{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:08:06Z","timestamp":1740100086743,"version":"3.37.3"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,5,19]],"date-time":"2021-05-19T00:00:00Z","timestamp":1621382400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,5,19]],"date-time":"2021-05-19T00:00:00Z","timestamp":1621382400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,5,19]],"date-time":"2021-05-19T00:00:00Z","timestamp":1621382400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002701","name":"Ministry of Education","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002701","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,19]]},"DOI":"10.1109\/saci51354.2021.9465639","type":"proceedings-article","created":{"date-parts":[[2021,6,30]],"date-time":"2021-06-30T20:24:34Z","timestamp":1625084674000},"page":"000021-000026","source":"Crossref","is-referenced-by-count":1,"title":["Analysis of Monetary Policy Decisions of the National Bank of Romania with Text Mining Techniques"],"prefix":"10.1109","author":[{"given":"Cristian-Vasile","family":"Pop","sequence":"first","affiliation":[]},{"given":"Radu-Emil","family":"Precup","sequence":"additional","affiliation":[]},{"given":"Liviu Ioan","family":"Cadariu-Brailoiu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1016\/j.procs.2019.11.284"},{"key":"ref38","first-page":"57","article-title":"Island-based cuckoo search with highly disruptive polynomial mutation","volume":"17","author":"abed-alguni","year":"2019","journal-title":"Artific Intellig Int J"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/LCSYS.2020.2981895"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1016\/j.knosys.2020.106731"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/ISIC.2000.882910"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/IRDS.2002.1041710"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1016\/j.procs.2018.10.277"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1016\/j.asoc.2018.06.047"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.24846\/v29i4y202002"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1016\/j.automatica.2020.109031"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1080\/19312458.2017.1387238"},{"key":"ref40","first-page":"45","article-title":"Conflict monitoring optimization heuristic inspired by brain fear and conflict systems","volume":"18","author":"moattari","year":"2020","journal-title":"Artific Intellig Int J"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.18653\/v1\/K17-3009"},{"key":"ref12","first-page":"404","article-title":"TextRank: Bringing order into texts","author":"mihalcea","year":"2004","journal-title":"Proc 2004 Conference on Empirical Methods in Natural Language Processing"},{"year":"2019","author":"gr\u00fcn","journal-title":"Package &#x2018;topicmodels","key":"ref13"},{"key":"ref14","first-page":"pp. 993","article-title":"Latent Dirichlet allocation","volume":"3","author":"blei","year":"2003","journal-title":"J Mach Learn Res"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1214\/07-AOAS114"},{"year":"2007","author":"phan","journal-title":"GibbsLDA++ A C\/C++ Implementation of Latent Dirichlet Allocation (LDA) Using Gibbs Sampling for Parameter Estimation and Inference","key":"ref16"},{"year":"2021","journal-title":"Corpus documents downloaded from the website of the National Bank of Romania","key":"ref17"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/FUZZ.2001.1009066"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1007\/s00202-003-0157-7"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/TCST.2015.2422794"},{"year":"2015","author":"dietrich","journal-title":"Data Science and Big Data Analytics","key":"ref4"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1016\/j.ins.2020.03.059"},{"year":"2020","author":"pop","journal-title":"Algoritmi de clasificare nesupervizat? a datelor","key":"ref3"},{"year":"2015","author":"mayor","journal-title":"Learning Predictive Analytics with R Get to Grips with Key Data Visualization and Predictive Analytic Skills Using R Birmingham","key":"ref6"},{"key":"ref29","first-page":"189","article-title":"Fault detection and isolation of an aircraft turbojet engine using a multi-sensor network and multiple model approach","volume":"15","author":"nyul\u00e1szi","year":"2018","journal-title":"Acta Polyt Hung"},{"year":"2016","author":"gifu","journal-title":"Lexical Semantics in Text Processing Contrastive Diachronic Studies on Romanian Language","key":"ref5"},{"year":"2018","author":"klejdysz","journal-title":"Shifts in ECB Communication A Text Mining Approach","key":"ref8"},{"year":"2013","author":"fawcett","journal-title":"Data Science for Business","key":"ref7"},{"key":"ref2","first-page":"1","article-title":"Analiza deciziilor de politic? monetar? ale BNR cu ajutorul tehnicilor de text mining","author":"pop","year":"2020","journal-title":"Politehnica University of Timi?oara Mathematics MSc Students Conference Timi?oara"},{"year":"2012","author":"zhao","journal-title":"R and Data Mining Examples and Case Studies","key":"ref9"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1016\/S0169-7552(98)00110-X"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.15837\/ijccc.2017.6.3111"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.15837\/ijccc.2020.3.3844"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.3233\/JIFS-169875"},{"key":"ref24","first-page":"29","article-title":"Outside the box: an alternative data analytics framework","volume":"8","author":"angelov","year":"2014","journal-title":"J Autom Mobile Robot Intell Syst"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.2991\/ijcis.d.210309.001"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/EAIS.2013.6604098"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/TFUZZ.2019.2907503"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s12530-013-9084-7","article-title":"A robust fuzzy adaptive law for evolving control systems","volume":"5","author":"bla\u017ei?","year":"2014","journal-title":"Evolv Syst"}],"event":{"name":"2021 IEEE 15th International Symposium on Applied Computational Intelligence and Informatics (SACI)","start":{"date-parts":[[2021,5,19]]},"location":"Timisoara, Romania","end":{"date-parts":[[2021,5,21]]}},"container-title":["2021 IEEE 15th International Symposium on Applied Computational Intelligence and Informatics (SACI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9465482\/9465540\/09465639.pdf?arnumber=9465639","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:43:03Z","timestamp":1652197383000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9465639\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,19]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/saci51354.2021.9465639","relation":{},"subject":[],"published":{"date-parts":[[2021,5,19]]}}}