{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T05:50:22Z","timestamp":1726379422816},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,3,28]],"date-time":"2019-03-28T00:00:00Z","timestamp":1553731200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,3,28]],"date-time":"2019-03-28T00:00:00Z","timestamp":1553731200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Classif"],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1007\/s00357-018-9293-7","type":"journal-article","created":{"date-parts":[[2019,3,28]],"date-time":"2019-03-28T06:02:31Z","timestamp":1553752951000},"page":"18-41","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Hybrid Fuzzy Maintained Classification Method Based on Dendritic Cells"],"prefix":"10.1007","volume":"37","author":[{"given":"Zaineb","family":"Chelly Dagdia","sequence":"first","affiliation":[]},{"given":"Zied","family":"Elouedi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,28]]},"reference":[{"key":"9293_CR1","first-page":"37","volume":"1","author":"D Aha","year":"1991","unstructured":"Aha, D., Kibler, G., Albert, M.K. (1991). Instance-based learning algorithms. IEEE Transactions on Fuzzy Systems, 1, 37\u201366.","journal-title":"IEEE Transactions on Fuzzy Systems"},{"key":"9293_CR2","doi-asserted-by":"crossref","unstructured":"Aldous, D. (1991). The continuum random tree. In The annals of probability, pp. 11728.","DOI":"10.1214\/aop\/1176990534"},{"key":"9293_CR3","doi-asserted-by":"crossref","unstructured":"Amaral, M. (2011a). Fault detection in analog circuits using a fuzzy dendritic cell algorithm. In Proceedings of the 10th international conference on artificial immune systems (pp. 18\u201321). Springer.","DOI":"10.1007\/978-3-642-22371-6_26"},{"key":"9293_CR4","unstructured":"Amaral, M. (2011b). Finding danger using fuzzy dendritic cells. In Proceedings workshop on hybrid intelligent models and applications (pp. 21\u201327). IEEE."},{"key":"9293_CR5","unstructured":"Asuncion, A., & Newman, D. (2007). UCI machine learning repository. http:\/\/www.ics.uci.edu\/mlearn\/ ."},{"issue":"1","key":"9293_CR6","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L. (2001). Random forests. Machine learning, 45(1), 5\u201332.","journal-title":"Machine learning"},{"key":"9293_CR7","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1366\/0003702844555629","volume":"383","author":"B Bussian","year":"1984","unstructured":"Bussian, B., & H\u00e4rdle, M. (1984). Robust smoothing applied to white noise and single outlier contaminated raman spectra. Applied Spectroscopy, 383, 309\u2013313.","journal-title":"Applied Spectroscopy"},{"key":"9293_CR8","unstructured":"Chang, C., & Lin, C. (2001). Libsvm: a library for support vector machines. In Software available at http:\/\/www.csie.ntu.edu.tw\/cjlin\/libsvm ."},{"key":"9293_CR9","doi-asserted-by":"crossref","unstructured":"Chelly, Z., & Elouedi, Z. (2010). FDCM: a fuzzy dendritic cell method. In Proceedings of the 9th international conference of artificial immune systems (pp. 102\u2013115). Springer.","DOI":"10.1007\/978-3-642-14547-6_9"},{"key":"9293_CR10","doi-asserted-by":"crossref","unstructured":"Chelly, Z., & Elouedi, Z. (2012a). RC-DCA a new feature selection and signal categorization technique for the dendritic cell algorithm based on rough set theory. In Proceedings of the 11th international conference on artificial immune systems (pp. 152\u2013165). Springer.","DOI":"10.1007\/978-3-642-33757-4_12"},{"key":"9293_CR11","doi-asserted-by":"crossref","unstructured":"Chelly, Z., & Elouedi, Z. (2012b). RST-DCA a dendritic cell algorithm based on rough set theory. In Proceedings of the 19th international conference on neural information processing (pp. 480\u2013487). Springer.","DOI":"10.1007\/978-3-642-34487-9_58"},{"key":"9293_CR12","doi-asserted-by":"crossref","unstructured":"Chelly, Z., & Elouedi, Z. (2013). QR-DCA A new rough data pre-processing approach for the dendritic cell algorithm. In Proceedings of the 11th international conference on adaptive and natural computing algorithms (pp. 140\u2013150).","DOI":"10.1007\/978-3-642-37213-1_15"},{"issue":"1","key":"9293_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00354-015-0101-1","volume":"33","author":"Z Chelly","year":"2015","unstructured":"Chelly, Z., & Elouedi, Z. (2015). Hybridization schemes of the fuzzy dendritic cell immune binary classifier based on different fuzzy clustering techniques. New Generation Computing, 33(1), 1\u201331.","journal-title":"New Generation Computing"},{"issue":"3","key":"9293_CR14","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/s10115-015-0891-y","volume":"48","author":"Z Chelly","year":"2016","unstructured":"Chelly, Z., & Elouedi, Z. (2016). A survey of the dendritic cell algorithm. Knowledge and Information Systems, 48(3), 505\u2013535.","journal-title":"Knowledge and Information