{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:42:05Z","timestamp":1742913725411,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030624620"},{"type":"electronic","value":"9783030624637"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-62463-7_15","type":"book-chapter","created":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T09:06:23Z","timestamp":1604999183000},"page":"160-170","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Clustering Analysis Method of Ethnic Cultural Resources Based on Deep Neural Network Model"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0435-8854","authenticated-orcid":false,"given":"Mingjing","family":"Tang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3119-1172","authenticated-orcid":false,"given":"Chao","family":"Sun","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8004-7527","authenticated-orcid":false,"given":"Li","family":"Liang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,11]]},"reference":[{"issue":"05","key":"15_CR1","first-page":"177","volume":"2019","author":"W Xiao","year":"2019","unstructured":"Xiao, W., Lu, Y.: Digital protection analysis of national traditional culture based on big data. Inf. Commun. 2019(05), 177\u2013178 (2019)","journal-title":"Inf. Commun."},{"issue":"03","key":"15_CR2","first-page":"44","volume":"25","author":"XC Liu","year":"2016","unstructured":"Liu, X.C., Song, W.: Research on digital protection of national traditional culture under the condition of big data. J. Cent. Univ. Natl. (Nat. Sci. Ed.) 25(03), 44\u201349 (2016)","journal-title":"J. Cent. Univ. Natl. (Nat. Sci. Ed.)"},{"issue":"1","key":"15_CR3","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s10618-010-0200-z","volume":"23","author":"Q Zhu","year":"2011","unstructured":"Zhu, Q., Wang, X., Keogh, E., Lee, S.-H.: An efficient and effective similarity measure to enable data mining of petroglyphs. Data Min. Knowl. Disc. 23(1), 91\u2013127 (2011). https:\/\/doi.org\/10.1007\/s10618-010-0200-z","journal-title":"Data Min. Knowl. Disc."},{"issue":"08","key":"15_CR4","first-page":"176","volume":"1","author":"H Mei","year":"2017","unstructured":"Mei, H.: Research on the information service mode and document information resource construction of national libraries under the network environment. Commun. Res. 1(08), 176 (2017)","journal-title":"Commun. Res."},{"issue":"6","key":"15_CR5","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/s12599-012-0236-2","volume":"4","author":"T-F Kummer","year":"2012","unstructured":"Kummer, T.-F., Leimeister, J.M., Bick, M.: On the importance of national culture for the design of information systems. Bus. Inf. Syst. Eng. 4(6), 317\u2013330 (2012). https:\/\/doi.org\/10.1007\/s12599-012-0236-2","journal-title":"Bus. Inf. Syst. Eng."},{"issue":"04","key":"15_CR6","first-page":"419","volume":"2","author":"TN Manjunath","year":"2012","unstructured":"Manjunath, T.N., Ravindra, S.H., Umesh, I.M., Ravikumar, G.K.: Realistic analysis of data warehousing and data mining application in education domain. Int. J. Mach. Learn. Comput. 2(04), 419\u2013422 (2012)","journal-title":"Int. J. Mach. Learn. Comput."},{"issue":"06","key":"15_CR7","doi-asserted-by":"publisher","first-page":"496","DOI":"10.7763\/IJMLC.2014.V6.461","volume":"4","author":"Y Sun","year":"2014","unstructured":"Sun, Y.: A text mining approach to analyze public media science coverage and public interest in science. Int. J. Mach. Learn. Comput. 4(06), 496\u2013500 (2014)","journal-title":"Int. J. Mach. Learn. Comput."},{"issue":"1","key":"15_CR8","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1186\/s13638-017-0993-1","volume":"2017","author":"H Liang","year":"2017","unstructured":"Liang, H., Sun, X., Sun, Y., Gao, Y.: Text feature extraction based on deep learning: a review. EURASIP J. Wirel. Commun. Network. 2017(1), 211 (2017). https:\/\/doi.org\/10.1186\/s13638-017-0993-1","journal-title":"EURASIP J. Wirel. Commun. Network."},{"key":"15_CR9","unstructured":"Chen, X.: The feature extraction of the text based on the deep learning. In: Advanced Science and Industry Research Center. Proceedings of the 2014 International Conference on Network Security and Communication Engineering (NSCE 2014). Advanced Science and Industry Research Center: Science and Engineering Research Center, 2014, no. 5 (2014)"},{"issue":"08","key":"15_CR10","first-page":"891","volume":"14","author":"Y Wu","year":"2019","unstructured":"Wu, Y., Yuan, Y., Gong, Z.D.: A comparative study of Sino-US science and technology policies under the background of artificial intelligence\u2014\u2014based on text mining and visualization analysis. J. China Acad. Electron. Sci. 14(08), 891\u2013896 (2019)","journal-title":"J. China Acad. Electron. Sci."},{"issue":"07","key":"15_CR11","first-page":"722","volume":"38","author":"YK Wen","year":"2019","unstructured":"Wen, Y.K., Wen, H., Qiao, X.D.: Let knowledge generate wisdom\u2014\u2014study on text mining and question answering technology based on artificial intelligence. J. Inf. 38(07), 722\u2013730 (2019)","journal-title":"J. Inf."