{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:01:46Z","timestamp":1740096106281,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":40,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642233357"},{"type":"electronic","value":"9783642233364"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23336-4_3","type":"book-chapter","created":{"date-parts":[[2011,10,13]],"date-time":"2011-10-13T10:22:44Z","timestamp":1318501364000},"page":"39-59","source":"Crossref","is-referenced-by-count":0,"title":["A Comparison between Nature-Inspired and Machine Learning Approaches to Detecting Trend Reversals in Financial Time Series"],"prefix":"10.1007","author":[{"given":"Antonia","family":"Azzini","sequence":"first","affiliation":[]},{"given":"Matteo","family":"De Felice","sequence":"additional","affiliation":[]},{"given":"Andrea G. B.","family":"Tettamanzi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Aha, D.W., Kibler, D., Albert, M.K.: Instance-based learning algorithms. In: Machine Learning, pp. 37\u201366 (1991)","DOI":"10.1007\/BF00153759"},{"key":"3_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-642-01129-0_12","volume-title":"Applications of Evolutionary Computing","author":"A. Azzini","year":"2009","unstructured":"Azzini, A., De Felice, M., Meloni, S., Tettamanzi, A.G.B.: Soft computing techniques for internet backbone traffic anomaly detection. In: Giacobini, M., Brabazon, A., Cagnoni, S., Di Caro, G.A., Ek\u00e1rt, A., Esparcia-Alc\u00e1zar, A.I., Farooq, M., Fink, A., Machado, P. (eds.) EvoWorkshops 2009. LNCS, vol.\u00a05484, pp. 99\u2013104. Springer, Heidelberg (2009)"},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-642-12242-2_17","volume-title":"Applications of Evolutionary Computation","author":"A. Azzini","year":"2010","unstructured":"Azzini, A., De Felice, M., Tettamanzi, A.G.B.: A study of nature-inspired methods for financial trend reversal detection. In: Di Chio, C., Brabazon, A., Di Caro, G.A., Ebner, M., Farooq, M., Fink, A., Grahl, J., Greenfield, G., Machado, P., O\u2019Neill, M., Tarantino, E., Urquhart, N. (eds.) EvoApplications 2010. LNCS, vol.\u00a06025, pp. 161\u2013170. Springer, Heidelberg (2010)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Balachandran, S., Dasgupta, D., Nino, F., Garrett, D.: A framework for evolving multi-shaped detectors in negative selection. In: Proceedings of the IEEE Symposium on Foundations of Computational Intelligence, FOCI 2007, pp. 401\u2013408 (2007)","DOI":"10.1109\/FOCI.2007.371503"},{"key":"3_CR5","volume-title":"Neural Networks for Pattern Recognition","author":"C.M. Bishop","year":"1996","unstructured":"Bishop, C.M.: Neural Networks for Pattern Recognition, 1st edn. Oxford University Press, Oxford (1996), \n                  \n                    http:\/\/www.amazon.com\/exec\/obidos\/redirect?tag=citeulike07-20&path=ASIN\/0198538642","edition":"1"},{"key":"3_CR6","first-page":"28","volume-title":"Proceedings of the Eleventh International Conference on Machine Learning","author":"R. Caruana","year":"1994","unstructured":"Caruana, R., Freitag, D.: Greedy attribute selection. In: Proceedings of the Eleventh International Conference on Machine Learning, pp. 28\u201336. Morgan Kaufmann, San Francisco (1994)"},{"key":"3_CR7","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1109\/ICICIC.2007.568","volume-title":"ICICIC 2007: Proceedings of the Second International Conference on Innovative Computing, Information and Control","author":"J.F. Chang","year":"2007","unstructured":"Chang, J.F., Hsu, S.W.: The construction of stock\u2019s portfolios by using particle swarm optimization. In: ICICIC 2007: Proceedings of the Second International Conference on Innovative Computing, Information and Control, p. 390. IEEE Computer Society, Washington, DC, USA (2007), \n                  \n                    http:\/\/dx.doi.org\/10.1109\/ICICIC.2007.568"},{"key":"3_CR8","first-page":"108","volume-title":"Proceedings of the 12th