{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T16:37:25Z","timestamp":1732034245784},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2012,8,12]],"date-time":"2012-08-12T00:00:00Z","timestamp":1344729600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Inf Technol Manag"],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1007\/s10799-012-0135-8","type":"journal-article","created":{"date-parts":[[2012,8,11]],"date-time":"2012-08-11T06:52:16Z","timestamp":1344667936000},"page":"105-124","source":"Crossref","is-referenced-by-count":33,"title":["A comparative analysis of classification algorithms in data mining for accuracy, speed and robustness"],"prefix":"10.1007","volume":"14","author":[{"given":"Neslihan","family":"Dogan","sequence":"first","affiliation":[]},{"given":"Zuhal","family":"Tanrikulu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,8,12]]},"reference":[{"issue":"2\u20133","key":"135_CR1","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/s10799-009-0059-0","volume":"10","author":"A Abbasi","year":"2009","unstructured":"Abbasi A, Chen H (2009) A comparison of fraud cues and classification methods for fake escrow website detection. Inf Technol Manage 10(2\u20133):83\u2013101","journal-title":"Inf Technol Manage"},{"issue":"1","key":"135_CR2","first-page":"37","volume":"6","author":"DW Aha","year":"1991","unstructured":"Aha DW, Kibler D, Albert MK (1991) Instance-based learning algorithms. Mach Learn 6(1):37\u201366","journal-title":"Mach Learn"},{"issue":"4","key":"135_CR3","first-page":"31","volume":"10","author":"KA Al-Sheshtawi","year":"2010","unstructured":"Al-Sheshtawi KA, Abdul-Kader HM, Ismail NA (2010) Artificial immune clonal selection classification algorithms for classifying malware and benign processes using API call sequences. Int J Comput Sci Netw Secur 10(4):31\u201339","journal-title":"Int J Comput Sci Netw Secur"},{"key":"135_CR4","unstructured":"Armstrong LJ, Diepeveen D, Maddern R (2007) The application of data mining techniques to characterize agricultural soil profiles. In: Proceedings of the 6th Australasian conference on data mining and analytics (AusDM\u201907), Gold Coast, Australia, pp 81\u201395"},{"issue":"1","key":"135_CR5","first-page":"88","volume":"34","author":"LA Badulescu","year":"2007","unstructured":"Badulescu LA (2007) The choice of the best attribute selection measure in decision tree induction. Ann Univ Craiova Math Comp Sci Ser 34(1):88\u201393","journal-title":"Ann Univ Craiova Math Comp Sci Ser"},{"key":"135_CR6","unstructured":"Bazan JG (1998) A comparison of dynamic and non-dynamic rough set methods for extracting laws from decision tables. In: Polkowski L, Skowron A (eds) Rough sets in knowledge discovery: methodology and applications. Physica-Verlag, Heidelberg, pp 321\u2013365"},{"key":"135_CR7","unstructured":"Bazan JG, Szczuka M (2001) RSES and RSESlib - A collection of tools for rough set computations. In: Ziarko W, Yao Y (eds) Proceedings of the 2nd international conference on rough sets and current trends in computing (RSCTC\u20192000). Lecture Notes in Artificial Intelligence 2005. Springer, Berlin, pp 106\u2013113"},{"key":"135_CR8","volume-title":"Building data mining applications for CRM","author":"A Berson","year":"2000","unstructured":"Berson A, Smith S, Thearling K (2000) Building data mining applications for CRM. McGraw Hill, USA"},{"issue":"1","key":"135_CR9","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1080\/02664769100000005","volume":"18","author":"D Bigss","year":"1991","unstructured":"Bigss D, Ville B, Suen E (1991) A method of choosing multiway partitions for classification and decision trees. J Appl Stat 18(1):49\u201362","journal-title":"J Appl Stat"},{"key":"135_CR10","doi-asserted-by":"crossref","unstructured":"Boser BE, Guyon IM, Vapnik VN (1992) A training algorithm for optimal margin classes. In: Proceedings of the 5th annual workshop on computational learning theory, Pittsburg, USA, pp 144\u2013152","DOI":"10.1145\/130385.130401"},{"issue":"3","key":"135_CR11","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1023\/A:1021713901879","volume":"50","author":"PB Brazdil","year":"2003","unstructured":"Brazdil PB, Soares C, Costa JP (2003) Ranking learning algorithms: using IBL and meta-learning on accuracy and time results. Mach Learn 50(3):251\u2013277","journal-title":"Mach