{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:06:42Z","timestamp":1761581202163},"reference-count":69,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2014,5,26]],"date-time":"2014-05-26T00:00:00Z","timestamp":1401062400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1007\/s11704-014-3297-1","type":"journal-article","created":{"date-parts":[[2014,5,26]],"date-time":"2014-05-26T10:28:18Z","timestamp":1401100098000},"page":"537-562","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["RULES-IT: incremental transfer learning with RULES family"],"prefix":"10.1007","volume":"8","author":[{"given":"Hebah","family":"Elgibreen","sequence":"first","affiliation":[]},{"given":"Mehmet Sabih","family":"Aksoy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,26]]},"reference":[{"key":"3297_CR1","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1007\/978-3-540-68677-4_12","volume-title":"Artificial General Intelligence","author":"E Yudkowsky","year":"2007","unstructured":"Yudkowsky E. Levels of organization in general intelligence. In: Goertzel B, Pennachin C, eds. Artificial General Intelligence. Berlin: Springer, 2007, 389\u2013501"},{"key":"3297_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-540-68677-4_1","volume-title":"Artificial General Intelligence","author":"C Pennachin","year":"2007","unstructured":"Pennachin C, Goertzel B. Contemporary approaches to artificial general intelligence. In: Goertzel B, Pennachin C, eds. Artificial General Intelligence. SpringerLink, 2007, 1\u201328"},{"key":"3297_CR3","volume-title":"Kimera Systems","author":"M Shita","year":"2013","unstructured":"Shita M, Gilman N, Deighton N, Pedersen M, Dodsworth C, Oana J. Kimera Systems, 2013. Available: http:\/\/kimerasystems.com"},{"key":"3297_CR4","first-page":"3339","volume":"6","author":"M S Aksoy","year":"2010","unstructured":"Aksoy M S, Mathkour H, Alasoos B A. Performance evaluation of RULES-3 induction system for data mining. International Journal of Innovative Computing, Information and Control, 2010, 6: 3339\u20133346","journal-title":"International Journal of Innovative Computing, Information and Control"},{"key":"3297_CR5","first-page":"249","volume":"31","author":"S B Kotsiantis","year":"2007","unstructured":"Kotsiantis S B. Supervised machine learning: a review of classification techniques. Informatica (03505596), 2007, 31: 249\u2013268","journal-title":"Informatica (03505596)"},{"key":"3297_CR6","unstructured":"Cios K J, Swiniarski RW, Pedrycz W, Kurgan L A, Cios K, Swiniarski R, Kurgan L. Supervised learning: decision trees, rule algorithms, and their hybrids. Data Mining, eds. US: Springer, 2007, 81\u2013417"},{"key":"3297_CR7","first-page":"95","volume-title":"Proceedings of the 16th International Conference on Information and Software Technologies","author":"I Birzniece","year":"2010","unstructured":"Birzniece I. The use of inductive learning in information systems. In: Proceedings of the 16th International Conference on Information and Software Technologies. 2010, 95\u2013101"},{"key":"3297_CR8","first-page":"1","volume-title":"Frontiers of Computer Science","author":"Z Qin","year":"2013","unstructured":"Qin Z, Wan T. Hybrid bayesian estimation tree learning with discrete and fuzzy labels. Frontiers of Computer Science, 2013, 1\u201312"},{"key":"3297_CR9","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/TSMCB.2005.852983","volume":"36","author":"L A Kurgan","year":"2006","unstructured":"Kurgan L A, Cios K J, Dick S. Highly scalable and robust rule learner: performance evaluation and comparison. IEEE Systems, Man, and Cybernetics-Part B: Cybernetics, 2006, 36: 32\u201353","journal-title":"IEEE Systems, Man, and Cybernetics-Part B: Cybernetics"},{"key":"3297_CR10","doi-asserted-by":"crossref","first-page":"1345","DOI":"10.1109\/TKDE.2009.191","volume":"22","author":"S J Pan","year":"2010","unstructured":"Pan S J, Yang Q. A Survey on transfer learning. IEEE Transactions on Knowledge and Data Engineering, 2010, 22: 1345\u20131359","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"3297_CR11","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/s00500-008-0323-y","volume":"13","author":"J Alcal\u00e1-Fdez","year":"2009","unstructured":"Alcal\u00e1-Fdez J, S\u00e1nchez L, Garc\u00eda S, Jesus M J d, Ventura