{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T11:28:00Z","timestamp":1676978880478},"reference-count":19,"publisher":"International Academy Publishing (IAP)","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSW"],"DOI":"10.4304\/jsw.8.4.1035-1041","type":"journal-article","created":{"date-parts":[[2013,4,1]],"date-time":"2013-04-01T21:39:22Z","timestamp":1364852362000},"source":"Crossref","is-referenced-by-count":2,"title":["A Novel Clustering Algorithm Based on Graph Matching"],"prefix":"10.17706","volume":"8","author":[{"given":"Guoyuan","family":"Lin","sequence":"first","affiliation":[]},{"given":"Yuyu","family":"Bie","sequence":"additional","affiliation":[]},{"given":"Guohui","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Min","family":"Lei","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2013,4,1]]},"reference":[{"issue":"no. 6","key":"ref1","first-page":"34","article-title":"The overview of intrusion detection based on clustering","volume":"28","author":"Xiao","year":"2008","unstructured":"[1] Min Xiao, Jijun Han, Debao Xiao, Zheng Wu, Hui Xu, \"The overview of intrusion detection based on clustering,\" Journal of Computer Applications, vol. 28, no. 6, pp. 34-38, 2008.","journal-title":"Journal of Computer Applications"},{"issue":"no. 10","key":"ref2","first-page":"1119","article-title":"An efficient parallel clustering algorithm for large scale database","volume":"4","author":"Yang","year":"2009","unstructured":"[3] Jianfeng Yang, Puliu Yan, Yinbo Xie, Qing Geng, \"An efficient parallel clustering algorithm for large scale database,\" Journal of Software, vol. 4, no. 10, pp. 1119-1126, Dec. 2009.","journal-title":"J Softw","ISSN":"http:\/\/id.crossref.org\/issn\/1000-9825","issn-type":"print"},{"issue":"no. 1","key":"ref3","first-page":"58","article-title":"Fuzzy clustering algorithm based on factor analysis and its application to mail filtering","volume":"4","author":"Sun","year":"2009","unstructured":"[4] Jingtao Sun, Qiuyu Zhang, Zhanting Yuan, \"Fuzzy clustering algorithm based on factor analysis and its application to mail filtering,\" Journal of Software, vol. 4, no. 1, pp. 58-64, Feb. 2009.","journal-title":"J Softw","ISSN":"http:\/\/id.crossref.org\/issn\/1000-9825","issn-type":"print"},{"issue":"no. 3","key":"ref4","first-page":"497","article-title":"Ravi kannan, Santosh Vempala, Adrian Vetta, \"On clusterings: good, bad and spectral","volume":"51","year":"2004","unstructured":"[5] Ravi kannan, Santosh Vempala, Adrian Vetta, \"On clusterings: good, bad and spectral,\" ACM, vol. 51, no. 3, pp. 497-515, 2004.","journal-title":"ACM"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(00)00142-3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.066133"},{"issue":"no. 8","key":"ref7","first-page":"43","article-title":"An introduction to case-based reasoning","volume":"6","author":"Barletta","year":"1991","unstructured":"[8] Barletta R. \"An introduction to case-based reasoning,\" AI Expert, vol. 6, no. 8, pp. 43-49, 1991.","journal-title":"AI Expert","ISSN":"http:\/\/id.crossref.org\/issn\/0888-3785","issn-type":"print"},{"issue":"no. 8","key":"ref8","first-page":"866","article-title":"The research of clustering method in data association rules finding","volume":"23","author":"Yuan","year":"2000","unstructured":"[9] Shenmiao Yuan, Xiaoqing Cheng, \"The research of clustering method in data association rules finding,\" Chinese Journal of Computers, vol. 23, no. 8, pp. 866-871, 2000.","journal-title":"Chinese Journal of Computers"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"267","DOI":"10.3233\/IFS-1994-2306","article-title":"Fuzzy model identification based on cluster estimation","volume":"2","author":"Chiu","year":"1994","unstructured":"[10] Chiu S L. \"Fuzzy model identification based on cluster estimation,\" Journal of Intelligent and Fuzzy Systems, vol. 2, pp. 267-278, 1994.","journal-title":"Journal of Intelligent and Fuzzy Systems"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/237661.237708"},{"issue":"no. 12","key":"ref11","first-page":"3032","article-title":"The associative classification algorithm based on support and confidence threshold optimization technique","volume":"27","author":"Zhang","year":"2007","unstructured":"[12] Jiao Zhang, Wei Wang, \"The associative classification algorithm based on support and confidence threshold optimization technique,\" Journal of Computer Applications, vol. 27, no. 12, pp. 3032-3034, 2007.","journal-title":"Journal of Computer Applications"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009740529316"},{"issue":"no. 4","key":"ref13","first-page":"382","article-title":"RCHIG: an effective clustering algorithm with ranking","volume":"4","author":"Tao","year":"2009","unstructured":"[14] Jianwen Tao, \"RCHIG: an effective clustering algorithm with ranking,\" Journal of Software, vol. 4, no. 4, pp. 382-389, Jun. 2009.","journal-title":"J Softw","ISSN":"http:\/\/id.crossref.org\/issn\/1000-9825","issn-type":"print"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.5.4.598-605"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39658-1_52"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2004.10129093"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.5.7.1112-1119"},{"key":"ref17","doi-asserted-by":"crossref","unstructured":"[2] Jiawei Han, Micheline Kamber, \"Data mining: concepts and techniques,\" Morgan kaufamnn, San Francisco, Aug. 2000.","DOI":"10.4304\/jcp.5.7.1112-1119"},{"key":"ref17","doi-asserted-by":"crossref","unstructured":"[19] Inderjit Dhillon, Yuqiang Guan, Brian Kulis, \"A fast kernel-based multilevel algorithm for graph clustering,\" KDD '05 Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, ACM New York, pp. 629-634, 2005.","DOI":"10.4304\/jcp.5.7.1112-1119"}],"container-title":["Journal of Software"],"original-title":[],"deposited":{"date-parts":[[2020,7,24]],"date-time":"2020-07-24T17:26:40Z","timestamp":1595611600000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jsw\/article\/view\/9273"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4,1]]},"references-count":19,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2013,4,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jsw.8.4.1035-1041","relation":{},"ISSN":["1796-217X"],"issn-type":[{"value":"1796-217X","type":"print"}],"subject":[],"published":{"date-parts":[[2013,4,1]]}}}