期刊文献+

基于数据场的数据势能竞争与K-means融合的聚类算法 被引量:2

CLUSTERING ALGORITHM FOR COMPETITION OF DATA POTENTIAL ENERGY AND K-MEANS BASED ON DATA FIELD
下载PDF
导出
摘要 K-means算法采用欧氏距离进行数据点的划分,不能够准确地刻画数据集特征,而随机选取聚类中心点的机制,也不能获得好的聚类结果。为此,提出一种基于数据场的数据势能竞争与K-means算法融合的聚类算法。算法中定义了数据场的概念,利用局部最小距离进行数据聚合势能的竞争,然后利用势能熵提取基于数据集分布的最优截断距离,根据截断距离与斜率确定出簇中心点,实现K-means聚类。在UCI数据集上的测试结果表明,融合后的算法具有更好的聚类结果。 The K-means algorithm uses the Euclidean distance to divide the data points, cannot accurately characterize the data set, and randomly select the clustering center point mechanism, and cannot get good clustering results. In this paper, a clustering algorithm based on data field-based data potential competition and K-means algorithm is proposed. In this algorithm, the concept of data field is defined, and the local minimum distance is used to compete the potential of data aggregation. The optimal truncation distance based on the distribution of data set is extracted by using potential energy entropy. The cluster center point is determined according to the truncation distance and slope, and the K-means clustering is realized. The results of the UCI dataset show that the fusion algorithm has better clustering results.
出处 《计算机应用与软件》 2017年第12期266-272,共7页 Computer Applications and Software
基金 江苏省自然科学基金项目(BK20140165)
关键词 数据竞争 数据场 势能熵 斜率 复杂数据集 Data competition Data field Potential entropy Slope Complex dataset
  • 相关文献

参考文献5

二级参考文献61

  • 1余建桥,张帆.基于数据场改进的PAM聚类算法[J].计算机科学,2005,32(1):165-167. 被引量:15
  • 2淦文燕,李德毅,王建民.一种基于数据场的层次聚类方法[J].电子学报,2006,34(2):258-262. 被引量:82
  • 3高能,冯登国,向继.一种基于数据挖掘的拒绝服务攻击检测技术[J].计算机学报,2006,29(6):944-951. 被引量:44
  • 4ANDERSON J P.Computer Security Threat Monitoring and Surveillance[R].James P Anderson Co,Fort Washington,Pennsylvania,1980.
  • 5PORTNOY L,ESKIN E,STOLFO S J.Intrusion detection with unlabeled data using clustering[A].Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA2001)[C].Philadelphia,2001.5-8.
  • 6JIANG S Y,SONG X,WANG H,et al.A clustering-based method for unsupervised intrusion detections[J].Pattern Recognition Letters,2006,27(7):802-810.
  • 7ESKIN E,ARNOLD A,PRERAU M,et al.A geometric framework for unsupervised anomaly detection:detecting intrusions in unlabeled data[A].Applications of Data Mining in Computer Security[C].Boston,2002.78-99.
  • 8OLDMEADOW J,RAVINUTALA S,LECKIE C.Adaptive clustering for network intrusion detection[A].Advances in Knowledge Discovery and Data Mining[C].Heidelberg,2004.255-259.
  • 9LEUNG K,LECKIE C.Unsupervised anomaly detection in network intrusion detection using clusters[A].Proceedings of the Twenty-Eighth Australasian Computer Science Conference[C].Sydney,2005.333-342.
  • 10ZANERO S,SAVARESI S M.Unsupervised learning techniques for an intrusion detection system[A].Proceedings of the 2004 ACM Symposium on Applied Computing[C].New York,2004.412-419.

共引文献97

同被引文献25

引证文献2

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部