相似文献/References:
[1]方杰 张结魁 周军.基于有向带权图的页面聚类算法研究[J].计算机技术与发展,2009,(09):49.
FANG Jie,ZHANG Jie-kui,ZHOU Jun.Study on Page Clustering Algorithms Based on Weighted Directed Graph[J].,2009,(10):49.
[2]李静 陈立潮 成洪静 聂跃光.基于Delaunay三角网的CBDT聚类算法研究[J].计算机技术与发展,2009,(01):21.
LI Jing,CHEN Li-chao,CHENG Hong-jing,et al.Study of Spatial Clustering Algorithm Based on Delaunay Triangulation[J].,2009,(10):21.
[3]金萍 王浩 宗瑜 李明楚.基于调整学习的聚类算法[J].计算机技术与发展,2009,(02):58.
JIN Ping,WANG Hao,ZONG Yu,et al.Clustering Algorithm Based on Fine- Tuned Learning[J].,2009,(10):58.
[4]吴庆棋 林江云.基于聚类优化GMM提高说话人识别性能的研究[J].计算机技术与发展,2009,(04):35.
WU Qing-qi,LIN Jiang-yun.A Study on GMM Optimization with Clustering for Improving Speaker Recognition[J].,2009,(10):35.
[5]耿筱媛 张燕平 闫屹.改进的K—means算法在电信客户细分中的应用[J].计算机技术与发展,2008,(05):163.
GENG Xiao-yuan,ZHANG Yan-ping,YAN Yi.Application of Improved K - means Algorithm Subdivision of Telecom Clients[J].,2008,(10):163.
[6]朱永红.覆盖聚类算法的应用研究[J].计算机技术与发展,2007,(01):123.
ZHU Yong-hong.Application Study on Covering Clustering Algorithm[J].,2007,(10):123.
[7]王鑫 王洪国 王珺 王金枝[].数据挖掘中聚类方法比较研究[J].计算机技术与发展,2006,(10):20.
WANG Xin,WANG Hong-guo,WANG Jun,et al.Comparison of Clustering Methods in Data Mining[J].,2006,(10):20.
[8]赵慧 刘希玉 崔海青.网格聚类算法[J].计算机技术与发展,2010,(09):83.
ZHAO Hui,LIU Xi-yu,CUI Hai-qing.Grid-Based Clustering Algorithm[J].,2010,(10):83.
[9]黄韬 刘胜辉 谭艳娜.基于k-means聚类算法的研究[J].计算机技术与发展,2011,(07):54.
HUANG Tao,LIU Sheng-hui,TAN Yan-na.Research of Clustering Algorithm Based on K-means[J].,2011,(10):54.
[10]周峰 李龙澍.结合蚁群聚类算法的模糊C均值聚类[J].计算机技术与发展,2012,(07):45.
ZHOU Feng,LI Long-shu.Fuzzy C Mean Clustering Combined Ant Colony Clustering Algorithm[J].,2012,(10):45.
[11]肖红,许少华. 改进的话题检测和跟踪算法研究[J].计算机技术与发展,2014,24(09):84.
XIAO Hong,XU Shao-hua. Improved Algorithm Study on Topic Detection and Tracking[J].,2014,24(10):84.
[12]刘华春,候向宁,杨忠. 基于改进K均值算法的入侵检测系统设计[J].计算机技术与发展,2016,26(01):101.
LIU Hua-chun,HOU Xiang-ning,YANG Zhong. Design of Intrusion Detection System Based on Improved K-means Algorithm[J].,2016,26(10):101.
[13]郭华娟[],曹晓梅][],朱杰[]. 基于信誉推荐的Ad Hoc网络虫洞防御方案[J].计算机技术与发展,2016,26(08):83.
GUO Hua-juan[],CAO Xiao-mei[][],ZHU Jie[]. A Wormhole Defense Method for Ad Hoc Network Based on Credibility Recommendation[J].,2016,26(10):83.
[14]董峰,张秋霞. 一种恶意节点攻击的无线传感器网络入侵检测方法[J].计算机技术与发展,2017,27(02):86.
DONG Feng,ZHANG Qiu-xia. An Intrusion Detection Method for Wireless Sensor Network of Malicious Node Attack[J].,2017,27(10):86.
[15]单剑锋,岳震林. 基于二次星座聚类提取信号特征参数的方法[J].计算机技术与发展,2017,27(06):91.
SHAN Jian-feng,YUE Zhen-lin. A Method of Extracting Feature Parameters of Signals Based onTwo Constellation Clustering[J].,2017,27(10):91.