{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:00:04Z","timestamp":1760709604118},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,5,3]],"date-time":"2018-05-03T00:00:00Z","timestamp":1525305600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pattern Anal Applic"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s10044-018-0709-0","type":"journal-article","created":{"date-parts":[[2018,5,3]],"date-time":"2018-05-03T00:44:43Z","timestamp":1525308283000},"page":"1015-1027","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["BorderShift: toward optimal MeanShift vector for cluster boundary detection in high-dimensional data"],"prefix":"10.1007","volume":"22","author":[{"given":"Xiaofeng","family":"Cao","sequence":"first","affiliation":[]},{"given":"Baozhi","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Guandong","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,3]]},"reference":[{"issue":"6","key":"709_CR1","doi-asserted-by":"publisher","first-page":"1092","DOI":"10.1109\/TPAMI.2013.251","volume":"36","author":"A Faktor","year":"2014","unstructured":"Faktor A, Irani M (2014) Clustering by compositionunsupervised discovery of image categories. IEEE Trans Pattern Anal Mach Intell 36(6):1092\u20131106","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"8","key":"709_CR2","doi-asserted-by":"publisher","first-page":"1187","DOI":"10.1109\/TIP.2005.849770","volume":"14","author":"YX Chen","year":"2005","unstructured":"Chen YX, Wang JZ, Krovetz R (2005) CLUE: cluster-based retrieval of images by unsupervised learning. IEEE Trans Image Process 14(8):1187\u20131201","journal-title":"IEEE Trans Image Process"},{"issue":"2","key":"709_CR3","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1109\/TFUZZ.2004.840134","volume":"13","author":"Y Horng","year":"2005","unstructured":"Horng Y, Chen SM, Chang YC, Lee CH (2005) A new method for fuzzy information retrieval based on fuzzy hierarchical clusteringand fuzzy inference techniques. IEEE Trans Fuzzy Syst 13(2):216\u2013228","journal-title":"IEEE Trans Fuzzy Syst"},{"issue":"1","key":"709_CR4","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1016\/j.patcog.2009.06.003","volume":"43","author":"Q Li","year":"2010","unstructured":"Li Q, Chen YP (2010) Personalized text snippet extraction using statistical language models. Pattern Recogn 43(1):378\u2013386","journal-title":"Pattern Recogn"},{"issue":"9","key":"709_CR5","doi-asserted-by":"publisher","first-page":"1761","DOI":"10.1109\/TPAMI.2014.2303095","volume":"36","author":"S Kim","year":"2014","unstructured":"Kim S, Yoo CD, Nowozin S, Kohli P (2014) Image segmentation using higher-order correlation clustering. IEEE Trans Pattern Anal Mach Intell 36(9):1761\u20131774","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"8","key":"709_CR6","doi-asserted-by":"publisher","first-page":"2229","DOI":"10.1109\/TSP.2003.814460","volume":"51","author":"N Hohn","year":"2003","unstructured":"Hohn N, Veitch D, Abry P (2003) Cluster processes: a natural language for network traffic. IEEE Trans Signal Process 51(8):2229\u20132244","journal-title":"IEEE Trans Signal Process"},{"key":"709_CR7","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1007\/978-3-540-71701-0_83","volume-title":"Advances in knowledge discovery and data mining","author":"BZ Qiu","year":"2007","unstructured":"Qiu BZ, Yue F, Shen JY (2007) BRIM: an efficient boundary points detecting algorithm. In: Zhou ZH, Li H, Yang Q (eds) Advances in knowledge discovery and data mining. Springer, Berlin, pp 761\u2013768"},{"issue":"5","key":"709_CR8","first-page":"799","volume":"22","author":"LX Xue","year":"2009","unstructured":"Xue LX, Qiu BZ (2009) Boundary points detection algorithm based on coefficient of variation. Pattern