{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T17:02:15Z","timestamp":1765040535239},"reference-count":169,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,11,28]],"date-time":"2014-11-28T00:00:00Z","timestamp":1417132800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1007\/s00500-014-1510-7","type":"journal-article","created":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T14:11:16Z","timestamp":1417443076000},"page":"319-342","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Convergence of knowledge, nature and computations: a review"],"prefix":"10.1007","volume":"20","author":[{"given":"Subhash Chandra","family":"Pandey","sequence":"first","affiliation":[]},{"given":"Gora Chand","family":"Nandi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,28]]},"reference":[{"key":"1510_CR1","doi-asserted-by":"crossref","first-page":"1021","DOI":"10.1126\/science.7973651","volume":"266","author":"L Adleman","year":"1994","unstructured":"Adleman L (1994) Molecular computation of solutions to combinatorial problems. Science 266:1021\u20131024","journal-title":"Science"},{"issue":"2","key":"1510_CR2","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1038\/scientificamerican0898-54","volume":"279","author":"L Adleman","year":"1998","unstructured":"Adleman L (1998) Computing with DNA. Sci Am 279(2):54\u201361","journal-title":"Sci Am"},{"key":"1510_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal R, Imielinski T, Swami A (1993) Mining association rules between sets of items in large databases. In: Proc. Int. Conf. Management of Data (SIGMOD-93), Washington, DC, USA, pp 207\u2013216","DOI":"10.1145\/170035.170072"},{"key":"1510_CR4","unstructured":"Agrawal R, Mannila H, Srikant R, Toivonen H, Verkamo AI (1996) Fast discovery of association rules. In: Fayyad UM, Piatetsky-Shapiro G, Smith P, Uthurusamy R (eds.) Advances in knowledge discovery and data mining. AAAI\/MIT, pp 307\u2013328"},{"issue":"8","key":"1510_CR5","doi-asserted-by":"crossref","first-page":"943","DOI":"10.3844\/jcssp.2013.943.948","volume":"9","author":"R Al Qasem","year":"2013","unstructured":"Al Qasem R, Eldos T (2013) An Efficient Cell Placement Using Gravitational Search Algorithms. J Comput Sci 9(8):943\u2013948","journal-title":"J Comput Sci"},{"key":"1510_CR6","unstructured":"Albus JS, Meystel A (1995) A reference model architecture for design and implementation of semiotic control in large and complex systems, In: Proc. ISIC Workshop, Monterey"},{"issue":"3","key":"1510_CR7","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1109\/21.97471","volume":"21","author":"JS Albus","year":"1991","unstructured":"Albus JS (1991) Outline for a theory of intelligence. IEEE Trans Syst Man Cybern 21(3):473\u2013509","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"1510_CR8","doi-asserted-by":"crossref","first-page":"2303","DOI":"10.1007\/s00500-010-0671-2","volume":"15","author":"Rafael Alcala","year":"2011","unstructured":"Alcala Rafael, Nojima Yusuke, Herrera Francisco, Ishibuchi Hisao (2011) Multiobjective genetic fuzzy rule selection of single granularity-based fuzzy classification rules and its interaction with the lateral tuning of membership functions. Soft Comput 15:2303\u20132318","journal-title":"Soft Comput"},{"key":"1510_CR9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/msb4100073","volume":"2","author":"E Andrianantoandro","year":"2006","unstructured":"Andrianantoandro E, Basu S, Karig D, Weiss R (2006) Synthetic biology: new engineering rules for an emerging discipline. Mol Syst Biol 2:1\u201314","journal-title":"Mol Syst Biol"},{"key":"1510_CR10","doi-asserted-by":"crossref","DOI":"10.1887\/0750308958","volume-title":"Handbook of evolutionary computation","author":"T Back","year":"1997","unstructured":"Back T, Fogel D, Michalewicz Z (1997) Handbook of evolutionary computation. IOP Publishing, UK"},{"key":"1510_CR11","first-page":"291","volume":"4","author":"N Baklouti","year":"2012","unstructured":"Baklouti N, John R, Alimi AM (2012) Interval type-2 fuzzy logic control of mobile robots. J Intel Learn Syst Appl 4:291\u2013302","journal-title":"J Intel Learn Syst Appl"},{"key":"1510_CR12","unstructured":"Baklouti N, Alimi AM (2009) The geometric interval type-2 fuzzy logic approach in robot mobile issue. IEEE International conference on fuzzy systems, Jeju Island, pp 1971\u20131976"},{"key":"1510_CR13","unstructured":"Bates MJ (2005) Information and knowledge: an evolutionary framework for information science. Inf Res 10(4)"},{"issue":"5","key":"1510_CR14","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1007\/BF01011339","volume":"22","author":"P Benioff","year":"1980","unstructured":"Benioff P (1980) The computer as a physical system: a microscopic quantum mechanical Hamilitonian model of computers as represented by Turning machines. J Stat Phys 22(5):561\u2013563","journal-title":"J Stat Phys"},{"key":"1510_CR15","doi-asserted-by":"crossref","first-page":"657","DOI":"10.1103\/PhysRevLett.55.657","volume":"55","author":"C Bennett","year":"1985","unstructured":"Bennett C, Grinstein G (1985) Role of irreversibility in stabilizing complex and non-ergodic behavior in locally interacting discrete systems. Phys Rev Lett 55:657\u2013660","journal-title":"Phys Rev Lett"},{"key":"1510_CR16","unstructured":"Bennett C, Brassard G (1984) Quantum cryptography: public key