{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T23:17:53Z","timestamp":1725837473922},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319271187"},{"type":"electronic","value":"9783319271194"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27119-4_22","type":"book-chapter","created":{"date-parts":[[2015,11,16]],"date-time":"2015-11-16T04:39:29Z","timestamp":1447648769000},"page":"317-326","source":"Crossref","is-referenced-by-count":0,"title":["A Clustering Algorithm Based on Rough Sets for the Recommendation Domain in Trust-Based Access Control"],"prefix":"10.1007","author":[{"given":"Bin","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Jingsha","family":"He","sequence":"additional","affiliation":[]},{"given":"Xinggang","family":"Xuan","sequence":"additional","affiliation":[]},{"given":"Yixuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Na","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,16]]},"reference":[{"key":"22_CR1","unstructured":"Uci datasets (2014). \n                      http:\/\/archive.ics.uci.edu\/ml\/datasets.html"},{"key":"22_CR2","first-page":"2","volume":"59","author":"E Anderson","year":"1935","unstructured":"Anderson, E.: The irises of the gaspe peninsula. Bull. Am. Iris Soc. 59, 2\u20135 (1935)","journal-title":"Bull. Am. Iris Soc."},{"key":"22_CR3","unstructured":"Bezdek, J.C.: Pattern recognition with fuzzy objective function algorithms. Springer Science & Business Media (2013)"},{"issue":"3","key":"22_CR4","first-page":"1393","volume":"28","author":"B Farhadinia","year":"2015","unstructured":"Farhadinia, B.: Study on division and subtraction operations for hesitant fuzzy sets, interval-valued hesitant fuzzy sets and typical dual hesitant fuzzy sets. J. Intell. Fuzzy Syst. Appl. Eng. Technol. 28(3), 1393\u20131402 (2015)","journal-title":"J. Intell. Fuzzy Syst. Appl. Eng. Technol."},{"issue":"2","key":"22_CR5","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1111\/j.1469-1809.1936.tb02137.x","volume":"7","author":"RA Fisher","year":"1936","unstructured":"Fisher, R.A.: The use of multiple measurements in taxonomic problems. Ann. Eugenics 7(2), 179\u2013188 (1936)","journal-title":"Ann. Eugenics"},{"key":"22_CR6","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.neucom.2014.12.073","volume":"156","author":"C Gautam","year":"2015","unstructured":"Gautam, C., Ravi, V.: Data imputation via evolutionary computation, clustering and a neural network. Neurocomputing 156, 134\u2013142 (2015)","journal-title":"Neurocomputing"},{"issue":"2","key":"22_CR7","first-page":"242","volume":"8","author":"CF Hsieh","year":"2013","unstructured":"Hsieh, C.F., Cheng, K.F., Huang, Y.F.: An intrusion detection system for ad hoc networks with multi-attacks based on a support vector machine and rough set theory. J. Convergence Inf. Technol. 8(2), 242\u2013249 (2013)","journal-title":"J. Convergence Inf. Technol."},{"issue":"2","key":"22_CR8","first-page":"44","volume":"5","author":"G Huang","year":"2013","unstructured":"Huang, G., Dong, S., Ren, J.: A minimum spanning tree clustering algorithm based on density. Adva. Inf. Sci. Serv. Sci. 5(2), 44 (2013)","journal-title":"Adva. Inf. Sci. Serv. Sci."},{"key":"22_CR9","unstructured":"Huang, Z.: Clustering large data sets with mixed numeric and categorical values. In: Proceedings of the 1st Pacific-Asia Conference on Knowledge Discovery and Data Mining, (PAKDD), pp. 21\u201334. Singapore (1997)"},{"issue":"3","key":"22_CR10","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1023\/A:1009769707641","volume":"2","author":"Z Huang","year":"1998","unstructured":"Huang, Z.: Extensions to the k-means algorithm for clustering large data sets with categorical values. Data Min. Knowl. Disc. 2(3), 283\u2013304 (1998)","journal-title":"Data Min. Knowl. Disc."},{"issue":"1","key":"22_CR11","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/s11277-014-2201-5","volume":"82","author":"A Jain","year":"2015","unstructured":"Jain, A., Reddy, B.R.: A novel method of modeling wireless sensor network using fuzzy graph and energy efficient fuzzy based k-hop clustering algorithm. Wireless Pers. Commun. 82(1), 157\u2013181 (2015)","journal-title":"Wireless Pers. Commun."},{"issue":"10","key":"22_CR12","first-page":"1749","volume":"47","author":"L Jiye","year":"2010","unstructured":"Jiye, L., Liang, B., Fuyuan, C.: K-modes clustering algorithm based on the new distance measure. J. Comput. Res. Dev. 47(10), 1749\u20131755 (2010)","journal-title":"J. Comput. Res. Dev."