{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T14:26:30Z","timestamp":1774880790251,"version":"3.50.1"},"reference-count":102,"publisher":"World Scientific Pub Co Pte Lt","issue":"01","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Info. Tech. Dec. Mak."],"published-print":{"date-parts":[[2020,1]]},"abstract":"<jats:p> Clustering is a complex unsupervised method used to group most similar observations of a given dataset within the same cluster. To guarantee high efficiency, the clustering process should ensure high accuracy and low complexity. Many clustering methods were developed in various fields depending on the type of application and the data type considered. Categorical clustering considers segmenting a dataset in which the data are categorical and were widely used in many real-world applications. Thus several methods were developed including hard, fuzzy and rough set-based methods. In this survey, more than 30 categorical clustering algorithms were investigated. These methods were classified into hierarchical and partitional clustering methods and classified in terms of their accuracy, precision and recall to identify the most prominent ones. Experimental results show that rough set-based clustering methods provided better efficiency than hard and fuzzy methods. Besides, methods based on the initialization of the centroids also provided good results. <\/jats:p>","DOI":"10.1142\/s0219622019300064","type":"journal-article","created":{"date-parts":[[2019,12,10]],"date-time":"2019-12-10T03:54:38Z","timestamp":1575950078000},"page":"49-96","source":"Crossref","is-referenced-by-count":19,"title":["Clustering Categorical Data: A Survey"],"prefix":"10.1142","volume":"19","author":[{"given":"Sami","family":"Naouali","sequence":"first","affiliation":[{"name":"Virtual Reality and Information Technologies, Military Academy of Fondouk Jedid, Nabeul, Tunisia"}]},{"given":"Semeh","family":"Ben Salem","sequence":"additional","affiliation":[{"name":"Polytechnic School of Tunisia, La Marsa, Tunis B.P. 743, Rue El Khawarizmi 2078, Tunisia"}]},{"given":"Zied","family":"Chtourou","sequence":"additional","affiliation":[{"name":"Digital Research Center of Sfax, B.P. 275, Sakiet Ezzit, Sfax 3021, Tunisia"}]}],"member":"219","published-online":{"date-parts":[[2020,2,4]]},"reference":[{"key":"S0219622019300064BIB001","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.01.015"},{"key":"S0219622019300064BIB002","volume-title":"The Data Warehouse ETL Toolkit: Practical Techniques for Extracting, Cleaning, Conforming, and Delivering Data","author":"Kimball R.","year":"2011"},{"key":"S0219622019300064BIB003","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.109"},{"key":"S0219622019300064BIB004","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2014.2330519"},{"key":"S0219622019300064BIB005","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.06.026"},{"key":"S0219622019300064BIB006","doi-asserted-by":"publisher","DOI":"10.1145\/2556612"},{"key":"S0219622019300064BIB007","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2009.12.004"},{"key":"S0219622019300064BIB008","doi-asserted-by":"publisher","DOI":"10.1007\/s40745-015-0040-1"},{"key":"S0219622019300064BIB009","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-012-0258-x"},{"key":"S0219622019300064BIB010","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-014-0808-1"},{"key":"S0219622019300064BIB011","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2013.11.003"},{"key":"S0219622019300064BIB012","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2013.2293795"},{"key":"S0219622019300064BIB013","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2011.2182354"},{"key":"S0219622019300064BIB014","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.81"},{"key":"S0219622019300064BIB015","first-page":"1058","volume-title":"Proc. 4th Workshop Feature Sel. Data Mining","author":"Xie J.","year":"2009"},{"key":"S0219622019300064BIB016","doi-asserted-by":"publisher","DOI":"10.1016\/0167-8655(95)00075-R"},{"key":"S0219622019300064BIB017","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2014.6889941"},{"key":"S0219622019300064BIB018","first-page":"1","volume-title":"Proc. SIGMOG Workshop Res. Issues Data Mining Knowl. Discovery","author":"Huang