{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T02:29:10Z","timestamp":1697768950593},"reference-count":44,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100004541","name":"Ministry of Education, India","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004541","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Processing & Management"],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1016\/j.ipm.2022.102887","type":"journal-article","created":{"date-parts":[[2022,3,3]],"date-time":"2022-03-03T17:07:17Z","timestamp":1646327237000},"page":"102887","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":4,"title":["Predictive and adaptive Drift Analysis on Decomposed Healthcare Claims using ART based Topological Clustering"],"prefix":"10.1016","volume":"59","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-9519-4826","authenticated-orcid":false,"given":"Lavanya","family":"Settipalli","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0764-2650","authenticated-orcid":false,"given":"G.R.","family":"Gangadharan","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0509-5662","authenticated-orcid":false,"given":"Ugo","family":"Fiore","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ipm.2022.102887_b1","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.accinf.2016.04.001","article-title":"Outlier detection in healthcare fraud: A case study in the medicaid dental domain","volume":"21","author":"van Capelleveen","year":"2016","journal-title":"International Journal of Accounting Information Systems"},{"issue":"1","key":"10.1016\/j.ipm.2022.102887_b2","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1016\/S0734-189X(87)80014-2","article-title":"A massively parallel architecture for a self-organizing neural pattern recognition machine","volume":"37","author":"Carpenter","year":"1987","journal-title":"Computer Vision, Graphics, and Image Processing"},{"issue":"1","key":"10.1016\/j.ipm.2022.102887_b3","doi-asserted-by":"crossref","first-page":"63","DOI":"10.3923\/ajms.2008.63.68","article-title":"Pseudo\u2013additive (mixed) Fourier series model of time series","volume":"1","author":"Ekpenyong","year":"2008","journal-title":"Asian Journal of Mathematics and Statistics"},{"key":"10.1016\/j.ipm.2022.102887_b4","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2020.106385","article-title":"A bi-objective home healthcare routing and scheduling problem considering patients\u2019 satisfaction in a fuzzy environment","volume":"93","author":"Fathollahi-Fard","year":"2020","journal-title":"Applied Soft Computing"},{"issue":"10","key":"10.1016\/j.ipm.2022.102887_b5","doi-asserted-by":"crossref","first-page":"6185","DOI":"10.1007\/s00521-019-04126-8","article-title":"A set of efficient heuristics for a home healthcare problem","volume":"32","author":"Fathollahi-Fard","year":"2020","journal-title":"Neural Computing and Applications"},{"key":"10.1016\/j.ipm.2022.102887_b6","doi-asserted-by":"crossref","DOI":"10.1108\/JFC-06-2014-0032","article-title":"Financial fraud in the private health insurance sector in Australia: Perspectives from the industry","author":"Flynn","year":"2015","journal-title":"Journal of Financial Crime"},{"issue":"4","key":"10.1016\/j.ipm.2022.102887_b7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42979-021-00655-z","article-title":"Gradient boosted decision tree algorithms for medicare fraud detection","volume":"2","author":"Hancock","year":"2021","journal-title":"SN Computer Science"},{"key":"10.1016\/j.ipm.2022.102887_b8","article-title":"Identifying health insurance claim frauds using mixture of clinical concepts","author":"Haque","year":"2021","journal-title":"IEEE Transactions on Services Computing"},{"key":"10.1016\/j.ipm.2022.102887_b9","series-title":"Asia-Pacific Conference on Simulated Evolution and Learning","first-page":"74","article-title":"Application of genetic algorithm and k-nearest neighbour method in medical fraud detection","author":"He","year":"1998"},{"issue":"4","key":"10.1016\/j.ipm.2022.102887_b10","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/S0957-4174(97)00045-6","article-title":"Application of neural networks to detection of medical fraud","volume":"13","author":"He","year":"1997","journal-title":"Expert Systems with Applications"},{"issue":"1","key":"10.1016\/j.ipm.2022.102887_b11","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/s10729-018-9460-8","article-title":"Approaches for identifying US medicare fraud in provider claims data","volume":"23","author":"Herland","year":"2020","journal-title":"Health Care Management Science"},{"issue":"1","key":"10.1016\/j.ipm.2022.102887_b12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40537-018-0138-3","article-title":"Big data fraud detection using multiple medicare data sources","volume":"5","author":"Herland","year":"2018","journal-title":"Journal of Big Data"},{"issue":"2","key":"10.1016\/j.ipm.2022.102887_b13","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2020.102462","article-title":"Transaction-based classification and detection approach for ethereum smart