Learn"},{"key":"135_CR12","volume-title":"Classification and regression tree","author":"L Breiman","year":"1984","unstructured":"Breiman L, Friedman JH, Olshen R, Stone CJ (1984) Classification and regression tree. Wadsworth & Brooks\/Cole Advanced Books & Software, Pacific Grove"},{"key":"135_CR13","unstructured":"Brownlee J (2005) Clonal selection theory & CLONALG: the clonal selection classification algorithm (CSCA). Technical Report 2-02, Centre for Intelligent Systems and Complex Processes (CISCP), Swinburne University of Technology (SUT), Australia. Available via http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.70.2821&rep=rep1&type=pdf . Accessed on 15 August 2011"},{"issue":"3","key":"135_CR14","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1109\/TEVC.2002.1011539","volume":"6","author":"LN Castro","year":"2002","unstructured":"Castro LN, Zuben FJ (2002) Learning and optimization using the clonal selection principle. IEEE Trans Evol Computat 6(3):239\u2013251","journal-title":"IEEE Trans Evol Computat"},{"key":"135_CR15","unstructured":"Chang CC, Lin CJ (2011) LIBSVM: a library for support vector machines. ACM Trans Intell Syst Technol 2(3):27:1\u201327. Software available at http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm . Accessed on 29 August 2011"},{"issue":"4","key":"135_CR16","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1007\/s10799-009-0061-6","volume":"10","author":"TM Chiarini","year":"2009","unstructured":"Chiarini TM, Berndt JD, Luther SL, Foulis PR, French DD (2009) Identifying fall-related injuries: text mining the electronic medical record. Inf Technol Manage 10(4):253\u2013265","journal-title":"Inf Technol Manage"},{"key":"135_CR17","volume-title":"Data mining: a knowledge discovery approach","author":"KJ Cios","year":"2007","unstructured":"Cios KJ, Pedrycz W, Swiniarski RW, Kurgan LA (2007) Data mining: a knowledge discovery approach. Springer, USA"},{"issue":"3","key":"135_CR18","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273\u2013297","journal-title":"Mach Learn"},{"key":"135_CR19","unstructured":"Dogan N, Tanrikulu Z (2010) A comparative framework for evaluating classification algorithms. In: Proceedings of WCE 2010: international data mining and knowledge engineering 1, London, UK, pp 309\u2013314"},{"key":"135_CR20","volume-title":"Data mining: introductory and advanced topics","author":"MH Dunham","year":"2002","unstructured":"Dunham MH (2002) Data mining: introductory and advanced topics. Prentice Hall, New Jersey"},{"key":"135_CR21","unstructured":"EL-Manzalawy Y, Honavar V (2005) WLSVM: integrating LibSVM into weka environment. Software available at http:\/\/www.cs.iastate.edu\/~yasser\/wlsvm . Accessed on 29 August 2011"},{"issue":"2","key":"135_CR22","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1214\/aos\/1016218223","volume":"28","author":"J Friedman","year":"2000","unstructured":"Friedman J, Hastie T, Tibshirani R (2000) Additive logistic regression: a statistical view of boosting. Ann Stat 28(2):337\u2013407","journal-title":"Ann Stat"},{"key":"135_CR23","unstructured":"Ge E, Nayak R, Xu Y, Li Y (2006) Data mining for lifetime prediction of metallic components. In: Proceedings of the 5th Australasian data mining conference (AusDM2006), Sydney, Australia, pp 75\u201381"},{"key":"135_CR24","doi-asserted-by":"crossref","unstructured":"Hacker S, Ahn LV (2009) Matchin: eliciting user preferences with an online game. In: Proceedings of the 27th international conference on human factors in computing systems (CHI\u201909), pp 1207\u20131216","DOI":"10.1145\/1518701.1518882"},{"key":"135_CR25","volume-title":"Data mining concepts and techniques","author":"J Han","year":"2006","unstructured":"Han J, Kamber M (2006) Data mining concepts and techniques, 2nd edn. Morgan Kaufmann, USA","edition":"2"},{"key":"135_CR26","volume-title":"Principles of data mining","author":"D Hand","year":"2001","unstructured":"Hand D, Mannila H, Smyth P (2001) Principles of data mining. The MIT Press, Cambridge"},{"key":"135_CR27","unstructured":"He H, Jin H, Chen J, McAullay D, Li J, Fallon T (2006) Analysis of breast feeding data using data mining methods. In: Proceedings of the 5th Australasian data mining conference (AusDM2006), Sydney, Australia, pp 47\u201353"},{"key":"135_CR28","first-page":"323","volume-title":"Computational