distribution and coin testing. In: Proc. IEEE Int. Conf. on Comp., Syst., and Signal Processing, pp 175\u2013179"},{"key":"1510_CR17","unstructured":"Bickhard MH (2014) The dynamic emergence of representation, In: Clapin H, Staines P, Slezak P (eds.), Representation in mind: new approaches to mental representation, Elsevier, pp 71\u201390"},{"key":"1510_CR18","doi-asserted-by":"crossref","first-page":"945","DOI":"10.1038\/35023200","volume":"406","author":"R Brooks","year":"2000","unstructured":"Brooks R (2000) Artificial life: from robot dreams to reality. Nature 406:945\u2013947","journal-title":"Nature"},{"key":"1510_CR19","unstructured":"Burgin M (2005) Super recursive algorithms. Springer Monographs in Computer Science"},{"key":"1510_CR20","first-page":"257","volume":"3082","author":"L Cardelli","year":"2005","unstructured":"Cardelli L (2005) Brane calcui: interactions of biological membranes. LNCS Springer 3082:257\u2013280","journal-title":"LNCS Springer"},{"key":"1510_CR21","first-page":"176","volume":"93","author":"L Cardelli","year":"2007","unstructured":"Cardelli L (2007) Machines of system biology. Bull EATCS 93:176\u2013204","journal-title":"Bull EATCS"},{"key":"1510_CR22","doi-asserted-by":"crossref","unstructured":"Catlett J (1991) On changing continuous attributes into ordered discrete attributes. In: Proc. European Working Session on Learning (EWSL-91). Lecture Notes in Artificial Intelligence 482:164\u2013178","DOI":"10.1007\/BFb0017012"},{"key":"1510_CR23","unstructured":"Chaitin G (2006) Epistemology as information theory. COLLAPSE, vol. 1, pp 27\u201351, Lecture given at E-CAP, Sweden, 2005"},{"key":"1510_CR24","unstructured":"Chen H, Zhu YL (2008) Optimization based on symbiotic multi-species co-evolution. J Appl Math Comput 205"},{"key":"1510_CR25","doi-asserted-by":"crossref","unstructured":"Ciobanu G, Paun G, Perez-Jimenez M (2006) Application of membrane computing. Springer, Berlin","DOI":"10.1007\/3-540-29937-8"},{"key":"1510_CR26","unstructured":"Darwin C (1859) The origin of species by means of natural selection, Adamant Media Corp, Original 2001"},{"key":"1510_CR27","doi-asserted-by":"crossref","unstructured":"Dasgupta D (1998) Artificial immune system and their applications. Springer, Berlin","DOI":"10.1007\/978-3-642-59901-9"},{"key":"1510_CR28","doi-asserted-by":"crossref","DOI":"10.4018\/978-1-59140-312-8","volume-title":"Recent development in biologically inspired computing","author":"LN de Castro","year":"2005","unstructured":"de Castro LN, Von Zuben FJ (2005) Recent development in biologically inspired computing. Idea group publishing, Von Zuben"},{"key":"1510_CR29","doi-asserted-by":"crossref","unstructured":"de Castro L, Timmis J (2002) Artificial immune systems: a new computational intelligence approach. Springer","DOI":"10.4018\/978-1-930708-25-9.ch011"},{"key":"1510_CR30","doi-asserted-by":"crossref","unstructured":"De Jong K (2006) Evolutionary computation: a unified approach. MIT Press, Cambridge","DOI":"10.1145\/1274000.1274109"},{"key":"1510_CR31","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1098\/rspa.1985.0070","volume":"A400","author":"D Deutsch","year":"1985","unstructured":"Deutsch D (1985) Quantum theory, the Church-Turing principle and the universal quantum computer. Proc Royal Soc Lond A400:97\u2013117","journal-title":"Proc Royal Soc Lond"},{"key":"1510_CR32","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1038\/nature05127","volume":"443","author":"B Di Ventura","year":"2006","unstructured":"Di Ventura B, Lemerle C, Michalodimitrakis K, Serrano L (2006) From in vivo to in silico biology and back. Nature 443:527\u2013533","journal-title":"Nature"},{"key":"1510_CR33","unstructured":"Dodig-Crnkovic G (2006) Investigations into information semantics and ethics of computing. Malardalen University Press, pp 1\u2013133"},{"issue":"3","key":"1510_CR34","first-page":"12","volume":"6","author":"G Dodig-Crnkovic","year":"2008","unstructured":"Dodig-Crnkovic G (2008) Knowledge generation as natural computation. J Syst Cybern Inf 6(3):12\u201316","journal-title":"J Syst Cybern Inf"},{"key":"1510_CR35","unstructured":"Dorigo M (1992) Optimization, Learning and natural algorithms, Ph.D. thesis, Politecnico di Milano"},{"key":"1510_CR36","doi-asserted-by":"crossref","unstructured":"Dryer DC, Eisbach C, Ark WS (1999) At what cost pervasive? A social computing view of mobile computing systems. IBM Syst J 38(4):652\u2013676","DOI":"10.1147\/sj.384.0652"},{"key":"1510_CR37","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1038\/nature04342","volume":"438","author":"D Endy","year":"2005","unstructured":"Endy D (2005) Foundations for engineering biology. Nature 438:449\u2013453","journal-title":"Nature"},{"key":"1510_CR38","unstructured":"Engelbrecht A (2005) Fundamentals of computational swarm intelligence. Wiley, Chichester"},{"key":"1510_CR39","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1006\/jtbi.1993.1007","volume":"160","author":"G Ermentrout","year":"1993","unstructured":"Ermentrout G, Edelstein-Keshet L (1993) Cellular automata approach to biological modeling. J Theor Biol 160:97\u2013133","journal-title":"J Theor Biol"},{"key":"1510_CR40","doi-asserted-by":"crossref","unstructured":"Eusuff MM, Lansey KE (2003) Optimization of water distribution network design using the SFLA. J Water Resour Plan Manag 