Z.","year":"1997"},{"key":"S0219622019300064BIB019","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009769707641"},{"key":"S0219622019300064BIB020","doi-asserted-by":"publisher","DOI":"10.1109\/91.784206"},{"key":"S0219622019300064BIB021","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.228"},{"key":"S0219622019300064BIB022","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2011.04.024"},{"key":"S0219622019300064BIB023","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.53"},{"key":"S0219622019300064BIB024","doi-asserted-by":"publisher","DOI":"10.1504\/IJGCRSIS.2009.026727"},{"key":"S0219622019300064BIB025","doi-asserted-by":"publisher","DOI":"10.1007\/s007780050005"},{"key":"S0219622019300064BIB026","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4379(00)00022-3"},{"key":"S0219622019300064BIB027","doi-asserted-by":"publisher","DOI":"10.1145\/312129.312201"},{"key":"S0219622019300064BIB028","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2018.04.023"},{"key":"S0219622019300064BIB029","volume-title":"19th Int. Conf. on Machine Learning and Applications (ICMLA)","author":"Ben Salem S.","year":"2017"},{"key":"S0219622019300064BIB030","volume-title":"19th Int. Conf. Machine Learning and Applications (ICMLA)","author":"Ben Salem S.","year":"2017"},{"key":"S0219622019300064BIB031","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2004.04.004"},{"key":"S0219622019300064BIB032","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2007.08.012"},{"key":"S0219622019300064BIB033","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2016.01.026"},{"key":"S0219622019300064BIB034","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.11.045"},{"key":"S0219622019300064BIB035","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2012.06.005"},{"key":"S0219622019300064BIB036","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2016.09.023"},{"key":"S0219622019300064BIB037","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2006.01.001"},{"key":"S0219622019300064BIB038","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-011-0454-9"},{"key":"S0219622019300064BIB039","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2006.06.003"},{"key":"S0219622019300064BIB040","volume-title":"Proc. ISCA 13th, Int. Conf. (CAINE-2000)","author":"Mazlack L. J.","year":"2000"},{"key":"S0219622019300064BIB041","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2007.05.005"},{"key":"S0219622019300064BIB042","doi-asserted-by":"publisher","DOI":"10.1007\/11596448_23"},{"key":"S0219622019300064BIB043","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.01.060"},{"key":"S0219622019300064BIB044","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.07.002"},{"key":"S0219622019300064BIB045","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.11.005"},{"key":"S0219622019300064BIB046","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2009.11.001"},{"key":"S0219622019300064BIB047","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2013.11.024"},{"key":"S0219622019300064BIB048","doi-asserted-by":"publisher","DOI":"10.1038\/nature08837"},{"key":"S0219622019300064BIB049","doi-asserted-by":"publisher","DOI":"10.1007\/BF02948829"},{"key":"S0219622019300064BIB050","doi-asserted-by":"publisher","DOI":"10.1002\/int.20108"},{"issue":"2","key":"S0219622019300064BIB051","first-page":"147","volume":"1","author":"Tsekouras G. E.","year":"2004","journal-title":"International Journal of Computational Intelligence"},{"key":"S0219622019300064BIB052","volume-title":"Proc. 1st Pacific Asia Knowledge Discovery and Data Mining Conference","author":"Huang Z.","year":"1997"},{"issue":"2","key":"S0219622019300064BIB053","first-page":"474","volume":"177","author":"Hsu C. C.","year":"2007","journal-title":"Information Sciences"},{"key":"S0219622019300064BIB054","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502549"},{"key":"S0219622019300064BIB055","doi-asserted-by":"publisher","DOI":"10.1145\/584792.584888"},{"key":"S0219622019300064BIB056","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2010.04.012"},{"key":"S0219622019300064BIB057","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2013.01.002"},{"key":"S0219622019300064BIB059","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-009-0241-z"},{"key":"S0219622019300064BIB060","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.01.071"},{"key":"S0219622019300064BIB061","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"S0219622019300064BIB062","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.07.015"},{"key":"S0219622019300064BIB063","volume-title":"Information Systems Security and Privacy (ICISSP), 2015 International Conference on","author":"Alishahi M. S.","year":"2015"},{"key":"S0219622019300064BIB064","doi-asserted-by":"publisher","DOI":"10.1016\/j.jdmm.2016.01.008"},{"key":"S0219622019300064BIB065","author":"Amin A.","journal-title":"Neurocomputing."},{"key":"S0219622019300064BIB066","doi-asserted-by":"publisher","DOI":"10.1007\/s10707-010-0116-1"},{"key":"S0219622019300064BIB067","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-012-0264-z"},{"key":"S0219622019300064BIB068","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2011.02.015"},{"issue":"3","key":"S0219622019300064BIB069","first-page":"460","volume":"21","author":"Bai T.","year":"2012","journal-title":"Chinese Journal of Electronics"},{"key":"S0219622019300064BIB070","first-page":"972","volume-title":"Proc. 11th Pacific-Asia Conf. Advances in Knowledge Discovery and Data Mining PAKDD\u201907","author":"Wu S."