learning theory and natural learning systems: selecting good models","author":"F Hergert","year":"1995","unstructured":"Hergert F, Finnoff W, Zimmermann HG (1995) Improving model selection by dynamic regularization methods. In: Petsche T, Hanson SJ, Shavlik J (eds) Computational learning theory and natural learning systems: selecting good models. MIT Press, Cambridge, pp 323\u2013343"},{"key":"135_CR29","volume-title":"STATISTICS: methods and applications","author":"T Hill","year":"2007","unstructured":"Hill T, Lewicki P (2007) STATISTICS: methods and applications. StatSoft, Tulsa"},{"issue":"5","key":"135_CR30","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1016\/j.knosys.2005.11.014","volume":"19","author":"T Howley","year":"2006","unstructured":"Howley T, Madden MG, OConnell ML, Ryder AG (2006) The effect of principal component analysis on machine learning accuracy with high dimensional spectral data. Knowl-Based Syst 19(5):363\u2013370","journal-title":"Knowl-Based Syst"},{"issue":"1","key":"135_CR31","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/s00357-008-9003-y","volume":"25","author":"A Jamain","year":"2008","unstructured":"Jamain A, Hand DJ (2008) Mining supervised classification performance studies: a meta-analytic investigation. J Classif 25(1):87\u2013112","journal-title":"J Classif"},{"key":"135_CR32","unstructured":"John GH, Langley P (1995) Estimating continuous distributions in Bayesian classifiers. In: Besnard P, Hanks S (eds) Proceedings of the 17th conference on uncertainty in artificial intelligence. Morgan Kaufmann, USA, pp 338\u2013345"},{"key":"135_CR33","first-page":"133","volume-title":"Computational learning theory and natural learning systems: intersection between theory and experiment","author":"LP Kaelbling","year":"1994","unstructured":"Kaelbling LP (1994) Associative methods in reinforcement learning: an emprical study. In: Hanson SJ, Petsche T, Kearns M, Rivest RL (eds) Computational learning theory and natural learning systems: intersection between theory and experiment. MIT Press, Cambridge, pp 133\u2013153"},{"issue":"3","key":"135_CR34","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1023\/B:MACH.0000015882.38031.85","volume":"54","author":"A Kalousis","year":"2004","unstructured":"Kalousis A, Gama J, Hilario M (2004) On data and algorithms: understanding inductive performance. Mach Learn 54(3):275\u2013312","journal-title":"Mach Learn"},{"issue":"4","key":"135_CR35","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1023\/A:1024988512476","volume":"7","author":"E Keogh","year":"2002","unstructured":"Keogh E, Kasetty S (2002) On the need for time series data mining benchmarks: a survey and empirical demonstration. Data Min Knowl Disc 7(4):349\u2013371","journal-title":"Data Min Knowl Disc"},{"key":"135_CR36","first-page":"206","volume-title":"Proceedings of the 10th ACM SIGKDD international conference on knowledge discovery and data mining","author":"E Keogh","year":"2004","unstructured":"Keogh E, Stefano L, Ratanamahatana CA (2004) Towards parameter-free data mining. In: Kim W, Kohavi R, Gehrke J, DuMouchel W (eds) Proceedings of the 10th ACM SIGKDD international conference on knowledge discovery and data mining. Seattle, Washington, pp 206\u2013215"},{"issue":"11","key":"135_CR37","doi-asserted-by":"crossref","first-page":"1457","DOI":"10.1109\/TKDE.2006.180","volume":"18","author":"SB Kim","year":"2006","unstructured":"Kim SB, Han KS, Rim HC, Myaeng SH (2006) Some effective techniques for Naive Bayes text classification. IEEE Trans Knowl Data Eng 18(11):1457\u20131466","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"4","key":"135_CR38","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1007\/s10799-008-0036-z","volume":"9","author":"M Ko","year":"2008","unstructured":"Ko M, Osei-Bryson KM (2008) Reexamining the impact of information technology investment on productivity using regression tree and multivariate adaptive regression splines (MARS). Inf Technol Manage 9(4):285\u2013299","journal-title":"Inf Technol Manage"},{"key":"135_CR39","doi-asserted-by":"crossref","unstructured":"Kohonen T (1990a) Improved versions of learning vector quantization. In: Proceedings of the international joint conference on neural networks I, San Diego, pp 