Comparative Analysis of K-Means and Traversal Optimisation Algorithms

被引:0
|
作者
Adama, David Ada [1 ]
Olatunji, Timilehin Yinka [1 ]
Yahaya, Salisu Wada [1 ]
Lotfi, Ahmad [1 ]
机构
[1] Nottingham Trent Univ, Sch Sci & Technol, Clifton Lane, Nottingham NG11 8NS, England
关键词
Algorithm analysis; Clustering; K-means; Traversal optimisation; CLUSTERING-ALGORITHM; IDENTIFICATION;
D O I
10.1007/978-3-030-87094-2_26
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This research aims to present a technical analysis of the Traversal Optimisation Algorithm (TOA) for clustering and K-means clustering algorithm. The goal is to rigorously test this algorithm against different data specifications beyond what has previously been used with K-means without artificially and subjectively setting the initial number of clusters. The experimental evaluation involve the use of diverse cluster optimisation techniques for K-means while applying a wider range of internal validation methods such as Davies-Bouldin Index, Dunn Index and Silhouette Method, for appraising cluster quality of the Traversal Optimisation Algorithm, while at the same time not compromising the configuration of the default algorithm. The findings in this work shows that the optimisation algorithm's clustering quality as calculated by multiple internal validity indices can be very poor when operating on datasets with varying characteristics. This is owing to the algorithm's lack of any add-on mechanism for computing the optimal number of clusters that a dataset needs apriori. The results reveal that in a data processing contexts where the number of clusters are specified, the TOA yields a favourable cost-benefit in terms of run-time complexity and clustering quality.
引用
收藏
页码:300 / 311
页数:12
相关论文
共 50 条
  • [1] COMPARATIVE ANALYSIS OF K-MEANS AND DBSCAN ALGORITHMS
    Zurini, Madalina
    INTERNATIONAL CONFERENCE ON INFORMATICS IN ECONOMY, 2013, : 646 - 651
  • [2] Comparative Analysis of K-Means and Fuzzy C-Means Algorithms
    Ghosh, Soumi
    Dubey, Sanjay Kumar
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2013, 4 (04) : 35 - 39
  • [3] A Comparative Performance Analysis of Fast K-Means Clustering Algorithms
    Beecks, Christian
    Berns, Fabian
    Huewel, Jan David
    Linxen, Andrea
    Schlake, Georg Stefan
    Duesterhus, Tim
    INFORMATION INTEGRATION AND WEB INTELLIGENCE, IIWAS 2022, 2022, 13635 : 119 - 125
  • [4] Comparative Analysis for k-Means Algorithms in Network Community Detection
    Liu, Jian
    ADVANCES IN COMPUTATION AND INTELLIGENCE, 2010, 6382 : 158 - 169
  • [5] Comparative Study of K-Means, Pam and Rough K-Means Algorithms Using Cancer Datasets
    Kumar, Parvesh
    Wasan, Krishan
    COMPUTING, COMMUNICATION, AND CONTROL, 2011, 1 : 136 - 140
  • [6] K-means - a fast and efficient K-means algorithms
    Nguyen C.D.
    Duong T.H.
    Nguyen, Cuong Duc (nguyenduccuong@tdt.edu.vn), 2018, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (11) : 27 - 45
  • [7] A Comparative Study of K-Means, K-Means plus plus and Fuzzy C-Means Clustering Algorithms
    Kapoor, Akanksha
    Singhal, Abhishek
    2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE & COMMUNICATION TECHNOLOGY (CICT), 2017,
  • [8] Comparative Analysis of K-Means with other Clustering Algorithms to Improve Search Result
    Mehrotra, Shashi
    Kohli, Shruti
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 309 - 313
  • [9] Performance Analysis of K-Means Seeding Algorithms
    Ortiz-Bejar, Jose
    Tellez, Eric S.
    Graff, Mario
    Ortiz-Bejar, Jesus
    Jacobo, Jaime Cerda
    Zamora-Mendez, Alejandro
    2019 IEEE INTERNATIONAL AUTUMN MEETING ON POWER, ELECTRONICS AND COMPUTING (ROPEC 2019), 2019,
  • [10] Comparative Study of K-means and Mini Batch K-means Clustering Algorithms in Android Malware Detection Using Network Traffic Analysis
    Feizollah, Ali
    Anuar, Nor Badrul
    Salleh, Rosli
    Amalina, Fairuz
    2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 193 - 197