Visualization of dengue incidences for vulnerability using K-means

Nirbhay Mathur*, Vijanth S. Asirvadam, Sarat C. Dass, Balvinder Singh Gill

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

Dengue is the world's most rapidly spreading and geographically widespread arthropod-borne disease. Dengue epidemics are observed to be larger, more frequent and associated with more severe disease than they were in the past. To control the incidence of the disease, it is important to be able to identify the hot-spots localized regions of high incidences. This work focuses on identifying hot-spots of dengue using the K-means clustering algorithm. Data is collected from the state of Selangor in Malaysia from 2013 to 2014. Visualization of dengue vulnerability is obtained via Gaussian mixture models fitted using K-means algorithm. Results demonstrate the ability to render visualization for the vulnerability of dengue incidences on the basis of high density and low density cluster using Gaussian mixture and K-means algorithm.

Original languageEnglish
Title of host publicationIEEE 2015 International Conference on Signal and Image Processing Applications, ICSIPA 2015 - Proceedings
PublisherIEEE
Pages569-573
Number of pages5
ISBN (Electronic)9781479989966
DOIs
Publication statusPublished - 25 Feb 2016
Event4th IEEE International Conference on Signal and Image Processing Applications 2015 - Kuala Lumpur, Malaysia
Duration: 19 Oct 201521 Oct 2015

Conference

Conference4th IEEE International Conference on Signal and Image Processing Applications 2015
Abbreviated titleICSIPA 2015
Country/TerritoryMalaysia
CityKuala Lumpur
Period19/10/1521/10/15

Keywords

  • clustering
  • Dengue
  • Gaussian Mixture model
  • Geographical Information System (GIS)
  • K-means

ASJC Scopus subject areas

  • Computer Science Applications
  • Signal Processing

Fingerprint

Dive into the research topics of 'Visualization of dengue incidences for vulnerability using K-means'. Together they form a unique fingerprint.

Cite this