Smes  role in reduction of the unemployment problem in the area located in sa...Smes  role in reduction of the unemployment problem in the area located in sa...
Smes role in reduction of the unemployment problem in the area located in sa...prjpublications
 
An integrated approach for enhancing ready mixed concrete selection using tec...
An integrated approach for enhancing ready mixed concrete selection using tec...An integrated approach for enhancing ready mixed concrete selection using tec...
An integrated approach for enhancing ready mixed concrete selection using tec...prjpublications
 
Strategies of women entrepreneurs in economic development
Strategies of women entrepreneurs in economic developmentStrategies of women entrepreneurs in economic development
Strategies of women entrepreneurs in economic developmentprjpublications
 
Simulation of geometrical cross
Simulation of geometrical crossSimulation of geometrical cross
Simulation of geometrical crossprjpublications
 
Dual polarized, high-gain sector antenna for mimo
Dual polarized, high-gain sector antenna for mimoDual polarized, high-gain sector antenna for mimo
Dual polarized, high-gain sector antenna for mimoprjpublications
 
Comparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsComparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsprjpublications
 
It’s high time to come to terms with hcm – the superset of hrm!
It’s high time to come to terms with hcm – the superset of hrm!It’s high time to come to terms with hcm – the superset of hrm!
It’s high time to come to terms with hcm – the superset of hrm!prjpublications
 
Customer preference and consumption of various
Customer preference and consumption of variousCustomer preference and consumption of various
Customer preference and consumption of variousprjpublications
 
An appraisal on small firms corporate culture
An appraisal on small firms corporate cultureAn appraisal on small firms corporate culture
An appraisal on small firms corporate cultureprjpublications
 
Construction industry in kuwait – an analysis on e procurement-2
Construction industry in kuwait – an analysis on e procurement-2Construction industry in kuwait – an analysis on e procurement-2
Construction industry in kuwait – an analysis on e procurement-2prjpublications
 
Inquiry on womens entrepreneurship in arar city saudi
Inquiry on womens entrepreneurship in arar city saudiInquiry on womens entrepreneurship in arar city saudi
Inquiry on womens entrepreneurship in arar city saudiprjpublications
 

Andere mochten auch (20)

Prevalence and factors of smoking among the saudi youth in the northern borde...
Prevalence and factors of smoking among the saudi youth in the northern borde...Prevalence and factors of smoking among the saudi youth in the northern borde...
Prevalence and factors of smoking among the saudi youth in the northern borde...
 
Determination of the value of selected oscillation frequency measurement poin...
Determination of the value of selected oscillation frequency measurement poin...Determination of the value of selected oscillation frequency measurement poin...
Determination of the value of selected oscillation frequency measurement poin...
 
A parallel rough set based smoothing filter
A parallel rough set based smoothing filterA parallel rough set based smoothing filter
A parallel rough set based smoothing filter
 
Is the higher quality financial reporting improves csr investment efficiency ...
Is the higher quality financial reporting improves csr investment efficiency ...Is the higher quality financial reporting improves csr investment efficiency ...
Is the higher quality financial reporting improves csr investment efficiency ...
 
Design of l band truncated corner printed rectangular monopole antenna
Design of l   band truncated corner printed rectangular monopole antennaDesign of l   band truncated corner printed rectangular monopole antenna
Design of l band truncated corner printed rectangular monopole antenna
 
Dualfrequency oshaped 3 way bagley power divider based on tlt
Dualfrequency oshaped 3 way bagley power divider based on tltDualfrequency oshaped 3 way bagley power divider based on tlt
Dualfrequency oshaped 3 way bagley power divider based on tlt
 
Smes role in reduction of the unemployment problem in the area located in sa...
Smes  role in reduction of the unemployment problem in the area located in sa...Smes  role in reduction of the unemployment problem in the area located in sa...
Smes role in reduction of the unemployment problem in the area located in sa...
 
An integrated approach for enhancing ready mixed concrete selection using tec...
An integrated approach for enhancing ready mixed concrete selection using tec...An integrated approach for enhancing ready mixed concrete selection using tec...
An integrated approach for enhancing ready mixed concrete selection using tec...
 
