{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:56:02Z","timestamp":1725890162314},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642344862"},{"type":"electronic","value":"9783642344879"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34487-9_58","type":"book-chapter","created":{"date-parts":[[2012,11,5]],"date-time":"2012-11-05T04:30:07Z","timestamp":1352089807000},"page":"480-487","source":"Crossref","is-referenced-by-count":14,"title":["RST-DCA: A Dendritic Cell Algorithm Based on Rough Set Theory"],"prefix":"10.1007","author":[{"given":"Zeineb","family":"Chelly","sequence":"first","affiliation":[]},{"given":"Zied","family":"Elouedi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"58_CR1","unstructured":"Asuncion, A., Newman, D.J.: UCI Machine Learning Repository (2007)"},{"key":"58_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-642-14547-6_9","volume-title":"Artificial Immune Systems","author":"Z. Chelly","year":"2010","unstructured":"Chelly, Z., Elouedi, Z.: FDCM: A Fuzzy Dendritic Cell Method. In: Hart, E., McEwan, C., Timmis, J., Hone, A. (eds.) ICARIS 2010. LNCS, vol.\u00a06209, pp. 102\u2013115. Springer, Heidelberg (2010)"},{"key":"58_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/978-3-642-22371-6_36","volume-title":"Artificial Immune Systems","author":"Z. Chelly","year":"2011","unstructured":"Chelly, Z., Elouedi, Z.: Further Exploration of the Fuzzy Dendritic Cell Method. In: Li\u00f2, P., Nicosia, G., Stibor, T. (eds.) ICARIS 2011. LNCS, vol.\u00a06825, pp. 419\u2013432. Springer, Heidelberg (2011)"},{"key":"58_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-642-29350-4_28","volume-title":"Artificial Intelligence and Soft Computing","author":"Z. Chelly","year":"2012","unstructured":"Chelly, Z., Smiti, A., Elouedi, Z.: COID-FDCM: The Fuzzy Maintained Dendritic Cell Classification Method. In: Rutkowski, L., Korytkowski, M., Scherer, R., Tadeusiewicz, R., Zadeh, L.A., Zurada, J.M. (eds.) ICAISC 2012, Part II. LNCS, vol.\u00a07268, pp. 233\u2013241. Springer, Heidelberg (2012)"},{"key":"58_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/11536444_12","volume-title":"Artificial Immune Systems","author":"J. Greensmith","year":"2005","unstructured":"Greensmith, J., Aickelin, U., Cayzer, S.: Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol.\u00a03627, pp. 153\u2013167. Springer, Heidelberg (2005)"},{"key":"58_CR6","doi-asserted-by":"crossref","unstructured":"Gu, F., Greensmith, J., Oates, R., Aickelin, U.: Pca 4 dca: The application of principal component analysis to the dendritic cell algorithm. CoRR (2010)","DOI":"10.2139\/ssrn.2830357"},{"key":"58_CR7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2044-8317.1961.tb00061.x","volume":"14","author":"H. Kaiser","year":"1961","unstructured":"Kaiser, H.: A note on guttmans lower bound for the number of common factors. British Journal of Mathematical and Statistical Psychology\u00a014, 1\u20132 (1961)","journal-title":"British Journal of Mathematical and Statistical Psychology"},{"key":"58_CR8","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/BF01001956","volume":"11","author":"Z. Pawlak","year":"1982","unstructured":"Pawlak, Z., Rough, S.: International Journal of Computer and Information Science\u00a011, 341\u2013356 (1982)","journal-title":"International Journal of Computer and Information Science"}],"container-title":["Lecture Notes in Computer Science","Neural Information Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34487-9_58.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T08:55:50Z","timestamp":1620118550000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34487-9_58"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642344862","9783642344879"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34487-9_58","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}