Computer Science ›› 2019, Vol. 46 ›› Issue (7): 211-216.doi: 10.11896/j.issn.1002-137X.2019.07.032

• Artificial Intelligence • Previous Articles     Next Articles

Study on Ocean Data Anomaly Detection Algorithm Based on Improved K-means Clustering

JIANG Hua,WU Yao,WANG Xin,WANG Hui-jiao   

  1. (College of Computer Science and Information Security,Guilin University of Electronic Technology,Guilin,Guangxi 541004,China)
  • Received:2018-06-06 Online:2019-07-15 Published:2019-07-15

Abstract: Aiming at the problem of abnormal data mining in marine Argo buoy monitoring data,an anomaly detection algorithm based on distance criterion was proposed based on the improved K-means algorithm.The algorithm redefines the proximity of ocean data,blocks according to the size and distribution of the data,and adaptively selects alternative initial clustering centers.In the iterative process of the algorithm,using the distance mean of the data objects in the cluster relative to the clustering center,the global consideration is given to the data objects in the cluster according with the abnormal features to detect the anomalies.The simulation dataset and the real dataset are verified by experiments,and the comparison results show that it is superior to the contrast algorithm in clustering performance and anomaly detection.

Key words: K-means algorithm, Argo buoy data, Proximity, Block, Anomaly detection

CLC Number: 

