{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T18:54:12Z","timestamp":1770749652181,"version":"3.50.0"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,11,3]],"date-time":"2017-11-03T00:00:00Z","timestamp":1509667200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1007\/s00500-017-2909-8","type":"journal-article","created":{"date-parts":[[2017,11,3]],"date-time":"2017-11-03T00:57:21Z","timestamp":1509670641000},"page":"613-626","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["Bike sharing demand prediction using artificial immune system and artificial neural network"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9900-3513","authenticated-orcid":false,"given":"Pei-Chann","family":"Chang","sequence":"first","affiliation":[]},{"given":"Jheng-Long","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yahui","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Min","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiao-Yong","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,3]]},"reference":[{"key":"2909_CR1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2832054","volume-title":"The danger theory and its application to artificial immune systems","author":"T Aickelin","year":"2002","unstructured":"Aickelin T, Cayzer S (2002) The danger theory and its application to artificial immune systems. University of Kent at Canterbury, Kent"},{"issue":"1","key":"2909_CR2","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1016\/j.desal.2015.04.008","volume":"367","author":"AM Aish","year":"2015","unstructured":"Aish AM, Zaqoot HA, Abdeljawad SM (2015) Artificial neural network approach for predicting reverse osmosis desalination plants performance in the Gaza Strip. Desalination 367(1):240\u2013247","journal-title":"Desalination"},{"key":"2909_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.asoc.2014.12.006","volume":"29","author":"AN Al-Masri","year":"2015","unstructured":"Al-Masri AN, Ab Kadir MZA, Hizam H, Mariun N (2015) Simulation of an adaptive artificial neural network for power system security enhancement including control action. Appl Soft Comput 29:1\u201311","journal-title":"Appl Soft Comput"},{"issue":"6","key":"2909_CR4","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1504\/IJBIC.2014.066972","volume":"6","author":"A Askarzadeh","year":"2013","unstructured":"Askarzadeh A (2013) An innovative artificial immune optimization algorithm for solving complex optimization problems. Int J Bio-Inspired Comput 6(6):409\u2013415","journal-title":"Int J Bio-Inspired Comput"},{"key":"2909_CR5","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.asoc.2009.11.003","volume":"11","author":"I Aydin","year":"2011","unstructured":"Aydin I, Karakose M, Akin E (2011) A multi-objective artificial immune algorithm for parameter optimization in support vector machine. Appl Soft Comput 11:120\u2013129","journal-title":"Appl Soft Comput"},{"issue":"3","key":"2909_CR6","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1504\/IJBIC.2012.047240","volume":"4","author":"M Bateni","year":"2012","unstructured":"Bateni M, Baraani A, Ghorbani A (2012) Alert correlation using artificial immune recognition system. Int J Bio-Inspired Comput 4(3):181\u2013195","journal-title":"Int J Bio-Inspired Comput"},{"issue":"2","key":"2909_CR7","first-page":"123","volume":"24","author":"L Breiman","year":"1996","unstructured":"Breiman L (1996) Bagging predictors. Mach Learn 24(2):123\u2013140","journal-title":"Mach Learn"},{"key":"2909_CR8","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1016\/j.trb.2015.05.003","volume":"78","author":"CMD Chardon","year":"2015","unstructured":"Chardon CMD, Caruso G (2015) Estimating bike-share trips using station level data. Transp Res Part B 78:260\u2013279","journal-title":"Transp Res Part B"},{"key":"2909_CR9","first-page":"261","volume":"3","author":"P Clark","year":"1989","unstructured":"Clark P, Niblett T (1989) The CN2 rule induction algorithm. Mach Learn 3:261\u2013284","journal-title":"Mach Learn"},{"issue":"5","key":"2909_CR10","first-page":"220","volume":"161","author":"M Cui","year":"2015","unstructured":"Cui M, Liu H, Li Z, Tang Y, Guan X (2015) Identification of Hammerstein model using functional link artificial neural network. Neurocomputing 161(5):220\u2013228","journal-title":"Neurocomputing"},{"issue":"2\u20133","key":"2909_CR11","first-page":"113","volume":"2","author":"H Fanaee-T","year":"2013","unstructured":"Fanaee-T H, Gama J (2013) Event labeling combining ensemble detectors and background