S, Garrell J M, Otero J, Romero C, Bacardit J, Rivas V M, Fern\u00e1ndez J C, Herrera F. KEEL: a software tool to assess evolutionary algorithms to data mining problems. Soft Computing, 2009, 13: 307\u2013318","journal-title":"Soft Computing"},{"key":"3297_CR12","first-page":"255","volume":"17","author":"J Alcal\u00e1-Fdez","year":"2011","unstructured":"Alcal\u00e1-Fdez J, Fernandez A, Luengo J, Derrac J, Garc\u00eda S, S\u00e1nchez L, Herrera F. KEEL data-mining software tool: data set repository, integration of algorithms and experimental analysis framework. Journal of Multiple-Valued Logic and Soft Computing, 2011, 17: 255\u2013287","journal-title":"Journal of Multiple-Valued Logic and Soft Computing"},{"key":"3297_CR13","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4899-4541-9","volume-title":"An Introduction to the Bootstrap","author":"B Efron","year":"1993","unstructured":"Efron B, Tibshirani R. An Introduction to the Bootstrap. USA: Chapman & Hall, 1993"},{"key":"3297_CR14","doi-asserted-by":"crossref","first-page":"51","DOI":"10.3390\/mca13010051","volume":"13","author":"M S Aksoy","year":"2008","unstructured":"Aksoy M S. A review of rules family of algorithms. Mathematical and Computational Applications, 2008, 13: 51\u201360","journal-title":"Mathematical and Computational Applications"},{"key":"3297_CR15","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/S0957-4174(99)80008-6","volume":"8","author":"D T Pham","year":"1995","unstructured":"Pham D T, Aksoy M S. RULES: a simple rule extraction system. Expert Systems with Applications, 1995, 8: 59\u201365","journal-title":"Expert Systems with Applications"},{"key":"3297_CR16","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1016\/0954-1810(93)90011-4","volume":"8","author":"D T Pham","year":"1993","unstructured":"Pham D T, Aksoy M S. An algorithm for automatic rule induction. Artificial Intelligence in Engineering, 1993, 8: 277\u2013282","journal-title":"Artificial Intelligence in Engineering"},{"key":"3297_CR17","first-page":"115","volume":"5","author":"D T Pham","year":"1995","unstructured":"Pham D T, Aksoy M S. A new algorithm for inductive learning. Journal of Systems Engenering, 1995, 5: 115\u2013122","journal-title":"Journal of Systems Engenering"},{"key":"3297_CR18","first-page":"917","volume-title":"Proceedings of the 3rd World Congress on Expert Systems","author":"D T Pham","year":"1996","unstructured":"Pham D T, Dimov S S. The RULES-3 plus inductive learning algorithm. In: Proceedings of the 3rd World Congress on Expert Systems. 1996, 917\u2013924"},{"issue":"3","key":"3297_CR19","doi-asserted-by":"crossref","first-page":"318","DOI":"10.3390\/mca15030318","volume":"15","author":"H I Mathkour","year":"2010","unstructured":"Mathkour H I. RULES3-EXT improvement on RULES-3 induction algorithm. Mathematical and Computational Applications, 2010, 15(3): 318\u2013324","journal-title":"Mathematical and Computational Applications"},{"key":"3297_CR20","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1243\/0954405971516239","volume":"211","author":"D T Pham","year":"1997","unstructured":"Pham D T, Dimov S S. An algorithm for incremental inductive learning. Journal of Engineering Manufacture, 1997, 211: 239\u2013249","journal-title":"Journal of Engineering Manufacture"},{"key":"3297_CR21","volume-title":"Proceedings of the 3rd Virtual International Conference on Innovative Production Machines and Systems","author":"D T Pham","year":"2007","unstructured":"Pham D T, Soroka A J. An immune-network inspired rule generation algorithm (RULES-IS). In: Proceedings of the 3rd Virtual International Conference on Innovative Production Machines and Systems. 2007"},{"issue":"12","key":"3297_CR22","first-page":"1273","volume":"217","author":"D T Pham","year":"2003","unstructured":"Pham D T, Bigot S, Dimov S S. RULES-5: a rule induction algorithm for classification problems involving continuous attributes. Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science, 2003, 217(12): 1273\u20131286","journal-title":"Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science"},{"key":"3297_CR23","first-page":"1433","volume":"220","author":"D T Pham","year":"2006","unstructured":"Pham D T, Bigot S, Dimov S S. RULES-F: a fuzzy inductive learning algorithm. Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science, 2006, 220: 1433\u20131447","journal-title":"Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science"},{"issue":"7","key":"3297_CR24","first-page":"1018","volume":"225","author":"S Bigot","year":"2011","unstructured":"Bigot S. A new rule space representation scheme for rule induction in classification and control applications. Proceedings of the Institution of Mechanical Engineers, Part I: Journal of Systems and Control Engineering, 2011, 225(7): 1018\u20131038","journal-title":"Proceedings of the Institution of Mechanical Engineers, Part I: Journal of Systems and Control Engineering"},{"key":"3297_CR25","first-page":"6","volume-title":"Proceedings of the 31st Annual Conference of IEEE Industrial Electronics Society","author":"D T Pham","year":"2005","unstructured":"Pham D T, Afify A A. RULES-6: a simple rule induction algorithm for supporting decision making. In: Proceedings of the 31st Annual Conference of IEEE Industrial Electronics Society. 2005, 6"},{"key":"3297_CR26","doi-asserted-by":"crossref","first-page":"1435","DOI":"10.1109\/TKDE.2011.101","volume":"24","author":"K Shehzad","year":"2012","unstructured":"Shehzad K. EDISC: a class-tailored discretization technique for rulebased classification. IEEE Transactions on Knowledge and Data Engineering, 2012, 24: 1435\u20131447","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"3297_CR27","first-page":"537","volume":"220","author":"A A Afify","year":"2006","unstructured":"Afify A A, Pham D T. SRI: a scalable rule induction algorithm. Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science, 2006, 220: 537\u2013552","journal-title":"Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science"},{"key":"3297_CR28","unstructured":"ElGibreen H, Aksoy M S. RULES-TL: a simple and improved RULES algorithm for incomplete and large data. Journal of Theoretical and Applied Information Technology, 2013, 47"},{"key":"3297_CR29","first-page":"42","volume-title":"Proceedings of the 2013 International Conference on Machine Learning and Data Mining","author":"H ElGibreen","year":"2013","unstructured":"ElGibreen H, Aksoy M S. Multi model transfer learning with RULES family. In: Proceedings of the 2013 International Conference on Machine Learning and Data Mining. 2013, 42\u201356"},{"key":"3297_CR30","first-page":"699","volume-title":"European Conference on Machine Learning","author":"J Ramon","year":"2007","unstructured":"Ramon J, Driessens K, Croonenborghs T. Transfer learning in reinforcement learning problems through partial policy recycling: machine learning. In: Kok J, Koronacki J, Mantaras R, Matwin S, Mladenic D, Skowron A, eds. European Conference on Machine Learning. Berlin: Springer, 2007, 4701: 699\u2013707"},{"key":"3297_CR31","first-page":"617","volume-title":"Proceedings of the 10th International Conferance of Autonomous Agents and Multiagent Systems","author":"M Taylor","year":"2011","unstructured":"Taylor M, Suay H B, Chernova S. Integrating reinforcement learning with human demonstrations of varying ability. In: Proceedings of the 10th International Conferance of Autonomous Agents and Multiagent Systems. 2011, 617\u2013624"},{"key":"3297_CR32","unstructured":"Mahmud M. On universal transfer learning algorithmic learning theory. In: Hutter M, Servedio R, Takimoto E, eds. Berlin: Springer, 2007, 4754: 135\u2013149"},{"key":"3297_CR33","volume-title":"Proceedings of the 2007 International Conference on Automated Planning and Scheduling Workshop on Artificial Intelligence Planning and Learning","author":"M Taylor","year":"2007","unstructured":"Taylor M, Kuhlmann G, Stone P. Accelerating search with transferred heuristics. In: Proceedings of the 2007 International Conference on Automated Planning and Scheduling Workshop on Artificial Intelligence Planning and Learning. 2007"},{"key":"3297_CR34","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1007\/s11704-010-0102-7","volume":"4","author":"Q Yang","year":"2010","unstructured":"Yang Q. Three challenges in data mining. Frontiers of Computer Science in China, 2010, 4: 324\u2013333","journal-title":"Frontiers of Computer Science in China"},{"key":"3297_CR35","first-page":"7","volume":"4","author":"Y Liu","year":"2011","unstructured":"Liu Y. A Review about transfer learning methods and applications. In: Proceedings of the 2011 International Conference on Information and Network Technology. 