Claim Missing Document
Check
Articles

Found 2 Documents
Search

An improved Kohonen self-organizing map clustering algorithm for high-dimensional data sets Momotaz Begum; Bimal Chandra Das; Md. Zakir Hossain; Antu Saha; Khaleda Akther Papry
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 1: October 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v24.i1.pp600-610

Abstract

Manipulating high-dimensional data is a major research challenge in the field of computer science in recent years. To classify this data, a lot of clustering algorithms have already been proposed. Kohonen self-organizing map (KSOM) is one of them. However, this algorithm has some drawbacks like overlapping clusters and non-linear separability problems. Therefore, in this paper, we propose an improved KSOM (I-KSOM) to reduce the problems that measures distances among objects using EISEN Cosine correlation formula. So far as we know, no previous work has used EISEN Cosine correlation distance measurements to classify high-dimensional data sets. To the robustness of the proposed KSOM, we carry out the experiments on several popular datasets like Iris, Seeds, Glass, Vertebral column, and Wisconsin breast cancer data sets. Our proposed algorithm shows better result compared to the existing original KSOM and another modified KSOM in terms of predictive performance with topographic and quantization error.
A cost-effective counterfeiting prevention method using hashing, QR code, and website Monir Hossain; Momotaz Begum; Bimal Chandra Das; Jia Uddin
International Journal of Advances in Applied Sciences Vol 13, No 2: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijaas.v13.i2.pp351-359

Abstract

In this paper, we proposed a cost-effective software method to prevent counterfeiting where we used a website, quick-response (QR) code, and hashing. At the early stage of the product, the system will create a unique ID and a password with a random password generator for all products. Then, the password hash would be stored along with the ID in the database. At the same time, the password would be converted into a QR code for each product. The manufacturer will collect the QR code and ID and attach them to the product. When consumers attempt to verify the product, they will enter the website provided by the manufacturer and scan the QR code. After applying the same hash used before, the code will be checked on the database. After a successful check, the product entity will be destroyed and the life of the product ends. This paper contains flowcharts, figures, cost estimation, and a detailed explanation of the system. As it only requires domain hosting, thus the fixed cost of the system is so lower to bear for small enterprises also. We built a similar system using PHP, HTML, JavaScript for websites, and MYSQL for databases.