Strategies of women entrepreneurs in economic development
Strategies of women entrepreneurs in economic developmentStrategies of women entrepreneurs in economic development
Strategies of women entrepreneurs in economic development
 
Simulation of geometrical cross
Simulation of geometrical crossSimulation of geometrical cross
Simulation of geometrical cross
 
Dual polarized, high-gain sector antenna for mimo
Dual polarized, high-gain sector antenna for mimoDual polarized, high-gain sector antenna for mimo
Dual polarized, high-gain sector antenna for mimo
 
Comparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsComparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocols
 
Work life balance 2
Work life balance 2Work life balance 2
Work life balance 2
 
It’s high time to come to terms with hcm – the superset of hrm!
It’s high time to come to terms with hcm – the superset of hrm!It’s high time to come to terms with hcm – the superset of hrm!
It’s high time to come to terms with hcm – the superset of hrm!
 
Customer preference and consumption of various
Customer preference and consumption of variousCustomer preference and consumption of various
Customer preference and consumption of various
 
An appraisal on small firms corporate culture
An appraisal on small firms corporate cultureAn appraisal on small firms corporate culture
An appraisal on small firms corporate culture
 
Construction industry in kuwait – an analysis on e procurement-2
Construction industry in kuwait – an analysis on e procurement-2Construction industry in kuwait – an analysis on e procurement-2
Construction industry in kuwait – an analysis on e procurement-2
 
2 prayla
2 prayla2 prayla
2 prayla
 
Inquiry on womens entrepreneurship in arar city saudi
Inquiry on womens entrepreneurship in arar city saudiInquiry on womens entrepreneurship in arar city saudi
Inquiry on womens entrepreneurship in arar city saudi
 
Sathya narayanan
Sathya narayananSathya narayanan
Sathya narayanan
 

Ähnlich wie A comprehensive survey of contemporary

4 image segmentation through clustering
4 image segmentation through clustering4 image segmentation through clustering
4 image segmentation through clusteringprjpublications
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
iiit delhi unsupervised pdf.pdf
iiit delhi unsupervised pdf.pdfiiit delhi unsupervised pdf.pdf
iiit delhi unsupervised pdf.pdfVIKASGUPTA127897
 
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATIONMAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATIONVLSICS Design
 
Paper id 26201478
Paper id 26201478Paper id 26201478
Paper id 26201478IJRAT
 
Fuzzy c means_realestate_application
Fuzzy c means_realestate_applicationFuzzy c means_realestate_application
Fuzzy c means_realestate_applicationCemal Ardil
 
A Comprehensive Overview of Clustering Algorithms in Pattern Recognition
A Comprehensive Overview of Clustering Algorithms in Pattern  RecognitionA Comprehensive Overview of Clustering Algorithms in Pattern  Recognition
A Comprehensive Overview of Clustering Algorithms in Pattern RecognitionIOSR Journals
 
K-means Clustering Method for the Analysis of Log Data
K-means Clustering Method for the Analysis of Log DataK-means Clustering Method for the Analysis of Log Data
K-means Clustering Method for the Analysis of Log Dataidescitation
 
Performance Evaluation of Basic Segmented Algorithms for Brain Tumor Detection
Performance Evaluation of Basic Segmented Algorithms for Brain Tumor DetectionPerformance Evaluation of Basic Segmented Algorithms for Brain Tumor Detection
Performance Evaluation of Basic Segmented Algorithms for Brain Tumor DetectionIOSR Journals
 
Performance Evaluation of Basic Segmented Algorithms for Brain Tumor Detection
Performance Evaluation of Basic Segmented Algorithms for Brain Tumor DetectionPerformance Evaluation of Basic Segmented Algorithms for Brain Tumor Detection
Performance Evaluation of Basic Segmented Algorithms for Brain Tumor DetectionIOSR Journals
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Classification Techniques: A Review
Classification Techniques: A ReviewClassification Techniques: A Review
Classification Techniques: A ReviewIOSRjournaljce
 
Cancer data partitioning with data structure and difficulty independent clust...
Cancer data partitioning with data structure and difficulty independent clust...Cancer data partitioning with data structure and difficulty independent clust...
Cancer data partitioning with data structure and difficulty independent clust...IRJET Journal
 
Comparison Between Clustering Algorithms for Microarray Data Analysis
Comparison Between Clustering Algorithms for Microarray Data AnalysisComparison Between Clustering Algorithms for Microarray Data Analysis
Comparison Between Clustering Algorithms for Microarray Data AnalysisIOSR Journals
 
