{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T19:16:48Z","timestamp":1776971808343,"version":"3.51.4"},"reference-count":9,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T00:00:00Z","timestamp":1602633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T00:00:00Z","timestamp":1602633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T00:00:00Z","timestamp":1602633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,14]]},"DOI":"10.1109\/icccs49678.2020.9276870","type":"proceedings-article","created":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T03:21:19Z","timestamp":1607570479000},"page":"1-6","source":"Crossref","is-referenced-by-count":14,"title":["Enhancing the Data Mining Tool WEKA"],"prefix":"10.1109","author":[{"given":"Pranav","family":"Kotak","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hiral","family":"Modi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"ref3","first-page":"44","article-title":"Analytical study of some selected classification algorithms in weka using real crime data","author":"obuandike georgina","year":"2015","journal-title":"International Journal of Advanced Research in Artificial Intelligence"},{"key":"ref6","author":"chattamvelli","year":"2011","journal-title":"Data Mining Algorithms"},{"key":"ref5","author":"gjorgjioski","year":"2008","journal-title":"Stochastic propositionalization of relational data using aggregates"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44794-6_23"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(96)00034-3"},{"key":"ref2","first-page":"21","author":"bouckaert","year":"2013","journal-title":"WEKA Manual for Version 3-7-8"},{"key":"ref1","first-page":"8887","article-title":"Weka powerful tool in data mining","volume":"975","author":"kulkarni","year":"2016","journal-title":"International Journal of Computer Applications"},{"key":"ref9","first-page":"1","article-title":"Comparison Between WEKA and Salford System in Data Mining Software","volume":"3","author":"fitriani","year":"2016","journal-title":"Int J Mob Comput Appl"}],"event":{"name":"2020 5th International Conference on Computing, Communication and Security (ICCCS)","location":"Patna, India","start":{"date-parts":[[2020,10,14]]},"end":{"date-parts":[[2020,10,16]]}},"container-title":["2020 5th International Conference on Computing, Communication and Security (ICCCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9276407\/9276491\/09276870.pdf?arnumber=9276870","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:21:46Z","timestamp":1656375706000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9276870\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,14]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/icccs49678.2020.9276870","relation":{},"subject":[],"published":{"date-parts":[[2020,10,14]]}}}