{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:17:55Z","timestamp":1729621075628,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,10]]},"DOI":"10.1109\/imcsit.2008.4747233","type":"proceedings-article","created":{"date-parts":[[2009,1,16]],"date-time":"2009-01-16T15:30:21Z","timestamp":1232119821000},"page":"155-159","source":"Crossref","is-referenced-by-count":3,"title":["Accuracy Boosting Induction of Fuzzy Rules with Artificial Immune Systems"],"prefix":"10.1109","author":[{"given":"Adam","family":"Kalina","sequence":"first","affiliation":[]},{"given":"Edward","family":"Mezyk","sequence":"additional","affiliation":[]},{"given":"Olgierd","family":"Unold","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Artificial Immune Systems and Their Applications","year":"1999","key":"3"},{"key":"2","first-page":"1011","article-title":"an artificial immune system for fuzzy-rule induction in data mining","volume":"3242","author":"alves","year":"2004","journal-title":"Parallel Problem Solving from Nature ? PPSN V"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0255(02)00369-9"},{"key":"1","first-page":"283","article-title":"mining fuzzy classification rules using an artificial immune system with boosting","volume":"3631","author":"alatas","year":"2005","journal-title":"ADBIS 2005"},{"key":"7","first-page":"704","article-title":"speed boosting induction of fuzzy rules with artificial immune systems","author":"me?zyk","year":"2008","journal-title":"Proc of the 12th WSEAS International Conference on Systems"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ.2002.1005080"},{"key":"5","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/978-3-7908-1823-9_8","author":"marsala","year":"2001","journal-title":"Fuzzy Partitioning Methods Granular Computing An Emerging Paradigm"},{"key":"4","first-page":"1081","article-title":"an immunogenetic technique to detect anomalies in network traffic","author":"gonzales","year":"2002","journal-title":"Genetic and Evolutionary Computation"},{"journal-title":"C4 5 Programs for Machine Learning","year":"1993","author":"quinlan","key":"9"},{"key":"8","article-title":"an introduction to fuzzy sets","author":"pedrycz","year":"1998","journal-title":"Analysis and Design"},{"journal-title":"Data Mining Practical Machine Learning Tools and Techniques 2nd Edn","year":"2005","author":"witten","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1080\/095281300146272"}],"event":{"name":"2008 International Multiconference on Computer Science and Information Technology","start":{"date-parts":[[2008,10,20]]},"location":"Wisia","end":{"date-parts":[[2008,10,22]]}},"container-title":["2008 International Multiconference on Computer Science and Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4731350\/4747203\/04747233.pdf?arnumber=4747233","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,14]],"date-time":"2020-05-14T19:38:01Z","timestamp":1589485081000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4747233\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/imcsit.2008.4747233","relation":{},"subject":[],"published":{"date-parts":[[2008,10]]}}}