contract","volume":"58","author":"Hu","year":"2021","journal-title":"Information Processing & Management"},{"issue":"1","key":"10.1016\/j.ipm.2022.102887_b14","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1007\/BF01908075","article-title":"Comparing partitions","volume":"2","author":"Hubert","year":"1985","journal-title":"Journal of Classification"},{"issue":"4","key":"10.1016\/j.ipm.2022.102887_b15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42979-021-00656-y","article-title":"Medical provider embeddings for healthcare fraud detection","volume":"2","author":"Johnson","year":"2021","journal-title":"SN Computer Science"},{"issue":"3","key":"10.1016\/j.ipm.2022.102887_b16","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/s10729-015-9317-3","article-title":"Multi-stage methodology to detect health insurance claim fraud","volume":"19","author":"Johnson","year":"2016","journal-title":"Health Care Management Science"},{"issue":"12","key":"10.1016\/j.ipm.2022.102887_b17","doi-asserted-by":"crossref","first-page":"1267","DOI":"10.1057\/palgrave.jors.2600823","article-title":"Some properties of a simple moving average when applied to forecasting a time series","volume":"50","author":"Johnston","year":"1999","journal-title":"Journal of the Operational Research Society"},{"key":"10.1016\/j.ipm.2022.102887_b18","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2020.106701","article-title":"Clustering time-series by a novel slope-based similarity measure considering particle swarm optimization","volume":"96","author":"Kamalzadeh","year":"2020","journal-title":"Applied Soft Computing"},{"issue":"1","key":"10.1016\/j.ipm.2022.102887_b19","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2020.102433","article-title":"Robust adaptive semi-supervised classification method based on dynamic graph and self-paced learning","volume":"58","author":"Li","year":"2021","journal-title":"Information Processing & Management"},{"issue":"11","key":"10.1016\/j.ipm.2022.102887_b20","doi-asserted-by":"crossref","first-page":"5286","DOI":"10.1109\/TSP.2007.896065","article-title":"Correntropy: Properties and applications in non-Gaussian signal processing","volume":"55","author":"Liu","year":"2007","journal-title":"IEEE Transactions on Signal Processing"},{"key":"10.1016\/j.ipm.2022.102887_b21","series-title":"2019 IEEE Congress on Evolutionary Computation (CEC)","first-page":"713","article-title":"A novel clustering algorithm based on fully-informed particle swarm","author":"Mansour","year":"2019"},{"key":"10.1016\/j.ipm.2022.102887_b22","doi-asserted-by":"crossref","first-page":"76920","DOI":"10.1109\/ACCESS.2019.2921832","article-title":"Topological clustering via adaptive resonance theory with information theoretic learning","volume":"7","author":"Masuyama","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.ipm.2022.102887_b23","doi-asserted-by":"crossref","first-page":"143256","DOI":"10.1109\/ACCESS.2020.3013962","article-title":"Sequence mining and prediction-based healthcare fraud detection methodology","volume":"8","author":"Matloob","year":"2020","journal-title":"IEEE Access"},{"issue":"2","key":"10.1016\/j.ipm.2022.102887_b24","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1037\/h0043158","article-title":"The magical number seven, plus or minus two: Some limits on our capacity for processing information","volume":"63","author":"Miller","year":"1956","journal-title":"Psychological Review"},{"issue":"3","key":"10.1016\/j.ipm.2022.102887_b25","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1016\/S1364-6613(03)00029-9","article-title":"The cognitive revolution: a historical perspective","volume":"7","author":"Miller","year":"2003","journal-title":"Trends in Cognitive Sciences"},{"issue":"3","key":"10.1016\/j.ipm.2022.102887_b26","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2021.102535","article-title":"HOCBS: A privacy-preserving blockchain framework for healthcare data leveraging an on-chain and off-chain system design","volume":"58","author":"Miyachi","year":"2021","journal-title":"Information Processing & Management"},{"key":"10.1016\/j.ipm.2022.102887_b27","first-page":"419","article-title":"Unsupervised anomaly detection of healthcare providers using generative adversarial networks","volume":"12066","author":"Naidoo","year":"2020","journal-title":"Responsible Design, Implementation and Use of Information and Communication Technology"},{"issue":"2","key":"10.1016\/j.ipm.2022.102887_b28","doi-asserted-by":"crossref","first-page":"191","DOI":"10.7494\/csci.2012.14.2.191","article-title":"Unsupervised labeling of data for supervised learning and its application to medical claims prediction","volume":"14","author":"Ngufor","year":"2013","journal-title":"Computer Science"},{"issue":"18","key":"10.1016\/j.ipm.2022.102887_b29","article-title":"Cognitive cryptography for data security in cloud computing","volume":"32","author":"Ogiela","year":"2020","journal-title":"Concurrency Computations: Practice and Experience"},{"issue":"8","key":"10.1016\/j.ipm.2022.102887_b30","article-title":"Cognitive security paradigm for