{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:18:34Z","timestamp":1729664314827,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/embc.2014.6943594","type":"proceedings-article","created":{"date-parts":[[2014,11,12]],"date-time":"2014-11-12T17:43:47Z","timestamp":1415814227000},"page":"322-325","source":"Crossref","is-referenced-by-count":0,"title":["Biologically-motivated system identification: Application to microbial growth modeling"],"prefix":"10.1109","author":[{"family":"Jinyao Yan","sequence":"first","affiliation":[]},{"given":"J. R.","family":"Deller","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1979.1102164"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/0005-1098(82)90110-8","article-title":"On the value of information in system identification: Bounded noise case","volume":"18","author":"fogel","year":"1982","journal-title":"Automatica"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/acs.964"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/acs.4480080105"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-1115(199806)12:4<305::AID-ACS491>3.3.CO;2-M"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2000.861979"},{"journal-title":"An Introduction to Genetic Algorithms","year":"1998","author":"melanie","key":"ref16"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1109\/72.557660","article-title":"Using wavelet network in nonparametric estimation","volume":"8","author":"zhang","year":"1997","journal-title":"IEEE Trans Neural Networks"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/0005-1098(72)90083-0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ChinaSIP.2013.6625294"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.mi.03.100149.002103"},{"article-title":"Bounding Approaches to System Identification","year":"1996","author":"walter","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/5.214546"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/BF01211652"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/5.257681"},{"journal-title":"System Identification Theory for the User","year":"1999","author":"ljung","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/0005-1098(95)00120-8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/53.41661"}],"event":{"name":"2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)","start":{"date-parts":[[2014,8,26]]},"location":"Chicago, IL","end":{"date-parts":[[2014,8,30]]}},"container-title":["2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6923026\/6943513\/06943594.pdf?arnumber=6943594","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T20:04:02Z","timestamp":1498161842000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6943594\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/embc.2014.6943594","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}