Systems"},{"key":"9293_CR15","doi-asserted-by":"crossref","unstructured":"Chou, C., Kuo, B., Chang, F. (2006). The generalized condensed nearest neighbor rule as a data reduction method. In Proceedings of the 18th international conference on pattern recognition (pp. 556\u2013559). IEEE.","DOI":"10.1109\/ICPR.2006.1119"},{"key":"9293_CR16","doi-asserted-by":"crossref","unstructured":"Cortes, C., & Vapnik, V. (1995). Support-vector networks. Machine Learning, pp. 273\u2013297.","DOI":"10.1007\/BF00994018"},{"key":"9293_CR17","first-page":"217","volume":"22","author":"Z Cui","year":"2014","unstructured":"Cui, Z., & Xiao, R. (2014). Bio-inspired computation: theory and applications. Journal of Multiple-Valued Logic and Soft Computing, 22, 217\u2013221.","journal-title":"Journal of Multiple-Valued Logic and Soft Computing"},{"key":"9293_CR18","doi-asserted-by":"crossref","unstructured":"Dasu, T., & Johnson, T. (2003). Exploratory data mining and data cleaning (Vol. 479). New York: Wiley.","DOI":"10.1002\/0471448354"},{"key":"9293_CR19","unstructured":"Ester, M., Kriegel, H., Sander, J., Xu, X. (1996). A density-based algorithm for discovering clusters in large spatial databases with noise. In Proceedings of 2nd international conference on knowledge discovery (pp. 226\u2013231)."},{"key":"9293_CR20","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1016\/j.cageo.2004.11.013","volume":"31","author":"P Filzmoser","year":"2005","unstructured":"Filzmoser, P., Garrett, R., Reimann, C. (2005). Multivariate outlier detection in exploration geochemistry. Computers and Geosciences, 31, 579\u2013587.","journal-title":"Computers and Geosciences"},{"key":"9293_CR21","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1109\/TIT.1972.1054809","volume":"18","author":"W Gates","year":"1972","unstructured":"Gates, W. (1972). The reduced nearest neighbor rule. IEEE Transactions on Information Theory, 18, 431\u2013433.","journal-title":"IEEE Transactions on Information Theory"},{"key":"9293_CR22","unstructured":"Greensmith, J. (2007). The dendritic cell algorithm. PhD thesis, University of Nottingham."},{"key":"9293_CR23","doi-asserted-by":"crossref","unstructured":"Greensmith, J., & Aickelin, U. (2005). Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection. In Proceedings of the 4th international conference on artificial immune systems (pp. 153\u2013167). Springer.","DOI":"10.1007\/11536444_12"},{"key":"9293_CR24","doi-asserted-by":"crossref","unstructured":"Greensmith, J., & Aickelin, U. (2006). Articulation and clarification of the dendritic cell algorithm. In Proceedings of the 5th international conference on artificial immune systems (pp. 404\u2013417). Springer.","DOI":"10.1007\/11823940_31"},{"key":"9293_CR25","unstructured":"Greensmith, J., & Aickelin, U. (2007). The application of a dendritic cell algorithm to a robotic classifier. In Proceedings of the 6th international conference on artificial immune systems (pp. 204\u2013215). Springer."},{"key":"9293_CR26","doi-asserted-by":"crossref","unstructured":"Greensmith, J., & Aickelin, U. (2008). The deterministic dendritic cell algorithm. In Proceedings of the 7th international conference on artificial immune systems (pp. 291\u2013302). Springer.","DOI":"10.1007\/978-3-540-85072-4_26"},{"key":"9293_CR27","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.inffus.2009.04.006","volume":"11","author":"J Greensmith","year":"2010","unstructured":"Greensmith, J., Aickelin, U., Tedesco, G. (2010). Information fusion for anomaly detection with the dendritic cell algorithm. Information Fusion, 11, 21\u201334.","journal-title":"Information Fusion"},{"key":"9293_CR28","unstructured":"Gu, F., Greensmith, J., Aickelin, U. (2010). Further exploration of the dendritic cell algorithm Antigen multiplier and time windows. In Proceedings of the 5th international conference on artificial immune systems (pp. 142\u2013153). Springer."},{"key":"9293_CR29","unstructured":"Gustafson, D., & Kessel, W. (1979). Fuzzy clustering with a fuzzy covariance matrix. In Proceedings of the IEEE conference on decision and control (pp. 761\u2013766). IEEE."},{"key":"9293_CR30","unstructured":"John, G., & Langley, P. (1995). Estimating continuous distributions in bayesian classifiers. In Proceedings of the 11th conference on uncertainty in artificial intelligence (pp. 33817345)."},{"key":"9293_CR31","first-page":"555","volume":"25","author":"S Kaur","year":"2015","unstructured":"Kaur, S., Kumar, P., Singh, A. (2015). Nature inspired approaches for identification of optimized fuzzy model: a comparative study. Journal of Multiple-Valued Logic and Soft Computing, 25, 555\u2013587.","journal-title":"Journal of Multiple-Valued Logic and Soft Computing"},{"key":"9293_CR32","unstructured":"Kohavi, R. (1996). Scaling up the accuracy of naive-bayes classifiers: a decision-tree hybrid. In Proceedings of the 2nd international conference on knowledge discovery and data mining."