{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T08:52:14Z","timestamp":1725612734201},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1109\/cec.2008.4631220","type":"proceedings-article","created":{"date-parts":[[2008,9,26]],"date-time":"2008-09-26T11:17:53Z","timestamp":1222427873000},"page":"3122-3127","source":"Crossref","is-referenced-by-count":3,"title":["An AIS algorithm for Web usage mining with directed mutation"],"prefix":"10.1109","author":[{"given":"B. Hoda","family":"Helmi","sequence":"first","affiliation":[]},{"given":"Adel T.","family":"Rahmani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","article-title":"adaptive web sites: automatically learning for user access pattern","author":"perkowitz","year":"1997","journal-title":"Proc 6th int WWW conference"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2003.1250925"},{"year":"0","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-006-0116-0"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1971.223083"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/BF03040856"},{"journal-title":"Artificial Immune System A New Computational Intelligence Approach","year":"2002","author":"de castro","key":"3"},{"journal-title":"Artificial immune systems A novel data analysis technique inspired by the immune network theory","year":"2000","author":"timmis","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-59901-9"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ.2002.1005080"},{"key":"7","article-title":"scaling clustering algorithms to large databases","author":"bradley","year":"1998","journal-title":"Proc 6th Int Conf Knowl Discovery and Data Mining"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/235968.233324"},{"year":"0","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-002-0237-z"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(65)90241-X"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/S0303-2647(99)00092-1"}],"event":{"name":"2008 IEEE Congress on Evolutionary Computation (CEC)","start":{"date-parts":[[2008,6,1]]},"location":"Hong Kong, China","end":{"date-parts":[[2008,6,6]]}},"container-title":["2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4625778\/4630767\/04631220.pdf?arnumber=4631220","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T11:11:11Z","timestamp":1489749071000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4631220\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/cec.2008.4631220","relation":{},"subject":[],"published":{"date-parts":[[2008,6]]}}}