{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T05:18:52Z","timestamp":1761110332593},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2017,8,14]],"date-time":"2017-08-14T00:00:00Z","timestamp":1502668800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1007\/s10796-017-9794-7","type":"journal-article","created":{"date-parts":[[2017,8,14]],"date-time":"2017-08-14T19:03:30Z","timestamp":1502737410000},"page":"969-974","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Guest Editorial: Computational Intelligence and Applications"],"prefix":"10.1007","volume":"19","author":[{"given":"Vijayan","family":"Sugumaran","sequence":"first","affiliation":[]},{"given":"T. V.","family":"Geetha","sequence":"additional","affiliation":[]},{"given":"D.","family":"Manjula","sequence":"additional","affiliation":[]},{"given":"Hema","family":"Gopal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,14]]},"reference":[{"key":"9794_CR1","doi-asserted-by":"publisher","unstructured":"Afflerbach, P., Hohendorf, M., & Manderscheid, J. (2017). Design it like Darwin - a value-based application of evolutionary algorithms for proper and unambiguous business process redesign. Information Systems Frontiers, 19(5). doi:\n10.1007\/s10796-016-9715-1\n\n.","DOI":"10.1007\/s10796-016-9715-1"},{"key":"9794_CR2","doi-asserted-by":"publisher","unstructured":"Anand, P. G., & Geetha, T. V. (2017). Improving the freshness of the search engines by a probabilistic approach based incremental crawler. Information Systems Frontiers, 19(5). doi:\n10.1007\/s10796-016-9701-7\n\n.","DOI":"10.1007\/s10796-016-9701-7"},{"key":"9794_CR3","doi-asserted-by":"publisher","unstructured":"B\u00fcsch, S., Nissen, V., & W\u00fcnscher, A. (2017). Automatic classification of data-warehouse-data for information lifecycle management using machine learning techniques. Information Systems Frontiers, 19(5). doi:\n10.1007\/s10796-016-9680-8\n\n.","DOI":"10.1007\/s10796-016-9680-8"},{"key":"9794_CR4","doi-asserted-by":"publisher","unstructured":"Castelli, M., Goncalves, I., Trujillo, L., & Popovi\u010d, A. (2017). An evolutionary system for ozone concentration forecasting. Information Systems Frontiers, 19(5). doi:\n10.1007\/s10796-016-9706-2\n\n.","DOI":"10.1007\/s10796-016-9706-2"},{"key":"9794_CR5","doi-asserted-by":"publisher","unstructured":"Choi, Y., & Lee, H. (2017). Data properties and the performance of sentiment classification for electronic commerce applications. Information Systems Frontiers, 19(5). doi:\n10.1007\/s10796-017-9741-7\n\n.","DOI":"10.1007\/s10796-017-9741-7"},{"key":"9794_CR6","doi-asserted-by":"crossref","unstructured":"Duch, W. (2007). What is computational intelligence and where is it going? In Studies in Computational Intelligence (Vol. 63, pp. 1\u201313).","DOI":"10.1007\/978-3-540-71984-7_1"},{"key":"9794_CR7","unstructured":"Eberhart, R. C., & Shi, Y. (2007). Computational intelligence - concepts to implementations. Elsevier 2007, ISBN 978-1-55860-759-0, pp. I-XX, 1\u2013467."},{"key":"9794_CR8","doi-asserted-by":"publisher","DOI":"10.1002\/9780470512517","volume-title":"Computational","author":"AP Engelbrecht","year":"2007","unstructured":"Engelbrecht, A. P. (2007). Computational. Intelligence: An Introduction, Second Edition. Wiley. doi:\n10.1002\/9780470512517\n\n."},{"key":"9794_CR9","doi-asserted-by":"publisher","unstructured":"Joan, F. S. P., & Valli, S. (2017). An enhanced text detection technique for the visually impaired to read text. Information Systems Frontiers, 19(5). doi:\n10.1007\/s10796-016-9699-x\n\n.","DOI":"10.1007\/s10796-016-9699-x"},{"key":"9794_CR10","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/j.future.2016.08.021","volume":"66","author":"JJ Jung","year":"2017","unstructured":"Jung, J. J. (2017). Computational collective intelligence with big data: Challenges and opportunities. Future Generation Computer Systems, 66, 87\u201388.","journal-title":"Future Generation Computer Systems"},{"key":"9794_CR11","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-43505-2","volume-title":"Springer handbook of computational intelligence","author":"J Kacprzyk","year":"2015","unstructured":"Kacprzyk, J., & Pedrycz, W. (2015). Springer handbook of computational intelligence. Berlin: Springer."