{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T06:47:46Z","timestamp":1750747666687,"version":"3.37.3"},"reference-count":62,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100002383","name":"King Saud University, Riyadh, Saudi Arabia, through the Researchers Supporting Project","doi-asserted-by":"publisher","award":["RSP2024R509"],"award-info":[{"award-number":["RSP2024R509"]}],"id":[{"id":"10.13039\/501100002383","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3349620","type":"journal-article","created":{"date-parts":[[2024,1,4]],"date-time":"2024-01-04T19:58:32Z","timestamp":1704398312000},"page":"6546-6559","source":"Crossref","is-referenced-by-count":4,"title":["A Three-Way Clustering Mechanism to Handle Overlapping Regions"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5859-1219","authenticated-orcid":false,"given":"Anwar","family":"Shah","sequence":"first","affiliation":[{"name":"Department of Computer Science, FAST - National University of Computer and Emerging Sciences, Islamabad, Pakistan"}]},{"given":"Bahar","family":"Ali","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Institute of Management Sciences, National University of Computer and Emerging Sciences, Peshawar Campus, Peshawar, Pakistan"}]},{"given":"Fazal","family":"Wahab","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Northeastern University, Shenyang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5879-569X","authenticated-orcid":false,"given":"Inam","family":"Ullah","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Gachon University, Seongnam, Sujeong-gu, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8972-5953","authenticated-orcid":false,"given":"Fayez","family":"Alqahtani","sequence":"additional","affiliation":[{"name":"Software Engineering Department, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3439-6413","authenticated-orcid":false,"given":"Amr","family":"Tolba","sequence":"additional","affiliation":[{"name":"Computer Science Department, Community College, King Saud University, Riyadh, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0188747"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.08.087"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32115-3_33"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.biosystemseng.2013.03.011"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.rse.2022.113425"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2022.105267"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1038\/s41576-021-00417-w"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevD.105.104016"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2008.4761079"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.95"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2005.06.056"},{"issue":"2","key":"ref12","first-page":"427","article-title":"MCOKE: Multi-cluster overlapping k-means extension algorithm","volume":"9","author":"Baadel","year":"2015","journal-title":"Int. J. Comput., Control, Quantum Inf. Eng."},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.2307\/3151899"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49676-4_15"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1023\/B:JIIS.0000029668.88665.1a"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2005.863371"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.11.022"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.1999.790086"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0450-1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2018.04.029"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.7155\/jgaa.00084"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2010.24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/290941.290956"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2013.04.025"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SAI.2016.7555988"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2019.11.011"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.05.028"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44680-5_6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.11.019"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32115-3_1"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60840-2_22"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.05.001"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.05.018"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10646-0_48"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.05.053"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58449-8_9"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s41066-015-0013-y"},{"issue":"14","key":"ref38","first-page":"6009","article-title":"Clustering path profiles on a website using rough k-means method","volume":"8","author":"Cheng","year":"2012","journal-title":"J. Comput. Inf. Syst."},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2019.101777"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.14257\/ijdta.2013.6.5.06"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.04.008"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2013.05.007"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-2760-4_2"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04625-9"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2014.06.008"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2013.03.018"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-020-04992-8"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-150792"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/3477.658584"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.05.036"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.05.022"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2011.01.014"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1002\/widm.16"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/219717.219791"},{"key":"ref55","volume-title":"Rough Sets: Theoretical Aspects of Reasoning about Data","volume":"9","author":"Pawlak","year":"2012"},{"key":"ref56","first-page":"179","article-title":"Shadowed sets: Bridging fuzzy and rough sets","volume-title":"Rough Fuzzy Hybridization: A New Trend in Decision-Making","author":"Pedrycz","year":"1999"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.06.052"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/83.826787"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2017.8104877"},{"volume-title":"Anomaly Detection in Large Datasets","year":"2014","author":"Goldstein","key":"ref60"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-021-03072-0"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2015.7280373"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10380578.pdf?arnumber=10380578","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T01:25:56Z","timestamp":1705541156000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10380578\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":62,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3349620","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2024]]}}}