129(3):210\u2013225","DOI":"10.1061\/(ASCE)0733-9496(2003)129:3(210)"},{"key":"1510_CR41","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/0167-2789(86)90240-X","volume":"22","author":"J Farmer","year":"1986","unstructured":"Farmer J, Packard N, Perelson A (1986) The immune system, adaptation, and machine learning. Physica D 22:187\u2013204","journal-title":"Physica D"},{"key":"1510_CR42","unstructured":"Fayyad UM, Piatetsky-Shapiro G, Smyth P (1996) From data mining to knowledge discovery: an overview. In: Advances in Knowledge Discovery and Data Mining, AAAI\/MIT Press, pp 1\u201334"},{"key":"1510_CR43","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1016\/j.ijar.2008.11.004","volume":"50","author":"A Fernandez","year":"2009","unstructured":"Fernandez A, Jesus MJ, Herrera F (2009) Hierarchical fuzzy rule based classification systems with genetic rule selection for imbalanced data-sets. Int J Approx Reason 50:561\u2013577","journal-title":"Int J Approx Reason"},{"issue":"6\/7","key":"1510_CR44","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1007\/BF02650179","volume":"21","author":"R Feynman","year":"1982","unstructured":"Feynman R (1982) Simulating physics with computers. Int J Theor Phys 21(6\/7):467\u2013488","journal-title":"Int J Theor Phys"},{"issue":"1","key":"1510_CR45","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/BF01066545","volume":"2","author":"D Fisher","year":"1993","unstructured":"Fisher D, Hapanyengwi G (1993) Database management and analysis tools of machine induction. J Intel Inf Syst 2(1):5\u201338","journal-title":"J Intel Inf Syst"},{"key":"1510_CR46","unstructured":"Flake GW (2000) The computational beauty of nature. MIT Press, Cambridge"},{"key":"1510_CR47","volume-title":"The computational beauty of nature: computer explorations of fractals. Complex systems and adaptation","author":"GW Flake","year":"1998","unstructured":"Flake GW (1998) The computational beauty of nature: computer explorations of fractals. Complex systems and adaptation. MIT Press, Chaos"},{"key":"1510_CR48","unstructured":"Fogel L, Owens A, Walsh M (1966) Artificial Intelligence through Simulated Evolution. Wiley, New York, USA"},{"key":"1510_CR49","doi-asserted-by":"crossref","unstructured":"Forrest S, Perelson A, Allen L, Cherukuri R (1994) Self-nonself discrimination in a computer. In: Proc IEEE System on Res In Security and Privacy, pp 202\u2013212","DOI":"10.1109\/RISP.1994.296580"},{"issue":"11","key":"1510_CR50","doi-asserted-by":"crossref","first-page":"e1231","DOI":"10.1371\/journal.pone.0001231","volume":"2","author":"E Fox","year":"2007","unstructured":"Fox E, Harel D (2007) Beyond the gene. PLoS One 2(11):e1231","journal-title":"PLoS One"},{"key":"1510_CR51","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1016\/0167-2789(90)90186-S","volume":"45","author":"E Fredkin","year":"1990","unstructured":"Fredkin E (1990) Digital mechanics: an informational process based on reversible universal CA. Physics D 45:254\u2013270","journal-title":"Physics D"},{"key":"1510_CR52","doi-asserted-by":"crossref","unstructured":"Freitas AA (2000) Understanding the crucial differences between classification and discovery of association rules: a position paper. AcM aIGKDD Explor Newsl 2(1):65\u201369","DOI":"10.1145\/360402.360423"},{"key":"1510_CR53","unstructured":"Freitas AA, Lavington SH (1998) Mining Very Large Databases with Parallel Processing. Kluwer academic publisher"},{"key":"1510_CR54","doi-asserted-by":"crossref","unstructured":"Gardenfors P (2000) Conceptual spaces. Bradford Books, MIT Press","DOI":"10.7551\/mitpress\/2076.001.0001"},{"key":"1510_CR55","unstructured":"Gardenfors P (2003) How homo became sapiens: on the evolution of thinking. Oxford University Press, Oxford"},{"key":"1510_CR56","doi-asserted-by":"crossref","unstructured":"Gauci M, Dodd TJ, Gro\u00df R (2012) Why \u2018GSA: a gravitational search algorithm\u2019 is not genuinely based on the law of gravity. Nat Comput 11(4):1\u20132","DOI":"10.1007\/s11047-012-9322-0"},{"key":"1510_CR57","volume-title":"Spinoza Opera","author":"C Gebhardt","year":"1925","unstructured":"Gebhardt C (1925) Spinoza Opera. Winters, Heidelberg"},{"key":"1510_CR58","doi-asserted-by":"crossref","unstructured":"Gell-Mann M (1995) The quark and jaguar: adventures in the simple and the complex. Owl Books","DOI":"10.1063\/1.2808634"},{"key":"1510_CR59","unstructured":"Goertzel B (1993) The Evolving Mind. Gordon and Breach, New York, USA"},{"key":"1510_CR60","doi-asserted-by":"crossref","unstructured":"Goertzel B (1994) Chaotic logic: language, thought and reality from the perspective of complex systems science. Plenum Press, New York","DOI":"10.1007\/978-1-4757-2197-3"},{"key":"1510_CR61","unstructured":"Guyon I, Matic N, Vapnik V (1996) Discovering informative patterns and data cleaning. In: Fayyad UM, Piatetsky-Shapiro G, Smith P and Uthurusamy R (eds.) Advances in knowledge discovery and data mining. AAAI\/MIT Press, Cambridge, MA, pp 181\u2013203"},{"key":"1510_CR62","doi-asserted-by":"crossref","first-page":"2065","DOI":"10.1007\/s00500-013-1122-7","volume":"17","author":"Minghu Ha","year":"2013","unstructured":"Ha Minghu, Yang Yang, Wang Chao (2013) A new support vector machine based on type-2 fuzzy samples. Soft Comput 17:2065\u20132074","journal-title":"Soft