{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:57:51Z","timestamp":1725551871296},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540308188"},{"type":"electronic","value":"9783540315995"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11596448_79","type":"book-chapter","created":{"date-parts":[[2006,6,17]],"date-time":"2006-06-17T13:12:37Z","timestamp":1150549957000},"page":"544-549","source":"Crossref","is-referenced-by-count":0,"title":["Input Selection for Support Vector Machines Using Genetic Algorithms"],"prefix":"10.1007","author":[{"given":"Hee-Jun","family":"Song","sequence":"first","affiliation":[]},{"given":"Seon-Gu","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Sung-Hoe","family":"Huh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"79_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2440-0","volume-title":"The Nature of Statistical Learning Theory","author":"V. Vapnik","year":"1995","unstructured":"Vapnik, V.: The Nature of Statistical Learning Theory. Springer, Heidelberg (1995)"},{"key":"79_CR2","first-page":"273","volume":"20","author":"C. Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support Vector Networks. Machine Learning\u00a020, 273\u2013297 (1995)","journal-title":"Machine Learning"},{"key":"79_CR3","volume-title":"Genetic Algorithms in Search, Optimization, and Machine Learning","author":"D.E. Goldberg","year":"1989","unstructured":"Goldberg, D.E.: Genetic Algorithms in Search, Optimization, and Machine Learning. Addison-Wesley, Reading (1989)"},{"key":"79_CR4","volume-title":"Adaptation in Natural and Artificial Systems","author":"J. Holland","year":"1975","unstructured":"Holland, J.: Adaptation in Natural and Artificial Systems. The University of Michigan Press, Ann Arbor (1975)"},{"key":"79_CR5","first-page":"532","volume-title":"Time Series Analysis: Forecasting and Control","author":"G. Box","year":"1970","unstructured":"Box, G., Jenkins, G.: Time Series Analysis: Forecasting and Control, pp. 532\u2013533. Holden Day, San Francisco (1970)"},{"key":"79_CR6","first-page":"559","volume-title":"Advances in Fuzzy Set Theory and Applications","author":"R.M. Tong","year":"1979","unstructured":"Tong, R.M.: The Construction and Evaluation of Fuzzy Models. In: Advances in Fuzzy Set Theory and Applications, pp. 559\u2013576. North-Holland, Amsterdam (1979)"},{"key":"79_CR7","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1109\/TSMC.1987.289361","volume":"17","author":"C.W. Xu","year":"1987","unstructured":"Xu, C.W., Lu, Y.Z.: Fuzzy Model Identification and Self-Learning for Dynamic Systems. IEEE Trans. Syst., Man, Cybern.\u00a017, 683\u2013689 (1987)","journal-title":"IEEE Trans. Syst., Man, Cybern."},{"key":"79_CR8","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/0165-0114(84)90015-0","volume":"13","author":"W. Pedrycz","year":"1984","unstructured":"Pedrycz, W.: An Identification Algorithm in Fuzzy Relational System. Fuzzy Sets Systems\u00a013, 153\u2013167 (1984)","journal-title":"Fuzzy Sets Systems"},{"issue":"2","key":"79_CR9","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1109\/91.388173","volume":"3","author":"Y. Lin","year":"1995","unstructured":"Lin, Y., Cunningham III, G.A.: A New Approach to Fuzzy-Neural System Modeling. IEEE Transactions on Fuzzy Systems\u00a03(2), 190\u2013198 (1995)","journal-title":"IEEE Transactions on Fuzzy Systems"},{"key":"79_CR10","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1016\/0165-0114(91)90110-C","volume":"42","author":"M. Sugeno","year":"1991","unstructured":"Sugeno, M., Tanaka, K.: Successive Identification of a Fuzzy Model and Its Application to Prediction of a Complex System. Fuzzy Sets and Systems\u00a042, 315\u2013334 (1991)","journal-title":"Fuzzy Sets and Systems"}],"container-title":["Lecture Notes in Computer Science","Computational Intelligence and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11596448_79.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:56:23Z","timestamp":1619506583000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11596448_79"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540308188","9783540315995"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/11596448_79","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}