knowledge. Prog Artif Intell 2(2\u20133):113\u2013127","journal-title":"Prog Artif Intell"},{"issue":"D","key":"2909_CR12","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/0167-2789(86)90240-X","volume":"22","author":"JD Farmer","year":"1986","unstructured":"Farmer JD, Packard NH, Perelson AS (1986) The immune system, adaptation and machine learning. Physica D 22(D):187\u2013204","journal-title":"Physica D"},{"key":"2909_CR13","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1016\/j.asoc.2009.12.013","volume":"11","author":"JC Fern\u00e1ndez","year":"2011","unstructured":"Fern\u00e1ndez JC, Herv\u00e1s C, Mart\u00ednez-Estudillo FJ, Guti\u00e9rrez PA (2011) Memetic Pareto evolutionary artificial neural networks to determine growth\/no-growth in predictive microbiology. Appl Soft Comput 11:534\u2013550","journal-title":"Appl Soft Comput"},{"key":"2909_CR14","doi-asserted-by":"crossref","unstructured":"Frank E, Bouckaert RR (2009) Conditional density estimation with class probability estimators. In: Zhou E-H, Washio T (eds) Proceedings of first Asian conference on machine learning, ACML 2009, Nanjing, pp 65\u201381","DOI":"10.1007\/978-3-642-05224-8_7"},{"key":"2909_CR15","unstructured":"Frank R, Hall M, Pfahringer B (2003) Locally weighted naive bayes. In: Proceedings of the 19th conference in uncertainty in artificial intelligence, Acapulco, Mexico pp 249\u2013256"},{"key":"2909_CR16","doi-asserted-by":"crossref","unstructured":"Frank E, Mayo M, Kramer S (2015) Alternating model tree. In: Proceedings of the 30th annual ACM symposium on applied computing, pp 871\u2013878","DOI":"10.1145\/2695664.2695848"},{"issue":"4","key":"2909_CR17","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/S0167-9473(01)00065-2","volume":"38","author":"JH Friedman","year":"2002","unstructured":"Friedman JH (2002) Stochastic gradient boosting. Comput Stat Data Anal 38(4):367\u2013378","journal-title":"Comput Stat Data Anal"},{"key":"2909_CR18","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.apgeog.2012.07.002","volume":"35","author":"JC Garc\u00eda-Palomares","year":"2012","unstructured":"Garc\u00eda-Palomares JC, Guti\u00e9rrez J, Latorre M (2012) Optimizing the location of stations in bike-sharing programs: a GIS approach. Appl Geogr 35:235\u2013246","journal-title":"Appl Geogr"},{"key":"2909_CR19","doi-asserted-by":"publisher","first-page":"10967","DOI":"10.1016\/j.eswa.2012.03.027","volume":"39","author":"M Ghiassi","year":"2012","unstructured":"Ghiassi M, Olschimke M, Moon B, Arnaudo P (2012) Automated text classification using a dynamic artificial neural network model. Expert Syst Appl 39:10967\u201310976","journal-title":"Expert Syst Appl"},{"key":"2909_CR20","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.asoc.2014.06.042","volume":"24","author":"NH Halvaiee","year":"2014","unstructured":"Halvaiee NH, Akbari MK (2014) A novel model for credit card fraud detection using artificial immune systems. Appl Soft Comput 24:40\u201349","journal-title":"Appl Soft Comput"},{"key":"2909_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-84858-7","volume-title":"Elements of statistical learning","author":"T Hastie","year":"2009","unstructured":"Hastie T, Tibshirani R, Friedman J (2009) Elements of statistical learning, 2nd edn. Springer, New York","edition":"2"},{"key":"2909_CR22","unstructured":"Kohavi R (1996) The power of decision tables. In: Proceedings of 8th european conference on machine learning, Heraclion, Crete, pp 174\u2013189"},{"key":"2909_CR23","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/j.cie.2012.10.007","volume":"64","author":"RJ Kuo","year":"2013","unstructured":"Kuo RJ, Chen CM, Warren T (2013) Liao and F.C. Tien, Hybrid of artificial immune system and particle swarm optimization-based support vector machine for Radio Frequency Identification-based positioning system. Comput Ind Eng 64:333\u2013341","journal-title":"Comput Ind Eng"},{"issue":"4","key":"2909_CR24","doi-asserted-by":"publisher","first-page":"1380","DOI":"10.1109\/TASE.2014.2336874","volume":"12","author":"K Labadi","year":"2015","unstructured":"Labadi K, Benarbia T, Barbot JP, Hamaci S, Omari A (2015) Stochastic petri net modeling, simulation and analysis of public bicycle sharing systems. IEEE Trans Autom Sci Eng 12(4):1380\u20131395","journal-title":"IEEE Trans Autom Sci Eng"},{"key":"2909_CR25","doi-asserted-by":"crossref","unstructured":"Louppe G, Geurts P (2012) Ensembles on random patches. In: Machine learning and knowledge discovery in