},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Ling, Z., Zhong-ying, B., Kang, X., Wei, L., Guo-hui, Z.: Research of distributed intrusion detection model based on rough set in cloud computing. International Journal of Advancements in Computing Technology 5(4) (2013)","DOI":"10.4156\/ijact.vol5.issue4.11"},{"issue":"4","key":"22_CR14","doi-asserted-by":"publisher","first-page":"1881","DOI":"10.1007\/s12517-014-1379-x","volume":"8","author":"G Ma","year":"2015","unstructured":"Ma, G., Xu, Z., Zhang, W., Li, S.: An enriched k-means clustering method for grouping fractures with meliorated initial centers. Arab. J. Geosciences 8(4), 1881\u20131893 (2015)","journal-title":"Arab. J. Geosciences"},{"key":"22_CR15","unstructured":"MacQueen, J., et al.: Some methods for classification and analysis of multivariate observations. In: Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, vol. 1, pp. 281\u2013297, Oakland (1967)"},{"key":"22_CR16","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1016\/j.asoc.2015.01.049","volume":"30","author":"P Maji","year":"2015","unstructured":"Maji, P., Roy, S.: Rough-fuzzy clustering and multiresolution image analysis for text-graphics segmentation. Appl. Soft Comput. 30, 705\u2013721 (2015)","journal-title":"Appl. Soft Comput."},{"key":"22_CR17","volume-title":"Machine Learning","author":"TM Mitchell","year":"1997","unstructured":"Mitchell, T.M.: Machine Learning. wcb, New York (1997)"},{"issue":"4","key":"22_CR18","first-page":"1477","volume":"28","author":"S Nefti-Meziani","year":"2015","unstructured":"Nefti-Meziani, S., Oussalah, M., Soufian, M.: On the use of inclusion structure in fuzzy clustering algorithm in case of gaussian membership functions. J. Intell. Fuzzy Syst. Appl. Eng. Technol. 28(4), 1477\u20131493 (2015)","journal-title":"J. Intell. Fuzzy Syst. Appl. Eng. Technol."},{"issue":"1","key":"22_CR19","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/S0019-9958(69)90591-9","volume":"15","author":"EH Ruspini","year":"1969","unstructured":"Ruspini, E.H.: A new approach to clustering. Inf. Control 15(1), 22\u201332 (1969)","journal-title":"Inf. Control"},{"key":"22_CR20","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.asoc.2014.11.063","volume":"30","author":"SA Sert","year":"2015","unstructured":"Sert, S.A., Bagci, H., Yazici, A.: MOFCA: multi-objective fuzzy clustering algorithm for wireless sensor networks. Appl. Soft Comput. 30, 151\u2013165 (2015)","journal-title":"Appl. Soft Comput."},{"key":"22_CR21","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.fss.2014.07.021","volume":"270","author":"A Suleman","year":"2015","unstructured":"Suleman, A.: A convex semi-nonnegative matrix factorisation approach to fuzzy c-means clustering. Fuzzy Sets and Syst. 270, 90\u2013110 (2015)","journal-title":"Fuzzy Sets and Syst."},{"key":"22_CR22","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.ins.2015.01.024","volume":"305","author":"CY Wang","year":"2015","unstructured":"Wang, C.Y.: Type-2 fuzzy rough sets based on extended t-norms. Inf. Sci. 305, 165\u2013183 (2015)","journal-title":"Inf. Sci."},{"issue":"2","key":"22_CR23","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/s10044-014-0376-8","volume":"18","author":"L Zhang","year":"2015","unstructured":"Zhang, L., Bing, Z., Zhang, L.: A hybrid clustering algorithm based on missing attribute interval estimation for incomplete data. Pattern Anal. Appl. 18(2), 377\u2013384 (2015)","journal-title":"Pattern Anal. Appl."},{"issue":"7","key":"22_CR24","first-page":"1745","volume":"23","author":"QH Zhang","year":"2012","unstructured":"Zhang, Q.H., Wang, G.Y., Xiao, Y.: Approximation sets of rough sets. Ruanjian Xuebao\/J. Softw. 23(7), 1745\u20131759 (2012)","journal-title":"Ruanjian Xuebao\/J. Softw."},{"issue":"3","key":"22_CR25","first-page":"1243","volume":"28","author":"XM Zheng","year":"2015","unstructured":"Zheng, X.M.: Methods for multiple attribute decision making with hesitant fuzzy uncertain linguistic information and their application for evaluating the college english teachers\u2019 professional development competence. J. Intell. Fuzzy Syst. Appl. Eng. Technol. 28(3), 1243\u20131250 (2015)","journal-title":"J. Intell. Fuzzy Syst. Appl. Eng. Technol."}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27119-4_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T15:18:48Z","timestamp":1559315928000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27119-4_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319271187","9783319271194"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27119-4_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}