Skip to main content

The Application of SOM and K-Means Algorithms in Public Security Performance Analysis and Forecasting

  • Conference paper
Contemporary Research on E-business Technology and Strategy (iCETS 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 332))

Included in the following conference series:

Abstract

As cluster analysis is the most commonly used Data Mining method in performance analysis and forecasting, this paper establishes an auxiliary model framework for the security system, using clustering techniques to analyze data. We compared the analysis results of SOM and k-means algorithms, testing for their strengths and weaknesses, combing these two algorithms, and finally proposing the two-stage clustering algorithm based on SOM and k-means algorithms. In this thesis, by clustering and analyzing the same or similar cases, combining with the recommendations of experts, and determining main factors affecting the performance among different regions, we provide references not only for the investigators who will analyze the cases, but also for the public security agencies in the performance prediction, police force forecast and later development of the public security warning system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zong, Y.: Clustering quality improvement methods. Dalian University of Technology (2010)

    Google Scholar 

  2. Kaski, S., Kangas, J., Kohonen, T.: Bibliography of self-organizing maps (SOM) papers: 1981-1997. Neural Computing Surveys 1(3&4), 1–176 (1998)

    Google Scholar 

  3. Jain, A.K.: Data clustering: 50 years beyond K-means. Pattern Recognition Letters 31(8), 651–666 (2010)

    Article  Google Scholar 

  4. Zhao, L.: Adopting the Data Ming Techniques in the Investigation. Computer Engineering and Science 6 (2006)

    Google Scholar 

  5. Han, J., Kamber, M.: Data Mining Concepts and Techniques, Fan, M., Meng, X (translate), pp. 30–53. Mechanical Industry Press, Beijing (2008)

    Google Scholar 

  6. Famili, F., Shen, W.M., Weber, R., Simoudis, E.: Data pre-processing and intelligent data analysis. International Journal on Intelligent Data Analysis 1(1) (1997)

    Google Scholar 

  7. Shen, R., Shi, X., Wu, Y.: Data Preprocessing Procedure Model based on Data Warehouse. Computer and Digital Engineering 33(009), 73–74 (2005)

    Google Scholar 

  8. Kaski, S., Lagus, K.: Comparing Self-Organizing Maps. In: Vorbrüggen, J.C., von Seelen, W., Sendhoff, B. (eds.) ICANN 1996. LNCS, vol. 1112, pp. 809–814. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  9. Qin, A., Ceng, D., Wang, J.: Study on the Fault Diagnosis of Fan Based on SOM Neural Network. Wind Turbine Technology (001), 50–52 (2009)

    Google Scholar 

  10. Yang, L., Su, H., Zhang, Y., Chu, J.: A Method of Data Ming Based on SOM Clustering and Application. Computer Engineering and Science 29(8), 133–136 (2007)

    Google Scholar 

  11. Kohonen, T., Kaski, S., Lagus, K., Salojarvi, J., Honkela, J., Paatero, V., Saarela, A.: Self organization of a massive document collection. IEEE Transactions on Neural Networks 11(3), 574–585 (2000)

    Article  Google Scholar 

  12. Wagstaff, K., Cardie, C., Rogers, S., Schrödl, S.: Constrained k-means clustering with background knowledge, pp. 577–584 (2001)

    Google Scholar 

  13. Yang, Z., Yang, Y.: Doucment Clustering Method Based on Hybird of SOM and k-means. Application Research of Computers 23(5), 73–79 (2006)

    Google Scholar 

  14. Krishna, K., Narasimha Murty, M.: Genetic K-means algorithm. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 29(3), 433–439 (1999)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kou, Y., Cui, H., Xu, L. (2012). The Application of SOM and K-Means Algorithms in Public Security Performance Analysis and Forecasting. In: Khachidze, V., Wang, T., Siddiqui, S., Liu, V., Cappuccio, S., Lim, A. (eds) Contemporary Research on E-business Technology and Strategy. iCETS 2012. Communications in Computer and Information Science, vol 332. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34447-3_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34447-3_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34446-6

  • Online ISBN: 978-3-642-34447-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics