Computer Science ›› 2025, Vol. 52 ›› Issue (8): 162-170.doi: 10.11896/jsjkx.240700017
• Database & Big Data 5 Data Science • Previous Articles Next Articles
JIANG Rui, FAN Shuwen, WANG Xiaoming, XU Youyun
CLC Number:
[1]SCHANK R C.What is AI,anyway? [J].AI Magazine,1987,8(4):59. [2]MCCARTHY J.Generality in artificial intelligence [J].Communications of the ACM,1987,30(12):1030-1035. [3]SAMUEL A L.Some studies in machine learning using the game of checkers [J].IBM Journal of Research and Development,1959,3(3):210-229. [4]SAMUEL A L.Machine learning [J].The Technology Review,1959,62(1):42-45. [5]BAŞTANLAR Y,ÖZUYSAL M.Introduction to machine lear-ning [J].miRNomics:MicroRNA Biology and Computational Analysis,2014:105-128. [6]EL NAQA I,MURPHY M J.What is machine learning? [M].Springer International Publishing,2015. [7]ZHOU Z H.Machine Learning[M].Beijing:Tsinghua University Press,2016. [8]NASTESKI V.An overview of the supervised machine learning methods [J].Horizons.B,2017,4:51-62. [9]DAYAN P,SAHANI M,DEBACK G.Unsupervised learning[J].The MIT Encyclopedia of the Cognitive Sciences,1999:857-859. [10]BZDOK D,KRZYWINSKI M,ALTMAN N.Machine learning:supervised methods [J].Nature Methods,2018,15(1):5-6. [11]LAAKSONEN J,OJA E.Classification with learning k-nearest neighbors [C]//Proceedings of International Conference on Neural Networks.IEEE,1996:1480-1483. [12]LIU C X,SHI D M,SONG W J.Research thread and latest progress of the methods of dimensionality reduction in high-dimensional data[J].Journal of Statistics,2023,4(3):11-21. [13]WOLD S,ESBENSEN K,GELADI P.Principal component ana-lysis [J].Chemometrics and Intelligent Laboratory Systems,1987,2(1/2/3):37-52. [14]BAI Y X.The application of k-means in feature selection[J].Electronic Technology & Software Engineering,2018,123(1):186-187. [15]ESTER M,KRIEGEL H P,SANDER J,et al.A density-based algorithm for discovering clusters in large spatial databases with noise [J].KDD,1996,96(34):226-231. [16]KOHONEN T.The self-organizing map [J].Proceedings of the IEEE,1990,78(9):1464-1480. [17]KOHONEN T.Things you haven't heard about the self-organizing map [C]//IEEE International Conference on Neural Networks.IEEE,1993:1147-1156. [18]KOHONEN T.Exploration of very large databases by self-organizing maps [C]//Proceedings of International Conference on Neural Networks.IEEE,1997,1:1-6. [19]KOHONEN T.Essentials of the self-organizing map [J].Neural Networks,2013,37:52-65. [20]ZHOU G,YANG F,XIAO J.Study on pixel entanglement theoryfor imagery classification [J].IEEE Transactions on Geoscience and Remote Sensing,2022,60:1-18. [21]LI S,LIU F,JIAO L,et al.Self-supervised self-organizing clustering network:a novel unsupervised representation learning method [J].IEEE Transactions on Neural Networks and Lear-ning Systems,2022,35:1857-1871. [22]YAN J,ZHANG C,LI Y.A clustering method for power time series curves based on improved self-organizing map algorithm [C]//2023 IEEE 3rd International Conference on Electronic Technology,Communication and Information(ICETCI).IEEE,2023:451-455. [23]XIE D,FAN L,FU C,et al.Nonintrusive load monitoring algorithm using SOM-AdaDBSCAN [C]//2023 6th International Conference on Energy,Electrical and Power Engineering(CEEPE).IEEE,2023:905-910. [24]KHAN S,MAILEWA A B.Discover botnets in IoT sensor networks:A lightweight deep learning framework with hybrid self-organizing maps [J].Microprocessors and Microsystems,2023,97:104753. [25]BENDJAMA H,BOUHOUCHE S,AOUABDI S,et al.Monitoring of casting quality using principal component analysis and self-organizing map[J].The International Journal of Advanced Manufacturing Technology,2022,120(5):3599-3607. [26]FORT J C,PAGÉS G.About the Kohonen algorithm:strong or weak self-organization? [J].Neural Networks,1996,9(5):773-785. [27]ANDERSON E.The irises of the gaspe peninsula [J].Bulletin of American Iris Society,1935,59:2-5. [28]AEBERHARD S,COOMANS D,VEL O D.Comparative analysis of statistical pattern recognition methods in high dimensional settings [J].Pattern Recognition,1994,27(8):1065-1077. |
[1] | WANG Pei, YANG Xihong, GUAN Renxiang, ZHU En. Deep Graph Contrastive Clustering Algorithm Based on Dynamic Threshold Pseudo-label Selection [J]. Computer Science, 2025, 52(8): 100-108. |
[2] | ZHANG Shiju, GUO Chaoyang, WU Chengliang, WU Lingjun, YANG Fengyu. Text Clustering Approach Based on Key Semantic Driven and Contrastive Learning [J]. Computer Science, 2025, 52(8): 171-179. |
[3] | DING Zhengze, NIE Rencan, LI Jintao, SU Huaping, XU Hang. MTFuse:An Infrared and Visible Image Fusion Network Based on Mamba and Transformer [J]. Computer Science, 2025, 52(8): 188-194. |
[4] | WANG Jinfu, WANG Siwei, LIANG Weixuan, YU Shengju, ZHU En. Multi-view Clustering Based on Bipartite Graph Cross-view Graph Diffusion [J]. Computer Science, 2025, 52(7): 69-74. |
[5] | YANG Jixiang, JIANG Huiping, WANG Sen, MA Xuan. Research Progress and Challenges in Forest Fire Risk Prediction [J]. Computer Science, 2025, 52(6A): 240400177-8. |
[6] | WANG Baohui, XU Boren, LI Chang’ao, YE Zihao. Study on Algorithm for Keyword Extraction from WeChat Conversation Text [J]. Computer Science, 2025, 52(6A): 240700105-8. |
[7] | DU Yuanhua, CHEN Pan, ZHOU Nan, SHI Kaibo, CHEN Eryang, ZHANG Yuanpeng. Correntropy Based Multi-view Low-rank Matrix Factorization and Constraint Graph Learning for Multi-view Data Clustering [J]. Computer Science, 2025, 52(6A): 240900131-10. |
[8] | LI Hengyi, YANG Guo, WEI Bo, CHEN Hongjun. Research on the Method of C-RAN Networking Planning Based on Clustering Model [J]. Computer Science, 2025, 52(6A): 241000015-4. |
[9] | WU Xingli, ZHANG Haoyue, LIAO Huchang. Review of Doctor Recommendation Methods and Applications for Consultation Platforms [J]. Computer Science, 2025, 52(5): 109-121. |
[10] | SUN Jinyong, WANG Xuechun, CAI Guoyong, SHANG Zhiliang. Open Set Recognition Based on Meta Class Incremental Learning [J]. Computer Science, 2025, 52(5): 187-198. |
[11] | AN Rui, LU Jin, YANG Jingjing. Deep Clustering Method Based on Dual-branch Wavelet Convolutional Autoencoder and DataAugmentation [J]. Computer Science, 2025, 52(4): 129-137. |
[12] | WU Jie, WAN Yuan, LIU Qiujie. Consistent Block Diagonal and Exclusive Multi-view Subspace Clustering [J]. Computer Science, 2025, 52(4): 138-146. |
[13] | JIAO Jian, CHEN Ruixiang, HE Qiang, QU Kaiyang, ZHANG Ziyi. Study on Smart Contract Vulnerability Repair Based on T5 Model [J]. Computer Science, 2025, 52(4): 362-368. |
[14] | HAN Lin, WANG Yifan, LI Jianan, GAO Wei. Automatic Scheduling Search Optimization Method Based on TVM [J]. Computer Science, 2025, 52(3): 268-276. |
[15] | XIONG Qibing, MIAO Qiguang, YANG Tian, YUAN Benzheng, FEI Yangyang. Malicious Code Detection Method Based on Hybrid Quantum Convolutional Neural Network [J]. Computer Science, 2025, 52(3): 385-390. |
|