2011, 4: 7\u201311","journal-title":"Proceedings of the 2011 International Conference on Information and Network Technology"},{"key":"3297_CR36","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/978-1-4614-3223-4_7","volume-title":"Mining Text Data","author":"W Pan","year":"2012","unstructured":"Pan W, Zhong E, Yang Q. Transfer learning for text mining. Mining Text Data, 2012, 223\u2013257"},{"key":"3297_CR37","first-page":"420","volume-title":"Proceedings of the 2010 International Conference on Image Analysis and Signal Processing","author":"Y F Xie","year":"2010","unstructured":"Xie Y F, Su S Z, Li S Z. A pedestrian classification method based on transfer learning. In: Proceedings of the 2010 International Conference on Image Analysis and Signal Processing. 2010, 420\u2013425"},{"key":"3297_CR38","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1016\/j.patrec.2010.08.009","volume":"32","author":"E Rodner","year":"2011","unstructured":"Rodner E, Denzler J. Learning with few examples for binary and multiclass classification using regularization of randomized trees. Pattern Recognition Letters, 2011, 32: 244\u2013251","journal-title":"Pattern Recognition Letters"},{"key":"3297_CR39","first-page":"647","volume-title":"Proceedings of the the IEEE Congress on Evolutionary Computation New Orleans","author":"J I Est\u00e9vez","year":"2011","unstructured":"Est\u00e9vez J I, Toledo P A, Alay\u00f3n S. Using an induced relational decision tree for rule injection in a learning classifier system. In: Proceedings of the the IEEE Congress on Evolutionary Computation New Orleans. 2011, 647\u2013754"},{"key":"3297_CR40","first-page":"369","volume":"1925","author":"H Bostr\u00f6m","year":"2000","unstructured":"Bostr\u00f6m H. Induction of recursive transfer tules. In: Cussens J, D\u017eezroski S, eds. Learning Language in Logic. Berlin: Springer, 2000, 1925: 369\u2013450","journal-title":"Learning Language in Logic"},{"key":"3297_CR41","volume-title":"DEFT guessing: using inductive transfer to improve rule evaluation from limited data","author":"M D Reid","year":"2007","unstructured":"Reid M D. DEFT guessing: using inductive transfer to improve rule evaluation from limited data. Dissertation for the Doctoral Degree of Philosophy. Sydney: University of New South Wales, 2007"},{"key":"3297_CR42","first-page":"726","volume-title":"Proceedings of the 2007 International Joint Conference on Neural Networks","author":"JW Lee","year":"2007","unstructured":"Lee JW, Giraud-Carrier C. Transfer learning in decision trees. In: Proceedings of the 2007 International Joint Conference on Neural Networks. 2007, 726\u2013731"},{"key":"3297_CR43","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/s11704-009-0013-7","volume":"3","author":"B Lu","year":"2009","unstructured":"Lu B, Wang X, Utiyama M. Incorporating prior knowledge into learning by dividing training data. Frontiers of Computer Science in China, 2009, 3: 109\u2013122","journal-title":"Frontiers of Computer Science in China"},{"issue":"Suppl1","key":"3297_CR44","doi-asserted-by":"crossref","first-page":"S17","DOI":"10.1016\/j.jbi.2011.04.009","volume":"44","author":"P Ganchev","year":"2011","unstructured":"Ganchev P, Malehorn D, Bigbee W L, Gopalakrishnan V. Transfer learning of classification rules for biomarker discovery and verification from molecular profiling studies. Journal of Biomedical Informatics, 2011, 44(Suppl 1): S17\u2013S23","journal-title":"Journal of Biomedical Informatics"},{"key":"3297_CR45","first-page":"496","volume-title":"Proceedings of the 5th National Conference on Artificial Intelligence","author":"J C Schlimmer","year":"1986","unstructured":"Schlimmer J C, Fisher D. A case study of incremental concept induction. In: Proceedings of the 5th National Conference on Artificial Intelligence. 1986, 496\u2013501"},{"key":"3297_CR46","first-page":"107","volume-title":"Proceedings of the 5th International Conference on Machine Learning","author":"P E Utgoff","year":"1988","unstructured":"Utgoff P E. ID5: an incremental ID3. In: Proceedings of the 5th International Conference on Machine Learning. 