{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:17:33Z","timestamp":1755998253602},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,5,4]],"date-time":"2013-05-04T00:00:00Z","timestamp":1367625600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1007\/s10115-013-0649-3","type":"journal-article","created":{"date-parts":[[2013,5,3]],"date-time":"2013-05-03T09:02:07Z","timestamp":1367571727000},"page":"541-557","source":"Crossref","is-referenced-by-count":13,"title":["Integration of artificial immune network and K-means for cluster analysis"],"prefix":"10.1007","volume":"40","author":[{"given":"R. J.","family":"Kuo","sequence":"first","affiliation":[]},{"given":"S. S.","family":"Chen","sequence":"additional","affiliation":[]},{"given":"W. C.","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"C. Y.","family":"Tsai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,5,4]]},"reference":[{"issue":"9","key":"649_CR1","doi-asserted-by":"crossref","first-page":"1443","DOI":"10.1016\/0031-3203(95)00022-R","volume":"28","author":"K Al-Sultan","year":"1995","unstructured":"Al-Sultan K (1995) A tabu search approach to the clustering problem. Pattern Recognit 28(9):1443\u20131451","journal-title":"Pattern Recognit"},{"key":"649_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TPAMI.1980.4766964","volume":"2","author":"J Bezdek","year":"1980","unstructured":"Bezdek J (1980) A convergence theorem for the fuzzy ISO-DATA clustering algorithm. IEEE Trans Pattern Anal Mach Intell 2:1\u20138","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"5","key":"649_CR3","doi-asserted-by":"crossref","first-page":"787","DOI":"10.1109\/72.159067","volume":"3","author":"J Bezdek","year":"1992","unstructured":"Bezdek J, Hathaway R (1992) Numerical convergence and interpretation of the fuzzy c-shells clustering algorithms. IEEE Trans Neural Netw 3(5):787\u2013793","journal-title":"IEEE Trans Neural Netw"},{"key":"649_CR4","doi-asserted-by":"crossref","unstructured":"Bezerra GB, Barra TV, De Castro LN, Von Zuben FJ (2005) Adaptive radius immune algorithm for data clustering. In: Lecture notes in computer science, vol 3627, pp 290\u2013303","DOI":"10.1007\/11536444_22"},{"issue":"3","key":"649_CR5","doi-asserted-by":"crossref","first-page":"4437","DOI":"10.1016\/j.eswa.2008.05.005","volume":"36","author":"CY Chiu","year":"2009","unstructured":"Chiu CY, Kuo IT, Lin CH (2009) Applying artificial immune system and ant algorithm in air-conditioner market segmentation. Expert Syst Appl 36(3):4437\u20134442","journal-title":"Expert Syst Appl"},{"key":"649_CR6","unstructured":"Estivill-Castro V, Lee I (2000a) AMOEBA: hierarchical clustering based on spatial proximity using delaunay diagram. In: Proceedings of the 9th international spatial data handling (SDH2000), pp 10\u201312"},{"key":"649_CR7","unstructured":"Estivill-Castro V, Lee I (2000b) AUTOCLUST: automatic clustering via boundary extraction for massive point data sets. In: Proceedings of the 5th international conference geo-computation, pp 23\u201325"},{"key":"649_CR8","first-page":"768","volume":"21","author":"E Forgy","year":"1965","unstructured":"Forgy E (1965) Clustering analysis of multivariate data: efficiency versus interpretability of classification. Biometrics 21:768\u2013769","journal-title":"Biometrics"},{"issue":"6","key":"649_CR9","doi-asserted-by":"crossref","first-page":"723","DOI":"10.1109\/91.811242","volume":"7","author":"AB Geva","year":"1999","unstructured":"Geva AB (1999) Hierarchical unsupervised fuzzy clustering. IEEE Trans Fuzzy Syst 7(6):723\u2013733","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"649_CR10","doi-asserted-by":"crossref","unstructured":"Guha