Comput"},{"issue":"4","key":"1510_CR63","doi-asserted-by":"crossref","first-page":"524","DOI":"10.1109\/TFUZZ.2004.832538","volume":"12","author":"H Hagras","year":"2004","unstructured":"Hagras H (2004) A hierarchical type-2 fuzzy logic control architecture for autonomous mobile robots. IEEE Trans Fuzzy Syst 12(4):524\u2013539","journal-title":"IEEE Trans Fuzzy Syst"},{"issue":"1","key":"1510_CR64","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MCI.2007.357192","volume":"2","author":"H Hagras","year":"2007","unstructured":"Hagras H (2007) Type-2 FLCs: A new generation of fuzzy controllers. IEEE Comput Intel Mag 2(1):30\u201343","journal-title":"IEEE Comput Intel Mag"},{"key":"1510_CR65","unstructured":"Hand DJ (1997) Construction and assessment of classification rules. Wiley, Chichester"},{"key":"1510_CR66","doi-asserted-by":"crossref","first-page":"737","DOI":"10.1007\/BF02481771","volume":"49","author":"T Head","year":"1987","unstructured":"Head T (1987) Formal language theory and DNA: an analysis of the generative capacity of specific recombinant behaviors. Bull Math Biol 49:737\u2013759","journal-title":"Bull Math Biol"},{"key":"1510_CR67","unstructured":"He S, Wu QH (2006) A novel group search optimizer inspired by animal behavioral ecology. In: IEEE Congress on Evolutionary computation, p 1272\u20131278"},{"key":"1510_CR68","doi-asserted-by":"crossref","unstructured":"Hirvensalo M (2004) Quantum computing, 2nd edition. Springer, Berlin","DOI":"10.1007\/978-3-662-09636-9"},{"key":"1510_CR69","unstructured":"Howe J (2006) The rise of crowd sourcing, Wired"},{"key":"1510_CR70","unstructured":"Howe J (2008) Crowdsourcing: Why the power of the crowd is driving the future of business, Crown"},{"key":"1510_CR71","unstructured":"Howe J (2008) Crowdsourcing: How the power of the crowd is driving the future of business. Business Books, Great Britain"},{"key":"1510_CR72","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/j.ydbio.2007.08.009","volume":"310","author":"S Istrail","year":"2007","unstructured":"Istrail S, De-Leon SBT, Davidson E (2007) The regulatory genome and the computer. Dev Biol 310:187\u2013195","journal-title":"Dev Biol"},{"key":"1510_CR73","doi-asserted-by":"crossref","unstructured":"John GH, Kohavi R, Pfleger K (1994) Irrelevant features and the subset selection problem. In: Proc. 11 $$^{\\rm th}$$ th Int. Conf. Machine Learning, p 121\u2013129","DOI":"10.1016\/B978-1-55860-335-6.50023-4"},{"key":"1510_CR74","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1007\/s10898-007-9149-x","volume":"39","author":"D Karaboga","year":"2007","unstructured":"Karaboga D, Basturk B (2007) A powerful and efficient algorithm for numerical function optimization: artificial bee colony (ABC) algorithm. J Global Optim 39:459\u2013471","journal-title":"J Global Optim"},{"key":"1510_CR75","doi-asserted-by":"crossref","unstructured":"Kari L, Rozenberg G (2008) The many facet of natural computing. Commun ACM 51(10):72\u201383","DOI":"10.1145\/1400181.1400200"},{"issue":"6","key":"1510_CR76","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1109\/91.811231","volume":"7","author":"N Karnik","year":"1999","unstructured":"Karnik N, Mendel J, Liang Q (1999) Type-2 fuzzy logic systems. IEEE Trans Fuzzy Syst 7(6):643\u2013658","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"1510_CR77","doi-asserted-by":"crossref","unstructured":"Kennedy J, Eberhart R (1995) Particle swarm optimization. In: Proc. IEEE Int. Conf. Neural Networks, IEEE Press","DOI":"10.1109\/ICNN.1995.488968"},{"key":"1510_CR78","unstructured":"Khadanga RK, Panda S (2011) Gravitational search algorithm for Unified Power Flow Controller based damping controller design. 2011 International Conference on Energy, automation and signal, pp 1\u20136"},{"key":"1510_CR79","unstructured":"Knight T Jr, Sussman G (1998) Cellular gate technology. In: Unconventional Models of Computation. Springer, Berlin, pp 257\u2013272"},{"issue":"8","key":"1510_CR80","doi-asserted-by":"crossref","first-page":"2703","DOI":"10.1091\/mbc.10.8.2703","volume":"10","author":"K Kohn","year":"1999","unstructured":"Kohn K (1999) Molecular interaction map of the mammalian cell cycle control and DNA repair systems. Mol Biol Cell 10(8):2703\u20132734","journal-title":"Mol Biol Cell"},{"key":"1510_CR81","doi-asserted-by":"crossref","unstructured":"Kornblith H (1999) Knowledge in Humans and Other Animals. Nous 33:327","DOI":"10.1111\/0029-4624.33.s13.15"},{"key":"1510_CR82","volume-title":"Naturalizing epistemology","author":"H Kornblith","year":"1994","unstructured":"Kornblith H (1994) Naturalizing epistemology, 2nd edn. The MIT Press, Cambridge","edition":"2"},{"key":"1510_CR83","unstructured":"Koza J (1992) Genetic programming: on the programming of computers by means of natural selection, MIT Press"},{"key":"1510_CR84","unstructured":"Kulakov A, Stojanov G (2002) Structures, inner values, hierarchies and stages: essentials for developmental robot architecture, 2nd International Workshop on Epigenetic Robotics, Edinbourgh, 2004"},{"key":"1510_CR85","volume-title":"The singularity is near","author":"R Kurzweil","year":"2005","unstructured":"Kurzweil R (2005) The singularity is near. Viking, New York"},{"issue":"1\/3","key":"1510_CR86","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/S0303-2647(99)00027-1","volume":"52","author":"I Landweber","year":"1999","unstructured":"Landweber I, Kari L (1999) The evolution