Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2019
DOI: 10.1049/iet-its.2019.0171
|View full text |Cite
|
Sign up to set email alerts
|

Big spatio‐temporal data mining for emergency management information systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 24 publications
(12 citation statements)
references
References 14 publications
0
11
0
Order By: Relevance
“…Different nodes correspond to three performance dimensions: stakeholder satisfaction, key issue resolution, and organizational administration status. The separate, pairwise combination and three-dimensional integration of different dimensions include the possible combinations of government performance evaluation [ 19 ]. Hong et al divided the indicator system into three levels: the first level indicator evaluation dimension, the second level indicator focuses on the results of internal functions of the organization, and the third level can be divided into factor indicators, evidence indicators and quantitative indicators.…”
Section: Related Workmentioning
confidence: 99%
“…Different nodes correspond to three performance dimensions: stakeholder satisfaction, key issue resolution, and organizational administration status. The separate, pairwise combination and three-dimensional integration of different dimensions include the possible combinations of government performance evaluation [ 19 ]. Hong et al divided the indicator system into three levels: the first level indicator evaluation dimension, the second level indicator focuses on the results of internal functions of the organization, and the third level can be divided into factor indicators, evidence indicators and quantitative indicators.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, the model is adequate and suitable for use in intelligent detection systems for network scanning attacks [22]. As a direction for further research, it is proposed to develop other models and evaluate the results obtained on the basis of other methods of data mining [23][24][25][26][27][28]. In addition, the actual construction and practical use of intelligent decision support systems [29][30][31][32][33][34] to identify and prevent network attacks on computer systems.…”
Section: Discussionmentioning
confidence: 99%
“…In this paper, it is proposed to use the following blur modifiers: CLOSE (5% of blur), ABOUT (10%), APPROXIMATE (25%), COARSE (50%). Fuzzy restrictions on the parameters of the "List of values" type are determined using the membership function, formed by an expert way [29][30][31]. The weights of fuzzy constraints j w are formed expertly using the hierarchy analysis method [32].…”
Section: Methodsmentioning
confidence: 99%