Computer Science ›› 2025, Vol. 52 ›› Issue (8): 162-170.doi: 10.11896/jsjkx.240700017

• Database & Big Data 5 Data Science • Previous Articles     Next Articles

Clustering Algorithm Based on Improved SOM Model

JIANG Rui, FAN Shuwen, WANG Xiaoming, XU Youyun   

  1. School of Communications and Information Engineering,Nanjing University of Posts and Telecommunications,Nanjing 210003,China
  • Received:2024-07-05 Revised:2024-10-26 Online:2025-08-15 Published:2025-08-08
  • About author:JIANG Rui,born in 1985,Ph.D,asso-ciate professor.His main research in-terests include artificial intelligence and wireless communication.
  • Supported by:
    National Natural Science Foundation of China(62371246).

Abstract: In the training process of the Self-Organizing Map,different classes of data have varying effects on the update of the weight matrix.Therefore,the update of the weight matrix for a certain class of data will have an impact on the feature vectors of the winning neurons,which are corresponding to other classes of data.This impact causes the winning neurons to deviate from the features of the data,thus reducing the clustering accuracy of the algorithm.Regarding the above issue,this paper proposes an improved confidence-based SOM model(icSOM).Firstly,the sample data is classified by the K-means algorithm to provide more information for model training.Secondly,the pre-classified data is used for training different classes SOM models to eliminate the influence caused by data from different classes.Based on the traditional SOM model,the concept of confidence matrix is then proposed.By comprehensively evaluating the confidence of the winning neurons and their Euclidean distance to the input data,the confident neuron is finally obtained.The clustering label that assigned to this input data is same as this confident neuron's class.Using icSOM for clustering analysis of the Iris dataset and the Wine dataset,the experimental results show that the proposed algorithm can handle sample data more effectively and achieve better clustering performance.

Key words: Machine learning, Unsupervised learning, Clustering, Self-organizing feature map neural network

CLC Number: 

