{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T23:36:28Z","timestamp":1769297788373,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,6,6]],"date-time":"2012-06-06T00:00:00Z","timestamp":1338940800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,6,6]]},"DOI":"10.1145\/2413097.2413130","type":"proceedings-article","created":{"date-parts":[[2012,12,17]],"date-time":"2012-12-17T15:12:21Z","timestamp":1355757141000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["User activities outlier detection system using principal component analysis and fuzzy rule-based system"],"prefix":"10.1145","author":[{"given":"Sawsan M.","family":"Mahmoud","sequence":"first","affiliation":[{"name":"Nottingham Trent University, Nottingham, United Kingdom"}]},{"given":"Ahmad","family":"Lotfi","sequence":"additional","affiliation":[{"name":"Nottingham Trent University, Nottingham, United Kingdom"}]},{"given":"Caroline","family":"Langensiepen","sequence":"additional","affiliation":[{"name":"Nottingham Trent University, Nottingham, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2012,6,6]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"4th Int. Conf. on Smart Homes and Health Telematics","author":"D. J.","year":"2006"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/IE.2010.13"},{"key":"e_1_3_2_1_3_1","first-page":"172","volume-title":"Proc. of the IEEE Foundations and New Directions of Data Mining Workshop","author":"Shyu M.-L.","year":"2003"},{"key":"e_1_3_2_1_4_1","unstructured":"I. Jolliffe. Principal component analysis. Springer; 2nd ed. edition 2002.  I. Jolliffe. Principal component analysis. Springer; 2nd ed. edition 2002."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MeMeA.2011.5966685"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2008.2004498"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2010.147"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2011.2113352"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.3844\/ajassp.2007.637.644"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2007.4414244"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.2006.1681817"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.2009.5277257"},{"key":"e_1_3_2_1_13_1","first-page":"1","volume-title":"CRPITS 24:Proc. of the Australian symposium on Information visualisation","author":"Lee R. E. R.","year":"2003"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIINFS.2008.4798453"},{"key":"e_1_3_2_1_15_1","first-page":"49","volume-title":"Proc. of the Sixth New Zealand Computer Science Research Student Conf.","author":"Huang A.","year":"2008"},{"key":"e_1_3_2_1_16_1","volume-title":"Springer-Verlag","author":"Rokach L.","year":"2005"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2005.173"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016002919937"},{"key":"e_1_3_2_1_19_1","first-page":"43","article-title":"Intrusion detection using text processing techniques with a binary-weighted cosine metric","volume":"1","author":"Rawat S.","year":"2006","journal-title":"Journal of Information Assurance and Security"},{"key":"e_1_3_2_1_20_1","volume-title":"Control and Decision Conf.","author":"Yan Q.","year":"2010"},{"issue":"1","key":"e_1_3_2_1_21_1","first-page":"43","article-title":"A survey of binary similarity and distance measures. Journal of Systemics","volume":"8","author":"Choi S.-S.","year":"2010","journal-title":"Cybernetics and Informatics"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2141622.2141653"},{"key":"e_1_3_2_1_23_1","volume-title":"Conf. in Research and Practice in Information Technology (CRPIT)","author":"M\u00fcller W.","year":"2006"},{"key":"e_1_3_2_1_24_1","first-page":"1","article-title":"Principal component analysis based visualization and human melanoma classification","volume":"2","author":"Pan Z.","year":"2001","journal-title":"Dimension Contemporary German Arts And Letters"},{"key":"e_1_3_2_1_25_1","first-page":"27","volume-title":"Xuan-Tien Doan. On-Line Process Monitoring and Fault Isolation Using PCA. In Proc. of the IEEE Int. Symposium on Intelligent Control Limassol","author":"Liu Jun","year":"2005"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1561939.1561953"},{"key":"e_1_3_2_1_27_1","unstructured":"JustChecking. Supporting independence people with dementia (www.justchecking.co.uk).  JustChecking. Supporting independence people with dementia (www.justchecking.co.uk) ."},{"key":"e_1_3_2_1_28_1","first-page":"70","volume-title":"IEEE Symposium on Intelligent Agents","author":"Akhlaghinia M. J.","year":"2009"}],"event":{"name":"PETRA2012: The 5th International Conference on PErvasive Technologies Related to Assistive Environments","location":"Heraklion Crete Greece","acronym":"PETRA2012","sponsor":["U of Tex at Arlington U of Tex at Arlington"]},"container-title":["Proceedings of the 5th International Conference on PErvasive Technologies Related to Assistive Environments"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2413097.2413130","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2413097.2413130","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:18:27Z","timestamp":1750234707000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2413097.2413130"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6,6]]},"references-count":28,"alternative-id":["10.1145\/2413097.2413130","10.1145\/2413097"],"URL":"https:\/\/doi.org\/10.1145\/2413097.2413130","relation":{},"subject":[],"published":{"date-parts":[[2012,6,6]]},"assertion":[{"value":"2012-06-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}