1988, 107\u2013120"},{"key":"3297_CR47","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1023\/A:1022699900025","volume":"4","author":"P E Utgoff","year":"1989","unstructured":"Utgoff P E. Incremental induction of decision trees. Machine Learning, 1989, 4: 161\u2013186","journal-title":"Machine Learning"},{"key":"3297_CR48","first-page":"1041","volume-title":"Proceedings of the 5th National Conference on Artificial Intelligence","author":"R S Michalski","year":"1986","unstructured":"Michalski R S, Mozetic I, Hong J, Lavrac N. The multi-purpose incremental learning system AQ15 and its testing application to three medical domains. In: Proceedings of the 5th National Conference on Artificial Intelligence. 1986, 1041\u20131045"},{"key":"3297_CR49","first-page":"177","volume-title":"Proceedings of the 8th International Conference on Computer Engineering and Applications","author":"H ElGibreen","year":"2014","unstructured":"ElGibreen H, Aksoy M S. RULES family: where does it stand in inductive learning? In: Proceedings of the 8th International Conference on Computer Engineering and Applications. 2014, 177\u2013186"},{"key":"3297_CR50","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1613\/jair.614","volume":"11","author":"R Maclin","year":"1999","unstructured":"Maclin R, Opitz D W. Popular ensemble methods: an empirical study. Journal of Artificial Intelligence Research, 1999, 11: 169\u2013198","journal-title":"Journal of Artificial Intelligence Research"},{"key":"3297_CR51","first-page":"498","volume":"6","author":"KW Hsu","year":"2012","unstructured":"Hsu KW, Srivastava J. Improving bagging performance through multialgorithm ensembles. Frontiers of Computer Science in China, 2012, 6: 498\u2013512","journal-title":"Frontiers of Computer Science in China"},{"key":"3297_CR52","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/s11704-007-0015-2","volume":"1","author":"S Srihari","year":"2007","unstructured":"Srihari S, Yang X, Ball G. Offline chinese handwriting recognition: an assessment of current technology. Frontiers of Computer Science in China, 2007, 1: 137\u2013155","journal-title":"Frontiers of Computer Science in China"},{"key":"3297_CR53","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1007\/s11704-007-0012-5","volume":"1","author":"R Dai","year":"2007","unstructured":"Dai R, Liu C, Xiao B. Chinese character recognition: history, status and prospects. Frontiers of Computer Science in China, 2007, 1: 126\u2013136","journal-title":"Frontiers of Computer Science in China"},{"issue":"5","key":"3297_CR54","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1243\/095440505X32274","volume":"219","author":"D T Pham","year":"2005","unstructured":"Pham D T, Afify A A. Machine-learning techniques and their applications in manufacturing. Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture, 2005, 219(5): 395\u2013412","journal-title":"Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture"},{"key":"3297_CR55","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1007\/s11704-009-0006-6","volume":"3","author":"P Lehre","year":"2009","unstructured":"Lehre P, Yao X. Runtime analysis of search heuristics on software engineering problems. Frontiers of Computer Science in China, 2009, 3: 64\u201372","journal-title":"Frontiers of Computer Science in China"},{"key":"3297_CR56","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/s11704-010-0388-5","volume":"5","author":"L Jiang","year":"2011","unstructured":"Jiang L. Learning random forests for ranking. Frontiers of Computer Science in China, 2011, 5: 79\u201386","journal-title":"Frontiers of Computer Science in China"},{"key":"3297_CR57","volume-title":"Proceedings of the 5th Virtual Conference on Innovative Production Machines and Systems","author":"S Bigot","year":"2009","unstructured":"Bigot S. A study of specialisation and classification heuristics used in covering algorithms. In: Proceedings of the 5th Virtual Conference on Innovative Production Machines and Systems. 2009"},{"key":"3297_CR58","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1007\/s10994-009-5162-2","volume":"78","author":"F Janssen","year":"2010","unstructured":"Janssen F, F\u00fcrnkranz J. On the quest for optimal rule learning heuristics. Machine Learning, 2010, 78: 343\u2013379","journal-title":"Machine Learning"},{"key":"3297_CR59","first-page":"205","volume-title":"Proceedings of the 9th International Conference on Applications of Artificial Intelligence in Engineering","author":"C Lee","year":"1994","unstructured":"Lee C. Generating classification rules from databases. In: Proceedings of the 9th International Conference on Applications of Artificial Intelligence in Engineering. 