{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:45:49Z","timestamp":1740170749515,"version":"3.37.3"},"reference-count":21,"publisher":"Tech Science Press","issue":"3","funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61172018","61100009"],"award-info":[{"award-number":["61172018","61100009"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Scientific Research Program of Shaanxi Province Education Department","award":["15JS077"],"award-info":[{"award-number":["15JS077"]}]},{"name":"Project of Xi\u2019an social science planning foundation","award":["16J133"],"award-info":[{"award-number":["16J133"]}]},{"name":"CERNET Innovation Project","award":["NGII20150707"],"award-info":[{"award-number":["NGII20150707"]}]},{"name":"Xi\u2019an BeiLin Science Research Plan","award":["GX1626","GX1623"],"award-info":[{"award-number":["GX1626","GX1623"]}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Intelligent Automation &amp; Soft Computing"],"published-print":{"date-parts":[[2017,7,3]]},"DOI":"10.1080\/10798587.2016.1220133","type":"journal-article","created":{"date-parts":[[2016,9,10]],"date-time":"2016-09-10T21:53:22Z","timestamp":1473544402000},"page":"509-517","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":4,"title":["Activity recognition method based on weighted LDA data fusion"],"prefix":"10.32604","volume":"23","author":[{"given":"Junhuai","family":"Li","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Xi\u2019an University of Technology, Xi\u2019an, China"},{"name":"Shaanxi Key Laboratory for Network Computing and Security Technology, Xi\u2019an, China"}]},{"given":"Yang","family":"An","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Xi\u2019an University of Technology, Xi\u2019an, China"}]},{"given":"Rong","family":"Fei","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Xi\u2019an University of Technology, Xi\u2019an, China"},{"name":"Shaanxi Key Laboratory for Network Computing and Security Technology, Xi\u2019an, China"}]},{"given":"Huaijun","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Xi\u2019an University of Technology, Xi\u2019an, China"},{"name":"Shaanxi Key Laboratory for Network Computing and Security Technology, Xi\u2019an, China"}]},{"given":"Qisong","family":"Yan","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Xi\u2019an University of Technology, Xi\u2019an, China"}]}],"member":"17807","published-online":{"date-parts":[[2016,9,9]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1097\/01.yco.0000133836.34543.7e"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1080\/10798587.2015.1118275"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2012.12.014"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.08.048"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2014.2313473"},{"key":"CIT0010","first-page":"41","author":"Damer N.","year":"2013","journal-title":"Biometric Measurements and Systems for Security and Medical Applications"},{"issue":"1","key":"CIT0012","first-page":"1","volume":"39","author":"Dempster A.","year":"1977","journal-title":"Journal of the Royal Statistical Society"},{"key":"CIT0013","unstructured":"Harrington, P. (2012). Machine learning in action. Manning Publications."},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2011.08.001"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2015.02.110"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.08.096"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2012.2235075"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.3233\/AIS-160372"},{"key":"CIT0020","first-page":"1","volume":"121","author":"Pan L.","year":"2013","journal-title":"IEEE International Conference on Networks"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.3390\/s16020184"},{"key":"CIT0023","first-page":"4362","author":"Qi G.","year":"2012","journal-title":"Intelligent Control and Automation"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2015.10.012"},{"key":"CIT0026","first-page":"180","volume":"137","author":"Rubin D.B.","year":"2010","journal-title":"Journal of Marketing Research"},{"key":"CIT0029","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1007\/978-81-322-2205-7_51","volume":"31","author":"Sathyadevan S.","year":"2015","journal-title":"Computational Intelligence in Data Mining"},{"key":"CIT0030","first-page":"655","volume":"8","author":"Sun Y.","year":"2012","journal-title":"Journal of Computational Information Systems"}],"container-title":["Intelligent Automation &amp; Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/autosoftjournal.net\/viewPaper.php?paper=1220133","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,3]],"date-time":"2020-06-03T13:09:00Z","timestamp":1591189740000},"score":1,"resource":{"primary":{"URL":"http:\/\/autosoftjournal.net\/paperShow.php?paper=1220133"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,9]]},"references-count":21,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2016,11,25]]},"published-print":{"date-parts":[[2017,7,3]]}},"alternative-id":["10.1080\/10798587.2016.1220133"],"URL":"https:\/\/doi.org\/10.1080\/10798587.2016.1220133","relation":{},"ISSN":["1079-8587","2326-005X"],"issn-type":[{"type":"print","value":"1079-8587"},{"type":"electronic","value":"2326-005X"}],"subject":[],"published":{"date-parts":[[2016,9,9]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tasj20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tasj20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}