{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:58:08Z","timestamp":1761663488815,"version":"3.37.3"},"reference-count":59,"publisher":"Tech Science Press","issue":"3","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61305057"],"award-info":[{"award-number":["61305057"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61573173"],"award-info":[{"award-number":["61573173"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61562050"],"award-info":[{"award-number":["61562050"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Intelligent Automation &amp; Soft Computing"],"published-print":{"date-parts":[[2017,7,3]]},"DOI":"10.1080\/10798587.2016.1212509","type":"journal-article","created":{"date-parts":[[2016,8,3]],"date-time":"2016-08-03T08:44:56Z","timestamp":1470213896000},"page":"519-533","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":10,"title":["An intensive study on rule acquisition in formal decision contexts based on minimal closed label concept lattices"],"prefix":"10.32604","volume":"23","author":[{"given":"Jinhai","family":"Li","sequence":"first","affiliation":[{"name":"Faculty of Science, Kunming University of Science and Technology, Kunming, Yunnan, China"}]},{"given":"Chenchen","family":"Huang","sequence":"additional","affiliation":[{"name":"Faculty of Science, Kunming University of Science and Technology, Kunming, Yunnan, China"}]},{"given":"Changlin","family":"Mei","sequence":"additional","affiliation":[{"name":"School of Mathematics and Statistics, Xi\u2019an Jiaotong University, Xi\u2019an, Shaanxi, China"}]},{"given":"Yunqiang","family":"Yin","sequence":"additional","affiliation":[{"name":"Faculty of Science, Kunming University of Science and Technology, Kunming, Yunnan, China"}]}],"member":"17807","published-online":{"date-parts":[[2016,8,3]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2010.2041006"},{"key":"CIT0002","first-page":"31","volume":"96","author":"Bordat J.P.","year":"1986","journal-title":"Math\u00e9matiques et Sciences Humaines"},{"key":"CIT0003","first-page":"209","volume":"3","author":"Burusco A.","year":"1994","journal-title":"Mathware and Soft Computing"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2012.648457"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.09.026"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1016\/j.matcom.2014.08.004"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2004.05.001"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.10.010"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2003.06.013"},{"volume-title":"Clustering and classification techniques for the biosciences","year":"2007","author":"Fielding A.H.","key":"CIT0012"},{"volume-title":"UCI Repository of machine learning databases","year":"2010","author":"Frank A.","key":"CIT0013"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44583-8"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-59830-2"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1111\/coin.1995.11.issue-2"},{"key":"CIT0017","first-page":"5","volume":"95","author":"Guigues J.L.","year":"1986","journal-title":"Math\u00e9matiques et Sciences Humaines"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1016\/j.disc.2011.04.033"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1142\/S0129054108005681"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(01)00087-5"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2011.09.016"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.07.007"},{"key":"CIT0023","doi-asserted-by":"crossref","first-page":"169","DOI":"10.3233\/FI-1996-272305","volume":"27","author":"Kent R.E.","year":"1996","journal-title":"Fundamenta Informaticae"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2003.11.002"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1080\/09528130210164170"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-013-0150-z"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2011.02.011"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.11.041"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2012.07.005"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1080\/18756891.2014.967009"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.12.010"},{"key":"CIT0033","doi-asserted-by":"crossref","first-page":"15","DOI":"10.3233\/FI-2011-551","volume":"111","author":"Li T.J.","year":"2011","journal-title":"Fundamenta Informaticae"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2010.03.006"},{"key":"CIT0035","first-page":"107","volume":"6","author":"Liang J.Y.","year":"2006","journal-title":"International Journal of Computer Science and Network Security"},{"key":"CIT0036","first-page":"35","volume":"113","author":"Luxenburger M.","year":"1991","journal-title":"Mathematiques et Sciences Humaines"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2012.03.087"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2010.03.007"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1007\/b72293"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(99)00108-8"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4379(99)00003-4"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1007\/BF01001956"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1080\/03081079.2013.862377"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.08.006"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1080\/03081070600913650"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2013.04.011"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.07.038"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88411-8"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2013.02.003"},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2008.07.004"},{"key":"CIT0053","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2008.02.005"},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-008-0067-4"},{"key":"CIT0056","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-009-7798-3_15"},{"key":"CIT0057","doi-asserted-by":"publisher","DOI":"10.1080\/09528130210164161"},{"key":"CIT0058","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.8"},{"key":"CIT0062","doi-asserted-by":"publisher","DOI":"10.1023\/B:DAMI.0000040429.96086.c7"},{"key":"CIT0063","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2012.08.004"},{"key":"CIT0064","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2013.06.012"},{"key":"CIT0065","first-page":"4883","volume":"177","author":"Zhang W.X.","year":"2007","journal-title":"Variable threshold concept lattices. Information Sciences"},{"volume-title":"Uncertain decision making based on rough sets","year":"2005","author":"Zhang W.X.","key":"CIT0066"},{"key":"CIT0067","doi-asserted-by":"publisher","DOI":"10.1360\/122004-104"},{"key":"CIT0068","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.07.022"}],"container-title":["Intelligent Automation &amp; Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/autosoftjournal.net\/viewPaper.php?paper=1212509","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,24]],"date-time":"2020-09-24T18:20:05Z","timestamp":1600971605000},"score":1,"resource":{"primary":{"URL":"http:\/\/autosoftjournal.net\/paperShow.php?paper=1212509"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,3]]},"references-count":59,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2016,11,25]]},"published-print":{"date-parts":[[2017,7,3]]}},"alternative-id":["10.1080\/10798587.2016.1212509"],"URL":"https:\/\/doi.org\/10.1080\/10798587.2016.1212509","relation":{},"ISSN":["1079-8587","2326-005X"],"issn-type":[{"type":"print","value":"1079-8587"},{"type":"electronic","value":"2326-005X"}],"subject":[],"published":{"date-parts":[[2016,8,3]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tasj20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tasj20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}