545\u2013550","DOI":"10.1109\/IJCNN.1990.137622"},{"issue":"9","key":"135_CR40","doi-asserted-by":"crossref","first-page":"1464","DOI":"10.1109\/5.58325","volume":"78","author":"T Kohonen","year":"1990","unstructured":"Kohonen T (1990) The self-organizing map. Proc IEEE 78(9):1464\u20131480","journal-title":"Proc IEEE"},{"key":"135_CR41","unstructured":"Kohonen T, Hynninen J, Kangas J, Laaksonen J, Torkkola K (1995) LVQ-PK: the learning vector quantization package version 3.1. Technical Report. Helsinki University of Technology Laboratory of Computer and Information Science, Finland. Available via http:\/\/www.cis.hut.fi\/research\/lvq_pak\/lvq_doc.txt . Accessed on 27 March 2012"},{"issue":"1","key":"135_CR42","doi-asserted-by":"crossref","first-page":"191","DOI":"10.2307\/2347628","volume":"41","author":"S Cessie Le","year":"1992","unstructured":"Le Cessie S, van Houwelingen JC (1992) Ridge estimators in logistic regression. Appl Stat 41(1):191\u2013201","journal-title":"Appl Stat"},{"issue":"3","key":"135_CR43","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1023\/A:1007608224229","volume":"40","author":"T-S Lim","year":"2000","unstructured":"Lim T-S, Loh W-Y, Shih Y-S (2000) A comparison of prediction accuracy, complexity, and training time of thirty-three old and new classification algorithms. Mach Learn 40(3):203\u2013228","journal-title":"Mach Learn"},{"issue":"4","key":"135_CR44","first-page":"815","volume":"7","author":"WY Loh","year":"1997","unstructured":"Loh WY, Shih YS (1997) Split selection methods for classification trees. Stat Sin 7(4):815\u2013840","journal-title":"Stat Sin"},{"key":"135_CR45","doi-asserted-by":"crossref","unstructured":"Maimon O, Rokach L (2010) The data mining and knowledge discovery handbook. Springer, Berlin, 2nd edn","DOI":"10.1007\/978-0-387-09823-4"},{"key":"135_CR46","unstructured":"Maindonald J (2006) Data mining methodological weaknesses and suggested fixes. In: Proceedings of the 5th Australasian data mining conference (AusDM2006), Sydney, Australia, pp 9\u201316"},{"key":"135_CR47","volume-title":"Machine learning","author":"TM Mitchell","year":"1997","unstructured":"Mitchell TM (1997) Machine learning. McGraw Hill, USA"},{"issue":"5","key":"135_CR48","first-page":"341","volume":"11","author":"Z Pawlak","year":"1982","unstructured":"Pawlak Z (1982) Rough sets. Int J Parallel Prog 11(5):341\u2013356","journal-title":"Int J Parallel Prog"},{"key":"135_CR49","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-011-3534-4","volume-title":"Rough sets: theoretical aspects of reasoning about data","author":"Z Pawlak","year":"1991","unstructured":"Pawlak Z (1991) Rough sets: theoretical aspects of reasoning about data. Kluwer, Dordrecht"},{"key":"135_CR50","first-page":"87","volume-title":"Proceedings of the 2nd international workshop on integrating artificial intelligence and data mining (AIDM 2007) CRPIT 87","author":"E Pitt","year":"2007","unstructured":"Pitt E, Nayak R (2007) The use of various data mining and feature selection methods in the analysis of a population survey dataset. In: Ong KL, Li W, Gao J (eds) Proceedings of the 2nd international workshop on integrating artificial intelligence and data mining (AIDM 2007) CRPIT 87. Goald Coast, Australia, pp 87\u201397"},{"key":"135_CR51","unstructured":"Putten P, Lingjun M, Kok JN (2008) Profiling novel classification algorithms: artificial immune system. In: Proceedings of the 7th IEEE international conference on cybernetic intelligent systems (CIS 2008), London, UK, pp 1\u20136"},{"key":"135_CR52","unstructured":"Quinlan JR (1993) C4.5: programs for machine learning. Morgan Kaufmann, USA"},{"key":"135_CR53","first-page":"445","volume-title":"Computational learning theory and natural learning systems: constraints and prospect","author":"JR Quinlan","year":"1994","unstructured":"Quinlan JR (1994) Comparing connectionist and symbolic learning methods. In: Hanson SJ, Drastal GA, Rivest RL (eds) Computational learning theory and natural learning systems: constraints and prospect. MIT Press, Cambridge, pp 445\u2013456"},{"key":"135_CR54","unstructured":"Rumelhart DE, Hinton GE, Williams RJ (1986) Learning internal representations by error propagation. In: Rumelhart DE, McClelland JL, and the PDP research group (eds) Parallel distributed processing: explorations in the microstructure of cognition 1: foundations. MIT