Recog Artif Intell 22(5):799\u2013802","journal-title":"Pattern Recog Artif Intell"},{"key":"709_CR9","first-page":"117","volume":"33","author":"BZ Qiu","year":"2012","unstructured":"Qiu BZ, Yang Y, Du XW (2012) BRINK: an algorithmof boundary points of clusters detection based on local qualitative factors. J Zhengzhou Univ (Eng Sci) 33:117\u2013120","journal-title":"J Zhengzhou Univ (Eng Sci)"},{"key":"709_CR10","first-page":"71","volume":"1","author":"BZ Qiu","year":"2011","unstructured":"Qiu BZ, Cao HL (2011) An efficient boundary points detecting algorithm based on joint entropy. Control Dec 1:71\u201374","journal-title":"Control Dec"},{"issue":"1","key":"709_CR11","first-page":"171","volume":"30","author":"LX Li","year":"2015","unstructured":"Li LX, Geng P, Qiu BZ (2015) clusteringboundary detection technology for mixed attribute data set. Kongzhi yu Juece\/Control Dec 30(1):171\u2013175","journal-title":"Kongzhi yu Juece\/Control Dec"},{"issue":"5500","key":"709_CR12","doi-asserted-by":"publisher","first-page":"2323","DOI":"10.1126\/science.290.5500.2323","volume":"290","author":"ST Roweis","year":"2000","unstructured":"Roweis ST, Saul LK (2000) Nonlnear dimensionality reduction by locally linear embedding. Science 290(5500):2323\u20132326","journal-title":"Science"},{"key":"709_CR13","volume-title":"Advances in neural information processing systems","author":"X He","year":"2003","unstructured":"He X, Niyogi P (2003) Locality preserving projections. In: Thrun S, Saul L, Schlkopf B (eds) Advances in neural information processing systems. MIT Press, Cambridge"},{"key":"709_CR14","first-page":"226","volume":"96","author":"M Ester","year":"1996","unstructured":"Ester M, Kriegel HP, Sander J et al (1996) A density-based algorithm for discovering clusters in large spatial databases with noise. KDD 96:226\u2013231","journal-title":"KDD"},{"key":"709_CR15","first-page":"289","volume":"3","author":"C Xia","year":"2006","unstructured":"Xia C, Hsu W, Lee ML et al (2006) BORDER: an efficient computation of boundary points. IEEE Trans Knowl Data Eng 3:289\u2013303","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"5","key":"709_CR16","doi-asserted-by":"publisher","first-page":"988","DOI":"10.1109\/72.788640","volume":"10","author":"VN Vapnik","year":"1995","unstructured":"Vapnik VN (1995) An overview of statistical learning theory. IEEE Trans Neural Netw 10(5):988\u2013999","journal-title":"IEEE Trans Neural Netw"},{"issue":"4","key":"709_CR17","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/5254.708428","volume":"13","author":"MA Hearst","year":"1998","unstructured":"Hearst MA, Dumais ST, Osman E, Platt J, Scholkopf B (1998) Support vector machines. IEEE Intell Syst 13(4):18\u201328","journal-title":"IEEE Intell Syst"},{"key":"709_CR18","first-page":"10651076","volume":"32","author":"E Parzen","year":"1962","unstructured":"Parzen E (1962) On the estimation of a probability density function and the mode. Ann Math Stat 32:10651076","journal-title":"Ann Math Stat"},{"key":"709_CR19","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/TIT.1975.1055330","volume":"21","author":"K Fukunaga","year":"1975","unstructured":"Fukunaga K, Hostetler LD (1975) The estimation of the gradient of a density function. IEEE Trans Inf Theory 21:32\u201340","journal-title":"IEEE Trans Inf Theory"},{"issue":"8","key":"709_CR20","doi-asserted-by":"publisher","first-page":"790","DOI":"10.1109\/34.400568","volume":"17","author":"YZ Cheng","year":"1995","unstructured":"Cheng YZ (1995) MeanShift, mode seeking, and clustering. IEEE Trans Pattern Anal Mach Intell 17(8):790\u2013799","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"709_CR21","unstructured":"Comaniciu D, Meer P (1999) MeanShift analysis and application. In: Proceedings of the international conference on computer vision, pp 1197\u20131204"},{"key":"709_CR22","first-page":"1","volume-title":"Engineering asset management\u2014systems, professional practices and certification lecture notes in mechanical engineering","author":"XG Chen","year":"2015","unstructured":"Chen XG, Xu GH, Liu F, Wan X, Zhang Q (2015) An adaptive alarm method for tool condition monitoring based on probability density functions estimated with the Parzen window. In: Tse P, Mathew J, Wong K, Lam R, Ko C (eds) Engineering asset management\u2014systems, professional practices and certification lecture notes in mechanical engineering. Springer, Cham, pp 1\u20138"},{"key":"709_CR23","doi-asserted-by":"publisher","first-page":"30703081","DOI":"10.1016\/j.patcog.2014.03.018","volume":"47","author":"V Vikjord","year":"2014","unstructured":"Vikjord V, Jenssen R (2014) Information theoretic clustering using a k-nearest neighbors approach. Pattern Recogn 47:30703081","journal-title":"Pattern Recogn"},{"key":"709_CR24","unstructured":"Biomed data set. http:\/\/lib.stat.cmu.edu\/datasets\/"},{"key":"709_CR25","unstructured":"Cancer data set. http:\/\/archive.ics.uci.edu\/ml\/ datasets.html"},{"key":"709_CR26","unstructured":"Colon data set. http:\/\/genomics-pubs.princeton.edu\/ oncology\/affydata\/"},{"key":"709_CR27","unstructured":"Prostate data set. http:\/\/www.gems-system.org\/"},{"key":"709_CR28","first-page":"58","volume-title":"Geo-informatics in resource management and sustainable ecosystem. Communications in Computer and Information Science","author":"Q Zhu","year":"2013","unstructured":"Zhu Q, Xin H (2013) Feature extraction and filter in handwritten numeral recognition. In: Bian F, Xie Y, Cui X, Zeng Y (eds) Geo-informatics in resource management and sustainable ecosystem. Communications in Computer and Information Science, vol 398. Springer, Berlin, pp 58\u201367"},{"key":"709_CR29","first-page":"435","volume-title":"Artificial neural networks. Springer series in bio-\/neuroinformatics","author":"M Juan","year":"2015","unstructured":"Juan M, Weber A, Sesmero MP (2015) Input transformation and output combination for improved handwritten digit recognition. In: Koprinkova-Hristova P, Mladenov V, Kasabov N (eds) Artificial neural networks. Springer series in bio-\/neuroinformatics, vol 4. Springer, Cham, pp 435\u2013443"},{"key":"709_CR30","first-page":"177","volume-title":"Multimedia and ubiquitous engineering. Lecture notes in electrical engineering","author":"YM Wang","year":"2013","unstructured":"Wang YM, Peyls A, Pan Y, Claesen L, Yan XL (2013) A fast self-organizing map algorithm for handwritten digit recognition. In: Park J, Ng JY, Jeong HY, Waluyo B (eds) Multimedia and ubiquitous engineering. Lecture notes in electrical engineering, vol 240. Springer, Dordrech, pp 177\u2013183"},{"key":"709_CR31","unstructured":"Mnist data set. http:\/\/yann.lecun.com\/exdb\/mnist\/"},{"issue":"7\u20138","key":"709_CR32","doi-asserted-by":"publisher","first-page":"2091","DOI":"10.1007\/s00521-014-1749-z","volume":"25","author":"SC Huang","year":"2014","unstructured":"Huang SC, Chen J, Luo Z (2014) Retraction note to: sparse tensor CCA for color face recognition. Neural Comput Appl 25(7\u20138):2091","journal-title":"Neural Comput Appl"},{"key":"709_CR33","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/978-3-319-11218-3_4","volume-title":"Advances in intelligent informatics. Advances in intelligent systems and computing","author":"B Bhaskar","year":"2015","unstructured":"Bhaskar B, Mahantesh K, Geetha GP (2015) An investigation of fSVD and Ridgelet transform for illumination and expression invariant face recognition. In: El-Alfy ES, Thampi S, Takagi H, Piramuthu S, Hanne T (eds) Advances in intelligent informatics. Advances in intelligent systems and computing, vol 320. Springer, Cham, pp 31\u201338"},{"key":"709_CR34","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-642-34300-1_19","volume-title":"Advanced methods for computational collective intelligence Studies in computational intelligence","author":"KD Dang","year":"2013","unstructured":"Dang KD, Le TH (2013) Local region partitioning for disguised face recognition using non-negative sparse coding. In: Nguyen N, Trawi\u0144ski B, Katarzyniak R, Jo GS (eds) Advanced methods for computational collective intelligence Studies in computational intelligence, vol 457. Springer, Berlin, pp 197\u2013206"},{"key":"709_CR35","first-page":"182","volume-title":"Biometric recognition. Lecture notes in computer science","author":"HJ Zang","year":"2014","unstructured":"Zang HJ, Zhan S, Zhang MJ, Zhao JJ, Liang ZC (2014) 3D face recognition by collaborative representation based on face feature. In: Sun Z, Shan S, Sang H, Zhou J, Wang Y, Yuan W (eds) Biometric recognition. Lecture notes in computer science, vol 8833. Springer, Cham, pp 182\u2013190"},{"key":"709_CR36","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/978-3-642-31528-2_51","volume-title":"Advances in mechanical and electronic engineering. Lecture notes in electrical engineering","author":"WY Ge","year":"2013","unstructured":"Ge WY, Li PW (2013) A fuzzy expectation-maximization algorithm of electronic remote-sensing image. In: Jin D, Lin S (eds) Advances in mechanical and electronic engineering. Lecture notes in electrical engineering, vol 178. Springer, Berlin, pp 323\u2013329"},{"key":"709_CR37","unstructured":"PRL data set. http:\/\/www.cl.cam.ac.uk\/research\/dtg\/ attarchive\/facedatabase.html"},{"key":"709_CR38","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-0-387-09565-3_3","volume-title":"Saving biological diversity","author":"KP Sheldon","year":"2008","unstructured":"Sheldon KP (2008) Navigating for Noah: setting new directions for endangered species protection in the 21st century. In: Askins RA, Dreyer GD, Visgilio GR, Whitelaw DM (eds) Saving biological diversity. Springer, Boston, pp 21\u201333"},{"key":"709_CR39","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1007\/978-3-319-19551-3_38","volume-title":"Artificial intelligence in medicine. Lecture notes in computer science","author":"C Colombo","year":"2015","unstructured":"Colombo C, Leopold JH, Bellazzi R, Abu-Hanna A (2015) Comparison of probabilistic versus non-probabilistic electronic nose classification methods in an animal model. In: Holmes J, Bellazzi R, Sacchi L, Peek N (eds) Artificial intelligence in medicine. Lecture notes in computer science, vol 9105. Springer, Cham, pp 298\u2013303"}],"container-title":["Pattern Analysis and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-018-0709-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10044-018-0709-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-018-0709-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,17]],"date-time":"2019-10-17T06:14:25Z","timestamp":1571292865000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10044-018-0709-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,3]]},"references-count":39,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["709"],"URL":"https:\/\/doi.org\/10.1007\/s10044-018-0709-0","relation":{},"ISSN":["1433-7541","1433-755X"],"issn-type":[{"value":"1433-7541","type":"print"},{"value":"1433-755X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,3]]},"assertion":[{"value":"11 March 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 April 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 May 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}