databases, Springer, Berlin, pp 346\u2013361","DOI":"10.1007\/978-3-642-33460-3_28"},{"key":"2909_CR26","doi-asserted-by":"crossref","unstructured":"Montechiesi L, Cocconcelli M, Rubini R (2016) Artificial immune system via Euclidean Distance Minimization for anomaly detection in bearings. Mech Syst Signal Process 76\u201377:380\u2013393","DOI":"10.1016\/j.ymssp.2015.04.017"},{"key":"2909_CR27","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1016\/j.asoc.2009.08.008","volume":"10","author":"L \u00d6zbakir","year":"2010","unstructured":"\u00d6zbakir L, Baykaso\u011flu A, Kulluk S (2010) A soft computing-based approach for integrated training and rule extraction from artificial neural networks: DIFACONN-miner. Appl Soft Comput 10:304\u2013317","journal-title":"Appl Soft Comput"},{"key":"2909_CR28","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.asoc.2015.03.014","volume":"31","author":"S \u00d6zsen","year":"2015","unstructured":"\u00d6zsen S, Yucelbas C (2015) On the evolution of ellipsoidal recognition regions in artificial immune systems. Appl Soft Comput 31:210\u2013222","journal-title":"Appl Soft Comput"},{"key":"2909_CR29","volume-title":"Neural networks: a systematic introduction","author":"R Rojas","year":"2005","unstructured":"Rojas R (2005) Neural networks: a systematic introduction. Springer, Berlin"},{"issue":"5","key":"2909_CR30","doi-asserted-by":"publisher","first-page":"1188","DOI":"10.1109\/72.870050","volume":"11","author":"SK Shevade","year":"2000","unstructured":"Shevade SK, Keerthi SS, Bhattacharyya C, Murthy KRK (2000) Improvements to the SMO algorithm for SVM regression. IEEE Trans Neural Netw 11(5):1188\u20131193","journal-title":"IEEE Trans Neural Netw"},{"key":"2909_CR31","doi-asserted-by":"crossref","unstructured":"Szymczyk P, Szymczyk M (2015) Classification of geological structure using ground penetrating radar and Laplace transform artificial neural networks. Neurocomputing 148(19):354\u2013362","DOI":"10.1016\/j.neucom.2014.06.025"},{"key":"2909_CR32","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.ejor.2007.02.047","volume":"187","author":"KC Tan","year":"2008","unstructured":"Tan KC, Goh CK, Mamun AA, Ei EZ (2008) An evolutionary artificial immune system for multi-objective optimization. Eur J Oper Res 187:371\u2013392","journal-title":"Eur J Oper Res"},{"issue":"20","key":"2909_CR33","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.neucom.2011.10.044","volume":"116","author":"DD Wang","year":"2013","unstructured":"Wang DD, Chang PC, Zhang L, Wu JL, Zhou CL (2013) The stability analysis for a novel feedback neural network with partial connection. Neurocomputing 116(20):22\u201329","journal-title":"Neurocomputing"},{"issue":"1","key":"2909_CR34","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1504\/IJBIC.2013.053057","volume":"5","author":"R Xiao","year":"2013","unstructured":"Xiao R, Chen T (2013) Relationships of swarm intelligence and artificial immune system. Int J Bio-Inspired Comput 5(1):35\u201351","journal-title":"Int J Bio-Inspired Comput"},{"key":"2909_CR35","doi-asserted-by":"publisher","first-page":"1029","DOI":"10.1016\/j.asoc.2009.02.003","volume":"9","author":"A Yardimci","year":"2009","unstructured":"Yardimci A (2009) Soft computing in medicine. Appl Soft Comput 9:1029\u20131043","journal-title":"Appl Soft Comput"},{"issue":"7\u20139","key":"2909_CR36","doi-asserted-by":"publisher","first-page":"1244","DOI":"10.1016\/j.neucom.2010.01.005","volume":"73","author":"C Zhang","year":"2010","unstructured":"Zhang C, Yi Z (2010) A danger theory inspired artificial immune algorithm for on-line supervised two-class classification problem. Neurocomputing 73(7\u20139):1244\u20131255","journal-title":"Neurocomputing"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-017-2909-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-017-2909-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-017-2909-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,21]],"date-time":"2019-01-21T03:24:33Z","timestamp":1548041073000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-017-2909-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,3]]},"references-count":36,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["2909"],"URL":"https:\/\/doi.org\/10.1007\/s00500-017-2909-8","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,11,3]]},"assertion":[{"value":"3 November 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"All authors of this research declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}