S, Rastogi R, Shim K (1998) CURE: an efficient clustering algorithm for large databases. In: Proceedings ACM SIGMOD international conference management of data, pp 73\u201384","DOI":"10.1145\/276305.276312"},{"issue":"5","key":"649_CR11","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1016\/S0306-4379(00)00022-3","volume":"25","author":"S Guha","year":"2000","unstructured":"Guha S, Rastogi R, Shim K (2000) ROCK: a robust clustering algorithm for categorical attributes. Inf Syst 25(5):345\u2013366","journal-title":"Inf Syst"},{"issue":"2","key":"649_CR12","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/4235.771164","volume":"3","author":"L Hall","year":"1999","unstructured":"Hall L, \u00d6zyurt I, Bezdek J (1999) Clustering with a genetically optimized approach. IEEE Trans Evol Comput 3(2):103\u2013112","journal-title":"IEEE Trans Evol Comput"},{"key":"649_CR13","unstructured":"Hamerly G, Elkan C (2003) Learning the K in K-means. In: Proceedings of 7th annual conference on neural information processing systems"},{"key":"649_CR14","volume-title":"Data mining: concepts and techniques","author":"J Han","year":"2006","unstructured":"Han J, Kamber M (2006) Data mining: concepts and techniques, 2nd edn. Morgan Kaufmann, Los Altos, CA","edition":"2"},{"issue":"4","key":"649_CR15","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1023\/A:1026191011609","volume":"4","author":"E Hart","year":"2003","unstructured":"Hart E, Ross P (2003) Exploiting the analogy between the immune system and sparse distributed memories. Genet Program Evol Mach 4(4):333\u2013358","journal-title":"Genet Program Evol Mach"},{"issue":"8","key":"649_CR16","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/2.781637","volume":"32","author":"G Karypis","year":"1999","unstructured":"Karypis G, Han E, Kumar V (1999) Chameleon: hierarchical clustering using dynamic modeling. IEEE Comput 32(8):68\u201375","journal-title":"IEEE Comput"},{"key":"649_CR17","doi-asserted-by":"crossref","DOI":"10.1002\/9780470316801","volume-title":"Finding groups in data: an introduction to cluster analysis","author":"L Kaufman","year":"1990","unstructured":"Kaufman L, Rousseeuw P (1990) Finding groups in data: an introduction to cluster analysis. Wiley, London"},{"issue":"3","key":"649_CR18","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1109\/3477.764879","volume":"29","author":"K Krishna","year":"1999","unstructured":"Krishna K, Murty MN (1999) Genetic K-means algorithm. IEEE Trans Syst Man Cybern 29(3):433\u2013439","journal-title":"IEEE Trans Syst Man Cybern"},{"issue":"2","key":"649_CR19","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1109\/91.227387","volume":"1","author":"R Krishnapuram","year":"1993","unstructured":"Krishnapuram R, Keller J (1993) A possibilistic approach to clustering. IEEE Trans Fuzzy Syst 1(2):98\u2013110","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"649_CR20","doi-asserted-by":"crossref","first-page":"1709","DOI":"10.1016\/j.camwa.2005.05.009","volume":"50","author":"RJ Kuo","year":"2005","unstructured":"Kuo RJ, Wang HS, Hu TL, Chou SH (2005) Application of ant K-means on clustering analysis in data mining. Int J Comput Math Appl 50:1709\u20131724","journal-title":"Int J Comput Math Appl"},{"issue":"3","key":"649_CR21","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1007\/s00500-009-0539-5","volume":"15","author":"RJ Kuo","year":"2011","unstructured":"Kuo RJ, Wang MJ, Huang TW (2011) An application of particle swarm optimization algorithm to clustering analysis. J Soft Comput 15(3):533\u2013542","journal-title":"J Soft Comput"},{"key":"649_CR22","unstructured":"Li XY, Xu HL, Cheng ZG (2008) One