wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

K-means use cases

profile
Mathew Thomas
Mar 15, 2022
0 Likes
0 Discussions
382 Reads

Let’s get started!

Clustering is the process of splitting a population or set of data points into many groups so that data points in the same group are more similar than data points in other groups. In other words, the goal is to sort groups with similar characteristics into clusters. The data points used are unlabelled and thus clustering relies on unsupervised machine learning algorithms. Assigning a data point to a cluster by analysing its features is the fundamental logic behind a Clustering Algorithm. There are various types of Clustering Algorithm of which k-means is discussed in this article.

 

Digging up the past.

James Macqueen coined the term "k-means" in 1967 as part of a work titled "Some approaches for categorization and analysis of multivariate observations." In 1957, the standard algorithm was utilised in Bell Labs as part of a pulse code modulation approach. E. W. Forgy published it in 1965, and it is commonly referred to as the Lloyd-Forgy approach.

 

K-Means?

“k” is a number. It’s a variable that represents the number of clusters that is needed. For example, k = 2 refers to two clusters. Based on the attributes provided, the algorithm assigns each data point to one of the k groups iteratively. In the reference image below, k = 2 and two clusters from the source dataset have been found.

The outputs of executing a k-means on a dataset are:

  • k centroids: centroids for each of the k clusters identified from the dataset.
  • Complete dataset labelled to ensure each data point is assigned to one of the clusters.

 

Where can you see it?

K-Means clustering algorithm works well with small number of dimensions, which is numeric and continuous. It works well when you have small scenarios with data points that are randomly distributed.

Following are some use cases of k-means algorithm:

Document Classification:

Documents are grouped into several categories based on tags, subjects, and the documents content. This is a relatively common classification problem, and k-means is an excellent technique for it. Initial document processing is required to represent each document as a vector, and term frequency is utilised to find regularly used terms that aid in document classification. The document vectors are then grouped to aid in the identification of document group commonalities.

Delivery Store Optimization:

Utilizing a combination of k-means to discover the ideal number of launch locations and a genetic algorithm to solve the truck route as a travelling salesman problem, optimise the process of good delivery using truck drones.

 

Identifying Crime Localities:

The category of crime, the area of the crime, and the relationship between the two can provide qualitative insight into crime-prone areas within a city or a locality when data relating to crimes is accessible in specific locales within a city.

 

Insurance Fraud Detection:

Machine learning plays an important role in fraud detection and has a wide range of applications in the automotive, healthcare, and insurance industries. It is possible to separate new claims based on their proximity to clusters that signal fraudulent trends using historical data on fraudulent claims. Because insurance fraud has the potential to cost a company millions of dollars, the ability to detect fraud is critical.


Comments ()


Sign in

Read Next

How India made the GIS its Own, and its Use in Infrastructural Developments

Blog banner

Student Grade Calculator in LISP

Blog banner

MORDERN UNIX SYSTEM

Blog banner

Traditional UNIX Scheduling

Blog banner

Concept and definition of m-commerce

Blog banner

Socket Programming in Java

Blog banner

Buffers in Operating Systems

Blog banner

M commerce

Blog banner

Explaining Buffer Overflow with Example

Blog banner

A-B-C of Networking: Part-2 (Components)

Blog banner

Process states

Blog banner

Smitten Kitchen Keepers

Blog banner

DMZ: Your Secret Weapon for Data Security

Blog banner

Understanding Endometriosis and Its Psychological Impact on Quality of Life

Blog banner

Precision-Recall in Data Science

Blog banner

Article on Fresh Book

Blog banner

Technical SEO : Total Guide

Blog banner

Understanding the 4 Types of Learning Methods in Early Childhood

Blog banner

Is Brushing After Eating Damaging Your Teeth? (Fact or Myth)

Blog banner

The Truth Behind Viral DIY Dental Hacks

Blog banner

Steganography and Steganalysis

Blog banner

Emerging threats in cyber Forensics

Blog banner

Uniprocessor scheduling

Blog banner

Smart Shoephone: Is that technology overdose!?

Blog banner

Supervised and unsupervised learning

Blog banner

BEAUTY IS IN THE EYE OF THE BEHOLDER

Blog banner

Challenges and risks in service operations

Blog banner

Visualization in Data Science

Blog banner

I/O Management and Disk Scheduling

Blog banner

Photorec - media recovery tool

Blog banner

Memory heirchy

Blog banner

Social Engineering

Blog banner

How can parents support a child’s mental health?

Blog banner

operating system

Blog banner

Why Progressive Web Apps (PWAs) Are Replacing Traditional Websites

Blog banner

"Audit" In Data Science

Blog banner

The Impact of Cyber Forensics on Corporate Governance and Compliance

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

memory cache

Blog banner

Buffering

Blog banner

Digital marketing spotlight “Dove’s Real Beauty Campaign”

Blog banner

Beauty of indian railway

Blog banner