{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T03:17:20Z","timestamp":1740107840555,"version":"3.37.3"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"21","license":[{"start":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T00:00:00Z","timestamp":1533081600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100000315","name":"Aberystwyth University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100000315","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1007\/s00500-018-3427-z","type":"journal-article","created":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T10:25:09Z","timestamp":1533119109000},"page":"7059-7072","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Inter-variable correlation prediction with fuzzy connected-triples"],"prefix":"10.1007","volume":"22","author":[{"given":"Zhenpeng","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6375-6276","authenticated-orcid":false,"given":"Changjing","family":"Shang","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Shen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,1]]},"reference":[{"issue":"2","key":"3427_CR1","first-page":"9","volume":"6","author":"LM Aiello","year":"2012","unstructured":"Aiello LM, Barrat A, Schifanella R, Cattuto C, Markines B, Menczer F (2012) Friendship prediction and homophily in social media. ACM Trans Web (TWEB) 6(2):9","journal-title":"ACM Trans Web (TWEB)"},{"key":"3427_CR2","doi-asserted-by":"crossref","unstructured":"Akcora CG, Carminati B, Ferrari E (2011) Network and profile based measures for user similarities on social networks. In: Information Reuse and Integration (IRI), 2011 IEEE International Conference on, IEEE, pp 292\u2013298","DOI":"10.1109\/IRI.2011.6009562"},{"issue":"1\u20132","key":"3427_CR3","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s13721-012-0005-7","volume":"1","author":"W Almansoori","year":"2012","unstructured":"Almansoori W, Gao S, Jarada TN, Elsheikh AM, Murshed AN, Jida J, Alhajj R, Rokne J (2012) Link prediction and classification in social networks and its application in healthcare and systems biology. Netw Model Anal Health Inf Bioinf 1(1\u20132):27\u201336","journal-title":"Netw Model Anal Health Inf Bioinf"},{"key":"3427_CR4","unstructured":"Bache K, Lichman M (2013) Uci machine learning repository"},{"issue":"5","key":"3427_CR5","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1016\/j.outlook.2015.05.006","volume":"63","author":"SH Bae","year":"2015","unstructured":"Bae SH, Nikolaev A, Seo JY, Castner J (2015) Health care provider social network analysis: a systematic review. Nurs Outlook 63(5):566\u2013584","journal-title":"Nurs Outlook"},{"issue":"3\u20134","key":"3427_CR6","doi-asserted-by":"publisher","first-page":"590","DOI":"10.1016\/S0378-4371(02)00736-7","volume":"311","author":"AL Barab\u00e2si","year":"2002","unstructured":"Barab\u00e2si AL, Jeong H, N\u00e9da Z, Ravasz E, Schubert A, Vicsek T (2002) Evolution of the social network of scientific collaborations. Physica A: Stat Mech Appl 311(3\u20134):590\u2013614","journal-title":"Physica A: Stat Mech Appl"},{"key":"3427_CR7","doi-asserted-by":"crossref","unstructured":"Bengio Y, Grandvalet Y (2005) Bias in estimating the variance of k-fold cross-validation. In: Statistical modeling and analysis for complex data problems, Springer, pp 75\u201395","DOI":"10.1007\/0-387-24555-3_5"},{"issue":"4","key":"3427_CR8","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.physrep.2005.10.009","volume":"424","author":"S Boccaletti","year":"2006","unstructured":"Boccaletti S, Latora V, Moreno Y, Chavez M, Hwang DU (2006) Complex networks: structure and dynamics. Phys Rep 424(4):175\u2013308","journal-title":"Phys Rep"},{"issue":"1","key":"3427_CR9","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s10506-010-9085-9","volume":"18","author":"T Boongoen","year":"2010","unstructured":"Boongoen T, Shen Q, Price C (2010) Disclosing false identity through hybrid link analysis. Artif Intell Law 18(1):77\u2013102","journal-title":"Artif Intell Law"},{"key":"3427_CR10","doi-asserted-by":"publisher","first-page":"1705","DOI":"10.1109\/TSMCB.2011.2160341","volume":"41","author":"T Boongoen","year":"2011","unstructured":"Boongoen T, Shang C, Iam-On N, Shen Q (2011) Fuzzy orders-of-magnitude based link analysis for qualitative alias detection. IEEE Trans Syst, Man, Cybern, Part B: Cybern 41:1705\u20131714","journal-title":"IEEE Trans Syst, Man, Cybern, Part B: Cybern"},{"issue":"4","key":"3427_CR11","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MIS.2010.91","volume":"25","author":"B Bringmann","year":"2010","unstructured":"Bringmann B, Berlingerio M, Bonchi