},{"key":"9794_CR12","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4471-5013-8","volume-title":"Computational intelligence: A methodological introduction","author":"R Kruse","year":"2013","unstructured":"Kruse, R., Borgelt, C., Klawonn, F., Moewes, C., Steinbrecher, M., & Held, P. (2013). Computational intelligence: A methodological introduction. London: Springer-Verlag."},{"key":"9794_CR13","doi-asserted-by":"publisher","first-page":"196976","DOI":"10.1155\/2015\/196976","volume":"2015","author":"E L\u00f3pez-Rubio","year":"2015","unstructured":"L\u00f3pez-Rubio, E., Elizondo, D. A., Grootveld, M., Jerez, J. M., & Luque-Baena, R. M. (2015). Computational intelligence techniques in medicine. Computational and Mathematical Methods in Medicine, 2015, 196976. doi:\n10.1155\/2015\/196976\n\n.","journal-title":"Computational and Mathematical Methods in Medicine"},{"key":"9794_CR14","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.compbiomed.2016.11.013","volume":"80","author":"S Raitha","year":"2017","unstructured":"Raitha, S., Vogela, E. P., Aneesa, N., Keulb, C., Guthb, J. F., Edelhoffb, D., & Fischera, H. (2017). Artificial neural networks as a powerful numerical tool to classify specific features of a tooth based on 3D scan data. Computers in Biology and Medicine, 80, 65\u201376.","journal-title":"Computers in Biology and Medicine"},{"key":"9794_CR15","doi-asserted-by":"publisher","unstructured":"Sanchez-Segura, M. I., Dugarte-Pe\u00f1a, G. L., Medina-Dominguez, F., & Ruiz-Robles, A. (2017). A model of biomimetic process assets to simulate their impact on strategic goals. Information Systems Frontiers, 19(5). doi:\n10.1007\/s10796-016-9702-6\n\n.","DOI":"10.1007\/s10796-016-9702-6"},{"key":"9794_CR16","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.future.2016.04.022","volume":"66","author":"SI Shafiq","year":"2017","unstructured":"Shafiq, S. I., Sanin, C., Szczerbicki, E., & Toro, C. (2017). Towards an experience based collective computational intelligence for manufacturing. Future Generation Computer Systems, 66, 89\u201399.","journal-title":"Future Generation Computer Systems"},{"key":"9794_CR17","doi-asserted-by":"publisher","unstructured":"Sivrikaya, B. T., Cebi, F., Turan, H. H., Kasap, N., & Delen, D. (2017). A fuzzy long-term investment planning model for a GenCo in a hybrid electricity market considering climate change impacts. Information Systems Frontiers, 19(5). doi:\n10.1007\/s10796-016-9707-1\n\n.","DOI":"10.1007\/s10796-016-9707-1"},{"key":"9794_CR18","doi-asserted-by":"publisher","unstructured":"Xu, Z., Xuan, J., Liu, Y., Choo, K. R., Mei, L., & Hu, C. (2017). Building spatial temporal relation graph of concepts pair using web repository. Information Systems Frontiers, 19(5). doi:\n10.1007\/s10796-016-9676-4\n\n.","DOI":"10.1007\/s10796-016-9676-4"},{"key":"9794_CR19","doi-asserted-by":"publisher","unstructured":"Zhao, W., Zeng, Q., Zheng, G. & Yang, L. (2017). The resource allocation model for multi-process instances based on particle swarm optimization. Information Systems Frontiers, 19(5). doi:\n10.1007\/s10796-017-9743-5\n\n.","DOI":"10.1007\/s10796-017-9743-5"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10796-017-9794-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-017-9794-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-017-9794-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,9,11]],"date-time":"2017-09-11T16:14:02Z","timestamp":1505146442000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-017-9794-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,14]]},"references-count":19,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["9794"],"URL":"https:\/\/doi.org\/10.1007\/s10796-017-9794-7","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8,14]]}}}