},{"key":"9293_CR33","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1016\/S1471-4906(02)02281-0","volume":"23","author":"M Lutz","year":"2002","unstructured":"Lutz, M., & Schuler, G. (2002). Immature, semi-mature and fully mature dendritic cells: which signals induce tolerance or immunity? Trends in Immunology, 23, 991\u20131045.","journal-title":"Trends in Immunology"},{"key":"9293_CR34","doi-asserted-by":"crossref","unstructured":"Markovich, S., & Scott, P. (1988). The role of forgetting in learning. In Proceedings of the 5th international conference on machine learning (pp. 459\u2013465). Springer.","DOI":"10.1016\/B978-0-934613-64-4.50052-9"},{"key":"9293_CR35","first-page":"113","volume":"10","author":"S Markovitch","year":"1993","unstructured":"Markovitch, S., & Scott, P. (1993). Information filtering: selection mechanisms in learning systems. Machine Learning, 10, 113\u2013151.","journal-title":"Machine Learning"},{"key":"9293_CR36","unstructured":"Quinlan, J. (1993). C4.5: programs for machine learning. In Morgan Kaufmann."},{"key":"9293_CR37","unstructured":"Racine, K., & Yang, Q. (1996). On the consistency management of large case bases: the case for validation. In Proceedings of the AAAI workshop on knowledge base validation (pp. 84\u201390). AAAI."},{"key":"9293_CR38","doi-asserted-by":"crossref","unstructured":"Racine, K., & Yang, Q. (1997). Maintaining unstructured case bases. In Proceedings of the 2nd international conference on case-based reasoning (pp. 553\u2013564). Springer.","DOI":"10.1007\/3-540-63233-6_524"},{"key":"9293_CR39","doi-asserted-by":"crossref","unstructured":"Ruck, D.W., Rogers, S.K., Kabrisky, M., Oxley, M., Suter, B. (1990). The multilayer perceptron as an approximation to a bayes optimaldiscriminant function. In IEEE transactions on neural networks (pp. 29617298).","DOI":"10.1109\/72.80266"},{"key":"9293_CR40","unstructured":"Smyth, B., & McKenna, E. (1998). Modelling the competence of case-bases. In Advances in case-based reasoning: proceedings of the 4th European workshop on case-based reasoning (pp. 208\u2013220). Springer."},{"key":"9293_CR41","first-page":"39","volume":"295","author":"A Smiti","year":"2010","unstructured":"Smiti, A., & Elouedi, Z. (2010). COID: a maintaining case method based on clustering, outliers and internal detection. Book chapter in Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing - Studies in Computational Intelligence, Springer, 295, 39\u201352.","journal-title":"Book chapter in Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing - Studies in Computational Intelligence, Springer"},{"key":"9293_CR42","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1109\/TSMC.1972.4309137","volume":"2","author":"D Wilson","year":"1972","unstructured":"Wilson, D. (1972). Asymptotic properties of nearest neighbor rules using edited data. IEEE Transactions on Systems Man and Cybernetics, 2, 408\u2013421.","journal-title":"IEEE Transactions on Systems Man and Cybernetics"},{"key":"9293_CR43","first-page":"150","volume":"5","author":"A Yarifard","year":"2008","unstructured":"Yarifard, A., & Yaghmaee, M. (2008). The monitoring system based on traffic classification. World Applied Sciences Journal, 5, 150\u2013160.","journal-title":"World Applied Sciences Journal"},{"key":"9293_CR44","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"L Zadeh","year":"1965","unstructured":"Zadeh, L. (1965). Fuzzy sets. Information and Control, 8, 338\u2013353.","journal-title":"Information and Control"},{"key":"9293_CR45","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1109\/5326.897072","volume":"30","author":"G Zhang","year":"2000","unstructured":"Zhang, G. (2000). Neural networks for classification: a survey. IEEE Transactions on Systems, Man, and Cybernetics, 30, 451\u2013462.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics"}],"container-title":["Journal of Classification"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00357-018-9293-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00357-018-9293-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00357-018-9293-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,14]],"date-time":"2022-09-14T14:47:29Z","timestamp":1663166849000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00357-018-9293-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,28]]},"references-count":45,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,4]]}},"alternative-id":["9293"],"URL":"https:\/\/doi.org\/10.1007\/s00357-018-9293-7","relation":{},"ISSN":["0176-4268","1432-1343"],"issn-type":[{"value":"0176-4268","type":"print"},{"value":"1432-1343","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3,28]]},"assertion":[{"value":"28 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}