International Conference on Machine Learning","author":"J.G. Cleary","year":"1995","unstructured":"Cleary, J.G., Trigg, L.E.: K*: An instance-based learner using an entropic distance measure. In: Proceedings of the 12th International Conference on Machine Learning, pp. 108\u2013114. Morgan Kaufmann, San Francisco (1995)"},{"key":"3_CR9","first-page":"115","volume-title":"Proceedings of the Twelfth International Conference on Machine Learning","author":"W.W. Cohen","year":"1995","unstructured":"Cohen, W.W.: Fast effective rule induction. In: Proceedings of the Twelfth International Conference on Machine Learning, pp. 115\u2013123. Morgan Kaufmann, San Francisco (1995)"},{"key":"3_CR10","volume-title":"The Encyclopedia Of Technical Market Indicators","author":"R.W. Colby","year":"1988","unstructured":"Colby, R.W., Meyers, T.A.: The Encyclopedia Of Technical Market Indicators. McGraw-Hill, New York (1988)"},{"key":"3_CR11","volume-title":"Introduction to Algorithms","author":"T. Cormen","year":"2003","unstructured":"Cormen, T., Leiserson, C., Rivest, R., Stein, C.: Introduction to Algorithms, 2nd edn. MIT Press, Cambridge (2003)","edition":"2"},{"issue":"3","key":"3_CR12","doi-asserted-by":"publisher","first-page":"652","DOI":"10.1016\/j.asoc.2005.09.004","volume":"7","author":"I.D. Falco","year":"2007","unstructured":"Falco, I.D., Cioppa, A.D., Tarantino, E.: Facing classification problems with particle swarm optimization. Applied Soft Computing\u00a07(3), 652\u2013658 (2007), \n                  \n                    http:\/\/www.sciencedirect.com\/science\/article\/B6W86-4J61657-1\/2\/1789a219e3a464b9c22947693cca47c8\n                  \n                  \n                , doi:10.1016\/j.asoc.2005.09.004","journal-title":"Applied Soft Computing"},{"key":"3_CR13","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1109\/RISP.1994.296580","volume-title":"Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy","author":"S. Forrest","year":"1994","unstructured":"Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, pp. 202\u2013212. IEEE Computer Society Press, Los Alamitos (1994)"},{"key":"3_CR14","first-page":"124","volume-title":"Machine Learning: Proceedings of the Sixteenth International Conference","author":"Y. Freund","year":"1999","unstructured":"Freund, Y.: The alternating decision tree learning algorithm. In: Machine Learning: Proceedings of the Sixteenth International Conference, pp. 124\u2013133. Morgan Kaufmann, San Francisco (1999)"},{"issue":"2","key":"3_CR15","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1162\/1063656054088503","volume":"13","author":"M. Glickman","year":"2005","unstructured":"Glickman, M., Balthrop, J., Forrest, S.: A machine learning evaluation of an artificial immune system. Journal of Evolutionary Computation\u00a013(2), 179\u2013212 (2005)","journal-title":"Journal of Evolutionary Computation"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Gonzalez, F., Dasgupta, D., Kozma, R.: Combining negative selection and classification techniques for anomaly detection. In: Proceedings of the 2002 Congress on Evolutionary Computation, CEC 2002, vol.\u00a01, pp. 705\u2013710 (2002)","DOI":"10.1109\/CEC.2002.1007012"},{"key":"3_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/978-3-540-45192-1_25","volume-title":"Artificial Immune Systems","author":"F. Gonz\u00e1lez","year":"2003","unstructured":"Gonz\u00e1lez, F., Dasgupta, D., Ni\u00f1o, L.: A randomized real-valued negative selection algorithm. In: Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003. LNCS, vol.