Press, Cambridge, pp 318\u2013362"},{"key":"135_CR55","unstructured":"Shih YS (2004) QUEST user manual. Department of Mathematics, National Chung Cheng University, Taiwan. Available via http:\/\/www.stat.wisc.edu\/~loh\/treeprogs\/quest\/questman.pdf . Accessed on 15 August 2011"},{"key":"135_CR56","unstructured":"SPSS (2012) CHAID and exhaustive CHAID algorithms. Available via ftp:\/\/ftp.software.ibm.com\/software\/analytics\/spss\/support\/Stats\/Docs\/Statistics\/Algorithms\/13.0\/TREE-CHAID.pdf . Accessed on 9 April 2012"},{"issue":"2","key":"135_CR57","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1109\/TKDE.2008.128","volume":"21","author":"CT Su","year":"2009","unstructured":"Su CT, Hsiao YH (2009) Multiclass MTS for simultaneous feature selection and classification. IEEE Trans Knowl Data Eng 21(2):192\u2013204","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"135_CR58","unstructured":"UCI Machine Learning Repository (2010) Available via http:\/\/archive.ics.uci.edu\/ml . Accessed on 10 December 2010"},{"key":"135_CR59","unstructured":"Watkins AB (2001) AIRS: a resource limited artificial immune classifier. M.Sc. Thesis, Mississippi State University Department of Computer Science, USA. Available via http:\/\/www.cse.msstate.edu\/~andrew\/research\/publications\/watkins_thesis.pdf . Accessed on 15 August 2011"},{"key":"135_CR60","unstructured":"Watkins AB (2005) Exploiting immunological metaphors in the development of serial, parallel and distributed learning algorithms. PhD Thesis, University of Kent, Canterbury, UK Available via http:\/\/www.cse.msstate.edu\/~andrew\/research\/publications\/watkins_phd_dissertation.pdf . Accessed on 15 August 2011"},{"issue":"3","key":"135_CR61","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1023\/B:GENP.0000030197.83685.94","volume":"5","author":"AB Watkins","year":"2004","unstructured":"Watkins AB, Timmis J, Boggess L (2004) Artificial immune recognition system (AIRS): an immune-inspired supervised learning algorithm. Genet Program Evolvable Mach 5(3):291\u2013317","journal-title":"Genet Program Evolvable Mach"},{"key":"135_CR62","unstructured":"WEKA (2011) Classification algorithms. Available via http:\/\/wekaclassalgos.sourceforge.net\/ . Accessed on 15 August 2011"},{"key":"135_CR63","volume-title":"Data mining: practical machine learning tools and techniques","author":"IH Witten","year":"2005","unstructured":"Witten IH, Frank E (2005) Data mining: practical machine learning tools and techniques, 2nd edn. Morgan Kaufmann, USA","edition":"2"},{"key":"135_CR64","doi-asserted-by":"crossref","unstructured":"Wu X, Kumar V (2009) The top ten algorithms in data mining. Chapman&Hall\/CRC Press, Taylor &Francis Group, USA","DOI":"10.1201\/9781420089653"},{"issue":"12","key":"135_CR65","doi-asserted-by":"crossref","first-page":"1652","DOI":"10.1109\/TKDE.2007.190650","volume":"19","author":"Y Yang","year":"2007","unstructured":"Yang Y, Webb GI, Cerquides J, Korb KB, Boughton J, Ting KM (2007) To select or to weigh: a comparative study of linear combination schemes for superparent-one-dependence estimators. IEEE Trans Knowl Data Eng 19(12):1652\u20131664","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"4","key":"135_CR66","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1111\/j.1540-5915.2001.tb00975.x","volume":"32","author":"D Zhu","year":"2001","unstructured":"Zhu D, Premkumar G, Zhang X, Chu C-H (2001) Data mining for network intrusion detection: a comparison of alternative methods. Decis Sci 32(4):635\u2013660","journal-title":"Decis Sci"}],"container-title":["Information Technology and Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-012-0135-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10799-012-0135-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-012-0135-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T08:13:44Z","timestamp":1643184824000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10799-012-0135-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,12]]},"references-count":66,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["135"],"URL":"https:\/\/doi.org\/10.1007\/s10799-012-0135-8","relation":{},"ISSN":["1385-951X","1573-7667"],"issn-type":[{"value":"1385-951X","type":"print"},{"value":"1573-7667","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,8,12]]}}}