wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Use case of K-means clustering

profile
Raashid Shaikh
Mar 16, 2022
0 Likes
0 Discussions
140 Reads

Clustering is the task of dividing the population or data points into a number of groups consisting of similar data points. Simply, the aim is to segregate groups with similar traits and assign them into clusters. the goal of the k-means algorithm is to find groups in the data, with the number of groups represented by the variable k.

Below are the few use cases of k-means clustering;

Acedemic performance: Based on the scores, students are categorized into grades like A, B, or C. 

Diagnostic systems: The medical profession uses k-means in creating smarter medical decision support systems, especially in the treatment of liver ailments.

Search engines: Clustering forms a backbone of search engines. When a search is performed, the search results need to be grouped, and the search engines very often use clustering to do this. 

Delivery Store Optimization: Optimize the process of good delivery using truck drones by using a combination of k-means to find the optimal number of launch locations and a genetic algorithm to solve the truck route as a traveling salesman problem.

Identifying Crime Localities: With data related to crimes available in specific localities in a city, the category of crime, the area of the crime, and the association between the two can give quality insight into crime-prone areas within a city or a locality.

Fantasy league stats analysis: Analyzing player stats has always been a critical element of the sporting world, and with increasing competition, machine learning has a critical role to play here. as an interesting exercise, if you would like to create a fantasy draft team and like to identify similar players based on player stats, k-means can be a useful option.

Cyber Profiling Criminals: Cyber profiling is the process of collecting data from individuals and groups to identify significant co-relations. the idea of cyber profiling is derived from criminal profiles, which provide information on the investigation division to classify the types of criminals who were at the crime scene.

Insurance fraud detection: Utilizing past historical data on fraudulent claims, it is possible to isolate new claims based on their proximity to clusters that state fraudulent patterns. Since insurance fraud can have a multi-million dollar impact on a company, the ability to detect frauds is crucial.

Call record detail analysis: A call detail record is a piece of information captured by telecom companies during the call, SMS, and internet activity of a customer. this information provides greater insights about the customer’s needs when used with customer demographics. We can cluster customer activities for 24 hours by using the unsupervised k-means clustering algorithm. It is used to understand segments of customers with respect to their usage by hours.

There are many more cases where k-means is used but I let's hope this helps.


Comments ()


Sign in

Read Next

PROCESS STATES OF OPERATING SYSTEM

Blog banner

Service Validation and Testing during the Design Phase

Blog banner

Web Site

Blog banner

What is Password Cracking ? and it's Techniques.

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

Child labour

Blog banner

Digital Marketing Ethics Transparency Trust And Brand Reputation digital

Blog banner

Operating Systems Overview

Blog banner

PROCESS STATE:

Blog banner

Career v/s Job : Choose your passion

Blog banner

Stephen Hawking : A Remarkable Physicist

Blog banner

Patola Outfits for the Modern Wardrobe: Reviving Indian Handloom in Style

Blog banner

Difference Between Classification And Clustering

Blog banner

A-B-C of Networking: Part-3 (Topology [Bus & Star])

Blog banner

Types Of scheduling

Blog banner

The Laws of Karma

Blog banner

Paging

Blog banner

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner

Southern Turkey Earthquake: Causes and Consequences of a Tragic Natural Disaster

Blog banner

Deadlock and Starvation

Blog banner

Which Smartphone Company Has the Largest Market Share in India?

Blog banner

Memory management

Blog banner

Modern Operating System

Blog banner

What is process

Blog banner

Affiliate Marketing V/S Influencer Marketing

Blog banner

I/O buffer and its techniques

Blog banner

The khan mehtab transforming the modular switches company

Blog banner

Process states

Blog banner

Paginng In OS

Blog banner

About myself

Blog banner

Multiprocessor

Blog banner

Know your Processors!

Blog banner

Expert System In AI

Blog banner

File Management

Blog banner

Service Transition Process in ITSM

Blog banner

Memory managment

Blog banner

Disk scheduling

Blog banner

A Tourist’s Guide To Florida’s Rodeo Culture: What To Expect At The Arcadia Championship Rodeo

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner