{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:40:42Z","timestamp":1725799242490},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319108391"},{"type":"electronic","value":"9783319108407"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-10840-7_37","type":"book-chapter","created":{"date-parts":[[2014,8,13]],"date-time":"2014-08-13T21:43:24Z","timestamp":1407966204000},"page":"303-308","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Self Suppression Operator Used in TMA"],"prefix":"10.1007","author":[{"given":"Jungan","family":"Chen","sequence":"first","affiliation":[]},{"given":"ShaoZhong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yutian","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"37_CR1","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.asoc.2006.12.004","volume":"8","author":"E. Hart","year":"2008","unstructured":"Hart, E., Timmis, J.: Application areas of AIS: The past, the present and the future. Journal of Applied Soft Computing\u00a08(1), 191\u2013201 (2008)","journal-title":"Journal of Applied Soft Computing"},{"issue":"1","key":"37_CR2","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s12065-007-0004-2","volume":"1","author":"J. Timmis","year":"2008","unstructured":"Timmis, J., et al.: An interdisciplinary perspective on artificial immune systems. Evolutionary Intelligence\u00a01(1), 5\u201326 (2008)","journal-title":"Evolutionary Intelligence"},{"issue":"1","key":"37_CR3","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.inffus.2009.04.006","volume":"11","author":"J. Greensmith","year":"2010","unstructured":"Greensmith, J., Aickelin, U., et al.: Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm. Information Fusion\u00a011(1), 21\u201334 (2010)","journal-title":"Information Fusion"},{"key":"37_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-540-24854-5_30","volume-title":"Genetic and Evolutionary Computation \u2013 GECCO 2004","author":"Z. Ji","year":"2004","unstructured":"Ji, Z., Dasgupta, D.: Real-Valued Negative Selection Algorithm with Variable-Sized Detectors. In: Deb, K., Tari, Z. (eds.) GECCO 2004. LNCS, vol.\u00a03102, pp. 287\u2013298. Springer, Heidelberg (2004)"},{"key":"37_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/11536444_20","volume-title":"Artificial Immune Systems","author":"T. Stibor","year":"2005","unstructured":"Stibor, T., Timmis, J.I., Eckert, C.: A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol.\u00a03627, pp. 262\u2013275. Springer, Heidelberg (2005)"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"Ji, Z., Dasgupta, D.: Estimating the Detector Coverage in a Negative Selection Algorithm. In: Genetic and Evolutionary Computation Conference (2005)","DOI":"10.1145\/1068009.1068056"},{"issue":"8","key":"37_CR7","first-page":"1300","volume":"7","author":"J. Chen","year":"2008","unstructured":"Chen, J.: T-detector Maturation Algorithm with Overlap Rate. WSEAS Transactions on Computers\u00a07(8), 1300\u20131308 (2008)","journal-title":"WSEAS Transactions on Computers"},{"key":"37_CR8","first-page":"17","volume":"57","author":"J. Chen","year":"2009","unstructured":"Chen, J.: A novel suppression operator used in optaiNet. BSBT\u00a057, 17\u201323 (2009)","journal-title":"BSBT"},{"key":"37_CR9","series-title":"AISC","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1007\/978-3-642-28765-7_80","volume-title":"Distributed Computing and Artificial Intelligence","author":"J. Chen","year":"2012","unstructured":"Chen, J., Zhang, Q., Fang, Z.: Improve the Adaptive Capability of TMA-OR. In: Omatu, S., Paz Santana, J.F., Gonz\u00e1lez, S.R., Molina, J.M., Bernardos, A.M., Rodr\u00edguez, J.M.C. (eds.) Distributed Computing and Artificial Intelligence. AISC, vol.\u00a0151, pp. 665\u2013671. Springer, Heidelberg (2012)"},{"key":"37_CR10","unstructured":"Ji, Z.: Negative Selection Algorithms: from the Thymus to V-detector. PhD Dissertation, University of Memphis (2006)"}],"container-title":["Lecture Notes in Computer Science","Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2014"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10840-7_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T15:50:32Z","timestamp":1558972232000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-10840-7_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319108391","9783319108407"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10840-7_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}