immune simplex particle swarm optimization and it\u2019s application. In: Proceedings of the 4th international conference on natural computation, pp 331\u2013335"},{"key":"649_CR23","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/s10586-009-0110-2","volume":"13","author":"XF Liao","year":"2010","unstructured":"Liao XF, Hu LT, Jin H (2010) Energy optimization schemes in cluster with virtual machines. Clust Comput 13:113\u2013126","journal-title":"Clust Comput"},{"key":"649_CR24","unstructured":"Liu F, Wang Q, Gao X (2006) Survey of artificial immune system. In: Proceedings of the 1st international symposium on systems and control in aerospace and astronautics, pp 19\u201321"},{"issue":"1","key":"649_CR25","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.neucom.2011.04.046","volume":"78","author":"JTH Lo","year":"2012","unstructured":"Lo JTH (2012) A cortex-like learning machine for temporal hierarchical pattern clustering, detection, and recognition. Neurocomputing 78(1):89\u2013103","journal-title":"Neurocomputing"},{"key":"649_CR26","unstructured":"Lu B, Ju F (2012) An optimized genetic K-means clustering algorithm. In: Proceedings international conference on computer science and information processing, pp 1296\u20131299"},{"issue":"6","key":"649_CR27","doi-asserted-by":"crossref","first-page":"751","DOI":"10.1016\/j.pnsc.2008.08.004","volume":"19","author":"W Ma","year":"2009","unstructured":"Ma W, Jiao L, Gong M (2009) Immunodominance and clonal selection inspired multi-objective clustering. Prog Nat Sci 19(6):751\u2013758","journal-title":"Prog Nat Sci"},{"issue":"1","key":"649_CR28","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1016\/j.patcog.2011.05.007","volume":"45","author":"IA Maraziotis","year":"2012","unstructured":"Maraziotis IA (2012) A semi-supervised fuzzy clustering algorithm applied to gene expression data. Pattern Recognit 45(1):637\u2013648","journal-title":"Pattern Recognit"},{"issue":"3","key":"649_CR29","first-page":"1615","volume":"5","author":"Y Mu","year":"2009","unstructured":"Mu Y, Sheng A (2009) Evolutionary diagonal recurrent neural network with improved hybrid EP-PSO algorithm and its identification application. Int J Innov Comput Inf Control 5(3):1615\u20131624","journal-title":"Int J Innov Comput Inf Control"},{"issue":"10","key":"649_CR30","doi-asserted-by":"crossref","first-page":"1488","DOI":"10.1016\/j.comnet.2005.10.021","volume":"50","author":"O Nasraoui","year":"2006","unstructured":"Nasraoui O, Rojas C, Cardona C (2006) A framework for mining evolving trends in web data streams using dynamic learning and retrospective validation. Comput Netw 50(10):1488\u20131512","journal-title":"Comput Netw"},{"key":"649_CR31","unstructured":"Pasti R, Castro LND (2006) An immune and a gradient-based method to train multi-layer perceptron neural networks. In: Proceedings of the international joint conference on neural networks, pp 2075\u20132082"},{"issue":"9","key":"649_CR32","first-page":"3101","volume":"14","author":"MF Saad","year":"2011","unstructured":"Saad MF, Lee J, Kwon O, Alimi AM (2011) Context data clustering based on modified fuzzy possibilistic C-means algorithm for efficient context-aware computing services. Inf Int Interdiscip J 14(9):3101\u20133111","journal-title":"Inf Int Interdiscip J"},{"key":"649_CR33","doi-asserted-by":"crossref","unstructured":"Sotiropoulos DN, Tsihrintzis GA, Savvopoulos A, Virvou M (2006) Artificial immune system-based customer data clustering in an e-shopping application. In: Lecture notes in computer science, vol 4251, pp 960\u2013967","DOI":"10.1007\/11892960_115"},{"key":"649_CR34","doi-asserted-by":"crossref","unstructured":"Tang