F, Gionis A (2010) Learning and predicting the evolution of social networks. IEEE Intell Syst 25(4):26\u201335","journal-title":"IEEE Intell Syst"},{"key":"3427_CR12","doi-asserted-by":"crossref","unstructured":"Chen HH, Gou L, Zhang XL, Giles CL (2012) Discovering missing links in networks using vertex similarity measures. In: Proceedings of the 27th annual ACM symposium on applied computing, ACM, pp 138\u2013143","DOI":"10.1145\/2245276.2245305"},{"key":"3427_CR13","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.eswa.2016.09.029","volume":"67","author":"AF Colladon","year":"2017","unstructured":"Colladon AF, Remondi E (2017) Using social network analysis to prevent money laundering. Expert Syst Appl 67:49\u201358","journal-title":"Expert Syst Appl"},{"key":"3427_CR14","volume-title":"Elements of information theory","author":"TM Cover","year":"2012","unstructured":"Cover TM, Thomas JA (2012) Elements of information theory. Wiley, London"},{"issue":"1","key":"3427_CR15","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/TFUZZ.2003.822678","volume":"12","author":"G Deschrijver","year":"2004","unstructured":"Deschrijver G, Cornelis C, Kerre EE (2004) On the representation of intuitionistic fuzzy t-norms and t-conorms. IEEE Trans Fuzzy Syst 12(1):45\u201361","journal-title":"IEEE Trans Fuzzy Syst"},{"issue":"1","key":"3427_CR16","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.artmed.2004.01.010","volume":"31","author":"E Dimitriadou","year":"2004","unstructured":"Dimitriadou E, Barth M, Windischberger C, Hornik K, Moser E (2004) A quantitative comparison of functional mri cluster analysis. Artif Intell Med 31(1):57\u201371","journal-title":"Artif Intell Med"},{"issue":"D1","key":"3427_CR17","doi-asserted-by":"publisher","first-page":"D808","DOI":"10.1093\/nar\/gks1094","volume":"41","author":"A Franceschini","year":"2012","unstructured":"Franceschini A, Szklarczyk D, Frankild S, Kuhn M, Simonovic M, Roth A, Lin J, Minguez P, Bork P, Von Mering C et al (2012) String v9. 1: protein-protein interaction networks, with increased coverage and integration. Nucleic Acids Res 41(D1):D808\u2013D815","journal-title":"Nucleic Acids Res"},{"issue":"2","key":"3427_CR18","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1287\/ijoc.1080.0292","volume":"21","author":"Z Huang","year":"2009","unstructured":"Huang Z, Lin DK (2009) The time-series link prediction problem with applications in communication surveillance. INFORMS J Comput 21(2):286\u2013303","journal-title":"INFORMS J Comput"},{"key":"3427_CR19","doi-asserted-by":"crossref","unstructured":"Jeh G, Widom J (2002) Simrank: a measure of structural-context similarity. In: Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, ACM, pp 538\u2013543","DOI":"10.1145\/775047.775126"},{"issue":"1","key":"3427_CR20","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/BF02289026","volume":"18","author":"L Katz","year":"1953","unstructured":"Katz L (1953) A new status index derived from sociometric analysis. Psychometrika 18(1):39\u201343","journal-title":"Psychometrika"},{"key":"3427_CR21","doi-asserted-by":"crossref","unstructured":"Kim M, Leskovec J (2011) The network completion problem: Inferring missing nodes and edges in networks. In: Proceedings of the 2011 SIAM International Conference on Data Mining, SIAM, pp 47\u201358","DOI":"10.1137\/1.9781611972818.5"},{"key":"3427_CR22","first-page":"49","volume-title":"Advances in Intelligent Systems and Computing","author":"Zhenpeng Li","year":"2017","unstructured":"Li Z, Shang C, Shen Q (2017) Fuzzy connected-triple for predicting inter-variable correlation. In: Proceedings of the 17th annual workshop on computational intelligence, pp 49\u201362"},{"issue":"01","key":"3427_CR23","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1142\/S0218488504002631","volume":"12","author":"J Liang","year":"2004","unstructured":"Liang J, Shi Z (2004) The information entropy, rough entropy and knowledge granulation in rough set theory. Int J Uncertain, Fuzziness Knowl-Based Syst 12(01):37\u201346","journal-title":"Int J Uncertain, Fuzziness Knowl-Based Syst"},{"issue":"7","key":"3427_CR24","doi-asserted-by":"publisher","first-page":"1019","DOI":"10.1002\/asi.20591","volume":"58","author":"D Liben-Nowell","year":"2007","unstructured":"Liben-Nowell D, Kleinberg J (2007) The link-prediction problem for social networks. J Assoc Inf Sci Technol 58(7):1019\u20131031","journal-title":"J Assoc Inf Sci Technol"},{"issue":"1","key":"3427_CR25","doi-asserted-by":"publisher","first-page":"18,001","DOI":"10.1209\/0295-5075\/89\/18001","volume":"89","author":"L L\u00fc","year":"2010","unstructured":"L\u00fc