},{"key":"S0219622019300064BIB072","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2015.2475174"},{"key":"S0219622019300064BIB073","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2006.05.006"},{"key":"S0219622019300064BIB074","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.03.013"},{"key":"S0219622019300064BIB075","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-011-0221-2"},{"key":"S0219622019300064BIB076","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(65)90241-X"},{"key":"S0219622019300064BIB077","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2010.04.018"},{"key":"S0219622019300064BIB078","doi-asserted-by":"publisher","DOI":"10.1109\/Anti-Cybercrime.2015.7351952"},{"key":"S0219622019300064BIB079","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.11.069"},{"key":"S0219622019300064BIB080","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.01.120"},{"key":"S0219622019300064BIB081","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.09.010"},{"key":"S0219622019300064BIB082","doi-asserted-by":"publisher","DOI":"10.5120\/2261-2906"},{"key":"S0219622019300064BIB083","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.03.090"},{"key":"S0219622019300064BIB084","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2012.09.013"},{"key":"S0219622019300064BIB085","first-page":"323","volume-title":"CAAI Transactions on Intelligence Technology","volume":"1","author":"Qinghua Z.","year":"2016"},{"key":"S0219622019300064BIB086","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0255(99)00075-4"},{"key":"S0219622019300064BIB087","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-2760-4_2"},{"key":"S0219622019300064BIB088","author":"Amin A.","year":"2018","journal-title":"International Journal of Information Management"},{"key":"S0219622019300064BIB089","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10774-5_8"},{"key":"S0219622019300064BIB090","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.12.009"},{"key":"S0219622019300064BIB091","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16486-1_22"},{"key":"S0219622019300064BIB092","volume-title":"5th Int. Conf. Pattern Recognition and Machine Learning","author":"Ranga Suri N. N. R.","year":"2013"},{"issue":"1","key":"S0219622019300064BIB093","first-page":"13","volume":"44","author":"Qi D.","year":"2017","journal-title":"IAENG International Journal of Computer Science"},{"issue":"3","key":"S0219622019300064BIB095","volume":"12","author":"Chen D.","year":"2006","journal-title":"International Journal of Information Technology"},{"key":"S0219622019300064BIB096","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2009.12.003"},{"issue":"3","key":"S0219622019300064BIB097","first-page":"314","volume":"2","author":"Tripathy B. K.","year":"2011","journal-title":"Advances in Applied Science Research"},{"key":"S0219622019300064BIB098","author":"Li M.","year":"2014","journal-title":"Knowledge-Based Systems"},{"key":"S0219622019300064BIB099","doi-asserted-by":"publisher","DOI":"10.5815\/ijisa.2017.08.03"},{"key":"S0219622019300064BIB100","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2012.07.021"},{"key":"S0219622019300064BIB101","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063774"},{"key":"S0219622019300064BIB102","volume-title":"Data Mining (ICDM), 2010 IEEE 10th International Conf.","author":"Yanchi L.","year":"2010"},{"key":"S0219622019300064BIB103","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2012.11.009"},{"key":"S0219622019300064BIB104","volume-title":"International Workshop on Multiple Classifier Systems","author":"Krzysztof K.","year":"2010"},{"key":"S0219622019300064BIB105","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.02.137"}],"container-title":["International Journal of Information Technology &amp; Decision Making"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219622019300064","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,26]],"date-time":"2020-03-26T07:58:58Z","timestamp":1585209538000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0219622019300064"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1]]},"references-count":102,"journal-issue":{"issue":"01","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["10.1142\/S0219622019300064"],"URL":"https:\/\/doi.org\/10.1142\/s0219622019300064","relation":{},"ISSN":["0219-6220","1793-6845"],"issn-type":[{"value":"0219-6220","type":"print"},{"value":"1793-6845","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1]]}}}