{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T05:29:04Z","timestamp":1745386144028,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/fuzz-ieee.2018.8491518","type":"proceedings-article","created":{"date-parts":[[2018,10,19]],"date-time":"2018-10-19T22:18:38Z","timestamp":1539987518000},"page":"1-7","source":"Crossref","is-referenced-by-count":2,"title":["Learning Type-2 Fuzzy Rule-Based Systems through Memetic Algorithms"],"prefix":"10.1109","author":[{"given":"Giovanni","family":"Acampora","sequence":"first","affiliation":[]},{"given":"Pasquale","family":"DrAlterio","sequence":"additional","affiliation":[]},{"given":"Autilia","family":"Vitiello","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/S0009-9236(97)90149-1"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/T2FZZ.2013.6613298"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2016.7737713"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.2011.6007517"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2015.2426311"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1016\/j.asoc.2015.05.004","article-title":"Memetic algorithms for the job shop scheduling problem with operators","volume":"34","author":"menc\u00eda","year":"2015","journal-title":"Applied Soft Computing"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.2991\/ifsa-eusflat-15.2015.128","article-title":"Memetic type-2 fuzzy system learning for load forecasting","author":"castro leon","year":"2015"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/91.811231"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2006.879986"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.11.015"},{"article-title":"Uncertain rule-based fuzzy logic system: introduction and new directions","year":"2001","author":"mendel","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.2004.1375538"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.04.015"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.1993.390281"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.01.013"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-0114(98)00224-3"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2009.2034529"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13650-9_30"},{"journal-title":"Experiments on controlling overfitting in genetic programming","year":"0","author":"gon\u00e7alves","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/91.995115"},{"key":"ref8","first-page":"2880","article-title":"A big bang-big crunch optimization for a type-2 fuzzy logic based human behaviour recognition system in intelligent environments","volume":"10","author":"yao","year":"2013"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/ICIEA.2016.7603546","article-title":"Evolutionary interval type-2 fuzzy systems using continuous ant colony optimization algorithms","author":"juang","year":"2016","journal-title":"Industrial Electronics and Applications (ICIEA) 2016 11th IEEE Conference on"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2007.909762"},{"article-title":"On evolution, search, optimization, genetic algorithms and martial arts - towards memetic algorithms","year":"1989","author":"moscato","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s12065-007-0001-5"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-011-0792-2"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2005.850260"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-33416-5_11"},{"article-title":"Real-coded genetic algorithms and interval-schema","year":"1992","author":"eshelman","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.04.015"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2006.889765"},{"key":"ref25","first-page":"238","article-title":"A real coded genetic algorithm with an explorer and an exploiter populations","author":"tsutsui","year":"1997"}],"event":{"name":"2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","start":{"date-parts":[[2018,7,8]]},"location":"Rio de Janeiro","end":{"date-parts":[[2018,7,13]]}},"container-title":["2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8466242\/8491438\/08491518.pdf?arnumber=8491518","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T04:23:14Z","timestamp":1598242994000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8491518\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/fuzz-ieee.2018.8491518","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}