• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhu Lin, Wang Shitong, Deng Zhaohong. Research on Generalized Fuzzy C-Means Clustering Algorithm with Improved Fuzzy Partitions[J]. Journal of Computer Research and Development, 2009, 46(5): 814-822.
Citation: Zhu Lin, Wang Shitong, Deng Zhaohong. Research on Generalized Fuzzy C-Means Clustering Algorithm with Improved Fuzzy Partitions[J]. Journal of Computer Research and Development, 2009, 46(5): 814-822.

Research on Generalized Fuzzy C-Means Clustering Algorithm with Improved Fuzzy Partitions

More Information
  • Published Date: May 14, 2009
  • Cluster analysis is an important tool of unsupervised pattern recognition. It has been used in diverse fields such as data mining, biology, computer vision, and document analysis. The fuzziness index m has important influence on the clustering result of fuzzy clustering algorithms and it should not be forced to fix at the usual value m=2. In view of its distinctive features in applications and its limitation of having m=2 only, a recent advance of fuzzy clustering called fuzzy c-means clustering with improved fuzzy partitions (IFP-FCM) is extended in this paper and a generalized algorithm called GIFP-FCM for more effective clustering is proposed. By introducing a novel membership constraint function, a new objective function is constructed and GIFP-FCM clustering is derived. Meanwhile, from the viewpoints of Voronoi distance and competitive learning, the robustness and convergence of the proposed algorithm are analyzed. The proposed GIFP-FCM algorithm not only inherits the merits of IFP-FCM, but also generalizes it so that the original limitation on the fuzziness index m can be removed. Furthermore, the classical fuzzy c-means algorithm (FCM) and IFP-FCM can be taken as two special cases of the proposed algorithm, and GIFP-FCM provides a reasonable link between FCM and IFP-FCM. Several experimental results including its application to noisy image texture segmentation demonstrate its average advantage over FCM and IFP-FCM in both clustering and robustness capability.
  • Related Articles

    [1]Wu Haibo, Liu Hui, Sun Yi, Li Jun. A Concurrent Conflict Transaction Optimization Method for Consortium Blockchain Hyperledger Fabric[J]. Journal of Computer Research and Development, 2024, 61(8): 2110-2126. DOI: 10.7544/issn1000-1239.202220644
    [2]Yang Bo, Guo Haoran, Feng Junhui, Li Ge, Jin Zhi. A Rule Conflict Detection Approach for Intelligent System of Internet of Things[J]. Journal of Computer Research and Development, 2023, 60(3): 592-605. DOI: 10.7544/issn1000-1239.202110941
    [3]Huang Xiaohui, Li Dong, Shi Hailong, Cui Li. EasiRCC: A Method of Rule-Matching and Conflict Resolution for Smart Home[J]. Journal of Computer Research and Development, 2017, 54(12): 2711-2720. DOI: 10.7544/issn1000-1239.2017.20160646
    [4]Wang Yongji, Wu Jingzheng, Ding Liping, Zeng Haitao. Detecion Approach for Covert Channel Based on Concurrency Conflict Interval Time[J]. Journal of Computer Research and Development, 2011, 48(8): 1542-1553.
    [5]Zhou Hang, Huang Zhiqiu, Hu Jun, Zhu Yi. Real-Time System Resource Conflict Checking Based on Time Petri Nets[J]. Journal of Computer Research and Development, 2009, 46(9): 1578-1585.
    [6]Li Lin and Lu Xianliang. An Algorithm for Detecting Filters Conflicts Based on the Intersection of Bit Vectors[J]. Journal of Computer Research and Development, 2008, 45(2): 237-245.
    [7]Li Xiangjun, Meng Luoming, and Jiao Li. Problems in Results of Policy Conflict Resolutions and Detection and Resolution Methods in Network Management Systems[J]. Journal of Computer Research and Development, 2006, 43(7): 1297-1303.
    [8]Yang Wu, Yun Xiaochun, Li Jianhua. An Efficient Approach to Intrusion Detection Based on Boosting Rule Learning[J]. Journal of Computer Research and Development, 2006, 43(7): 1252-1259.
    [9]Mao Tianlu, Wang Zhaoqi, Xia Shihong. An Algorithm for Collision Detection and Response Between Human Body Model and Cloth in 3D Garment Simulation[J]. Journal of Computer Research and Development, 2006, 43(2): 356-361.
    [10]Yao Jian, Mao Bing, and Xie Li. A DAG-Based Security Policy Conflicts Detection Method[J]. Journal of Computer Research and Development, 2005, 42(7): 1108-1114.

Catalog

    Article views (981) PDF downloads (776) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return