of cellular computing: nature\u2019s solution to a computational problem. Biosystems 52(1\/3):3\u201313","journal-title":"Biosystems"},{"key":"1510_CR87","unstructured":"Langton C (1990) Artificial life. Addison-Wesley Longman, Boston"},{"key":"1510_CR88","first-page":"32","volume":"22","author":"X Li","year":"2002","unstructured":"Li X, Shao Z, Qian J (2002) An optimizing method base on autonomous animates: fish- swarm algorithm. Syst Eng Theory Pract 22:32\u201338","journal-title":"Syst Eng Theory Pract"},{"issue":"5","key":"1510_CR89","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1109\/91.873577","volume":"8","author":"Qilian Liang","year":"2000","unstructured":"Liang Qilian, Mendel Jerry M (2000) Interval type-2 fuzzy logic system: Theory and design. IEEE Trans Fuzzy Syst 8(5):535\u2013550","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"1510_CR90","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1016\/0022-5193(68)90079-9","volume":"18","author":"A Lindenmayer","year":"1968","unstructured":"Lindenmayer A (1968) Mathematical models for cellular interaction in development, part I and II. J Theor Biol 18:280\u2013315","journal-title":"J Theor Biol"},{"key":"1510_CR91","unstructured":"Lioyd S (2006) Programming the Universe: a quantum computer scientist takes on the cosmos, Knopf"},{"key":"1510_CR92","doi-asserted-by":"crossref","first-page":"974","DOI":"10.1038\/35023115","volume":"406","author":"H Lipson","year":"2000","unstructured":"Lipson H, Pollack J (2000) Automatic design and manufacture of robotic life forms. Nature 406:974\u2013978","journal-title":"Nature"},{"key":"1510_CR93","doi-asserted-by":"crossref","unstructured":"Liu Z, Xu S, Zhang Y, Chen X, Philip Chen CL (2014) Interval type-2 fuzzy kernel based support vector machine algorithm for scene classification of humanoid robot","DOI":"10.1007\/s00500-013-1080-0"},{"key":"1510_CR94","unstructured":"Lloyd S (2006) Programming the Universe: a quatum computer scientist takes on the cosmos. Knopf Alfred A"},{"key":"1510_CR95","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.tcs.2003.12.008","volume":"317","author":"B MacLennan","year":"2004","unstructured":"MacLennan B (2004) Natural computation and non-turing models of computation. Theor Comput Sci 317:115\u2013145","journal-title":"Theor Comput Sci"},{"key":"1510_CR96","unstructured":"Maturana H, F Varela (1992) The Tree of Knowledge. Shambala"},{"key":"1510_CR97","doi-asserted-by":"crossref","unstructured":"Maturana H, Varela F (1980) Autopoiesis and cognition: the realization of the living. D. Reidel, Holland","DOI":"10.1007\/978-94-009-8947-4"},{"key":"1510_CR98","unstructured":"Mehrabian AR, Lucas C (2006) A novel numerical optimization algorithm inspired from weed colonization. Ecol Inf pp 355\u2013366"},{"key":"1510_CR99","volume-title":"Uncertain rule-based fuzzy logic systems: Introduction and new directions, Upper Saddle River","author":"JM Mendel","year":"2001","unstructured":"Mendel JM (2001) Uncertain rule-based fuzzy logic systems: Introduction and new directions, Upper Saddle River. Prentice Hall PTR, NJ"},{"issue":"2","key":"1510_CR100","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1109\/91.995115","volume":"10","author":"J Mendel","year":"2002","unstructured":"Mendel J, John R (2002) Type-2 fuzzy sets made simple. IEEE Trans Fuzzy Syst 10(2):117\u2013127","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"1510_CR101","doi-asserted-by":"crossref","unstructured":"Mendel J, John R (2001) A fundamental decomposition of type-2 fuzzy sets. In: IFSA world congress and 20th NAFIPS International Conference 4:1896\u20131901","DOI":"10.1109\/NAFIPS.2001.944356"},{"key":"1510_CR102","unstructured":"Meystel A (1993) Nested hierarchical control. In: An introduction to intelligent and autonomous control. Kluwer Academic Publishers, Boston"},{"key":"1510_CR103","volume-title":"Machine learning, neural and statistical classification","author":"D Michie","year":"1994","unstructured":"Michie D, Spiegelhalter DJ, Taylor CC (1994) Machine learning, neural and statistical classification. Ellis Horwood, New York"},{"key":"1510_CR104","unstructured":"Milner R (1999) Communicating and mobile systems: the $$\\pi $$ \u03c0 -calculus. Cambridge University Press, Cambridge, UK"},{"key":"1510_CR105","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1101\/SQB.1961.026.01.048","volume":"26","author":"J Monod","year":"1961","unstructured":"Monod J, Jacob F (1961) Telenomic mechanisms in cellular metabolism, growth, and differentiation. Cold Spring Harb Symp Quant Biol 26:389\u2013401","journal-title":"Cold Spring Harb Symp Quant Biol"},{"key":"1510_CR106","unstructured":"Moscato P (1989) On evolution, search, optimization, genetic algorithms and martial arts: towards memetic algorithms. Caltech Concurrent Computation Program (report 826)"},{"key":"1510_CR107","first-page":"133","volume":"10","author":"M Nagasaki","year":"1999","unstructured":"Nagasaki M, Onami S, Miyano S, Kitano H (1999) Bio-calculus: its concept and molecular interaction. Genome Inf 10:133\u2013143","journal-title":"Genome Inf"},{"key":"1510_CR108","doi-asserted-by":"crossref","unstructured":"Nakagawa H, Sakamoto K, Sakakibara Y (2006) Development of an in vivo computer based on Escherichia Coli, In LNCS 3892, Springer, pp 