cloud computing applications","volume":"32","author":"Ogiela","year":"2020","journal-title":"Concurrency Computations: Practice and Experience"},{"key":"10.1016\/j.ipm.2022.102887_b31","series-title":"2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)","first-page":"198","article-title":"Efficiency of strategic data sharing and management protocols","author":"Ogiela","year":"2016"},{"key":"10.1016\/j.ipm.2022.102887_b32","first-page":"26","article-title":"A medical claim fraud\/abuse detection system based on data mining: A case study in Chile","volume":"6","author":"Ortega","year":"2006","journal-title":"DMIN"},{"key":"10.1016\/j.ipm.2022.102887_b33","series-title":"Wiley Encyclopedia of Operations Research and Management Science","article-title":"The weighted moving average technique","author":"Perry","year":"2010"},{"issue":"1","key":"10.1016\/j.ipm.2022.102887_b34","first-page":"6","article-title":"Employer strategies to combat health care plan fraud","volume":"7","author":"Pflaum","year":"1991","journal-title":"Benefits Quarterly"},{"issue":"3p1","key":"10.1016\/j.ipm.2022.102887_b35","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1037\/h0025953","article-title":"On the genesis of abstract ideas","volume":"77","author":"Posner","year":"1968","journal-title":"Journal of Experimental Psychology"},{"issue":"8","key":"10.1016\/j.ipm.2022.102887_b36","doi-asserted-by":"crossref","first-page":"7441","DOI":"10.1016\/j.eswa.2012.01.105","article-title":"A scoring model to detect abusive billing patterns in health insurance claims","volume":"39","author":"Shin","year":"2012","journal-title":"Expert Systems with Applications"},{"issue":"4","key":"10.1016\/j.ipm.2022.102887_b37","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1016\/j.ipm.2009.03.002","article-title":"A systematic analysis of performance measures for classification tasks","volume":"45","author":"Sokolova","year":"2009","journal-title":"Information Processing & Management"},{"key":"10.1016\/j.ipm.2022.102887_b38","doi-asserted-by":"crossref","DOI":"10.1155\/2019\/1432597","article-title":"Decision support system (DSS) for fraud detection in health insurance claims using genetic support vector machines (GVMs)","volume":"2019","author":"Sowah","year":"2019","journal-title":"Journal of Engineering"},{"issue":"Dec","key":"10.1016\/j.ipm.2022.102887_b39","first-page":"583","article-title":"Cluster ensembles\u2014a knowledge reuse framework for combining multiple partitions","volume":"3","author":"Strehl","year":"2002","journal-title":"Journal of Machine Learning Research"},{"issue":"1413","key":"10.1016\/j.ipm.2022.102887_b40","doi-asserted-by":"crossref","first-page":"1505","DOI":"10.1098\/rstb.2001.0937","article-title":"Episodic memory and common sense: how far apart?","volume":"356","author":"Tulving","year":"2001","journal-title":"Philosophical Transactions of the Royal Society of London. Series B: Biological Sciences"},{"key":"10.1016\/j.ipm.2022.102887_b41","series-title":"The Nature of Statistical Learning Theory","author":"Vapnik","year":"2013"},{"issue":"3","key":"10.1016\/j.ipm.2022.102887_b42","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1007\/s00607-020-00853-2","article-title":"Differential privacy distributed learning under chaotic quantum particle swarm optimization","volume":"103","author":"Xie","year":"2021","journal-title":"Computing"},{"issue":"3","key":"10.1016\/j.ipm.2022.102887_b43","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1023\/B:DAMI.0000023676.72185.7c","article-title":"On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms","volume":"8","author":"Yamanishi","year":"2004","journal-title":"Data Mining and Knowledge Discovery"},{"issue":"1","key":"10.1016\/j.ipm.2022.102887_b44","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.eswa.2005.09.003","article-title":"A process-mining framework for the detection of healthcare fraud and abuse","volume":"31","author":"Yang","year":"2006","journal-title":"Expert Systems with Applications"}],"container-title":["Information Processing & Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0306457322000164?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0306457322000164?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,1,29]],"date-time":"2023-01-29T10:46:34Z","timestamp":1674989194000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0306457322000164"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":44,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["S0306457322000164"],"URL":"https:\/\/doi.org\/10.1016\/j.ipm.2022.102887","relation":{},"ISSN":["0306-4573"],"issn-type":[{"value":"0306-4573","type":"print"}],"subject":[],"published":{"date-parts":[[2022,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Predictive and adaptive Drift Analysis on Decomposed Healthcare Claims using ART based Topological Clustering","name":"articletitle","label":"Article Title"},{"value":"Information Processing & Management","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ipm.2022.102887","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"102887"}}