{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T04:04:44Z","timestamp":1749873884793,"version":"3.41.0"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2019,12,11]],"date-time":"2019-12-11T00:00:00Z","timestamp":1576022400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,11]],"date-time":"2019-12-11T00:00:00Z","timestamp":1576022400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61433004","61627809"],"award-info":[{"award-number":["61433004","61627809"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61621004"],"award-info":[{"award-number":["61621004"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s00521-019-04649-0","type":"journal-article","created":{"date-parts":[[2019,12,11]],"date-time":"2019-12-11T14:06:52Z","timestamp":1576073212000},"page":"11621-11636","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Axiomatic fuzzy set theory-based fuzzy oblique decision tree with dynamic mining fuzzy rules"],"prefix":"10.1007","volume":"32","author":[{"given":"Yuliang","family":"Cai","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5702-4845","authenticated-orcid":false,"given":"Huaguang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Shaoxin","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Xianchang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"He","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,11]]},"reference":[{"issue":"16","key":"4649_CR1","doi-asserted-by":"publisher","first-page":"6283","DOI":"10.1016\/j.eswa.2013.05.044","volume":"40","author":"A L\u00f3pez-Chau","year":"2013","unstructured":"L\u00f3pez-Chau A, Cervantes J, L\u00f3pez-Garca L, Lamont FG (2013) Fisher\u2019s decision tree. Expert Syst Appl 40(16):6283\u20136291","journal-title":"Expert Syst Appl"},{"issue":"4","key":"4649_CR2","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1007\/s10044-016-0542-2","volume":"20","author":"Z Mirzamomen","year":"2017","unstructured":"Mirzamomen Z, Kangavari MR (2017) A framework to induce more stable decision trees for pattern classification. Pattern Anal Appl 20(4):991\u20131004","journal-title":"Pattern Anal Appl"},{"issue":"1","key":"4649_CR3","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/TSMCB.2011.2163392","volume":"42","author":"N Manwani","year":"2012","unstructured":"Manwani N, Sastry PS (2012) Geometric decision tree. IEEE Trans Syst Man Cybernet Part B (Cybernet) 42(1):181\u2013192","journal-title":"IEEE Trans Syst Man Cybernet Part B (Cybernet)"},{"issue":"1","key":"4649_CR4","doi-asserted-by":"publisher","first-page":"1051","DOI":"10.1007\/s00521-016-2418-1","volume":"28","author":"J Kevric","year":"2017","unstructured":"Kevric J, Jukic S, Subasi A (2017) An effective combining classifier approach using tree algorithms for network intrusion detection. Neural Comput Appl 28(1):1051\u20131058","journal-title":"Neural Comput Appl"},{"key":"4649_CR5","doi-asserted-by":"publisher","DOI":"10.1201\/9781315139470","volume-title":"Classification and regression trees","author":"L Breiman","year":"2017","unstructured":"Breiman L (2017) Classification and regression trees. Routledge, Abingdon"},{"issue":"7\u20138","key":"4649_CR6","doi-asserted-by":"publisher","first-page":"2387","DOI":"10.1007\/s00521-012-1196-7","volume":"23","author":"AT Azar","year":"2013","unstructured":"Azar AT, El-Metwally SM (2013) Decision tree classifiers for automated medical diagnosis. Neural Comput Appl 23(7\u20138):2387\u20132403","journal-title":"Neural Comput Appl"},{"key":"4649_CR7","volume-title":"C4.5: programs for machine learning","author":"JR Quinlan","year":"2014","unstructured":"Quinlan JR (2014) C4.5: programs for machine learning. Elsevier, Amsterdam"},{"key":"4649_CR8","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.patcog.2015.08.014","volume":"50","author":"HK Sok","year":"2016","unstructured":"Sok HK, Ooi MP, Kuang YC (2016) Multivariate alternating decision trees. Pattern Recogn 50:195\u2013209","journal-title":"Pattern Recogn"},{"issue":"11","key":"4649_CR9","first-page":"63","volume":"4","author":"PS Kumar","year":"2017","unstructured":"Kumar PS, Yung Y, Huan TL (2017) Neural network based decision trees using machine learning for alzheimer\u2019s diagnosis. Int J Comput Inf Sci 4(11):63\u201372","journal-title":"Int