L, Zhou T (2010) Link prediction in weighted networks: the role of weak ties. EPL (Europhys Lett) 89(1):18,001","journal-title":"EPL (Europhys Lett)"},{"issue":"4","key":"3427_CR26","doi-asserted-by":"publisher","first-page":"046","DOI":"10.1103\/PhysRevE.80.046122","volume":"80","author":"L L\u00fc","year":"2009","unstructured":"L\u00fc L, Jin CH, Zhou T (2009) Similarity index based on local paths for link prediction of complex networks. Phys Rev E 80(4):046\u2013122","journal-title":"Phys Rev E"},{"issue":"2","key":"3427_CR27","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/BF02289146","volume":"14","author":"RD Luce","year":"1949","unstructured":"Luce RD, Perry AD (1949) A method of matrix analysis of group structure. Psychometrika 14(2):95\u2013116","journal-title":"Psychometrika"},{"issue":"3","key":"3427_CR28","doi-asserted-by":"publisher","first-page":"1373","DOI":"10.1016\/j.csda.2007.03.016","volume":"52","author":"DJ Marchette","year":"2008","unstructured":"Marchette DJ, Priebe CE (2008) Predicting unobserved links in incompletely observed networks. Comput Stat Data Anal 52(3):1373\u20131386","journal-title":"Comput Stat Data Anal"},{"issue":"4","key":"3427_CR29","first-page":"69","volume":"49","author":"V Mart\u00ednez","year":"2017","unstructured":"Mart\u00ednez V, Berzal F, Cubero JC (2017) A survey of link prediction in complex networks. ACM Comput Surve (CSUR) 49(4):69","journal-title":"ACM Comput Surve (CSUR)"},{"issue":"12","key":"3427_CR30","doi-asserted-by":"publisher","first-page":"10,402","DOI":"10.1016\/j.eswa.2012.01.202","volume":"39","author":"J Mori","year":"2012","unstructured":"Mori J, Kajikawa Y, Kashima H, Sakata I (2012) Machine learning approach for finding business partners and building reciprocal relationships. Expert Syst Appl 39(12):10,402\u201310,407","journal-title":"Expert Syst Appl"},{"issue":"3","key":"3427_CR31","doi-asserted-by":"publisher","first-page":"036","DOI":"10.1103\/PhysRevE.68.036122","volume":"68","author":"ME Newman","year":"2003","unstructured":"Newman ME, Park J (2003) Why social networks are different from other types of networks. Phys Rev E 68(3):036\u2013122","journal-title":"Phys Rev E"},{"key":"3427_CR32","unstructured":"Pavlov M, Ichise R (2007) Finding experts by link prediction in co-authorship networks. In: Proceedings of the 2nd International Conference on Finding Experts on the Web with Semantics-Volume 290, Citeseer, pp 42\u201355"},{"key":"3427_CR33","volume-title":"The blood group antigen factsbook","author":"ME Reid","year":"2012","unstructured":"Reid ME, Lomas-Francis C, Olsson ML (2012) The blood group antigen factsbook. Academic Press, New York"},{"key":"3427_CR34","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1109\/TKDE.2010.255","volume":"24","author":"Q Shen","year":"2012","unstructured":"Shen Q, Boongoen T (2012a) Extending data reliability measure to a filter approach for soft subspace clustering. IEEE Trans Knowl Data Eng 24:649\u2013664","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"3427_CR35","doi-asserted-by":"crossref","unstructured":"Shen Q, Boongoen T (2012b) Social network inspired approach to intelligent monitoring of intelligence data. Social Network Mining, Analysis and Research Trends: Techniques and Applications, IGI Publishing 24:79\u2013100","DOI":"10.4018\/978-1-61350-513-7.ch006"},{"issue":"2","key":"3427_CR36","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1214\/ss\/1177012580","volume":"4","author":"Stephen M. Stigler","year":"1989","unstructured":"Stigler SM (1989) Francis galton\u2019s account of the invention of correlation. Stat Sci pp 73\u201379","journal-title":"Statistical Science"},{"key":"3427_CR37","first-page":"583","volume":"3","author":"A Strehl","year":"2002","unstructured":"Strehl A, Ghosh J (2002) Cluster ensembles\u2013a knowledge reuse framework for combining multiple partitions. J Mach Learn Res 3:583\u2013617","journal-title":"J Mach Learn Res"},{"key":"3427_CR38","doi-asserted-by":"publisher","first-page":"1306","DOI":"10.1109\/TFUZZ.2016.2612265","volume":"25","author":"P Su","year":"2017","unstructured":"Su P, Shang C, Chen T, Shen Q (2017) Exploiting data reliability and fuzzy clustering for journal ranking. IEEE Trans Fuzzy Syst 25:1306\u20131319","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"3427_CR39","doi-asserted-by":"crossref","unstructured":"Thi DB, Ichise R, Le B (2014) Link prediction in social networks based on local weighted paths. In: Future Data and Security Engineering, Springer, pp 151\u2013163","DOI":"10.1007\/978-3-319-12778-1_12"},{"key":"3427_CR40","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1057\/eps.2016.16","volume":"16","author":"F