{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T10:19:33Z","timestamp":1747736373439,"version":"3.30.1"},"reference-count":32,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.32604\/iasc.2023.028368","type":"journal-article","created":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T02:42:18Z","timestamp":1658198538000},"page":"2043-2055","source":"Crossref","is-referenced-by-count":3,"title":["Evaluating Partitioning Based Clustering Methods for Extended Non-negative Matrix Factorization (NMF)"],"prefix":"10.32604","volume":"35","author":[{"given":"Neetika","family":"Bhandari","sequence":"first","affiliation":[]},{"given":"Payal","family":"Pahwa","sequence":"additional","affiliation":[]}],"member":"17807","reference":[{"key":"ref1","first-page":"62","article-title":"Application of artificial intelligence and data mining techniques to financial markets","volume":"6","author":"Hi'ovsk\u00e1","year":"2012","journal-title":"Economic Studies & Analyses\/Acta VSFS"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"14","DOI":"10.36548\/jtcsst.2019.1.002","article-title":"Survey of data mining algorithm\u2019s for intelligent computing system","volume":"1","author":"Joseph","year":"2019","journal-title":"Journal of Trends in Computer Science and Smart Technology (TCSST)"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.1109\/ACCESS.2014.2362522","article-title":"Information security in big data: Privacy and data mining","volume":"2","author":"Xu","year":"2014","journal-title":"IEEE Access"},{"key":"ref4","series-title":"Proc. 2012 Third Int. Conf. on Computer and Communication Technology","first-page":"26","article-title":"Privacy preserving data mining techniques: Current scenario and future prospects","author":"Malik","year":"2012"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"61","DOI":"10.32604\/jihpp.2019.05943","article-title":"Research on privacy preserving data mining","volume":"1","author":"Wang","year":"2019","journal-title":"Journal of Information Hiding and Privacy Protection"},{"key":"ref6","series-title":"Proc. Int. Conf. on Innovative Computing and Communications","first-page":"535","article-title":"Comparative analysis of privacy-preserving data mining techniques","author":"Bhandari","year":"2018"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"56","DOI":"10.14445\/22315381\/IJETT-V68I11P207","article-title":"Privacy preserving data mining: Techniques and algorithms","volume":"68","author":"Ratra","year":"2020","journal-title":"SSRG International Journal of Engineering Trends and Technology"},{"key":"ref8","doi-asserted-by":"crossref","unstructured":"N. Bhandari and P. Pahwa, \u201cAchieving data privacy using extended NMF,\u201d (Accepted and presented in conference), 2021.","DOI":"10.1007\/978-981-19-2347-0_17"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"866","DOI":"10.1109\/69.553155","article-title":"Data mining: An overview from a database perspective","volume":"8","author":"Chen","year":"1996","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"journal-title":"Data mining: Concepts and techniques","year":"2006","author":"Han","key":"ref10"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1136\/svn-2017-000101","article-title":"Artificial intelligence in healthcare: Past, present and future","volume":"2","author":"Jiang","year":"2017","journal-title":"Stroke and Vascular Neurology"},{"key":"ref12","first-page":"696","article-title":"Privacy preserving clustering by hybrid data transformation approach","volume":"3","author":"Nagalakshmi","year":"2013","journal-title":"International Journal of Emerging Technology and Advanced Engineering"},{"key":"ref13","first-page":"1528","article-title":"A hybrid data perturbation approach to preserve privacy","volume":"6","author":"Jahan","year":"2015","journal-title":"International Journal of Scientific and Engineering Research"},{"key":"ref14","first-page":"V1","article-title":"Combined data distortion strategies for privacy-preserving data mining","volume":"1","author":"Peng","year":"2010","journal-title":"2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE)"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1799","DOI":"10.1007\/s11277-017-5237-5","article-title":"A new privacy-preserving data mining method using non-negative matrix factorization and singular value