Journal of Guangdong University of Technology ›› 2019, Vol. 36 ›› Issue (04): 24-30.doi: 10.12052/gdutxb.190052
Previous Articles Next Articles
He Qing-xiang, Zhang Wei
CLC Number:
[1] 李国辉. 全球恐怖袭击时空演变及风险分析研究[D].合肥:中国科学技术大学,2014 [2] 滕少华, 吴昊, 李日贵, 等. 可调多趟聚类挖掘在电信数据分析中的应用[J]. 广东工业大学学报, 2014, 31(3):1-7 TENG S H, WU H, LI R G, et al. The application of the adjustable multi-times clustering algorithm in telecom data[J]. Journal of Guangdong University of technology, 2014, 31(3):1-7 [3] ALTMAN I, HUNTER M M. The employment and income effects of cleaner coal:the case of future gen and rural Illinois[J]. Clean Technologies and Environmental Policy, 2015, 17(6):1475-1485 [4] BARALIS E, CAGLIERO L, CERQUITELLI T, et al. Digging deep into weighted patient data through multiple-level patterns[J]. Information Sciences, 2015, 322:51-71 [5] 吴绍忠. 基于聚类分析的反恐情报中潜在恐怖团伙发现技术[J]. 警察技术, 2016(6):18-21 WU S Z. Potential terrorist gang discovery technology in counter-terrorism intelligence based on cluster analysis[J]. Police Technology, 2016(6):18-21 [6] 张巍, 麦志深. 核模糊谱聚类LOF降噪方法研究[J]. 广东工业大学学报, 2018, 35(6):77-82 ZHANG W, MAI Z S. Research on LOF noise reduction method based on kernel fuzzy spectral clustering[J]. Journal of Guangdong University of Technology, 2018, 35(6):77-82 [7] LIBRARY W E. National consortium for the study of terrorism and responses to terrorism[C]//International Symposium on High-power Laser Ablation. Santa Fe, NM:International Society for Optics and Photonics, 2010. [8] PETER K, MICHAEL D I, JOHN P S. Countering terrorism and WMD:creating a global counter-terrorism network[M]. New York:Routledge, 2006. [9] CHEN H, REID E, SINAI J, et al. Terrorism informatics:knowledge management and data mining for homeland security[M]. West Berlin:Springer Publishing Company, 2008. [10] WANG X, MILLER E, SMARICK K, et al. Investigative visual analysis of global terrorism[J]. Computer Graphics Forum, 2008, 27(3):919-926 [11] JONES J, BUTKIEWICZ T, RIBARSKY W. Visualizing uncertainty for geographical information in the global terrorism database[J]. Proceedings of SPIE-The International Society for Optical Engineering, 2008, 15(9):1396 [12] 颜峻. 基于时空数据挖掘的社会安全(刑事)事件成因研究[D]. 北京清华大学, 2009. [13] 彭如香, 张奥博, 杨涛, 等. 基于GTD的全球恐怖主义活动现状与发展趋势研究[J]. 计算机应用与软件, 2019, 36(1):1-5 [14] 李勇男, 梅建明. ROCK聚类在反恐情报分析中的应用研究[J]. 情报杂志, 2017(10):26-29 LI Y N, MEI J M. Application of ROCK clustering in anti-terrorism intelligence analysis[J]. Journal of Information, 2017(10):26-29 [15] AYTEKIN C, NI X, CRICRI F, et al. Clustering and unsupervised anomaly detection with L2 normalized deep auto-encoder representations[J]. arXiv preprint arXiv:1802.00187, 2018. [16] CHANG C J, DAI W L. A grey silhouette coefficient for the small sample forecasting[C]//IEEE International Conference on Grey Systems & Intelligent Services. Macau:IEEE, 2014. [17] LUKASIK S, KOWALSKI P A, CHARYTANOWICZ M, et al. Clustering using flower pollination algorithm and calinski-harabasz index[C]//2016 IEEE Congress on Evolutionary Computation. Vancouver:IEEE, 2016. |
[1] | Fan Juan, Deng Xiu-qin, Liu Yu-lan. A Spectral Clustering Algorithm Based on Fréchet Distance [J]. Journal of Guangdong University of Technology, 2023, 40(02): 39-44. |
[2] | Mo Zan, Fan Meng-ting, Liu Hong-wei, Yan Yang-fan. Market Structure of Product Asymmetric Competition Based on Online User Behavior [J]. Journal of Guangdong University of Technology, 2023, 40(02): 111-119. |
[3] | Fan Meng-ting, Liu Hong-wei, Gao Hong-ming, He Rui-chao. A Research on Competitive Product Market Structure of E-commerce Platform [J]. Journal of Guangdong University of Technology, 2019, 36(06): 32-37. |
[4] | Zhang Wei, Mai Zhi-shen. A Research on Local Outlier Factor De-noising Method for Kernel Fuzzy Spectral Clustering [J]. Journal of Guangdong University of Technology, 2018, 35(06): 77-82. |
[5] | Wang Rong-rong, Fu Xiu-fen. An Improved mpts-HDBSCAN Algorithm [J]. Journal of Guangdong University of Technology, 2017, 34(03): 49-53. |
[6] | Chen Li, Cao Xi, Lin Jun-jie, Gao Hong-ming, Liu Fei-ya, Li Yan-yan. Prediction of Short-Term Load Based on Big Data Mining [J]. Journal of Guangdong University of Technology, 2017, 34(03): 105-109. |
[7] | Chen Ji-feng, Liu Guang-cong, Peng Cheng-ping. An Improved DV-Hop Localization Algorithm for Wireless Sensor Networks [J]. Journal of Guangdong University of Technology, 2017, 34(02): 80-85. |
[8] | SHEN Xiao-Min, LI Bao-Jun, SUN Xu, XU Wei-Chao. Large Scale Face Clustering Based on Convolutional Neural Network [J]. Journal of Guangdong University of Technology, 2016, 33(06): 77-84. |
[9] | TENG Shao-Hua, LIU Xiang. An E-CARGO Based Cluster Mechanism Research on WSN [J]. Journal of Guangdong University of Technology, 2015, 32(04): 92-98. |
[10] | WANG Bo, ZHONG Ying-Chun, CHEN Jun-Bin. Research on Speaker Recognition Based on Both AP and GMM [J]. Journal of Guangdong University of Technology, 2015, 32(04): 145-149. |
[11] | TENG Shao-Hua, WU Hao, LI Ri-Gui, ZHANG Wei, LIU Dong-Ning, LIANG Lu. The Application of the Adjustable Multitimes Clustering Algorithm in Telecom Data [J]. Journal of Guangdong University of Technology, 2014, 31(3): 1-7. |
[12] | JIANG Sheng-Yi, WANG Lian-Xi. Some Challenges in Clustering Analysis [J]. Journal of Guangdong University of Technology, 2014, 31(3): 32-38. |
[13] | Li Yun, Bao Hong. Research on Speech Recognition by Group Technology [J]. Journal of Guangdong University of Technology, 2014, 31(2): 54-57. |
[14] | YAO Lei. A Novel Parameter Optimization Algorithm for Mamdani Fuzzy Neural Networks Based on PSO [J]. Journal of Guangdong University of Technology, 2014, 31(1): 36-39. |
[15] | Liu Lin, Huang Ying, He Zhenhua. Segmentation of Medical Images Based on Extension Detecting Technology [J]. Journal of Guangdong University of Technology, 2013, 30(3): 18-22. |
|