J Comput Inf Sci"},{"issue":"3","key":"4649_CR10","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1007\/s10489-016-0785-z","volume":"45","author":"CC Wu","year":"2016","unstructured":"Wu CC, Chen YL, Liu YH (2016) Decision tree induction with a constrained number of leaf nodes. Appl Intell 45(3):673\u2013685","journal-title":"Appl Intell"},{"issue":"1","key":"4649_CR11","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/TSM.2011.2173372","volume":"25","author":"SK Shukla","year":"2012","unstructured":"Shukla SK, Tiwari MK (2012) GA guided cluster based fuzzy decision tree for reactive ion etching modeling: a data mining approach. IEEE Trans Semicond Manuf 25(1):45\u201356","journal-title":"IEEE Trans Semicond Manuf"},{"key":"4649_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.datak.2012.12.001","volume":"84","author":"X Liu","year":"2013","unstructured":"Liu X, Feng X, Pedrycz W (2013) Extraction of fuzzy rules from fuzzy decision trees: an axiomatic fuzzy sets (AFS) approach. Data Knowl Eng 84:1\u201325","journal-title":"Data Knowl Eng"},{"issue":"1","key":"4649_CR13","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1109\/TFUZZ.2016.2646746","volume":"26","author":"A Segatori","year":"2018","unstructured":"Segatori A, Marcelloni F, Pedrycz W (2018) On distributed fuzzy decision trees for big data. IEEE Trans Fuzzy Syst 26(1):174\u2013192","journal-title":"IEEE Trans Fuzzy Syst"},{"issue":"4","key":"4649_CR14","first-page":"367","volume":"32","author":"NM Han","year":"2016","unstructured":"Han NM, Hao NC (2016) An algorithm to building a fuzzy decision tree for data classification problem based on the fuzziness intervals matching. J Comput Sci Cybernet 32(4):367\u2013380","journal-title":"J Comput Sci Cybernet"},{"key":"4649_CR15","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.asoc.2017.08.052","volume":"61","author":"S Sardari","year":"2017","unstructured":"Sardari S, Eftekhari M, Afsari F (2017) Hesitant fuzzy decision tree approach for highly imbalanced data classification. Appl Soft Comput 61:727\u2013741","journal-title":"Appl Soft Comput"},{"key":"4649_CR16","doi-asserted-by":"crossref","unstructured":"Tan PJ, Dowe DL (2006) Decision forests with oblique decision trees. In: Mexican international conference on artificial intelligence, Springer, Berlin, Heidelberg, pp 593\u2013603","DOI":"10.1007\/11925231_56"},{"issue":"1","key":"4649_CR17","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/TEVC.2002.806857","volume":"7","author":"E Cantu-Paz","year":"2003","unstructured":"Cantu-Paz E, Kamath C (2003) Inducing oblique decision trees with evolutionary algorithms. IEEE Trans Evol Comput 7(1):54\u201368","journal-title":"IEEE Trans Evol Comput"},{"issue":"1","key":"4649_CR18","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s40595-014-0024-7","volume":"2","author":"TN Do","year":"2015","unstructured":"Do TN, Lenca P, Lallich S (2015) Classifying many-class high-dimensional fingerprint datasets using random forest of oblique decision trees. Vietnam J Comput Sci 2(1):3\u201312","journal-title":"Vietnam J Comput Sci"},{"key":"4649_CR19","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.neucom.2013.01.067","volume":"135","author":"RC Barros","year":"2014","unstructured":"Barros RC, Jaskowiak PA, Cerri R (2014) A framework for bottom-up induction of oblique decision trees. Neurocomputing 135:3\u201312","journal-title":"Neurocomputing"},{"issue":"1","key":"4649_CR20","first-page":"197","volume":"5","author":"SP Patil","year":"2015","unstructured":"Patil SP, Badhe SV (2015) Geometric approach for induction of oblique decision tree. Int J Comput Sci Inf Technol 5(1):197\u2013201","journal-title":"Int J Comput Sci Inf Technol"},{"key":"4649_CR21","doi-asserted-by":"crossref","unstructured":"Rivera-Lopez R, Canul-Reich J (2017) A global search approach for inducing oblique decision trees using differential evolution. In: Canadian conference on artificial intelligence, Springer, Cham, pp 27\u201338","DOI":"10.1007\/978-3-319-57351-9_3"},{"key":"4649_CR22","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.csda.2015.11.006","volume":"96","author":"DC Wickramarachchi","year":"2016","unstructured":"Wickramarachchi DC, Robertson BL, Reale M et al (2016) HHCART: an