Ensemble based Distributed K-Modes Clustering
Ensemble based Distributed K-Modes ClusteringEnsemble based Distributed K-Modes Clustering
Ensemble based Distributed K-Modes ClusteringIJERD Editor
 
CLUSTERING HYPERSPECTRAL DATA
CLUSTERING HYPERSPECTRAL DATACLUSTERING HYPERSPECTRAL DATA
CLUSTERING HYPERSPECTRAL DATAcsandit
 
Cluster Analysis Introduction
Cluster Analysis IntroductionCluster Analysis Introduction
Cluster Analysis IntroductionPrasiddhaSarma
 

Ähnlich wie A comprehensive survey of contemporary (20)

4 image segmentation through clustering
4 image segmentation through clustering4 image segmentation through clustering
4 image segmentation through clustering
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
iiit delhi unsupervised pdf.pdf
iiit delhi unsupervised pdf.pdfiiit delhi unsupervised pdf.pdf
iiit delhi unsupervised pdf.pdf
 
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATIONMAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
 
H0114857
H0114857H0114857
H0114857
 
Paper id 26201478
Paper id 26201478Paper id 26201478
Paper id 26201478
 
Fuzzy c means_realestate_application
Fuzzy c means_realestate_applicationFuzzy c means_realestate_application
Fuzzy c means_realestate_application
 
A Comprehensive Overview of Clustering Algorithms in Pattern Recognition
A Comprehensive Overview of Clustering Algorithms in Pattern  RecognitionA Comprehensive Overview of Clustering Algorithms in Pattern  Recognition
A Comprehensive Overview of Clustering Algorithms in Pattern Recognition
 
K-means Clustering Method for the Analysis of Log Data
K-means Clustering Method for the Analysis of Log DataK-means Clustering Method for the Analysis of Log Data
K-means Clustering Method for the Analysis of Log Data
 
Performance Evaluation of Basic Segmented Algorithms for Brain Tumor Detection
Performance Evaluation of Basic Segmented Algorithms for Brain Tumor DetectionPerformance Evaluation of Basic Segmented Algorithms for Brain Tumor Detection
Performance Evaluation of Basic Segmented Algorithms for Brain Tumor Detection
 
Performance Evaluation of Basic Segmented Algorithms for Brain Tumor Detection
Performance Evaluation of Basic Segmented Algorithms for Brain Tumor DetectionPerformance Evaluation of Basic Segmented Algorithms for Brain Tumor Detection
Performance Evaluation of Basic Segmented Algorithms for Brain Tumor Detection
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Classification Techniques: A Review
Classification Techniques: A ReviewClassification Techniques: A Review
Classification Techniques: A Review
 
Cancer data partitioning with data structure and difficulty independent clust...
Cancer data partitioning with data structure and difficulty independent clust...Cancer data partitioning with data structure and difficulty independent clust...
Cancer data partitioning with data structure and difficulty independent clust...
 
Comparison Between Clustering Algorithms for Microarray Data Analysis
Comparison Between Clustering Algorithms for Microarray Data AnalysisComparison Between Clustering Algorithms for Microarray Data Analysis
Comparison Between Clustering Algorithms for Microarray Data Analysis
 
Ensemble based Distributed K-Modes Clustering
Ensemble based Distributed K-Modes ClusteringEnsemble based Distributed K-Modes Clustering
Ensemble based Distributed K-Modes Clustering
 
CLUSTERING HYPERSPECTRAL DATA
CLUSTERING HYPERSPECTRAL DATACLUSTERING HYPERSPECTRAL DATA
CLUSTERING HYPERSPECTRAL DATA
 
K mean-clustering
K mean-clusteringK mean-clustering
K mean-clustering
 
Visualization of Crisp and Rough Clustering using MATLAB
Visualization of Crisp and Rough Clustering using MATLABVisualization of Crisp and Rough Clustering using MATLAB
Visualization of Crisp and Rough Clustering using MATLAB
 
Cluster Analysis Introduction
Cluster Analysis IntroductionCluster Analysis Introduction
Cluster Analysis Introduction
 

Mehr von prjpublications

Mems based optical sensor for salinity measurement
Mems based optical sensor for salinity measurementMems based optical sensor for salinity measurement
Mems based optical sensor for salinity measurementprjpublications
 
Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...prjpublications
 
An approach to design a rectangular microstrip patch antenna in s band by tlm...
An approach to design a rectangular microstrip patch antenna in s band by tlm...An approach to design a rectangular microstrip patch antenna in s band by tlm...
An approach to design a rectangular microstrip patch antenna in s band by tlm...prjpublications
 
A design and simulation of optical pressure sensor based on photonic crystal ...
A design and simulation of optical pressure sensor based on photonic crystal ...A design and simulation of optical pressure sensor based on photonic crystal ...
A design and simulation of optical pressure sensor based on photonic crystal ...prjpublications
 
Pattern recognition using video surveillance for wildlife applications
Pattern recognition using video surveillance for wildlife applicationsPattern recognition using video surveillance for wildlife applications
Pattern recognition using video surveillance for wildlife applicationsprjpublications
 
Precision face image retrieval by extracting the face features and comparing ...
Precision face image retrieval by extracting the face features and comparing ...Precision face image retrieval by extracting the face features and comparing ...
Precision face image retrieval by extracting the face features and comparing ...prjpublications
 
Keyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted imageKeyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted imageprjpublications
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudprjpublications
 
A secure payment scheme in multihop wireless network by trusted node identifi...
A secure payment scheme in multihop wireless network by trusted node identifi...A secure payment scheme in multihop wireless network by trusted node identifi...
A secure payment scheme in multihop wireless network by trusted node identifi...prjpublications
 
Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...prjpublications
 
Study on gis simulated water quality model
Study on gis simulated water quality modelStudy on gis simulated water quality model
Study on gis simulated water quality modelprjpublications
 
Review of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionReview of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionprjpublications
 
Reduction of executive stress by development of emotional intelligence a stu...
Reduction of executive stress by development of emotional intelligence  a stu...Reduction of executive stress by development of emotional intelligence  a stu...
Reduction of executive stress by development of emotional intelligence a stu...prjpublications
 
Mathematical modeling approach for flood management
Mathematical modeling approach for flood managementMathematical modeling approach for flood management
Mathematical modeling approach for flood managementprjpublications
 
Influences of child endorsers on the consumers
Influences of child endorsers on the consumersInfluences of child endorsers on the consumers
Influences of child endorsers on the consumersprjpublications
 
Impact of stress management by development of emotional intelligence in cmts,...
Impact of stress management by development of emotional intelligence in cmts,...Impact of stress management by development of emotional intelligence in cmts,...
Impact of stress management by development of emotional intelligence in cmts,...prjpublications
 
Faulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor networkFaulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor networkprjpublications
 
Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...prjpublications
 
Employee spirituality and job engagement a correlational study across organi...
Employee spirituality and job engagement  a correlational study across organi...Employee spirituality and job engagement  a correlational study across organi...
Employee spirituality and job engagement a correlational study across organi...prjpublications
 
Anempirical study on the performance of self financing engineering colleges (...
Anempirical study on the performance of self financing engineering colleges (...Anempirical study on the performance of self financing engineering colleges (...
Anempirical study on the performance of self financing engineering colleges (...prjpublications
 

Mehr von prjpublications (20)

Mems based optical sensor for salinity measurement
Mems based optical sensor for salinity measurementMems based optical sensor for salinity measurement
Mems based optical sensor for salinity measurement
 
Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...
 
An approach to design a rectangular microstrip patch antenna in s band by tlm...
An approach to design a rectangular microstrip patch antenna in s band by tlm...An approach to design a rectangular microstrip patch antenna in s band by tlm...
An approach to design a rectangular microstrip patch antenna in s band by tlm...
 
A design and simulation of optical pressure sensor based on photonic crystal ...
A design and simulation of optical pressure sensor based on photonic crystal ...A design and simulation of optical pressure sensor based on photonic crystal ...
A design and simulation of optical pressure sensor based on photonic crystal ...
 
Pattern recognition using video surveillance for wildlife applications
Pattern recognition using video surveillance for wildlife applicationsPattern recognition using video surveillance for wildlife applications
Pattern recognition using video surveillance for wildlife applications
 
Precision face image retrieval by extracting the face features and comparing ...
Precision face image retrieval by extracting the face features and comparing ...Precision face image retrieval by extracting the face features and comparing ...
Precision face image retrieval by extracting the face features and comparing ...
 
Keyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted imageKeyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted image
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloud
 
A secure payment scheme in multihop wireless network by trusted node identifi...
A secure payment scheme in multihop wireless network by trusted node identifi...A secure payment scheme in multihop wireless network by trusted node identifi...
A secure payment scheme in multihop wireless network by trusted node identifi...
 
Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...
 
Study on gis simulated water quality model
Study on gis simulated water quality modelStudy on gis simulated water quality model
Study on gis simulated water quality model
 
Review of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionReview of three categories of fingerprint recognition
Review of three categories of fingerprint recognition
 
Reduction of executive stress by development of emotional intelligence a stu...
Reduction of executive stress by development of emotional intelligence  a stu...Reduction of executive stress by development of emotional intelligence  a stu...
Reduction of executive stress by development of emotional intelligence a stu...
 
Mathematical modeling approach for flood management
Mathematical modeling approach for flood managementMathematical modeling approach for flood management
Mathematical modeling approach for flood management
 
Influences of child endorsers on the consumers
Influences of child endorsers on the consumersInfluences of child endorsers on the consumers
Influences of child endorsers on the consumers
 
Impact of stress management by development of emotional intelligence in cmts,...
Impact of stress management by development of emotional intelligence in cmts,...Impact of stress management by development of emotional intelligence in cmts,...
Impact of stress management by development of emotional intelligence in cmts,...
 
Faulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor networkFaulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor network
 
Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...
 
Employee spirituality and job engagement a correlational study across organi...
Employee spirituality and job engagement  a correlational study across organi...Employee spirituality and job engagement  a correlational study across organi...
Employee spirituality and job engagement a correlational study across organi...
 
Anempirical study on the performance of self financing engineering colleges (...
Anempirical study on the performance of self financing engineering colleges (...Anempirical study on the performance of self financing engineering colleges (...
Anempirical study on the performance of self financing engineering colleges (...
 

