{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:57:58Z","timestamp":1761663478456,"version":"3.37.3"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,7,8]],"date-time":"2016-07-08T00:00:00Z","timestamp":1467936000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,7,8]],"date-time":"2016-07-08T00:00:00Z","timestamp":1467936000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["1052339"],"award-info":[{"award-number":["1052339"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Artif Intell Rev"],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1007\/s10462-016-9497-3","type":"journal-article","created":{"date-parts":[[2016,7,8]],"date-time":"2016-07-08T08:17:15Z","timestamp":1467965835000},"page":"139-155","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Predicting the occurrence of adverse events using an adaptive neuro-fuzzy inference system (ANFIS) approach with the help of ANFIS input selection"],"prefix":"10.1007","volume":"48","author":[{"given":"Erman","family":"\u00c7ak\u0131t","sequence":"first","affiliation":[]},{"given":"Waldemar","family":"Karwowski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,8]]},"reference":[{"issue":"3","key":"9497_CR1","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/s10462-012-9381-8","volume":"43","author":"MM Adnan","year":"2015","unstructured":"Adnan MM, Sarkheyli A, Zain AM, Haron H (2015) Fuzzy logic for modeling machining process: a review. Artif Intell Rev 43(3):345\u2013379","journal-title":"Artif Intell Rev"},{"issue":"2","key":"9497_CR2","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1111\/0033-0124.5502005","volume":"55","author":"RA Beck","year":"2003","unstructured":"Beck RA (2003) Remote sensing and GIS as counterterrorism tools in the Afghanistan war: a case study of the Zhawar Kili region. Prof Geogr 55(2):170\u2013179","journal-title":"Prof Geogr"},{"issue":"2","key":"9497_CR3","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1080\/10242690600863935","volume":"18","author":"C Berrebi","year":"2007","unstructured":"Berrebi C, Lakdawalla D (2007) How does terrorism risk vary across space and time? An analysis based on the Israeli experience. Def Peace Econ 18(2):113\u2013131","journal-title":"Def Peace Econ"},{"issue":"5824","key":"9497_CR4","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1126\/science.316.5824.534","volume":"316","author":"Y Bhattacharjee","year":"2007","unstructured":"Bhattacharjee Y (2007) Pentagon asks academics for help in understanding its enemies. Science 316(5824):534\u2013535","journal-title":"Science"},{"key":"9497_CR5","doi-asserted-by":"crossref","unstructured":"Brown D, Dalton J, Hoyle H (2004) Spatial forecast methods for terrorist events in urban environments. In: Intelligence and security informatics, pp 426-435","DOI":"10.1007\/978-3-540-25952-7_33"},{"issue":"3","key":"9497_CR6","doi-asserted-by":"publisher","first-page":"252","DOI":"10.7763\/IJMLC.2015.V5.516","volume":"5","author":"E Cakit","year":"2015","unstructured":"Cakit E, Karwowski W (2015) Assessing the relationship between economic factors and adverse events in an active war theater using fuzzy inference system approach. Int J Mach Learn Comput 5(3):252","journal-title":"Int J Mach Learn Comput"},{"issue":"2","key":"9497_CR7","first-page":"88","volume":"37","author":"J Clancy","year":"2007","unstructured":"Clancy J, Crossett C (2007) Measuring effectiveness in irregular warfare. Parameters 37(2):88","journal-title":"Parameters"},{"key":"9497_CR8","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1016\/j.asoc.2014.09.028","volume":"25","author":"E \u00c7ak\u0131t","year":"2014","unstructured":"\u00c7ak\u0131t E, Karwowski W, Bozkurt H, Ahram T, Thompson W, Mikusinski P, Lee G (2014) Investigating the relationship between adverse events and infrastructure development in an active war theater using soft computing techniques. Appl Soft Comput 25:204\u2013214","journal-title":"Appl Soft Comput"},{"key":"9497_CR9","doi-asserted-by":"publisher","first-page":"3876","DOI":"10.1016\/j.promfg.2015.07.897","volume":"3","author":"E \u00c7ak\u0131t","year":"2015","unstructured":"\u00c7ak\u0131t E, Karwowski W (2015a) Understanding patterns of infrastructure development in the active war theater of Afghanistan over the period 2002\u20132010. Proced Manuf 3:3876\u20133882","journal-title":"Proced