203\u2013212","DOI":"10.1007\/11753681_16"},{"issue":"4","key":"1510_CR109","first-page":"197","volume":"27","author":"M Neal","year":"2003","unstructured":"Neal M, Timmis J (2003) Timidity: A useful mechanism for robot control? Informatica 27(4):197\u2013204","journal-title":"Informatica"},{"key":"1510_CR110","doi-asserted-by":"crossref","unstructured":"Neal M, Timmis J (2005) Once more unto breach: towards artificial homeostasis. Recent development in biologically inspired computing. Idea Group Publishing, pp 340\u2013365","DOI":"10.4018\/978-1-59140-312-8.ch014"},{"key":"1510_CR111","doi-asserted-by":"crossref","first-page":"2389","DOI":"10.1007\/s00500-010-0668-x","volume":"15","author":"Albert Orriols-Puig","year":"2011","unstructured":"Orriols-Puig Albert, Casillas Jorge (2011) Fuzzy knowledge representation study for incremental learning in data streams and classification problems. Soft Comput 15:2389\u20132414","journal-title":"Soft Comput"},{"key":"1510_CR112","doi-asserted-by":"crossref","first-page":"2690","DOI":"10.1016\/j.patcog.2011.12.027","volume":"45","author":"SK Pal","year":"2012","unstructured":"Pal SK, Meher SK, Dutta S (2012) Class dependent rough fuzzy granular space, dispersion index and classification. Pattern Recog 45:2690\u20132707","journal-title":"Pattern Recog"},{"key":"1510_CR113","doi-asserted-by":"crossref","unstructured":"Pal SK, Meher SK (2013) Natural computing: a problem solving paradigm with granular information processing. Appl Soft Comput 13:3944\u20133955","DOI":"10.1016\/j.asoc.2013.06.026"},{"key":"1510_CR114","doi-asserted-by":"crossref","first-page":"2266","DOI":"10.1016\/j.asoc.2012.03.047","volume":"12","author":"SC Pandey","year":"2012","unstructured":"Pandey SC, Nandi GC (2012) Blood sugar regularization based evolutionary algorithm for data classification. Appl Soft Comput 12:2266\u20132273","journal-title":"Appl Soft Comput"},{"issue":"3, 4","key":"1510_CR115","first-page":"1","volume":"9","author":"SC Pandey","year":"2013","unstructured":"Pandey SC, Nandi GC (2013) Artificial endocrine system: a new paradigm of knowledge discovery, International journal of information acquisition. Int J Inf Acquis World Sci 9(3, 4):1\u201321","journal-title":"Int J Inf Acquis World Sci"},{"issue":"2","key":"1510_CR116","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1016\/j.jocs.2013.11.005","volume":"5","author":"SC Pandey","year":"2014","unstructured":"Pandey SC, Nandi GC (2014) TSD based framework for mining the induction rules. J Comput Sci 5(2):184\u2013195","journal-title":"J Comput Sci"},{"issue":"37","key":"1510_CR117","first-page":"762","volume":"19","author":"M Parameswaran","year":"2007","unstructured":"Parameswaran M, Whinston AB (2007) Social computing: an overview. CAIS 19(37):762\u2013780","journal-title":"CAIS"},{"key":"1510_CR118","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/s00500-013-1030-x","volume":"18","author":"So-Youn Park","year":"2014","unstructured":"Park So-Youn, Lee Ju-Jang (2014) An efficient differential evolution using speeded-up k-nearest neighbor estimator. Soft Comput 18:35\u201349","journal-title":"Soft Comput"},{"issue":"3","key":"1510_CR119","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MCS.2002.1004010","volume":"22","author":"KM Passino","year":"2002","unstructured":"Passino KM (2002) Bio-mimicry of bacterial foraging for distributed optimization and control. IEEE Control Syst Mag 22(3):52\u201367","journal-title":"IEEE Control Syst Mag"},{"issue":"3","key":"1510_CR120","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.chembiol.2006.01.007","volume":"13","author":"N Paul","year":"2006","unstructured":"Paul N, Springsteen G, Joyce G (2006) Conversion of a ribozyme to a deoxyribozyme through in vitro evolution. Chem Biol 13(3):329\u2013338","journal-title":"Chem Biol"},{"key":"1510_CR121","doi-asserted-by":"crossref","unstructured":"Paun G (2002) Membrane computing: an introduction, Springer","DOI":"10.1007\/978-3-642-56196-2"},{"issue":"1","key":"1510_CR122","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/S0304-3975(02)00136-6","volume":"287","author":"G Paun","year":"2002","unstructured":"Paun G, Rozenberg G (2002) A guide to membrane computing. Theor Comput Sci 287(1):73\u2013100","journal-title":"Theor Comput Sci"},{"key":"1510_CR123","doi-asserted-by":"crossref","unstructured":"Paun G, Rozenberg G, Salomaa A (1998) DNA computing: new computing paradigms. Springer, Heidelberg","DOI":"10.1007\/978-3-662-03563-4"},{"key":"1510_CR124","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/BF01001956","volume":"11","author":"Z Pawlak","year":"1982","unstructured":"Pawlak Z (1982) Rough sets. Int J Comput Inf Sci 11:341\u2013356","journal-title":"Int J Comput Inf Sci"},{"key":"1510_CR125","doi-asserted-by":"crossref","unstructured":"Pedrycz W, Skowron A, Kreinovich V (2008) Hand book of granular computing, Willey","DOI":"10.1002\/9780470724163"},{"key":"1510_CR126","unstructured":"Pfahringer B (1995) Supervised and unsupervised discretization of continuous features. In: Proc. 12 $$^{\\rm th}$$ th Int. Conf. Machine Learning, pp 456\u2013463"},{"key":"1510_CR127","volume-title":"Objective knowledge: an evolutionary approach","author":"KR Popper","year":"1972","unstructured":"Popper KR (1972) Objective knowledge: an evolutionary approach. The Clarendon Press, Oxford"},{"key":"1510_CR128","unstructured":"Pyle D (1999) Data preparation