A comprehensive survey of contemporary

  • 1. InternationalJournal ofof Computer Science and Engineering International Journal Computer Science and Engineering Research and Development (IJCSERD), IJCSERD Research and Development (IJCSERD), ISSN 2248-9363Number 2, May-October (2011) ISSN 2248-9363 (Print), ISSN 2248-9371 (Online) Volume 1, (Print), ISSN 2248-9371 (Online), Volume 1, Number 2, May-October (2011) pp. 70-74 © PRJ Publication © PRJ http://www.prjpublication.com/IJCSERD.asp PUBLICATION A COMPREHENSIVE SURVEY OF CONTEMPORARY RESEARCHES ON IMAGE SEGMENTATION THROUGH CLUSTERING Ritu Agrawal1 , Prof. Manisha Sharma2 1 Electronics and Telecommunication , C.I.T, Rajnandgaon, C.G, India 2 Electronics and Telecommunication , B.I.T, Durg, C.G, India ritube_03@yahoo.co.in , manishasharma1@rediffmail.com ABSTRACT This paper presents an analysis on different clustering techniques for image segmentation. Clustering is the unsupervised classification of patterns (observations, data items, or feature vectors) into groups (clusters). Clustering is most widely spread approach in Image segmentation because of its robust characteristics for data classification. Clustering is done on different attributes of an image such as size, color, texture etc. The purpose of clustering is to get meaningful result, effective storage and fast retrieval in various areas. Keywords: Clustering, Image segmentation, Exclusive Clustering ,Overlapping Clustering , Hierarchical clustering , Probabilistic D-Clustering 1. INTRODUCTION Clustering in Image segmentation is defined as the process of identifying groups of similar objects. A cluster is a collection of data points that are similar to one another within the same cluster and dissimilar to data points in other clusters [1]. Clustering techniques can broadly be classified as Unsupervised Clustering (calculated by software) and Supervised (human-guided) clustering. Unsupervised clustering is defined as groupings of pixels with common characteristics which are based on the software analysis of an image. Supervised clustering is based on the idea that a user can select sample pixels in an image that are representative of specific classes. Segmentation is a process of subdividing an image into its constituent regions or objects. The level of details, to which the subdivision is carried on, depends on the problem being solved So, the segmentation should stop when the objects or regions of interest in an application have been detected. Image segmentation is a technique that partitions an image into uniform and non- overlapping regions. This technique has a variety of applications including computer vision, image analysis, medical image processing, remote sensing and geographical information system. 70
  • 2. International Journal of Computer Science and Engineering Research and Development (IJCSERD), ISSN 2248-9363 (Print), ISSN 2248-9371 (Online) Volume 1, Number 2, May-October (2011) 2. CLUSTERING Clustering is a common technique for data analysis, which is used in many fields, including machine learning, data mining, pattern recognition, image analysis and bioinformatics. Clustering is the method of classification of similar objects into different groups or more precisely the partitioning of a data set into subsets (clusters), so that the data in each subset (ideally) share some common trait . The goal of clustering algorithm is to maximize the intra-cluster similarity and minimize the inter- cluster similarity. A variety of clustering technique has been introduced to make the segmentation more effective. The clustering technique can be broadly classified as: 1. Exclusive Clustering 2. Overlapping Clustering 3. Hierarchical Clustering 4. Probabilistic D- Clustering. 3. SEGMENTATION Segmentation is a process of partitioning a digital image into multiple segments or a sets of pixels. The goal of segmentation is to simplify an image into some more meaningful and easier to analyze. Image segmentation is typically used to locate objects and boundaries (lines, curves, etc.) in images. More precisely, image segmentation is the process of assigning a label to every pixel in an image such that pixels with the same label share certain visual characteristics. Segmentation has been used in a wide range of applications. Different applications require different types of images. The most commonly used images are light intensity (LI), range (depth) image(RI), computerized tomography(CT), magnetic resonance images(MRI). Image segmentation is highly dependent on the image type, hence there is no single generalized technique that is suitable for all images. There are numerous image segmentation techniques in the literature , which can be broadly classified into two categories, namely i) classical ii) fuzzy mathematical . Fuzzy mathematical techniques are widely used in computer vision applications as they are far better able to handle and segment images, particularly noisy images. 4. CLUSTERING TECHNIQUES An image may contain more than one objects and to segment an image in a meaningful feature is a very difficult job. This paper is a review and summarizes different clustering technique. 4.1 Exclusive Clustering In this case data are grouped in an exclusive way, so that if a certain datum belongs to a definite cluster then it could not be included in another cluster. K-means clustering is one of the type of exclusive clustering and is one of the simplest unsupervised learning algorithms. In case of K means clustering , k centroid must be defined for each cluster. The algorithm is composed of the following steps: Step 1: Place K points into the space represented by the objects that are being clustered . These points represent initial group centroids. 71
