{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T08:22:52Z","timestamp":1760170972411,"version":"3.41.0"},"reference-count":29,"publisher":"SAGE Publications","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IDA"],"published-print":{"date-parts":[[2016,1,18]]},"DOI":"10.3233\/ida-150792","type":"journal-article","created":{"date-parts":[[2016,1,19]],"date-time":"2016-01-19T17:17:46Z","timestamp":1453223866000},"page":"29-45","source":"Crossref","is-referenced-by-count":12,"title":["A cluster boundary detection algorithm based on shadowed set"],"prefix":"10.1177","volume":"20","author":[{"given":"Xiangli","family":"Li","sequence":"first","affiliation":[]},{"given":"Peng","family":"Geng","sequence":"additional","affiliation":[]},{"given":"Baozhi","family":"Qiu","sequence":"additional","affiliation":[]}],"member":"179","reference":[{"key":"10.3233\/IDA-150792_ref1","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1145\/331499.331504","article-title":"Data clustering: A review","volume":"3","author":"Jain","year":"1999","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"10.3233\/IDA-150792_ref2","doi-asserted-by":"crossref","unstructured":"Chuanjun M., Sifeng L. et al., Study on commerical bank off-site regulation based on GSOM clustering method, Management Science and Engineering, International Conference on IEEE, (2006), 1580-1583.","DOI":"10.1109\/ICMSE.2006.314039"},{"key":"10.3233\/IDA-150792_ref3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.14257\/ijdta.2013.6.6.01","article-title":"Implementation of the fuzzy c-means clustering algorithm in meteorological data","volume":"6","author":"Yinghua","year":"2013","journal-title":"International Journal of Database Theory and Application"},{"key":"10.3233\/IDA-150792_ref4","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1016\/j.cor.2011.04.017","article-title":"Capacitated clustering problem in computational biology: Combinatorial and statistical approach for sibling reconstruction","volume":"3","author":"Chou","year":"2012","journal-title":"Computers & Operations Research"},{"key":"10.3233\/IDA-150792_ref5","first-page":"74","article-title":"Hamiltonian-based clustering: Algorithm for static and dynamic clustering in data mining and image processing","volume":"4","author":"Casagrande","year":"2012","journal-title":"Control System, IEEE"},{"key":"10.3233\/IDA-150792_ref6","doi-asserted-by":"crossref","first-page":"342","DOI":"10.3923\/jeasci.2012.342.347","article-title":"Study of ontology or thesaurus based document clustering and information retrieval","volume":"4","author":"Bharathi","year":"2012","journal-title":"Journal of Engineering and Applied Sciences"},{"key":"10.3233\/IDA-150792_ref7","first-page":"289","article-title":"BORDER: An efficient computation of boundary points","volume":"3","author":"Xia","year":"2006","journal-title":"Knowledge and Data Engineering, IEEE Transactions"},{"key":"10.3233\/IDA-150792_ref8","unstructured":"M.Ester, Kriegel H.P., Sander J. et al., A density-based algorithm for discovering clusters in large spatial databases with noise, KDD, (1996), 226-231."},{"key":"10.3233\/IDA-150792_ref9","doi-asserted-by":"crossref","first-page":"2757","DOI":"10.1016\/j.patcog.2008.01.021","article-title":"Automatic clustering and boundary detection algorithm based on adaptive influence function","volume":"9","author":"Nosovskiy","year":"2008","journal-title":"Pattern Recognition"},{"key":"10.3233\/IDA-150792_ref10","doi-asserted-by":"crossref","unstructured":"Qiu B.Z., Yue F. and Shen J.Y., BRIM: An efficient boundary points detecting algorithm, Advances in Knowledge Discovery and Data Mining, (2007), 761-768.","DOI":"10.1007\/978-3-540-71701-0_83"},{"key":"10.3233\/IDA-150792_ref11","first-page":"799","article-title":"Boundary points detection algorithm based on coefficient of variation","volume":"5","author":"Xie","year":"2009","journal-title":"Pattern Recognition and Artificial Intelligence"},{"key":"10.3233\/IDA-150792_ref12","first-page":"117","article-title":"BRINK: An algorithm of boundary points of clusters detection based on local qualitative factors","volume":"3","author":"Qiu","year":"2012","journal-title":"Journal of Zhengzhou University (Engineering Science)"},{"key":"10.3233\/IDA-150792_ref13","first-page":"71","article-title":"An efficient boundary points detecting algorithm based on joint entropy","volume":"1","author":"Qiu","year":"2011","journal-title":"Control and Decision"},{"key":"10.3233\/IDA-150792_ref14","first-page":"1654","article-title":"Cluster boundary detection technology for categorical data","volume":"6","author":"Qiu","year":"2012","journal-title":"Journal of Computer