decomposition","volume":"102","author":"Li","year":"2018","journal-title":"Wireless Personal Communications"},{"key":"ref16","series-title":"Proc. 2009 IEEE Int. Conf. on Grey Systems and Intelligent Services","first-page":"1502","article-title":"A privacy preserving clustering technique using hybrid data transformation method","author":"Li","year":"2009"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1109\/TETC.2014.2330519","article-title":"A survey of clustering algorithms for big data: Taxonomy and empirical analysis","volume":"2","author":"Fahad","year":"2014","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"35","DOI":"10.14569\/IJACSA.2013.040406","article-title":"Comparative analysis of K-Means and Fuzzy C-Means algorithms","volume":"4","author":"Ghosh","year":"2013","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"1650","DOI":"10.1109\/TPAMI.2002.1114856","article-title":"Performance evaluation of some clustering algorithms and validity indices","volume":"24","author":"Maulik","year":"2002","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"ref20","series-title":"Proc. 2010 IEEE Int. Conf. on Data Mining","first-page":"911","article-title":"Understanding of internal clustering validation measures","author":"Liu","year":"2010"},{"key":"ref21","first-page":"29","article-title":"Knowledge discovery from database using an integration of clustering and classification","volume":"2","author":"Kumar","year":"2011","journal-title":"International Journal of Advanced Computer Sciences and Applications"},{"key":"ref22","first-page":"805","article-title":"Review and comparative study of clustering techniques","volume":"5","author":"Popat","year":"2014","journal-title":"International Journal of Computer Science and Information Technologies"},{"key":"ref23","article-title":"An overview of partitioning algorithms in clustering techniques","volume":"5","author":"Saket","year":"2016","journal-title":"International Journal of Advanced Research in Computer Engineering & Technology"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1117","DOI":"10.1080\/09720510.2020.1799507","article-title":"Evaluating performance of agglomerative clustering for extended NMF","volume":"23","author":"Bhandari","year":"2020","journal-title":"Journal of Statistics and Management Systems"},{"key":"ref25","series-title":"Proc. Sixth IEEE Int. Conf. on Data Mining \u2013 Workshops","first-page":"513","article-title":"NNMF-based factorization techniques for high-accuracy protection on non-negative valued datasets","author":"Wang","year":"2006"},{"key":"ref26","first-page":"283","article-title":"Double-reflecting data perturbation method for information decurity","volume":"5","author":"Balajee","year":"2002","journal-title":"Oriental Journal of Computer Science & Technology"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1186\/1471-2105-11-367","article-title":"A flexible R package for nonnegative matrix factorization","volume":"11","author":"Gaujoux","year":"2010","journal-title":"BMC Bioinformatics"},{"key":"ref28","article-title":"ppclust: Probabilistic and possibilistic cluster analysis","author":"Cebeci","year":"2019","journal-title":"R Package Version 0.1.3"},{"key":"ref29","article-title":"Cluster analysis basics and extensions","author":"Maechler","year":"2019","journal-title":"R Package Version 2.1.0"},{"key":"ref30","article-title":"clusterCrit: Clustering indices","author":"Desgraupes","year":"2018","journal-title":"R Package Version 1.2.8."},{"key":"ref31","unstructured":"https:\/\/archive.ics.uci.edu\/ml\/index.php."},{"key":"ref32","first-page":"226","article-title":"Research on K-value selection method of K-Means clustering algorithm","volume":"2","author":"Yuan","year":"2019","journal-title":"J"}],"container-title":["Intelligent Automation &amp; Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/ueditor\/files\/iasc\/TSP_IASC-35-2\/TSP_IASC_28368\/TSP_IASC_28368.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T21:29:18Z","timestamp":1733520558000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/iasc\/v35n2\/48893"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":32,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023]]}},"URL":"https:\/\/doi.org\/10.32604\/iasc.2023.028368","relation":{},"ISSN":["1079-8587"],"issn-type":[{"type":"print","value":"1079-8587"}],"subject":[],"published":{"date-parts":[[2023]]}}}