  • 3. International Journal of Computer Science and Engineering Research and Development (IJCSERD), ISSN 2248-9363 (Print), ISSN 2248-9371 (Online) Volume 1, Number 2, May-October (2011) Step2: Assign each object to the group that has the closest centroid. Step3: When all objects have been assigned, recalculate the positions of the K centroids. Step 4: Repeat Step2 and 3 until the centriods no longer moves. This produces a separation of the objects into groups which the metric to be minimized can be calculated. 4.2 Overlapping Clustering The overlapping clustering, uses fuzzy sets to cluster data, so that each point may belong to two or more clusters with different degrees of membership. In this case, data will be associated to an appropriate membership value. Fuzzy C means is one of the type of overlapping clustering algorithm. Fuzzy c-means (FCM) is a method of clustering which allows one piece of data to belong to two or more clusters. This method is frequently used in pattern recognition. The algorithm is composed of the following steps: Step1: Initialize prototype V= {v1,v2,…vc} Repeat Vprevious ← V Compute membership function using equation k µci(x) = 1 / ∑ [(║ x-vi ║2) / i =1 (║ x-vj ║2 )] 1/m-1 1≤i≤ k, xЄ X update the prototype , vi in V using equation n vi= ∑ (µci(x))m X x / ∑ (µci(x))m 1≤i≤ k x∈X x∈ X c until ∑ ║ vi previous - vi ║ ≤ ε i =1 where, X : an unlabeled data set c: the number of clusters to form m: the parameter in the objective function. ε: a threshold for the convergence criteria. 4.3 Hierarchical clustering Hierarchical clustering creates a hierarchy of clusters which may be represented in a tree structure. The root of the tree consists of a single cluster containing all observations, and the leaves correspond to individual observations. For example, suppose this data is to be clustered a b d c e f 72
  • 4. International Journal of Computer Science and Engineering Research and Development (IJCSERD), ISSN 2248-9363 (Print), ISSN 2248-9371 (Online) Volume 1, Number 2, May-October (2011) In this example, we have six elements {a} {b} {c} {d} {e} and {f}. The first step is to determine which elements is to merge in a cluster. Usually, we want to take the two closest elements, according to the chosen distance by using Euclidian distance. In this example, cutting the row yield clusters {a} {b c} {d e} {f}. Then again Cutting another row yields clusters {a} {b c} {d e f}.The combination of clusters depend on the distace between the clusters. As clustering progresses, rows and columns are merged and as the clusters are merged, the distances updated. This is a common way to implement this type of clustering. a b c d e f bc de de bcde abcde Hierarchical representation To stop clustering either when the clusters are too far apart to be merged or when there is a sufficiently small number of clusters. The algorithm used are Given a set of N items to be clustered, and an N*N distance matrix then. The basic algorithm of hierarchical clustering is the N*N matrix is D = [d(i,j)]. The clustering’s are assigned sequence numbers 0,1,......, (n-1) and L(k) is the level of the kth clustering. A cluster with sequence number “m” is denoted (m) and the proximity between clusters (r) and (s) is denoted d [(r),(s)]. The algorithm is composed of the following steps: Step1: Begin with the disjoint clustering having level L(0)= 0 and the sequence number m=0 . Step2: Find the least dissimilar pair of clusters in the current clustering , say pair (r ), (s) according to d[(r ),(s)]= min d[(i),(j)] where the minimum is over all pairs of clusters in the current clustering. Step 3: Increment the sequence number m= m+1 . Merge clusters (r )and (s) into single clusters to form the next clustering m. Set the level of this clustering to L(m)= d[(r ),(s)]. Step 4: Update the proximity matrix D , by deleting the rows and columns corresponding to clusters (r ) and (s) and adding a row and columns corresponding to the newly formed cluster. The proximity between the new cluster, denoted(r,s) and the old cluster (k) is defined in this way d[(k),(r,s)] = min d[(k),(r )],d[(k),(s)] if all objects are in one cluster , stop else go to Step 2 . 73
  • 5. International Journal of Computer Science and Engineering Research and Development (IJCSERD), ISSN 2248-9363 (Print), ISSN 2248-9371 (Online) Volume 1, Number 2, May-October (2011) 4.4 Probabilistic – D Clustering Here the word D means distance (Euclidean/ Exponential). The probability of cluster membership at any point is assumed to be inversely proportional to the distance from the centre of cluster. If, Pk(x) = probability that the point x belongs to cluster Ck. dk(x) = distance of point x from cluster Ck. Then: Pk(x) . dk(x) = constant , depending on (x). The clustering criterion used here is Euclidean distance Mathematically k Pk(x) = ∏ j ≠k dj(x) / ∑∏ di( x) i =1 j ≠ i If we consider the distance as Exponential then, Probability equation will be changed as dj(x) will be replaced by e dj(x). 5 CONCLUSION The paper presents an analysis on different clustering techniques used for image segmentation. Through clustering algorithms, image segmentation can be done in an effective way. Fuzzy C-means algorithm proved to be superior over other clustering approaches in terms of segmentation efficiency. The major drawback of FCM is the huge computational time required for convergence. To avoid the computational time of FCM , probabilistic – D clustering is proposed . REFERENCES [1] www.wikipedia.com [2] Andrew Moore: “K-means and Hierarchical Clustering - Tutorial Slides” [3] Brian T. Luke: “K-Means Clustering” [4] J. C. Dunn (1973): "A Fuzzy Relative of the ISODATA Process and Its Use in Detecting Compact Well-Separated Clusters", Journal of Cybernetics 3: 32-5 [5] J. C. Bezdek (1981): "Pattern Recognition with Fuzzy Objective Function Algorithms", Plenum Press, New York. [6]Data Clustering A Review ACM Computing Surveys, Vol. 31, No. 3, September 1999 [7] Paper 193-2011 Comparison of Probabilistic-D and k-Means Clustering in Segment Profiles for B2B Markets SAS Global Forum 2011 [8] A Survey on Image Segmentation Through Clustering International Journal of Research and Reviews in Information Sciences Vol. 1, No. 1, March 2011 [9] Image Segmentation using Fuzzy Clustering: A Survey. 6th International Conference on Emerging Technologies (ICET) 2010 74