1994: 205\u2013212"},{"key":"3297_CR60","volume-title":"Machine Learning","author":"T M Mitchell","year":"1997","unstructured":"Mitchell T M. Machine Learning. New York: McGraw-Hill, 1997"},{"key":"3297_CR61","volume-title":"Proceedings of the 13th International Joint Conference of Artificial Intelligence","author":"U M Fayyad","year":"1993","unstructured":"Fayyad U M, Irani K B. Multi-interval discretization of continuousvalued attributes for classification learning. In: Proceedings of the 13th International Joint Conference of Artificial Intelligence. 1993"},{"key":"3297_CR62","volume-title":"Technical Aspects of Data Mining","author":"Z Cai","year":"2001","unstructured":"Cai Z. Technical Aspects of Data Mining. Dissertation for the Doctoral degree. Cardiff, UK: University of Wales Cardiff, 2001"},{"key":"3297_CR63","first-page":"829","volume-title":"Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science","author":"D T Pham","year":"2005","unstructured":"Pham D T, Afify A A. Online discretization of continuous-valued attributes in rule induction. Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science, 2005: 829\u2013842"},{"key":"3297_CR64","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/s10115-011-0424-2","volume":"32","author":"J Luengo","year":"2012","unstructured":"Luengo J, Garc\u00eda S, Herrera F. On the choice of the best imputation methods for missing values considering three groups of classification methods. Knowledge and Information Systems, 2012, 32: 77\u2013108","journal-title":"Knowledge and Information Systems"},{"key":"3297_CR65","first-page":"573","volume-title":"Proceedings of the 4th International Conference of Rough Sets and Current Trends in Computing","author":"J Deogun","year":"2004","unstructured":"Deogun J, Spaulding W, Shuart B, Li D. Towards missing data imputation: a study of fuzzy k-means clustering method. In: Proceedings of the 4th International Conference of Rough Sets and Current Trends in Computing. 2004, 573\u2013579"},{"key":"3297_CR66","first-page":"115","volume-title":"Proceedings of the 12th International Conference on Machine Learning","author":"W W Cohen","year":"1995","unstructured":"Cohen W W. Fast effective rule induction. In: Proceedings of the 12th International Conference on Machine Learning. 1995, 115\u2013123"},{"key":"3297_CR67","first-page":"128","volume-title":"Proceedings of the 5th International Symposium on In formation Processing","author":"R Michalski","year":"1969","unstructured":"Michalski R. On the quasi-minimal solution of the general covering problem. In: Proceedings of the 5th International Symposium on In formation Processing. 1969, 128\u2013128"},{"key":"3297_CR68","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1109\/TSMCB.2004.842247","volume":"35","author":"S U Guan","year":"2005","unstructured":"Guan S U, Zhu F. An incremental approach to genetic algorithms based classification. IEEE Transactions on Systems, Man, and Cybernetics, Part B, 2005, 35: 227\u2013239, 2005","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part B"},{"key":"3297_CR69","volume-title":"C4.5: Programs for Machine Learning","author":"J R Quinlan","year":"1993","unstructured":"Quinlan J R. C4.5: Programs for Machine Learning. San Francisco: Morgan Kaufmann, 1993"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-014-3297-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11704-014-3297-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-014-3297-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,10]],"date-time":"2019-08-10T20:12:35Z","timestamp":1565467955000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11704-014-3297-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,26]]},"references-count":69,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,8]]}},"alternative-id":["3297"],"URL":"https:\/\/doi.org\/10.1007\/s11704-014-3297-1","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,5,26]]}}}