oblique decision tree. Comput Stat Data Anal 96:12\u201323","journal-title":"Comput Stat Data Anal"},{"key":"4649_CR23","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.knosys.2016.08.009","volume":"111","author":"C Wang","year":"2016","unstructured":"Wang C, Shao M, He Q, Qian Y, Qi Y (2016) Feature subset selection based on fuzzy neighborhood rough sets. Knowl-Based Syst 111:173\u2013179","journal-title":"Knowl-Based Syst"},{"issue":"10","key":"4649_CR24","doi-asserted-by":"publisher","first-page":"1585","DOI":"10.1016\/j.neucom.2011.01.019","volume":"74","author":"Q He","year":"2011","unstructured":"He Q, Xie Z, Hu Q, Wu C (2011) Neighborhood based sample and feature selection for svm classification learning. Neurocomputing 74(10):1585\u20131594","journal-title":"Neurocomputing"},{"key":"4649_CR25","doi-asserted-by":"crossref","unstructured":"Zhang DW, Wang P, Qiu JQ, Jiang Y (2010) An improved approach to feature selection. In: International conference on machine learning and cybernetics, pp 488\u2013493","DOI":"10.1109\/ICMLC.2010.5581012"},{"issue":"2","key":"4649_CR26","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/S0165-0114(96)00298-9","volume":"95","author":"X Liu","year":"1998","unstructured":"Liu X (1998) The fuzzy sets and systems based on AFS structure, EI algebra and EII algebra. Fuzzy Sets Syst 95(2):179\u2013188","journal-title":"Fuzzy Sets Syst"},{"issue":"4","key":"4649_CR27","doi-asserted-by":"publisher","first-page":"1007","DOI":"10.1016\/j.ins.2006.07.011","volume":"177","author":"X Liu","year":"2007","unstructured":"Liu X, Chai T, Wang W, Liu W (2007) Approaches to the representations and logic operations of fuzzy concepts in the framework of axiomatic fuzzy set theory i. Inf Sci 177(4):1007\u20131026","journal-title":"Inf Sci"},{"issue":"3","key":"4649_CR28","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s40745-015-0059-3","volume":"2","author":"B Wang","year":"2015","unstructured":"Wang B, Liu XD, Wang LD (2015) Mining fuzzy association rules in the framework of AFS theory. Ann Data Sci 2(3):261\u2013270","journal-title":"Ann Data Sci"},{"issue":"4","key":"4649_CR29","first-page":"1775","volume":"28","author":"E Menga","year":"2015","unstructured":"Menga E, Dan A, Lu J, Liu X (2015) Ranking alternative strategies by SWOT analysis in the framework of the axiomatic fuzzy set theory and the ER approach. J Intell Fuzzy Syst 28(4):1775\u20131784","journal-title":"J Intell Fuzzy Syst"},{"issue":"11","key":"4649_CR30","first-page":"7","volume":"134","author":"LR Burra","year":"2016","unstructured":"Burra LR, Poosapati P (2016) A study of notations and illustrations of axiomatic fuzzy set theory. Int J Comput Appl 134(11):7\u201312","journal-title":"Int J Comput Appl"},{"key":"4649_CR31","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.neucom.2017.02.070","volume":"242","author":"Z Li","year":"2017","unstructured":"Li Z, Duan X, Zhang Q, Wang C, Wang Y, Liu W (2017) Multi-ethnic facial features extraction based on axiomatic fuzzy set theory. Neurocomputing 242:161\u2013177","journal-title":"Neurocomputing"},{"issue":"2","key":"4649_CR32","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/S0165-0114(97)00077-8","volume":"90","author":"LA Zadeh","year":"1997","unstructured":"Zadeh LA (1997) Toward a theory of fuzzy information granulation and its centrality in human reasoning and fuzzy logic. Fuzzy Sets Syst 90(2):111\u2013127","journal-title":"Fuzzy Sets Syst"},{"issue":"6","key":"4649_CR33","doi-asserted-by":"publisher","first-page":"914","DOI":"10.1109\/69.250074","volume":"5","author":"R Agrawal","year":"1993","unstructured":"Agrawal R, Imielinski T, Swami A (1993) Database mining: a performance perspective. IEEE Trans Knowl Data Eng 5(6):914\u2013925","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"1","key":"4649_CR34","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1016\/j.ejor.2011.04.022","volume":"218","author":"X Wang","year":"2012","unstructured":"Wang X, Liu X, Pedrycz W, Zhu X, Hu G (2012) Mining axiomatic fuzzy set association rules for classification problems. Eur J Oper Res 218(1):202\u2013210","journal-title":"Eur J Oper Res"},{"key":"4649_CR35","volume-title":"Best-first decision tree learning","author":"H Shi","year":"2007","unstructured":"Shi