for data mining. Morgan Kaufmann, USA"},{"key":"1510_CR129","doi-asserted-by":"crossref","unstructured":"Ramirez-Serrano A, Boumedine M (1996) Real-time navigation in unknown environments using fuzzy logic and ultrasonic sensing, Dearborn, pp 26\u201330","DOI":"10.1109\/ISIC.1996.556172"},{"issue":"13","key":"1510_CR130","doi-asserted-by":"crossref","first-page":"2232","DOI":"10.1016\/j.ins.2009.03.004","volume":"179","author":"E Rashedi","year":"2009","unstructured":"Rashedi E, Nezamabadi-pour H, Saryazdi S (2009) GSA: a gravitational search algorithm. Inf Sci 179(13):2232\u20132248","journal-title":"Inf Sci"},{"key":"1510_CR131","unstructured":"Rechenberg I (1965) Cybernetic solution path of an experimental problem, Royal AirCraft Establishment, Library Translation, pp 1122"},{"key":"1510_CR132","unstructured":"Rechenberg I (1973) Evolutionsstrategie;optimierung technischer systems nach prinzipien der biologischen evolution, Fromman-Holzboog"},{"key":"1510_CR133","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1038\/419343a","volume":"419","author":"A Regev","year":"2002","unstructured":"Regev A, Shapiro E (2002) Cellular abstractions: cells as computation. Nature 419:343\u2013343","journal-title":"Nature"},{"key":"1510_CR134","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/j.ins.2013.06.010","volume":"255","author":"Q Ren","year":"2014","unstructured":"Ren Q, Balazinski M, Baron L, Jemielniak K, Botez R (2014) Type-2 fuzzy tool condition monitoring system based on acoustic emission in micromilling. Inf Sci 255:121\u2013134","journal-title":"Inf Sci"},{"key":"1510_CR135","volume-title":"Theory of recursive functions and effective computability","author":"H Rogers Jr","year":"1967","unstructured":"Rogers H Jr (1967) Theory of recursive functions and effective computability. McGraw-Hill Book Company, New York"},{"key":"1510_CR136","doi-asserted-by":"crossref","unstructured":"Rowe G (1994) The theoretical models in biology. Oxford University Press, New York","DOI":"10.1093\/oso\/9780198596882.001.0001"},{"key":"1510_CR137","doi-asserted-by":"crossref","unstructured":"Rozenberg G (2008) Computer science, informatics and natural computing, personal reflections In: New computational paradigms: changing conceptions of what is computable. Springer, New York, pp 373\u2013379","DOI":"10.1007\/978-0-387-68546-5_16"},{"issue":"27","key":"1510_CR138","doi-asserted-by":"crossref","first-page":"8370","DOI":"10.1021\/ja049171k","volume":"126","author":"P Sazani","year":"2004","unstructured":"Sazani P, Larralde R, Szostak J (2004) A small aptamer with strong and specific recognition of the triphosphate of ATP. J Am Chem Soc 126(27):8370\u20138371","journal-title":"J Am Chem Soc"},{"key":"1510_CR139","doi-asserted-by":"crossref","unstructured":"Schneider TD (1991) Theory of molecular machines. II. Energy dissipation from molecular machines. J Theor Biol 148:125\u2013137","DOI":"10.1016\/S0022-5193(05)80467-9"},{"key":"1510_CR140","unstructured":"Schwefel HP (1965) Kybernetische Evolution als Strategie der experimentellen Forschung in der Stromungstechnik, Dipl-Ing. Tech. Univ., Berlin, Thesis"},{"key":"1510_CR141","doi-asserted-by":"crossref","unstructured":"Shah-Hosseini H (2007) Shahid Beheshti Univ., Tehran Problem solving by intelligent water drops IEEE Congress on Evolutionary Computation, 2007, CEC","DOI":"10.1109\/CEC.2007.4424885"},{"key":"1510_CR142","doi-asserted-by":"crossref","unstructured":"Shor P (1994) Algorithms for quantum computation: discrete logarithms and factoring. In Proc. FOCS, IEEE Press","DOI":"10.1109\/SFCS.1994.365700"},{"key":"1510_CR143","doi-asserted-by":"crossref","unstructured":"Siegelmann HT (1995) Computation beyond the turing limit. Science 268(5210):545\u2013548","DOI":"10.1126\/science.268.5210.545"},{"issue":"6","key":"1510_CR144","doi-asserted-by":"crossref","first-page":"702","DOI":"10.1109\/TEVC.2008.919004","volume":"12","author":"D Simon","year":"2008","unstructured":"Simon D (2008) Biogeography-based optimization. IEEE Trans Evol Comput 12(6):702\u2013713","journal-title":"IEEE Trans Evol Comput"},{"key":"1510_CR145","unstructured":"Simoudis E, Livezey B, Kerber R (1996) Integrating inductive and deductive reasoning for data mining. In: Fayyad UM, Piatetsky-Shapiro G, Smith P, Uthurusamy R (eds.) Advances in knowledge discovery and data mining. AAAI\/MIT, pp 353\u2013373"},{"key":"1510_CR146","doi-asserted-by":"crossref","first-page":"1127","DOI":"10.1007\/s00500-013-1133-4","volume":"18","author":"Ji-Hwan Son","year":"2014","unstructured":"Son Ji-Hwan, Ahn Hyo-Sung (2014) Bio-insect and artificial robot interaction: learning mechanism and experiment. Soft Comput 18:1127\u20131141","journal-title":"Soft Comput"},{"key":"1510_CR147","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1023\/A:1008202821328","volume":"11","author":"R Storn","year":"1997","unstructured":"Storn R, Price K (1997) Differential evolution\u2014a simple and efficient heuristic for global optimization over continuous spaces. J Global Optim 11:341\u2013359","journal-title":"J Global Optim"},{"issue":"2","key":"1510_CR148","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1023\/A:1022997315561","volume":"13","author":"S Stuart","year":"2003","unstructured":"Stuart S (2003) The self as an embodied agent. Minds Mach 13(2):187","journal-title":"Minds Mach"},{"key":"1510_CR149","doi-asserted-by":"crossref","unstructured":"Teuscher C (2002) Turing\u2019s connectionism: an investigation of neural networks architectures. Springer, New York, USA","DOI":"10.1007\/978-1-4471-0161-1"},{"issue":"1","key":"1510_CR150","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s12065-007-0004-2","volume":"1","author":"J Timmis","year":"2008","unstructured":"Timmis J, Andrews P, Owens N, Clark E (2008) An interdisciplinary perspective on artificial immune systems. Evol Intel 1(1):5\u201326","journal-title":"Evol Intel"},{"key":"1510_CR151","doi-asserted-by":"crossref","unstructured":"Turing AM (1950) Computing machinery and intelligence. Mind 59(236):433\u2013460 (Reprinted in Copeland (2004))","DOI":"10.1093\/mind\/LIX.236.433"},{"key":"1510_CR152","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1038\/nphys629","volume":"3","author":"R Ursin","year":"2007","unstructured":"Ursin R et al (2007) Entanglement-based quantum communication over 144 km. Nat Phys 3:481\u2013486","journal-title":"Nat Phys"},{"key":"1510_CR153","doi-asserted-by":"crossref","unstructured":"Uzkent B, Barkana BD, Yang J (2011) Automatic environmental noise source classification model using fuzzy logic. Expert Syst Appl 38(7):8751\u20138755","DOI":"10.1016\/j.eswa.2011.01.084"},{"key":"1510_CR154","unstructured":"Vandwe AJ, Sherman J, Luciano D (1990) Human physiology: the mechanisms of body function, 5 $$^{\\rm th}$$ th edn., McGraw-Hill Publishing Company, Columbus, OH"},{"issue":"1\/2","key":"1510_CR155","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1016\/0167-2789(84)90253-7","volume":"10","author":"G Vichniac","year":"1984","unstructured":"Vichniac G (1984) Simmulating physics with cellular automata. Physica D 10(1\/2):96\u2013116","journal-title":"Physica D"},{"key":"1510_CR156","unstructured":"von Ahn L (2005) Human computation. Doctoral Thesis. UMI Order Number: AAI3205378, CMU"},{"key":"1510_CR157","unstructured":"von Neumann J (1958) The computer and the brain. Yale University Press, New Haven, CT, USA"},{"key":"1510_CR158","unstructured":"von Neumann J (1966) Theory of self-reproduction automata. In: Burks AW (ed) U. Illinois Press, Urbana and London"},{"key":"1510_CR159","volume-title":"The limitations of human responsibility","author":"F Wayland","year":"1838","unstructured":"Wayland F (1838) The limitations of human responsibility. Applewood Books, Bedford"},{"key":"1510_CR160","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1016\/S0304-3975(97)00154-0","volume":"192","author":"P Wegner","year":"1998","unstructured":"Wegner P (1998) Interactive foundations of computing. Theor Comput Sci 192:315\u2013351","journal-title":"Theor Comput Sci"},{"key":"1510_CR161","unstructured":"Weiss SM, Kulikowski CA (1991) Computer Systems that Learn. Morgan Kaufmann"},{"key":"1510_CR162","first-page":"1","volume":"2054","author":"R Weiss","year":"2001","unstructured":"Weiss R, Knight T Jr (2001) Engineered communications for microbial robotics. LNCS 2054:1\u201316","journal-title":"LNCS"},{"key":"1510_CR163","volume-title":"Process and reality: an essay in cosmology","author":"AN Whitehead","year":"1978","unstructured":"Whitehead AN (1978) Process and reality: an essay in cosmology. The Free Press, New York"},{"key":"1510_CR164","doi-asserted-by":"crossref","unstructured":"Wolfram S (2002) A new kind of science, Wolfram Media","DOI":"10.1115\/1.1553433"},{"key":"1510_CR165","unstructured":"Wright S (1932) The roles of mutation, inbreeding, crossbreeding and selection in evolution, In: Proc., $$6^{\\rm th}$$ 6 th International Congress of. Genetics 1:356\u2013366"},{"key":"1510_CR166","unstructured":"Yang XS (2009) Fire fly algorithm for multimodal optimization. In: Proceedings of the stochastic algorithms: foundations and applications (SAGA 109). Lecture notes in computer sciences, vol 5792. Springer, Berlin, pp 169\u2013178"},{"key":"1510_CR167","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"LA Zadeh","year":"1965","unstructured":"Zadeh LA (1965) Fuzzy sets. Infect Control 8:338\u2013353","journal-title":"Infect Control"},{"key":"1510_CR168","doi-asserted-by":"crossref","unstructured":"Zadeh LA (1975) The concept of a linguistic variable and its application to approximate reasoning. Inf Sci 8(3):199\u2013249","DOI":"10.1016\/0020-0255(75)90036-5"},{"issue":"2","key":"1510_CR169","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1109\/EURBOT.1996.551878","volume":"10","author":"J Zhang","year":"1996","unstructured":"Zhang J, Wille F, Knoll A (1996) Fuzzy logic rules for mapping sensor data to robot control. Proc First Euromicro Worksh Adv Mob Robot 10(2):29\u201338","journal-title":"Proc First Euromicro Worksh Adv Mob Robot"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-014-1510-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-014-1510-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-014-1510-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,5]],"date-time":"2024-06-05T13:04:11Z","timestamp":1717592651000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-014-1510-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,28]]},"references-count":169,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,1]]}},"alternative-id":["1510"],"URL":"https:\/\/doi.org\/10.1007\/s00500-014-1510-7","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11,28]]}}}