\u00a02787, pp. 261\u2013272. Springer, Heidelberg (2003), \n                  \n                    http:\/\/dx.doi.org\/10.1007\/978-3-540-45192-1_25"},{"key":"3_CR18","volume-title":"Analyzing and Forecasting Futures Prices","author":"A. Herbst","year":"1992","unstructured":"Herbst, A.: Analyzing and Forecasting Futures Prices. Wiley, Chichester (1992)"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Jang, G.S., Lai, F., Jiang, B.W., Chien, L.H.: An intelligent trend prediction and reversal recognition system using dual-module neural networks. In: Proceedings of the First International Conference on Artificial Intelligence on Wall Street, pp. 42\u201351 (1991), doi:10.1109\/AIAWS.1991.236575","DOI":"10.1109\/AIAWS.1991.236575"},{"key":"3_CR20","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1145\/1143997.1144017","volume-title":"Proceedings of Genetic and Evolutionary Computation Conference (GECCO)","author":"Z. Ji","year":"2006","unstructured":"Ji, Z., Dasgupta, D.: Applicability issues of the real-valued negative selection algorithms. In: Proceedings of Genetic and Evolutionary Computation Conference (GECCO), pp. 111\u2013118. ACM Press, New York (2006)"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Kennedy, J., Eberhart, R.: Particle swarm optimization. In: Proceedings of the IEEE International Conference on Neural Networks, vol.\u00a04, pp. 1942\u20131948 (1995), doi:10.1109\/ICNN.1995.488968","DOI":"10.1109\/ICNN.1995.488968"},{"issue":"2","key":"3_CR22","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/S0957-4174(00)00027-0","volume":"19","author":"K. Jae Kim","year":"2000","unstructured":"Jae Kim, K., Han, I.: Genetic algorithms approach to feature discretization in artificial neural networks for the prediction of stock price index. Expert Systems with Applications\u00a019(2), 125\u2013132 (2000), \n                  \n                    http:\/\/www.sciencedirect.com\/science\/article\/B6V03-40P8SC5-5\/2\/b16d2b8805a754de8214b5d60b666481\n                  \n                  \n                , doi:10.1016\/S0957-4174(00)00027-0","journal-title":"Expert Systems with Applications"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"La, T., de Oliveira, A.: Predicting stock trends through technical analysis and nearest neighbor classification. In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics (SMC 2009), pp. 3094\u20133099 (2009), doi:10.1109\/ICSMC.2009.5345944","DOI":"10.1109\/ICSMC.2009.5345944"},{"key":"3_CR24","unstructured":"Middlemiss, M.: Positive and negative selection in a multilayer artificial immune system. Tech. Rep. 2006\/03, Department of Information Science, Otago (2006)"},{"key":"3_CR25","unstructured":"Murphy, J.: Technical Analysis of the Financial Markets. New York Institute of Finance (1999)"},{"key":"3_CR26","volume-title":"Chaos and Order in the Capital Markets","author":"E. Peters","year":"1996","unstructured":"Peters, E.: Chaos and Order in the Capital Markets, 2nd edn. Wiley, New York (1996)","edition":"2"},{"key":"3_CR27","first-page":"1","volume":"2008","author":"R. Poli","year":"2008","unstructured":"Poli, R.: Analysis of the publications on the applications of particle swarm optimisation. J. Artif. Evol. App.\u00a02008, 1\u201310 (2008), \n                  \n                    http:\/\/dx.doi.org\/10.1155\/2008\/685175","journal-title":"J. Artif. Evol. App."},{"issue":"11","key":"3_CR28","doi-asserted-by":"publisher","first-page":"1119","DOI":"10.1016\/0167-8655(94)90127-9","volume":"15","author":"P. Pudil","year":"1994","unstructured":"Pudil, P., Novovicov, J., Kittler, J.: Floating search methods in feature selection. Pattern Recognition Letters\u00a015(11), 1119\u20131125 (1994), \n                  \n                    http:\/\/www.sciencedirect.com\/science\/article\/B6V15-48MPBV9-7\/2\/c88897a586e12c1a46510ac12fd6c27d\n                  \n                  \n                , doi:10.1016\/0167-8655(94)90127-9","journal-title":"Pattern Recognition Letters"},{"key":"3_CR29","volume-title":"C4.5: Programs for Machine Learning","author":"J.R. Quinlan","year":"1993","unstructured":"Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers Inc., San Francisco (1993)"},{"key":"3_CR30","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59140-984-7","volume-title":"Handbook of Research on Nature-inspired Computing for Economics and