},{"issue":"3","key":"15_CR12","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/s10660-017-9268-5","volume":"18","author":"H Lee","year":"2017","unstructured":"Lee, H., Yoon, Y.: Engineering doc2vec for automatic classification of product descriptions on O2O applications. Electron. Commer. Res. 18(3), 433\u2013456 (2017). https:\/\/doi.org\/10.1007\/s10660-017-9268-5","journal-title":"Electron. Commer. Res."},{"issue":"01","key":"15_CR13","first-page":"43","volume":"15","author":"FL Xiong","year":"2015","unstructured":"Xiong, F.L., Deng, Y.H., Tang, X.W.: The core architecture of word2vec and its application. J. Nanjing Normal Univ. (Eng. Technol. Ed.) 15(01), 43\u201348 (2015)","journal-title":"J. Nanjing Normal Univ. (Eng. Technol. Ed.)"},{"issue":"03","key":"15_CR14","first-page":"219","volume":"2","author":"M Rajhans","year":"2012","unstructured":"Rajhans, M., Pradeep, K.: Clustering web logs using similarity upper approximation with different similarity measures. Int. J. Mach. Learn. Comput. 2(03), 219\u2013221 (2012)","journal-title":"Int. J. Mach. Learn. Comput."},{"key":"15_CR15","unstructured":"Wang, C.C.: A model of chinese sentiment analysis with more general applicability. In: Information Engineering Research Institute (USA), Asia Pacific Human-Computer Interaction Research Center (Hong Kong). Proceedings of 2018 4th ICMSMA International Conference on Advances in Intelligent Information Technologies (ICAIIT 2018). Information Engineering Research Institute (USA), Asia Pacific Human-Computer Interaction Research Center (Hong Kong): Intelligent Information Technology Application Society (2018)"},{"key":"15_CR16","unstructured":"Le, Q.V., Mikolov, T.: Distributed representations of sentences and documents (2014)"},{"issue":"01","key":"15_CR17","doi-asserted-by":"publisher","first-page":"99","DOI":"10.7763\/IJMLC.2014.V4.394","volume":"4","author":"NE Mohamed","year":"2014","unstructured":"Mohamed, N.E., Monzer, M.Q.: Analysis of some algorithms for clustering data objects. Int. J. Mach. Learn. Comput. 4(01), 99\u2013105 (2014)","journal-title":"Int. J. Mach. Learn. Comput."},{"issue":"01","key":"15_CR18","doi-asserted-by":"publisher","first-page":"48","DOI":"10.3724\/SP.J.1001.2008.00048","volume":"2008","author":"JG Sun","year":"2008","unstructured":"Sun, J.G., Liu, J., Zhao, L.Y.: Research on clustering algorithms. J. Softw. 2008(01), 48\u201361 (2008)","journal-title":"J. Softw."},{"issue":"04","key":"15_CR19","first-page":"150","volume":"2017","author":"P Liu","year":"2017","unstructured":"Liu, P., Teng, J.Y., Ding, E.J., et al.: Spark-based large-scale text k-means parallel clustering algorithm. Chin. J. Inf. Sci. 2017(04), 150\u2013158 (2017)","journal-title":"Chin. J. Inf. Sci."},{"issue":"06","key":"15_CR20","doi-asserted-by":"publisher","first-page":"749","DOI":"10.18178\/ijmlc.2019.9.6.868","volume":"9","author":"WR Yogi","year":"2019","unstructured":"Yogi, W.R., Devi, F.: The comparative study on clustering method using hospital facility data in Jakarta District and surrounding areas. Int. J. Mach. Learn. Comput. 9(06), 749\u2013755 (2019)","journal-title":"Int. J. Mach. Learn. Comput."},{"issue":"7","key":"15_CR21","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1109\/TPAMI.2002.1017616","volume":"24","author":"T Kanungo","year":"2002","unstructured":"Kanungo, T., Mount, D.M., Netanyahu, N.S., et al.: An efficient k-means clustering algorithm: analysis and implementation. IEEE Trans. Pattern Anal. Mach. Intell. 24(7), 881\u2013892 (2002)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"15_CR22","unstructured":"Ryan, M.: Python Network Data Collection. People\u2019s Posts and Telecommunications Press, Beijing (2016). 2016.3"},{"issue":"05","key":"15_CR23","doi-asserted-by":"publisher","first-page":"569","DOI":"10.18178\/ijmlc.2019.9.5.841","volume":"9","author":"K Sarunya","year":"2019","unstructured":"Sarunya, K.: A novel outlier detection applied to an adaptive k-means. Int. J. Mach. Learn. Comput. 9(05), 569\u2013574 (2019)","journal-title":"Int. J. Mach. Learn. Comput."},{"issue":"02","key":"15_CR24","doi-asserted-by":"publisher","first-page":"143","DOI":"10.18178\/ijmlc.2019.9.2.778","volume":"9","author":"B Supaporn","year":"2019","unstructured":"Supaporn, B., Thuttaphol, I., Nittaya, K., Kittisak, K.: Text-independent speaker identification using deep learning model of convolution neural network. Int. J. Mach. Learn. Comput. 9(02), 143\u2013148 (2019)","journal-title":"Int. J. Mach. Learn. Comput."}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-62463-7_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T08:03:40Z","timestamp":1607933020000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-62463-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030624620","9783030624637"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-62463-7_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"11 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ML4CS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ml4cs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ml4cs2020\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"360","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"118","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}