A PHP Error was encountered

Severity: Warning

Message: file_get_contents(https://...@gmail.com&api_key=61f08fa0b96a73de8c900d749fcb997acc09&a=1): Failed to open stream: HTTP request failed! HTTP/1.1 429 Too Many Requests

Filename: helpers/my_audit_helper.php

Line Number: 197

Backtrace:

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 197
Function: file_get_contents

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 271
Function: simplexml_load_file_from_url

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 3145
Function: getPubMedXML

File: /var/www/html/application/controllers/Detail.php
Line: 575
Function: pubMedSearch_Global

File: /var/www/html/application/controllers/Detail.php
Line: 489
Function: pubMedGetRelatedKeyword

File: /var/www/html/index.php
Line: 316
Function: require_once

Adoption of K-means clustering algorithm in smart city security analysis and mythical experience analysis of urban image. | LitMetric

Objective: An information security evaluation model based on the K-Means Clustering (KMC) +  Decision Tree (DT) algorithm is constructed, aiming to assess its value in evaluating smart city (SC) security. Additionally, the impact of SCs on individuals' mythical experiences is investigated.

Methods: An information security analysis model based on the combination of KMC and DT algorithms is established. A total of 38 SCs are selected as the research objects for practical analysis. The practical feasibility of the model is assessed using the receiver operating characteristic (ROC) curve, and its performance is compared with that of the Naive Bayes (NB), Logistic Regression (LR), Random Forest (RF), Support Vector Machine (SVM), and Gradient Boosting Machine (GBM) classification methods. Lastly, a questionnaire survey is conducted to obtain and analyze individuals' mythical experiences in SCs.

Results: (1) The area under the ROC curve is significantly higher than 0.9 (0.921 vs. 0.9). (2) Compared to the NB and LR algorithms, the security analysis model based on the combination of KMC and DT algorithms demonstrated higher true positive rate (TPR), accuracy, recall, F-Score, AUC-ROC, and AUC-PR. Additionally, the performance metrics of RF, SVM, and GBM are similar to those of the KMC+DT model. (3) When the attributes are the same, the difference in smart risk levels is small, while when the attributes are different, the difference in risk levels is significant. (4) The support rates for various types of new folk activities are as follows: offline shopping festivals (17.6%), New Year's Eve celebrations (16.7%), Tibet tourism (15.6%), spiritual practices (16.2%), green leisure (16.0%), and suburban/rural tourism (15.8%). (5) High-risk cities (Grade A) showed stronger support for modern activities such as offline shopping festivals and green leisure, while low-risk cities (Grades C and D) tended to favor traditional cultural activities.

Conclusion: The algorithm model constructed in this work is capable of effectively evaluating the information security risks of SCs and has practical value. A good city image and mythological experience are driving the development of cities.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11892831PMC
http://journals.plos.org/plosone/article?id=10.1371/journal.pone.0319620PLOS

Publication Analysis

Top Keywords

security analysis
12
model based
12
k-means clustering
8
smart city
8
city security
8
individuals' mythical
8
mythical experiences
8
analysis model
8
based combination
8
combination kmc
8

Similar Publications

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!