{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:53:57Z","timestamp":1725594837231},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642223709"},{"type":"electronic","value":"9783642223716"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22371-6_36","type":"book-chapter","created":{"date-parts":[[2011,7,4]],"date-time":"2011-07-04T09:03:50Z","timestamp":1309770230000},"page":"419-432","source":"Crossref","is-referenced-by-count":10,"title":["Further Exploration of the Fuzzy Dendritic Cell Method"],"prefix":"10.1007","author":[{"given":"Zeineb","family":"Chelly","sequence":"first","affiliation":[]},{"given":"Zied","family":"Elouedi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Greensmith, J.: The Dendritic Cell Algorithm. PhD Thesis, University of Nottingham (2007)","key":"36_CR1","DOI":"10.2139\/ssrn.2831280"},{"key":"36_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/11536444_12","volume-title":"Artificial Immune Systems","author":"J. Greensmith","year":"2005","unstructured":"Greensmith, J., Aickelin, U., Cayzer, S.: Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol.\u00a03627, pp. 153\u2013167. Springer, Heidelberg (2005)"},{"doi-asserted-by":"crossref","unstructured":"Aickelin, U., Greensmith, J.: The Deterministic Dendritic Cell Algorithm. In: 7th International Conference on Artificial Immune Systems, Phuket, hailand, pp. 291\u2013302 (2008)","key":"36_CR3","DOI":"10.1007\/978-3-540-85072-4_26"},{"key":"36_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-642-14547-6_9","volume-title":"Artificial Immune Systems","author":"Z. Chelly","year":"2010","unstructured":"Chelly, Z., Elouedi, Z.: FDCM: A fuzzy dendritic cell method. In: Hart, E., McEwan, C., Timmis, J., Hone, A. (eds.) ICARIS 2010. LNCS, vol.\u00a06209, pp. 102\u2013115. Springer, Heidelberg (2010)"},{"key":"36_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-011-4868-9","volume-title":"Fuzzy modeling for control","author":"R. Basbuska","year":"1998","unstructured":"Basbuska, R.: Fuzzy modeling for control. Kluwer Academic Publishers, Boston (1998)"},{"key":"36_CR6","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"L. Zadeh","year":"1965","unstructured":"Zadeh, L.: Fuzzy Sets. Information and Control\u00a08, 338\u2013353 (1965)","journal-title":"Information and Control"},{"key":"36_CR7","first-page":"227","volume":"1","author":"J. Zimmermann","year":"1996","unstructured":"Zimmermann, J.: Fuzzy Set Theory and Its Applications. European Journal of Operational Research\u00a01, 227\u2013228 (1996)","journal-title":"European Journal of Operational Research"},{"key":"36_CR8","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/0020-0255(75)90036-5","volume":"8","author":"L. Zadeh","year":"1975","unstructured":"Zadeh, L.: The Concept of a Linguistic Variable and its Application to Approximate Reasoning I. Information Sciences\u00a08, 199\u2013251 (1975)","journal-title":"Information Sciences"},{"key":"36_CR9","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1109\/91.940964","volume":"9","author":"H. Ishibuchi","year":"2001","unstructured":"Ishibuchi, H., Nakashima, T.: Effect of rule weights in fuzzy rule-based classification systems. IEEE Transactions on Fuzzy Systems\u00a09, 506\u2013515 (2001)","journal-title":"IEEE Transactions on Fuzzy Systems"},{"key":"36_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0020-7373(75)80002-2","volume":"7","author":"H. Mamdani","year":"1975","unstructured":"Mamdani, H., Assilian, S.: An experiment in linguistic synthesis with a fuzzy logic controller. International Journal of Man-Machine Studies\u00a07, 1\u201313 (1975)","journal-title":"International Journal of Man-Machine Studies"},{"unstructured":"Mizumoto, M.: Fuzzy controls by product-sum gravity-method. Fuzzy Sets and Systems,\u00a0c1.1\u2013c1.4 (1990)","key":"36_CR11"},{"key":"36_CR12","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1109\/21.52551","volume":"2","author":"C. Lee","year":"1990","unstructured":"Lee, C.: Fuzzy logic in control systems: Fuzzy logic controller - Parts 1 and 2. IEEE Transactions on Systems, Man and Cybernetics\u00a02, 404\u2013435 (1990)","journal-title":"IEEE Transactions on Systems, Man and Cybernetics"},{"key":"36_CR13","doi-asserted-by":"publisher","first-page":"904","DOI":"10.1016\/j.fss.2005.11.005","volume":"157","author":"E. Broekhoven","year":"2006","unstructured":"Broekhoven, E., Baets, D.: Fast and accurate center of gravity defuzzification of fuzzy system outputs defined on trapezoidal fuzzy partitions. Fuzzy Sets and Systems\u00a0157, 904\u2013918 (2006)","journal-title":"Fuzzy Sets and Systems"},{"key":"36_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0450-1","volume-title":"Pattern Recognition with Fuzzy Objective Function Algorithms","author":"J. Bezdek","year":"1981","unstructured":"Bezdek, J.: Pattern Recognition with Fuzzy Objective Function Algorithms. Plenum Press, New York (1981)"},{"unstructured":"UCI machine learning repository, http:\/\/archive.ics.uci.edu","key":"36_CR15"}],"container-title":["Lecture Notes in Computer Science","Artificial Immune Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22371-6_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,27]],"date-time":"2021-11-27T06:58:46Z","timestamp":1637996326000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22371-6_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642223709","9783642223716"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22371-6_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}