Manuf"},{"issue":"10","key":"9497_CR10","doi-asserted-by":"publisher","first-page":"945","DOI":"10.1080\/08839514.2015.1097140","volume":"29","author":"E \u00c7ak\u0131t","year":"2015","unstructured":"\u00c7ak\u0131t E, Karwowski W (2015b) Fuzzy inference modeling with the help of fuzzy clustering for predicting the occurrence of adverse events in an active theater of war. Appl Artif Intell 29(10):945\u2013961","journal-title":"Appl Artif Intell"},{"issue":"6","key":"9497_CR11","doi-asserted-by":"publisher","first-page":"603","DOI":"10.14311\/NNW.2015.25.030","volume":"25","author":"E \u00c7akit","year":"2015","unstructured":"\u00c7akit E, Durgun B, Cetik O (2015) A neural network approach for assessing the relationship between grip strength and hand anthropometry. Neural Network World 25(6):603","journal-title":"Neural Network World"},{"key":"9497_CR12","first-page":"153","volume":"21","author":"S Demirci","year":"2007","unstructured":"Demirci S, Suen IS (2007) Spatial pattern analysis of pkk-kongra gel terror incidents in Turkey: 2003\u20132004. Underst Respond Terror Phenom Multi-Dimens Perspect 21:153","journal-title":"Underst Respond Terror Phenom Multi-Dimens Perspect"},{"issue":"5831","key":"9497_CR13","doi-asserted-by":"publisher","first-page":"1564","DOI":"10.1126\/science.316.5831.1564b","volume":"316","author":"MD Drapeau","year":"2007","unstructured":"Drapeau MD, Mignone BK (2007) Culture, conflict, and$$\\ldots $$ climate? Science 316(5831):1564\u20131564","journal-title":"Science"},{"issue":"2","key":"9497_CR14","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/s10462-011-9308-9","volume":"41","author":"CP Faustino","year":"2014","unstructured":"Faustino CP, Novaes CP, Pinheiro CAM, Carpinteiro OA (2014) Improving the performance of fuzzy rules-based forecasters through application of FCM algorithm. Artif Intell Rev 41(2):287\u2013300","journal-title":"Artif Intell Rev"},{"issue":"3","key":"9497_CR15","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/s10462-009-9152-3","volume":"33","author":"RA Gupta","year":"2010","unstructured":"Gupta RA, Kumar R, Bansal AK (2010) Artificial intelligence applications in permanent magnet brushless DC motor drives. Artif Intell Rev 33(3):175\u2013186","journal-title":"Artif Intell Rev"},{"key":"9497_CR16","doi-asserted-by":"publisher","first-page":"878","DOI":"10.1016\/j.procs.2013.01.092","volume":"16","author":"HA Hahn","year":"2013","unstructured":"Hahn HA (2013) The conundrum of verification and validation of social science-based models. Proced Comput Sci 16:878\u2013887","journal-title":"Proced Comput Sci"},{"issue":"5","key":"9497_CR17","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1109\/21.256541","volume":"23","author":"JSR Jang","year":"1993","unstructured":"Jang JSR (1993) ANFIS: adaptive-network-based fuzzy inference system. IEEE Trans Syst Man Cybern 23(5):665\u2013685","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"9497_CR18","volume-title":"Neuro-fuzzy and soft computing : a computational approach to learning and machine intelligence","author":"JSR Jang","year":"1997","unstructured":"Jang JSR, Sun CT, Mizutani E (1997) Neuro-fuzzy and soft computing : a computational approach to learning and machine intelligence. Prentice Hall, Upper Saddle River"},{"key":"9497_CR19","doi-asserted-by":"crossref","unstructured":"Jang JS (1996) Input selection for ANFIS learning. In: Proceedings of the fifth IEEE international conference on fuzzy systems, vol 2, pp 1493\u20131499","DOI":"10.1109\/FUZZY.1996.552396"},{"key":"9497_CR20","first-page":"9","volume-title":"Reducing terrorism through situational crime prevention: crime prevention studies","author":"SD Johnson","year":"2009","unstructured":"Johnson SD, Braithwaite E (2009) Spatio-temporal modeling of insurgency in Iraq. In: Freilich JD, Newman GR (eds) Reducing terrorism through situational crime prevention: crime prevention studies, vol 25. Criminal Justice Press, Monsey, pp 9\u201332"},{"issue":"1","key":"9497_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10940-011-9159-1","volume":"28","author":"G LaFree","year":"2012","unstructured":"LaFree G, Dugan L, Xie M, Piyusha Singh P (2012) Spatial and temporal patterns of terrorist attacks by ETA 1970 to 2007. J Quant Criminol 28(1):1\u201329","journal-title":"J Quant Criminol"},{"issue":"11","key":"9497_CR22","doi-asserted-by":"publisher","first-page":"862","DOI":"10.1080\/1057610X.2011.611933","volume":"34","author":"RM