{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:41:31Z","timestamp":1725522091086},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,11]]},"DOI":"10.1109\/isda.2010.5687231","type":"proceedings-article","created":{"date-parts":[[2011,1,13]],"date-time":"2011-01-13T16:33:25Z","timestamp":1294936405000},"page":"409-414","source":"Crossref","is-referenced-by-count":0,"title":["Data mining using NMF and generalized matrix inverse"],"prefix":"10.1109","author":[{"given":"Pavel","family":"Kromer","sequence":"first","affiliation":[]},{"given":"Jan","family":"Platos","sequence":"additional","affiliation":[]},{"given":"Vaclav","family":"Snasel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2004.11.005"},{"key":"ref3","first-page":"556","article-title":"Algorithms for non-negative matrix factorization","author":"lee","year":"2000","journal-title":"NIPS"},{"key":"ref10","first-page":"172","article-title":"Matrix factorization approach for feature deduction and design of intrusion detection systems","author":"sn\u00e1\u0161el","year":"2008","journal-title":"Proceedings of the Fourth International Conference on Information Assurance and Security IAS &#x2018;08 Naples Italy"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/852187"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref5","first-page":"67","article-title":"Non-negative matrix factorization, a new tool for feature extraction: Theory and applications","author":"buciu","year":"2008","journal-title":"Proc ICC"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/872425"},{"article-title":"Generalized Inverses. Theory and Applications","year":"2003","author":"ben israel","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2006.11.006"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/276535"},{"article-title":"Data Mining: Concepts and Techniques","year":"2006","author":"han","key":"ref1"}],"event":{"name":"2010 10th International Conference on Intelligent Systems Design and Applications (ISDA)","start":{"date-parts":[[2010,11,29]]},"location":"Cairo, Egypt","end":{"date-parts":[[2010,12,1]]}},"container-title":["2010 10th International Conference on Intelligent Systems Design and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5681599\/5687016\/05687231.pdf?arnumber=5687231","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T00:51:18Z","timestamp":1490057478000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5687231\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/isda.2010.5687231","relation":{},"subject":[],"published":{"date-parts":[[2010,11]]}}}