{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:00:37Z","timestamp":1725897637033},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642387029"},{"type":"electronic","value":"9783642387036"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38703-6_60","type":"book-chapter","created":{"date-parts":[[2013,5,13]],"date-time":"2013-05-13T16:18:03Z","timestamp":1368461883000},"page":"514-521","source":"Crossref","is-referenced-by-count":4,"title":["A New Hybrid Fuzzy-Rough Dendritic Cell Immune Classifier"],"prefix":"10.1007","author":[{"given":"Zeineb","family":"Chelly","sequence":"first","affiliation":[]},{"given":"Zied","family":"Elouedi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"60_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/11536444_12","volume-title":"Artificial Immune Systems","author":"J. Greensmith","year":"2005","unstructured":"Greensmith, J., Aickelin, U., Cayzer, S.: Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol.\u00a03627, pp. 153\u2013167. Springer, Heidelberg (2005)"},{"key":"60_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-540-85072-4_26","volume-title":"Artificial Immune Systems","author":"J. Greensmith","year":"2008","unstructured":"Greensmith, J., Aickelin, U.: The deterministic dendritic cell algorithm. In: Bentley, P.J., Lee, D., Jung, S. (eds.) ICARIS 2008. LNCS, vol.\u00a05132, pp. 291\u2013302. Springer, Heidelberg (2008)"},{"key":"60_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/978-3-642-22371-6_36","volume-title":"Artificial Immune Systems","author":"Z. Chelly","year":"2011","unstructured":"Chelly, Z., Elouedi, Z.: Further exploration of the fuzzy dendritic cell method. In: Li\u00f2, P., Nicosia, G., Stibor, T. (eds.) ICARIS 2011. LNCS, vol.\u00a06825, pp. 419\u2013432. Springer, Heidelberg (2011)"},{"key":"60_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1111\/j.2044-8317.1961.tb00061.x","volume":"14","author":"H. Kaiser","year":"1961","unstructured":"Kaiser, H.: A note on guttman\u2019s lower bound for the number of common factors. British Journal of Mathematical and Statistical Psychology\u00a014, 1\u20132 (1961)","journal-title":"British Journal of Mathematical and Statistical Psychology"},{"key":"60_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1007\/978-3-642-34487-9_58","volume-title":"Neural Information Processing","author":"Z. Chelly","year":"2012","unstructured":"Chelly, Z., Elouedi, Z.: RST-DCA: A dendritic cell algorithm based on rough set theory. In: Huang, T., Zeng, Z., Li, C., Leung, C.S. (eds.) ICONIP 2012, Part III. LNCS, vol.\u00a07665, pp. 480\u2013487. Springer, Heidelberg (2012)"},{"key":"60_CR6","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/BF01001956","volume":"11","author":"Z. Pawlak","year":"1982","unstructured":"Pawlak, Z.: Rough sets. International Journal of Computer and Information Science\u00a011, 341\u2013356 (1982)","journal-title":"International Journal of Computer and Information Science"},{"key":"60_CR7","doi-asserted-by":"crossref","unstructured":"Gu, F., Greensmith, J., Oates, R., Aickelin, U.: Pca 4 dca: The application of principal component analysis to the dendritic cell algorithm. In: Proceedings of the 9th Annual Workshop on Computational Intelligence (2009)","DOI":"10.2139\/ssrn.2830357"},{"key":"60_CR8","first-page":"227","volume":"1","author":"J. Zimmermann","year":"1996","unstructured":"Zimmermann, J.: Fuzzy set theory and its applications. European Journal of Operational Research\u00a01, 227\u2013228 (1996)","journal-title":"European Journal of Operational Research"},{"key":"60_CR9","unstructured":"Asuncion, A., Newman, D.J.: UCI machine learning repository, (2007), \n \n http:\/\/mlearn.ics.uci.edu\/mlrepository.html"}],"container-title":["Lecture Notes in Computer Science","Advances in Swarm Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38703-6_60","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,20]],"date-time":"2019-01-20T15:23:59Z","timestamp":1547997839000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38703-6_60"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642387029","9783642387036"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38703-6_60","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}