H (2007) Best-first decision tree learning. University of Waikato, Hamilton"},{"key":"4649_CR36","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36755-1_14","volume-title":"Multiclass alternating decision trees","author":"G Holmes","year":"2002","unstructured":"Holmes G, Pfahringer B, Kirkby R, Frank E, Hall M (2002) Multiclass alternating decision trees. Springer, Berlin"},{"key":"4649_CR37","unstructured":"Kohavi R (1996) Scaling up the accuracy of naive-bayes classifiers:a decision-tree hybrid. In: Second international conference on knowledge discovery and data mining"},{"key":"4649_CR38","volume-title":"Data mining: practical machine learning tools and techniques","author":"IH Witten","year":"2016","unstructured":"Witten IH, Frank E, Hall MA, Pal CJ (2016) Data mining: practical machine learning tools and techniques. Morgan Kaufmann, Burlington"},{"issue":"1","key":"4649_CR39","first-page":"1","volume":"7","author":"J Ar","year":"2006","unstructured":"Ar J (2006) Statistical comparisons of classifiers over multiple data sets. J Mach Learn Res 7(1):1\u201330","journal-title":"J Mach Learn Res"},{"issue":"2","key":"4649_CR40","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s10614-010-9205-3","volume":"36","author":"G Creamer","year":"2010","unstructured":"Creamer G, Freund Y (2010) Using boosting for financial analysis and performance prediction: application to s&p 500 companies, latin american adrs and banks. Comput Econ 36(2):133\u2013151","journal-title":"Comput Econ"},{"issue":"2","key":"4649_CR41","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1109\/TPWRS.2013.2283064","volume":"29","author":"C Liu","year":"2013","unstructured":"Liu C, Sun K, Rather ZH, Chen Z, Bak CL, Th\u00f8gersen P, Lund P (2013) A systematic approach for dynamic security assessment and the corresponding preventive control scheme based on decision trees. IEEE Trans Power Syst 29(2):717\u2013730","journal-title":"IEEE Trans Power Syst"},{"issue":"2","key":"4649_CR42","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.eij.2011.04.003","volume":"12","author":"MB Al Snousy","year":"2011","unstructured":"Al Snousy MB, El-Deeb HM, Badran K, Al Khlil IA (2011) Suite of decision tree-based classification algorithms on cancer gene expression data. Egypt Inform J 12(2):73\u201382","journal-title":"Egypt Inform J"},{"issue":"1","key":"4649_CR43","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.eswa.2011.06.013","volume":"39","author":"SSS Sindhu","year":"2012","unstructured":"Sindhu SSS, Geetha S, Kannan A (2012) Decision tree based light weight intrusion detection using a wrapper approach. Expert Syst Appl 39(1):129\u2013141","journal-title":"Expert Syst Appl"},{"issue":"10","key":"4649_CR44","doi-asserted-by":"publisher","first-page":"1637","DOI":"10.1016\/j.enbuild.2010.04.006","volume":"42","author":"Z Yu","year":"2010","unstructured":"Yu Z, Haghighat F, Fung BC, Yoshino H (2010) A decision tree method for building energy demand modeling. Energy Build 42(10):1637\u20131646","journal-title":"Energy Build"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-019-04649-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-019-04649-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-019-04649-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T08:23:06Z","timestamp":1749802986000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-019-04649-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,11]]},"references-count":44,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["4649"],"URL":"https:\/\/doi.org\/10.1007\/s00521-019-04649-0","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"type":"print","value":"0941-0643"},{"type":"electronic","value":"1433-3058"}],"subject":[],"published":{"date-parts":[[2019,12,11]]},"assertion":[{"value":"22 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 November 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 December 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that there are no financial and personal relationships with other people or organizations that can inappropriately influence our work. And there are no potential conflicts of interest with respect to this work.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}