  • TP391
[1] LIU Z H,WU X F,XU J P,et al.Argoocean observations in China for 15 years [J].Progressin Geoscience,2016,31(5):445-460.(in Chinese)刘增宏,吴晓芬,许建平,等.中国Argo海洋观测十五年[J].地球科学进展,2016,31(5):445-460.
[2] DING J,WANG L,SHEN D,et al.An Anomaly Detection System on Big Data[J].Natural Science Journal of Hainan University,2015,33(1):24-27.
[3] WANG H Z,ZHANG R,WANG G H,et al.Quality Control Technology of temperature and Salt profile observation data of Argo buoy [J].Journal of Geophysics,2012,55(2):577-588.(in Chinese)王辉赞,张韧,王桂华,等.Argo浮标温盐剖面观测资料的质量控制技术[J].地球物理学报,2012,55(2):577-588.
[4] SHAOLEI L U,HONG L I,LIU Z.Improvement of Argo salini- ty data delayed-mode quality control Method[J].Journal of Pla University of Science&Technology,2014,15(6):598-606.
[5] TZORTZIS G,LIKAS A,TZORTZIS G.The MinMaxk-Means clustering algorithm[J].Pattern Recognition,2014,47(7):2505-2516.
[6] CHEN G P,WANG W P,HUANG J,et al.Improved initial clustering center selection method for k-means algorithm [ J ].Journal of Chinese Computer Systems,2012,33(6):1320-1323.
[7] XING C Z,GU H.K-means algorithm for optimizing initial clustering centers based on average density [J].Computer Enginee-ring and Application,2014,50(20):135-138.(in Chinese)邢长征,谷浩.基于平均密度优化初始聚类中心的k-means算法[J].计算机工程与应用,2014,50(20):135-138.
[8] CELEBI M E,KINGRAVI H A,VELA P A.A Comparative Study of Efficient Initialization Methods for the K-Means Clustering Algorithm[J].Expert Systems with Applications,2013,40(1):200-210.
[9] HAN Z J.Adaptive K-means initialization method based on data denseness [J].Computer Applications and Software,2014,31(2):182-187.(in Chinese)韩最蛟.基于数据密集性的自适应K均值初始化方法[J].计算机应用与软件,2014,31(2):182-187.
[10] ZUO J,CHEN Z M.Anomaly detection algorithm based on improved K-means clustering [J].Computer Science,2016,43(8):258-261.(in Chinese)左进,陈泽茂.基于改进K均值聚类的异常检测算法[J].计算机科学,2016,43(8):258-261.
[11] CHEN G P,WANG W P,HUANG J.An improved K-means algorithm for initial clustering Center selection [J].Minicomputer System,2012,33(6):170-173.(in Chinese)陈光平,王文鹏,黄俊.一种改进初始聚类中心选择的K-means算法[J].小型微型计算机系统,2012,33(6):170-173.
[12] HAN C,YUAN Y S,MEI T,et al.Outlier Detection algorithm based on K-means [J].Computer Engineering and Application,2017,53(3):58-63.(in Chinese)韩崇,袁颖珊,梅焘,等.基于K-means的数据流离群点检测算法[J].计算机工程与应用,2017,53(3):58-63.
[13] SAMRIN R,VASUMATHI D.Hybrid Weighted K-Means Clustering and Artificial Neural Network for an Anomaly-Based Network Intrusion Detection System[J].Journal of Intelligent Systems,2016,27(2):135-147.
[14] SHEN G.Improved k-means initialization method based on data density[J].Computer Engineering & Applications,2014,51(11):139-144.
[15] TZORTZIS G,LIKAS A,TZORTZIS G.The MinMax k-Meansclustering algorithm[J].Pattern Recognition,2014,47(7):2505-2516.
[1] ZHANG Yan-mei, LOU Yin-cheng. Deep Neural Network Based Ponzi Scheme Contract Detection Method [J]. Computer Science, 2021, 48(1): 273-279.
[2] SHAO Wei-hui, WANG Ning, HAN Chuan-feng, XU Wei-sheng. Integrated Emergency-Defense System Based on Blockchain [J]. Computer Science, 2021, 48(1): 287-294.
[3] FENG An-ran, WANG Xu-ren, WANG Qiu-yun, XIONG Meng-bo. Database Anomaly Access Detection Based on Principal Component Analysis and Random Tree [J]. Computer Science, 2020, 47(9): 94-98.
[4] ZHONG Ying-yu, CHEN Song-can. High-order Multi-view Outlier Detection [J]. Computer Science, 2020, 47(9): 99-104.
[5] ZHAO Hui-qun, WU Kai-feng. Big Data Valuation Algorithm [J]. Computer Science, 2020, 47(9): 110-116.
[6] LI Ying, YU Ya-xin, ZHANG Hong-yu, LI Zhen-guo. High Trusted Cloud Storage Model Based on TBchain Blockchain [J]. Computer Science, 2020, 47(9): 330-338.
[7] MENG Li-sha, REN Kun, FAN Chun-qi, HUANG Long. Dense Convolution Generative Adversarial Networks Based Image Inpainting [J]. Computer Science, 2020, 47(8): 202-207.
[8] GAO Fang-yuan, WANG Xiu-mei. Subspace Clustering Method Based on Block Diagonal Representation and Neighbor Constraint [J]. Computer Science, 2020, 47(7): 66-70.
[9] SHEN Xuan, WANG Xin-mei, HE Jun, SUN Zhi-yuan. Revised Impossible Differential Cryptanalysis of PFP Block Cipher [J]. Computer Science, 2020, 47(7): 263-267.
[10] LIU Shuai, GAN Guo-hua, LIU Ming-xi, FANG Yong, WANG Shou-yang. Multi-subblock Incentive Consensus Mechanism Based on Topology and Distribution Mechanism [J]. Computer Science, 2020, 47(7): 268-277.
[11] CHEN Meng-hui, CAO Qian-feng and LAN Yan-qi. Heuristic Algorithm Based on Block Mining and Recombination for Permutation Flow-shop Scheduling Problem [J]. Computer Science, 2020, 47(6A): 108-113.
[12] LU Ge-hao, XIE Li-hong and LI Xi-yu. Comparative Research of Blockchain Consensus Algorithm [J]. Computer Science, 2020, 47(6A): 332-339.
[13] HONG Xiao-ling, WAN Hu, XIAO Xiao and SUN Hao-xiang. Manufacturing Alliance System Based on Block Chain [J]. Computer Science, 2020, 47(6A): 369-374.
[14] LIN Xu-dan, BAO Shi-Jian, ZHAO Li-xin and ZHAO Chen-lin. Design and Performance Analysis of Automotive Supply Chain System Based on Hyperledger Fabric [J]. Computer Science, 2020, 47(6A): 546-551.
[15] KE Yu-Jing, JING Mao-hua and ZHENG Han-yin. Application Research of Blockchain Technology in Trust Industry [J]. Computer Science, 2020, 47(6A): 591-595.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .