{"id":"https://openalex.org/W4285107012","doi":"https://doi.org/10.1109/jiot.2022.3179320","title":"Efficient Gaussian Kernel Microcluster Real-Time Clustering Method for Industrial Internet of Things (IIoT) Streams","display_name":"Efficient Gaussian Kernel Microcluster Real-Time Clustering Method for Industrial Internet of Things (IIoT) Streams","publication_year":2022,"publication_date":"2022-05-31","ids":{"openalex":"https://openalex.org/W4285107012","doi":"https://doi.org/10.1109/jiot.2022.3179320"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2022.3179320","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2022.3179320","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023280134","display_name":"Weifu Zhu","orcid":"https://orcid.org/0009-0009-7401-2649"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Weifu Zhu","raw_affiliation_strings":["College of Computer and Cyber Security and the Digit Fujian Internet of Things Laboratory of Environmental Graduate Student, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security and the Digit Fujian Internet of Things Laboratory of Environmental Graduate Student, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049202535","display_name":"Ruliang Xiao","orcid":"https://orcid.org/0000-0003-2173-4612"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruliang Xiao","raw_affiliation_strings":["College of Computer and Cyber Security, the Digit Fujian Internet of Things Laboratory of Environmental Monitoring, and the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, the Digit Fujian Internet of Things Laboratory of Environmental Monitoring, and the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022593179","display_name":"Ruohe Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruohe Huang","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101071638","display_name":"Ping Gong","orcid":"https://orcid.org/0000-0002-9266-3295"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ping Gong","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046652046","display_name":"Shi Zhang","orcid":"https://orcid.org/0000-0002-1458-9050"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shi Zhang","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078980278","display_name":"\uf020Xin Du","orcid":"https://orcid.org/0000-0003-3485-2175"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Du","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5023280134"],"corresponding_institution_ids":["https://openalex.org/I111753288"],"apc_list":null,"apc_paid":null,"fwci":1.1936,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.82003284,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":"9","issue":"21","first_page":"21323","last_page":"21337"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8323888182640076},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.7911416292190552},{"id":"https://openalex.org/keywords/data-stream-mining","display_name":"Data stream mining","score":0.6350566744804382},{"id":"https://openalex.org/keywords/kernel","display_name":"Kernel (algebra)","score":0.5838761329650879},{"id":"https://openalex.org/keywords/gaussian-function","display_name":"Gaussian function","score":0.5101785659790039},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.47545477747917175},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.46009060740470886},{"id":"https://openalex.org/keywords/gaussian","display_name":"Gaussian","score":0.4281173646450043},{"id":"https://openalex.org/keywords/concept-drift","display_name":"Concept drift","score":0.42728447914123535},{"id":"https://openalex.org/keywords/data-stream","display_name":"Data stream","score":0.41787707805633545},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.35620540380477905},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2537569999694824},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08954727649688721}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8323888182640076},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.7911416292190552},{"id":"https://openalex.org/C89198739","wikidata":"https://www.wikidata.org/wiki/Q3079880","display_name":"Data stream mining","level":2,"score":0.6350566744804382},{"id":"https://openalex.org/C74193536","wikidata":"https://www.wikidata.org/wiki/Q574844","display_name":"Kernel (algebra)","level":2,"score":0.5838761329650879},{"id":"https://openalex.org/C7218915","wikidata":"https://www.wikidata.org/wiki/Q1054475","display_name":"Gaussian function","level":3,"score":0.5101785659790039},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.47545477747917175},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.46009060740470886},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.4281173646450043},{"id":"https://openalex.org/C60777511","wikidata":"https://www.wikidata.org/wiki/Q3045002","display_name":"Concept drift","level":3,"score":0.42728447914123535},{"id":"https://openalex.org/C2778484313","wikidata":"https://www.wikidata.org/wiki/Q1172540","display_name":"Data stream","level":2,"score":0.41787707805633545},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.35620540380477905},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2537569999694824},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08954727649688721},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2022.3179320","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2022.3179320","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.550000011920929,"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7"}],"awards":[{"id":"https://openalex.org/G3327627158","display_name":null,"funder_award_id":"U1805263","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4229438732","display_name":null,"funder_award_id":"2019J01427","funder_id":"https://openalex.org/F4320323190","funder_display_name":"Fujian Provincial Department of Science and Technology"},{"id":"https://openalex.org/G6185092768","display_name":null,"funder_award_id":"2020H6011","funder_id":"https://openalex.org/F4320323190","funder_display_name":"Fujian Provincial Department of Science and Technology"},{"id":"https://openalex.org/G6476901745","display_name":null,"funder_award_id":"2020J01161","funder_id":"https://openalex.org/F4320323190","funder_display_name":"Fujian Provincial Department of Science and Technology"},{"id":"https://openalex.org/G6925082703","display_name":null,"funder_award_id":"61672157","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320323190","display_name":"Fujian Provincial Department of Science and Technology","ror":"https://ror.org/00rgzpv08"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W37489049","https://openalex.org/W182707955","https://openalex.org/W341879454","https://openalex.org/W1562753845","https://openalex.org/W1986319134","https://openalex.org/W1987799824","https://openalex.org/W2041193927","https://openalex.org/W2063312129","https://openalex.org/W2079361215","https://openalex.org/W2092335550","https://openalex.org/W2105416473","https://openalex.org/W2107586730","https://openalex.org/W2112482089","https://openalex.org/W2115665190","https://openalex.org/W2117487426","https://openalex.org/W2122646361","https://openalex.org/W2147129265","https://openalex.org/W2170936641","https://openalex.org/W2400162648","https://openalex.org/W2403008614","https://openalex.org/W2404779194","https://openalex.org/W2517600007","https://openalex.org/W2537240387","https://openalex.org/W2541451878","https://openalex.org/W2559950244","https://openalex.org/W2599627952","https://openalex.org/W2603425044","https://openalex.org/W2737926459","https://openalex.org/W2741799308","https://openalex.org/W2765417155","https://openalex.org/W2793815497","https://openalex.org/W2803192575","https://openalex.org/W2805611890","https://openalex.org/W2811266402","https://openalex.org/W2897310364","https://openalex.org/W2898017895","https://openalex.org/W2903010997","https://openalex.org/W2914839418","https://openalex.org/W2919979744","https://openalex.org/W2921793854","https://openalex.org/W2923990426","https://openalex.org/W2996880361","https://openalex.org/W3001393655","https://openalex.org/W3001398650","https://openalex.org/W3014974411","https://openalex.org/W3029782888"],"related_works":["https://openalex.org/W4307392573","https://openalex.org/W2802243998","https://openalex.org/W2736127210","https://openalex.org/W2329342202","https://openalex.org/W2161835057","https://openalex.org/W1521014365","https://openalex.org/W4200217704","https://openalex.org/W3208495060","https://openalex.org/W2740428142","https://openalex.org/W2060628068"],"abstract_inverted_index":{"With":[0],"recent":[1],"advancements":[2],"in":[3,13,92,107,129],"Industrial":[4],"Internet":[5],"of":[6,21,33,85,99,121,127,152],"Things":[7],"(IIoT),":[8],"the":[9,31,38,50,57,97,118,125,132,139,144,149,154,168,173,180,195,204],"stream":[10,207],"data":[11,75,87,106,191],"generated":[12],"IIoT":[14,74],"applications":[15],"presents":[16],"new":[17],"characteristics:":[18],"huge":[19],"amount":[20],"data,":[22],"ultrahigh":[23],"computational":[24],"complexity":[25],"and":[26,30,44,142,185],"large":[27],"memory":[28],"consumption,":[29],"existence":[32],"concept":[34,164],"drift":[35,43],"leading":[36],"to":[37,54,90,103,116,123,137,147,158,179],"ineffective":[39],"distinction":[40],"between":[41],"real":[42,163],"anomalies.":[45],"It":[46],"is":[47,171],"difficult":[48],"for":[49,73],"current":[51,169,205],"mainstream":[52,206],"methods":[53],"cope":[55],"with":[56],"above":[58],"problems":[59],"effectively.":[60],"In":[61],"this":[62],"article,":[63],"we":[64],"propose":[65],"an":[66],"efficient":[67],"Gaussian":[68,113],"kernel":[69,114],"microcluster":[70,81,140,156,160,170,175],"real-time-clustering":[71],"method":[72,78],"streams":[76],"(GKMC).The":[77],"uses":[79,111],"a":[80,112,199],"sketch":[82],"structure":[83],"instead":[84],"individual":[86],"sample":[88],"points":[89],"participate":[91],"clustering":[93,201,208],"directly,":[94],"which":[95],"solves":[96],"problem":[98],"not":[100],"being":[101],"able":[102],"store":[104],"unlimited":[105],"limited":[108],"memory;":[109],"it":[110],"function":[115,135],"calculate":[117],"local":[119],"density":[120],"microclusters":[122],"enhance":[124],"detection":[126,150],"anomalies;":[128],"addition,":[130],"using":[131,143],"gravity":[133],"energy":[134],"recursively":[136],"update":[138],"online":[141],"relearning":[145],"strategy":[146],"improve":[148],"ability":[151],"whether":[153],"outdated":[155],"belongs":[157],"abnormal":[159],"or":[161],"has":[162,198],"drift,":[165],"ensuring":[166],"that":[167,194],"always":[172],"latest":[174],"most":[176],"closely":[177],"related":[178],"cluster.":[181],"The":[182],"theoretical":[183],"analysis":[184],"sufficient":[186],"comparison":[187],"experiments":[188],"on":[189],"three":[190],"sets":[192],"show":[193],"proposed":[196],"algorithm":[197],"better":[200],"effect":[202],"than":[203],"algorithms.":[209]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