Applications"},{"key":"10.3233\/IDA-150792_ref15","doi-asserted-by":"crossref","first-page":"1738","DOI":"10.1016\/j.patcog.2011.01.014","article-title":"Shadowed sets in the characterization of rough-fuzzy clustering","volume":"8","author":"Zhou","year":"2011","journal-title":"Pattern Recognition"},{"key":"10.3233\/IDA-150792_ref17","doi-asserted-by":"crossref","first-page":"1282","DOI":"10.1016\/j.patcog.2009.09.029","article-title":"Shadowed c-means: Integrating fuzzy and rough clustering","volume":"4","author":"Mitra","year":"2010","journal-title":"Pattern Recognition"},{"key":"10.3233\/IDA-150792_ref18","doi-asserted-by":"crossref","first-page":"780","DOI":"10.1109\/TAC.1969.1099336","article-title":"Slowly varying system x = A(t)x","volume":"6","author":"Desoer","year":"1969","journal-title":"IEEE Trans on Automatic Control"},{"key":"10.3233\/IDA-150792_ref19","doi-asserted-by":"crossref","unstructured":"Ankerst M., Breunig M.M., Kriegel H.P. et al., Optics: Ordering points to identify the clustering structure, ACM SIGMOD Record, (1999), 49-60.","DOI":"10.1145\/304181.304187"},{"key":"10.3233\/IDA-150792_ref20","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1145\/565117.565124","article-title":"Cluster validity methods: Part 1","volume":"2","author":"Halkidi","year":"2002","journal-title":"ACM SIGMOD Record"},{"key":"10.3233\/IDA-150792_ref21","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1145\/601858.601862","article-title":"Clustering validity checking methods: Part 2","volume":"3","author":"Halkidi","year":"2002","journal-title":"ACM SIGMOD Record"},{"key":"10.3233\/IDA-150792_ref22","first-page":"985","article-title":"Outlier detection algorithm on shadowed sets clustering","volume":"11","author":"Wang","year":"2012","journal-title":"Journal of Frontiers of Computer Science and Technology"},{"key":"10.3233\/IDA-150792_ref23","doi-asserted-by":"crossref","first-page":"2439","DOI":"10.1016\/j.patrec.2005.05.001","article-title":"Interpretation of clusters in the framework of shadowed sets","volume":"15","author":"Pedrycz","year":"2005","journal-title":"Pattern Recognition Letters"},{"key":"10.3233\/IDA-150792_ref24","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/3477.658584","article-title":"Shadowed sets: representing and processing fuzzy sets","volume":"1","author":"Pedrycz","year":"1998","journal-title":"Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions"},{"key":"10.3233\/IDA-150792_ref25","doi-asserted-by":"crossref","first-page":"1261","DOI":"10.1016\/j.patrec.2008.01.028","article-title":"Effective clustering and boundary detection algorithm based on Delaunay triangulation","volume":"9","author":"Liu","year":"2008","journal-title":"Pattern Recognition Letters"},{"key":"10.3233\/IDA-150792_ref27","first-page":"133","article-title":"Research on nonparametric clustering boundary detection algorithm","volume":"15","author":"Qiu","year":"2011","journal-title":"Computer Engineering"},{"key":"10.3233\/IDA-150792_ref28","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1023\/A:1009769707641","article-title":"Extensions to the k-means algorithm for clustering large data sets with categorical values","volume":"3","author":"Huang","year":"1998","journal-title":"Data Mining and Knowledge Discovery"},{"key":"10.3233\/IDA-150792_ref29","doi-asserted-by":"crossref","first-page":"475","DOI":"10.3233\/FUN-2007-80408","article-title":"RFCM: A hybrid clustering algorithm using rough and fuzzy sets","volume":"4","author":"Maji","year":"2007","journal-title":"Fundamenta Informaticae"},{"key":"10.3233\/IDA-150792_ref30","first-page":"625","article-title":"Fuzzy sets and decision making approaches in vowel and speaker recognition","volume":"8","author":"Pal","year":"1977","journal-title":"IEEE Trans Syst, Man, Cybern"},{"key":"10.3233\/IDA-150792_ref31","doi-asserted-by":"crossref","first-page":"1481","DOI":"10.1016\/j.patcog.2006.02.002","article-title":"Some refinements of rough k-means clustering","volume":"8","author":"Peters","year":"2006","journal-title":"Pattern Recognition"}],"container-title":["Intelligent Data Analysis"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/IDA-150792","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:59:31Z","timestamp":1748753971000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/IDA-150792"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,18]]},"references-count":29,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.3233\/ida-150792","relation":{},"ISSN":["1088-467X","1571-4128"],"issn-type":[{"type":"print","value":"1088-467X"},{"type":"electronic","value":"1571-4128"}],"subject":[],"published":{"date-parts":[[2016,1,18]]}}}