Management","author":"J.P. Rennard","year":"2006","unstructured":"Rennard, J.P.: Handbook of Research on Nature-inspired Computing for Economics and Management. IGI Publishing, Hershey (2006)"},{"issue":"3","key":"3_CR31","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/21.97458","volume":"21","author":"S.R. Safavian","year":"1991","unstructured":"Safavian, S.R., Landgrebe, D.: A survey of decision tree classifier methodology. IEEE Transactions on Systems, Man and Cybernetics\u00a021(3), 660\u2013674 (1991), \n                  \n                    http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=97458","journal-title":"IEEE Transactions on Systems, Man and Cybernetics"},{"key":"3_CR32","unstructured":"Sewell, M.: Feature selection (2007)"},{"issue":"5-6","key":"3_CR33","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1016\/j.parco.2003.12.015","volume":"30","author":"T. Sousa","year":"2004","unstructured":"Sousa, T., Silva, A., Neves, A.: Particle swarm based data mining algorithms for classification tasks. Parallel Computing\u00a030(5-6), 767\u2013783 (2004), doi:10.1016\/j.parco.2003.12.015","journal-title":"Parallel Computing"},{"key":"3_CR34","doi-asserted-by":"crossref","unstructured":"Stibor, T., Mohr, P., Timmis, J.: Is negative selection appropriate for anomaly detection? In: Proceedings of the International Conference on Genetic and Evolutionary Computation, GECCO 2005, pp. 321\u2013328 (2005)","DOI":"10.1145\/1068009.1068061"},{"key":"3_CR35","unstructured":"Tax, D.: One-class classification. PhD thesis, TU Delft, Delft University of Technology (2001)"},{"key":"3_CR36","unstructured":"Vanstone, B., Tan, C.: A survey of the application of soft computing to investment and financial trading. In: Australian and New Zeland Intelligent Information Systems Conference, pp. 211\u2013216 (2003)"},{"key":"3_CR37","volume-title":"The Handbook of Portfolio Mathematics: Formulas for optimal allocation & leverage","author":"R. Vince","year":"2007","unstructured":"Vince, R.: The Handbook of Portfolio Mathematics: Formulas for optimal allocation & leverage. Wiley, Chichester (2007)"},{"issue":"1","key":"3_CR38","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/507338.507355","volume":"31","author":"I.H. Witten","year":"2002","unstructured":"Witten, I.H., Frank, E.: Data mining: practical machine learning tools and techniques with java implementations. SIGMOD Rec.\u00a031(1), 76\u201377 (2002), \n                  \n                    http:\/\/doi.acm.org\/10.1145\/507338.507355","journal-title":"SIGMOD Rec."},{"key":"3_CR39","series-title":"Kaufmann Series in Data Management Systems","volume-title":"Data Mining: Practical Machine Learning Tools and Techniques","author":"I.H. Witten","year":"2005","unstructured":"Witten, I.H., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques, 2nd edn. Kaufmann Series in Data Management Systems. Morgan Kaufmann, San Francisco (2005), \n                  \n                    http:\/\/www.worldcat.org\/isbn\/0120884070","edition":"2"},{"key":"3_CR40","doi-asserted-by":"crossref","unstructured":"Ye, Q., Liang, B., Li, Y.: Amnestic neural network for classification: application on stock trend prediction. In: Proceedings of International Conference on Services Systems and Services Management, 2005 (ICSSSM 2005), vol.\u00a02, pp. 1031\u20131034 (2005), doi:10.1109\/ICSSSM.2005.1500149","DOI":"10.1109\/ICSSSM.2005.1500149"}],"container-title":["Studies in Computational Intelligence","Natural Computing in Computational Finance"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23336-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,12]],"date-time":"2019-04-12T00:05:03Z","timestamp":1555027503000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23336-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642233357","9783642233364"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23336-4_3","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2011]]}}}