Medina","year":"2011","unstructured":"Medina RM, Siebeneck LK, Hepner GF (2011) A geographic information systems (GIS) analysis of spatiotemporal patterns of terrorist incidents in Iraq 2004\u20132009. Stud Confl Terror 34(11):862\u2013882","journal-title":"Stud Confl Terror"},{"key":"9497_CR23","volume-title":"Foundations of neuro-fuzzy systems","author":"D Nauck","year":"1997","unstructured":"Nauck D, Klawonn F, Kruse R (1997) Foundations of neuro-fuzzy systems. Wiley, New York"},{"key":"9497_CR24","unstructured":"Numrich SK, Tolk A (2010) Challenges for human, social, cultural, and behavioral modeling. SCS M&S Magazine (January), 1\u20139"},{"key":"9497_CR25","unstructured":"Open Source Center (OSC) (2009, April 30). Afghanistan-geospatial analysis reveal patterns in terrorist incidents 2004\u20132008. http:\/\/www.fas.org\/irp\/dni\/osc\/afghan-geospat.pdf . Accessed3 May 2012"},{"key":"9497_CR26","doi-asserted-by":"crossref","unstructured":"Rusnak DM, Kennedy LW, Eldivan IS, Caplan JM (2012) Analyzing terrorism using spatial analysis techniques: a case study of Turkish cities. In: Lum C, Kennedy LW (eds) Evidence-based counterterrorism policy. Springer, New York, pp 167\u2013185","DOI":"10.1007\/978-1-4614-0953-3_8"},{"key":"9497_CR27","unstructured":"Schmorrow D, Nicholson D (2011) Advances in cross-cultural decision making. Chapter 38, CRC Press, Boca Raton, pp 374\u2013384"},{"issue":"4","key":"9497_CR28","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1111\/j.1467-9272.2005.502.x","volume":"57","author":"J Shroder","year":"2005","unstructured":"Shroder J (2005) Remote sensing and GIS as counterterrorism tools in the Afghanistan war: reality, plus the results of media hyperbole. Prof Geogr 57(4):592\u2013597","journal-title":"Prof Geogr"},{"key":"9497_CR29","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1080\/10576100902961789","volume":"32","author":"LK Siebeneck","year":"2009","unstructured":"Siebeneck LK, Medina RM, Yamada I, Hepner GF (2009) Spatial and temporal analyses of terrorist incidents in Iraq, 2004\u20132006. Stud Confl Terror 32:591\u2013610","journal-title":"Stud Confl Terror"},{"key":"9497_CR30","unstructured":"Stanton J (2007) Evolutionary cognitive neuroscience: dual use discipline for understanding and managing complexity and altering warfare. In: International studies association conference, Portugal. http:\/\/ssrn.com\/abstract=1946864"},{"key":"9497_CR31","unstructured":"The 2013 Human Development Report (2013) The rise of the south: human progress in a diverse world. HDRO (Human Development Report Office), United Nations Development Programme, pp 144\u2013147. Accessed 20 May 2013"},{"key":"9497_CR32","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1080\/09546550902950308","volume":"21","author":"J Webb","year":"2009","unstructured":"Webb J, Cutter SL (2009) The geography of U.S. terrorist incidents, 1970\u20132004. Terror Political Violence 21:428\u2013449","journal-title":"Terror Political Violence"},{"issue":"1","key":"9497_CR33","doi-asserted-by":"publisher","first-page":"79","DOI":"10.3354\/cr030079","volume":"30","author":"CJ Willmott","year":"2005","unstructured":"Willmott CJ, Matsuura K (2005) Advantages of the mean absolute error (MAE) over the root mean square error (RMSE) in assessing average model performance. Clim Res 30(1):79","journal-title":"Clim Res"}],"container-title":["Artificial Intelligence Review"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10462-016-9497-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-016-9497-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-016-9497-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-016-9497-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,19]],"date-time":"2023-08-19T04:50:01Z","timestamp":1692420601000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10462-016-9497-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,8]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,8]]}},"alternative-id":["9497"],"URL":"https:\/\/doi.org\/10.1007\/s10462-016-9497-3","relation":{},"ISSN":["0269-2821","1573-7462"],"issn-type":[{"type":"print","value":"0269-2821"},{"type":"electronic","value":"1573-7462"}],"subject":[],"published":{"date-parts":[[2016,7,8]]},"assertion":[{"value":"8 July 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}