N, Vemuri V (2005) An artificial immune system approach to document clustering. In: Proceedings of the ACM symposium on applied computing, vol 2, pp 918\u2013922","DOI":"10.1145\/1066677.1066889"},{"key":"649_CR35","volume-title":"Taguchi\u2019s quality engineering handbook","author":"G Taguchi","year":"2005","unstructured":"Taguchi G, Chowdhury S, Wu Y (2005) Taguchi\u2019s quality engineering handbook. Wiley, London"},{"key":"649_CR36","doi-asserted-by":"crossref","unstructured":"Timmis J, Edmonds C (2004) A comment on Opt-AiNET: an immune network algorithm for optimisation. In: Lecture notes in computer science, vol 3102, pp 308\u2013317","DOI":"10.1007\/978-3-540-24854-5_32"},{"issue":"2","key":"649_CR37","first-page":"222","volume":"58","author":"J Vellingiri","year":"2011","unstructured":"Vellingiri J, Pandian SC (2011) Fuzzy possibilistic c-means algorithm for clustering on web usage mining to predict the user behavior. Eur J Sci Res 58(2):222\u2013230","journal-title":"Eur J Sci Res"},{"issue":"3","key":"649_CR38","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1109\/TNN.2005.845141","volume":"16","author":"R Xu","year":"2005","unstructured":"Xu R, Wunsch D (2005) Survey of clustering algorithms. IEEE Trans Neural Netw 16(3):645\u2013678","journal-title":"IEEE Trans Neural Netw"},{"key":"649_CR39","doi-asserted-by":"crossref","unstructured":"Yan Y, Chen L, Tjhi WC (2013) Semi-supervised fuzzy co-clustering algorithm for document categorization. Knowl Inf Syst 34(1):55\u201374","DOI":"10.1007\/s10115-011-0454-9"},{"key":"649_CR40","doi-asserted-by":"crossref","unstructured":"Younsi R, Wang W (2004) A new artificial immune system algorithm for clustering. In: Lecture notes in computer science, vol 3177, pp 58\u201364","DOI":"10.1007\/978-3-540-28651-6_9"},{"issue":"8","key":"649_CR41","doi-asserted-by":"crossref","first-page":"729","DOI":"10.1007\/s00500-006-0116-0","volume":"11","author":"X Yue","year":"2007","unstructured":"Yue X, Abraham A, Chi ZX, Hao YY, Mo H (2007) Artificial immune system inspired behavior-based anti-spam filter. Soft Comput 11(8):729\u2013740","journal-title":"Soft Comput"},{"key":"649_CR42","doi-asserted-by":"crossref","unstructured":"Zhang T, Ramakrishnan R, Livny M (1996) BIRCH: an efficient data clustering method for very large databases. In: Proceedings of the ACM SIGMOD conference management of data, pp 103\u2013114","DOI":"10.1145\/235968.233324"},{"issue":"3","key":"649_CR43","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1007\/s10115-011-0389-1","volume":"30","author":"W Zhao","year":"2012","unstructured":"Zhao W, He Q, Ma H, Shi Z (2012) Effective semi-supervised document clustering via active learning with instance-level constraints. Knowl Inf Syst 30(3):569\u2013587","journal-title":"Knowl Inf Syst"},{"key":"649_CR44","doi-asserted-by":"crossref","unstructured":"Zeng S, Tong X, Sang N, Huang R (2013) A study on semi-supervised FCM algorithm. Knowl Inf Syst (in press)","DOI":"10.1007\/s10115-012-0521-x"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-013-0649-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10115-013-0649-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-013-0649-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,13]],"date-time":"2019-07-13T10:26:19Z","timestamp":1563013579000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10115-013-0649-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,4]]},"references-count":44,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,9]]}},"alternative-id":["649"],"URL":"https:\/\/doi.org\/10.1007\/s10115-013-0649-3","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,5,4]]}}}