  • TP181
[1]SCHANK R C.What is AI,anyway? [J].AI Magazine,1987,8(4):59.
[2]MCCARTHY J.Generality in artificial intelligence [J].Communications of the ACM,1987,30(12):1030-1035.
[3]SAMUEL A L.Some studies in machine learning using the game of checkers [J].IBM Journal of Research and Development,1959,3(3):210-229.
[4]SAMUEL A L.Machine learning [J].The Technology Review,1959,62(1):42-45.
[5]BAŞTANLAR Y,ÖZUYSAL M.Introduction to machine lear-ning [J].miRNomics:MicroRNA Biology and Computational Analysis,2014:105-128.
[6]EL NAQA I,MURPHY M J.What is machine learning? [M].Springer International Publishing,2015.
[7]ZHOU Z H.Machine Learning[M].Beijing:Tsinghua University Press,2016.
[8]NASTESKI V.An overview of the supervised machine learning methods [J].Horizons.B,2017,4:51-62.
[9]DAYAN P,SAHANI M,DEBACK G.Unsupervised learning[J].The MIT Encyclopedia of the Cognitive Sciences,1999:857-859.
[10]BZDOK D,KRZYWINSKI M,ALTMAN N.Machine learning:supervised methods [J].Nature Methods,2018,15(1):5-6.
[11]LAAKSONEN J,OJA E.Classification with learning k-nearest neighbors [C]//Proceedings of International Conference on Neural Networks.IEEE,1996:1480-1483.
[12]LIU C X,SHI D M,SONG W J.Research thread and latest progress of the methods of dimensionality reduction in high-dimensional data[J].Journal of Statistics,2023,4(3):11-21.
[13]WOLD S,ESBENSEN K,GELADI P.Principal component ana-lysis [J].Chemometrics and Intelligent Laboratory Systems,1987,2(1/2/3):37-52.
[14]BAI Y X.The application of k-means in feature selection[J].Electronic Technology & Software Engineering,2018,123(1):186-187.
[15]ESTER M,KRIEGEL H P,SANDER J,et al.A density-based algorithm for discovering clusters in large spatial databases with noise [J].KDD,1996,96(34):226-231.
[16]KOHONEN T.The self-organizing map [J].Proceedings of the IEEE,1990,78(9):1464-1480.
[17]KOHONEN T.Things you haven't heard about the self-organizing map [C]//IEEE International Conference on Neural Networks.IEEE,1993:1147-1156.
[18]KOHONEN T.Exploration of very large databases by self-organizing maps [C]//Proceedings of International Conference on Neural Networks.IEEE,1997,1:1-6.
[19]KOHONEN T.Essentials of the self-organizing map [J].Neural Networks,2013,37:52-65.
[20]ZHOU G,YANG F,XIAO J.Study on pixel entanglement theoryfor imagery classification [J].IEEE Transactions on Geoscience and Remote Sensing,2022,60:1-18.
[21]LI S,LIU F,JIAO L,et al.Self-supervised self-organizing clustering network:a novel unsupervised representation learning method [J].IEEE Transactions on Neural Networks and Lear-ning Systems,2022,35:1857-1871.
[22]YAN J,ZHANG C,LI Y.A clustering method for power time series curves based on improved self-organizing map algorithm [C]//2023 IEEE 3rd International Conference on Electronic Technology,Communication and Information(ICETCI).IEEE,2023:451-455.
[23]XIE D,FAN L,FU C,et al.Nonintrusive load monitoring algorithm using SOM-AdaDBSCAN [C]//2023 6th International Conference on Energy,Electrical and Power Engineering(CEEPE).IEEE,2023:905-910.
[24]KHAN S,MAILEWA A B.Discover botnets in IoT sensor networks:A lightweight deep learning framework with hybrid self-organizing maps [J].Microprocessors and Microsystems,2023,97:104753.
[25]BENDJAMA H,BOUHOUCHE S,AOUABDI S,et al.Monitoring of casting quality using principal component analysis and self-organizing map[J].The International Journal of Advanced Manufacturing Technology,2022,120(5):3599-3607.
[26]FORT J C,PAGÉS G.About the Kohonen algorithm:strong or weak self-organization? [J].Neural Networks,1996,9(5):773-785.
[27]ANDERSON E.The irises of the gaspe peninsula [J].Bulletin of American Iris Society,1935,59:2-5.
[28]AEBERHARD S,COOMANS D,VEL O D.Comparative analysis of statistical pattern recognition methods in high dimensional settings [J].Pattern Recognition,1994,27(8):1065-1077.
[1] WANG Pei, YANG Xihong, GUAN Renxiang, ZHU En. Deep Graph Contrastive Clustering Algorithm Based on Dynamic Threshold Pseudo-label Selection [J]. Computer Science, 2025, 52(8): 100-108.
[2] ZHANG Shiju, GUO Chaoyang, WU Chengliang, WU Lingjun, YANG Fengyu. Text Clustering Approach Based on Key Semantic Driven and Contrastive Learning [J]. Computer Science, 2025, 52(8): 171-179.
[3] DING Zhengze, NIE Rencan, LI Jintao, SU Huaping, XU Hang. MTFuse:An Infrared and Visible Image Fusion Network Based on Mamba and Transformer [J]. Computer Science, 2025, 52(8): 188-194.
[4] WANG Jinfu, WANG Siwei, LIANG Weixuan, YU Shengju, ZHU En. Multi-view Clustering Based on Bipartite Graph Cross-view Graph Diffusion [J]. Computer Science, 2025, 52(7): 69-74.
[5] YANG Jixiang, JIANG Huiping, WANG Sen, MA Xuan. Research Progress and Challenges in Forest Fire Risk Prediction [J]. Computer Science, 2025, 52(6A): 240400177-8.
[6] WANG Baohui, XU Boren, LI Chang’ao, YE Zihao. Study on Algorithm for Keyword Extraction from WeChat Conversation Text [J]. Computer Science, 2025, 52(6A): 240700105-8.
[7] DU Yuanhua, CHEN Pan, ZHOU Nan, SHI Kaibo, CHEN Eryang, ZHANG Yuanpeng. Correntropy Based Multi-view Low-rank Matrix Factorization and Constraint Graph Learning for Multi-view Data Clustering [J]. Computer Science, 2025, 52(6A): 240900131-10.
[8] LI Hengyi, YANG Guo, WEI Bo, CHEN Hongjun. Research on the Method of C-RAN Networking Planning Based on Clustering Model [J]. Computer Science, 2025, 52(6A): 241000015-4.
[9] WU Xingli, ZHANG Haoyue, LIAO Huchang. Review of Doctor Recommendation Methods and Applications for Consultation Platforms [J]. Computer Science, 2025, 52(5): 109-121.
[10] SUN Jinyong, WANG Xuechun, CAI Guoyong, SHANG Zhiliang. Open Set Recognition Based on Meta Class Incremental Learning [J]. Computer Science, 2025, 52(5): 187-198.
[11] AN Rui, LU Jin, YANG Jingjing. Deep Clustering Method Based on Dual-branch Wavelet Convolutional Autoencoder and DataAugmentation [J]. Computer Science, 2025, 52(4): 129-137.
[12] WU Jie, WAN Yuan, LIU Qiujie. Consistent Block Diagonal and Exclusive Multi-view Subspace Clustering [J]. Computer Science, 2025, 52(4): 138-146.
[13] JIAO Jian, CHEN Ruixiang, HE Qiang, QU Kaiyang, ZHANG Ziyi. Study on Smart Contract Vulnerability Repair Based on T5 Model [J]. Computer Science, 2025, 52(4): 362-368.
[14] HAN Lin, WANG Yifan, LI Jianan, GAO Wei. Automatic Scheduling Search Optimization Method Based on TVM [J]. Computer Science, 2025, 52(3): 268-276.
[15] XIONG Qibing, MIAO Qiguang, YANG Tian, YUAN Benzheng, FEI Yangyang. Malicious Code Detection Method Based on Hybrid Quantum Convolutional Neural Network [J]. Computer Science, 2025, 52(3): 385-390.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!