Varone","year":"2017","unstructured":"Varone F, Ingold K, Jourdain C, Schneider V (2017) Studying policy advocacy through social network analysis. Eur Political Sci 16:322\u2013336","journal-title":"Eur Political Sci"},{"key":"3427_CR41","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.fss.2012.02.007","volume":"202","author":"N Verbiest","year":"2012","unstructured":"Verbiest N, Cornelis C, Victor P, Herrera-Viedma E (2012) Trust and distrust aggregation enhanced with path length incorporation. Fuzzy Sets Syst 202:61\u201374","journal-title":"Fuzzy Sets Syst"},{"key":"3427_CR42","doi-asserted-by":"crossref","DOI":"10.2991\/978-94-91216-08-4","volume-title":"Trust networks for recommender systems","author":"P Victor","year":"2011","unstructured":"Victor P, Cornelis C, De Cock M (2011a) Trust networks for recommender systems, vol 4. Springer, Berlin"},{"issue":"1","key":"3427_CR43","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.fss.2010.10.015","volume":"184","author":"P Victor","year":"2011","unstructured":"Victor P, Cornelis C, De Cock M, Herrera-Viedma E (2011b) Practical aggregation operators for gradual trust and distrust. Fuzzy Sets Syst 184(1):126\u2013147","journal-title":"Fuzzy Sets Syst"},{"issue":"1","key":"3427_CR44","first-page":"1","volume":"58","author":"P Wang","year":"2015","unstructured":"Wang P, Xu B, Wu Y, Zhou X (2015) Link prediction in social networks: the state-of-the-art. Sci China Inf Sci 58(1):1\u201338","journal-title":"Sci China Inf Sci"},{"key":"3427_CR45","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478","volume-title":"Social network analysis: methods and applications","author":"S Wasserman","year":"1994","unstructured":"Wasserman S, Faust K (1994) Social network analysis: methods and applications, vol 8. Cambridge University Press, Cambridge"},{"key":"3427_CR46","volume-title":"Advances in social network analysis: Research in the social and behavioral sciences","author":"S Wasserman","year":"1994","unstructured":"Wasserman S, Galaskiewicz J (1994) Advances in social network analysis: Research in the social and behavioral sciences, vol 171. Sage Publications, Beverley Hills"},{"key":"3427_CR47","doi-asserted-by":"crossref","unstructured":"Wu S, Sun J, Tang J (2013) Patent partner recommendation in enterprise social networks. In: Proceedings of the sixth ACM international conference on Web search and data mining, ACM, pp 43\u201352","DOI":"10.1145\/2433396.2433404"},{"issue":"2","key":"3427_CR48","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1093\/isr\/viv011","volume":"18","author":"ST Zech","year":"2016","unstructured":"Zech ST, Gabbay M (2016) Social network analysis in the study of terrorism and insurgency: From organization to politics. Int Stud Rev 18(2):214\u2013243","journal-title":"Int Stud Rev"},{"issue":"7","key":"3427_CR49","doi-asserted-by":"publisher","first-page":"1214","DOI":"10.1016\/j.ijproman.2016.06.005","volume":"34","author":"X Zheng","year":"2016","unstructured":"Zheng X, Le Y, Chan AP, Hu Y, Li Y (2016) Review of the application of social network analysis (sna) in construction project management research. Int J Project Manag 34(7):1214\u20131225","journal-title":"Int J Project Manag"},{"issue":"4","key":"3427_CR50","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1140\/epjb\/e2009-00335-8","volume":"71","author":"T Zhou","year":"2009","unstructured":"Zhou T, L\u00fc L, Zhang YC (2009) Predicting missing links via local information. Eur Phys J B 71(4):623\u2013630","journal-title":"Eur Phys J B"},{"key":"3427_CR51","doi-asserted-by":"crossref","unstructured":"Zhu J, Hong J, Hughes JG (2002) Using markov models for web site link prediction. In: Proceedings of the thirteenth ACM conference on Hypertext and hypermedia, ACM, pp 169\u2013170","DOI":"10.1145\/513338.513381"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-018-3427-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-018-3427-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-018-3427-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,31]],"date-time":"2019-07-31T20:36:23Z","timestamp":1564605383000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-018-3427-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,1]]},"references-count":51,"journal-issue":{"issue":"21","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["3427"],"URL":"https:\/\/doi.org\/10.1007\/s00500-018-3427-z","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2018,8,1]]},"assertion":[{"value":"1 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"All authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}]}}