iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1007/978-981-15-0184-5_35
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T13:16:49Z","timestamp":1726060609922},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811501838"},{"type":"electronic","value":"9789811501845"}],"license":[{"start":{"date-parts":[[2019,11,28]],"date-time":"2019-11-28T00:00:00Z","timestamp":1574899200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-0184-5_35","type":"book-chapter","created":{"date-parts":[[2019,11,27]],"date-time":"2019-11-27T12:04:06Z","timestamp":1574856246000},"page":"399-408","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An ANN-Based Text Mining Approach Over Hash Tag and Blogging Text Data"],"prefix":"10.1007","author":[{"given":"Archana","family":"Tamrakar","sequence":"first","affiliation":[]},{"given":"Pradeep","family":"Mewada","sequence":"additional","affiliation":[]},{"given":"Purva","family":"Gubrele","sequence":"additional","affiliation":[]},{"given":"Ritu","family":"Prasad","sequence":"additional","affiliation":[]},{"given":"Praneet","family":"Saurabh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,28]]},"reference":[{"key":"35_CR1","doi-asserted-by":"crossref","unstructured":"Fong, S., Gao, E., Wong, R.: Optimized swarm search-based feature selection for text mining in sentiment analysis. In: IEEE 15th International Conference on Data Mining Workshop, pp. 1153\u20131162 (2015)","DOI":"10.1109\/ICDMW.2015.231"},{"issue":"4","key":"35_CR2","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MITP.2014.50","volume":"16","author":"S Fong","year":"2014","unstructured":"Fong, S., Deb, S., Yang, X.S., Li, J.: Feature selection in life science classification, metaheuristic swarm search. IEEE IT Prof. 16(4), 24\u201329 (2014)","journal-title":"IEEE IT Prof."},{"issue":"5","key":"35_CR3","first-page":"1443","volume":"2","author":"R Sagayam","year":"2012","unstructured":"Sagayam, R.: A survey of text mining: retrieval, extraction and indexing techniques. Int. J. Comput. Eng. Res. 2(5), 1443\u20131446 (2012)","journal-title":"Int. J. Comput. Eng. Res."},{"issue":"3","key":"35_CR4","first-page":"43","volume":"2","author":"N Padhy","year":"2012","unstructured":"Padhy, N., Mishra, D., Panigrahi, R.: The survey of data mining applications and feature scope. Int. J. Comput. Sci. Eng. Inf. Technol. (IJCSEIT) 2(3), 43\u201358 (2012)","journal-title":"Int. J. Comput. Sci. Eng. Inf. Technol. (IJCSEIT)"},{"issue":"9","key":"35_CR5","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/1151030.1151032","volume":"49","author":"W Fan","year":"2006","unstructured":"Fan, W., Wallace, L., Rich, S., Zhang, Z.: Tapping the power of text mining. Commun. ACM 49(9), 76\u201382 (2006)","journal-title":"Commun. ACM"},{"key":"35_CR6","unstructured":"Weiss, S.M., Indurkhya, N.T., Zhang, T., Damerau, F.: Text Mining: Predictive Methods for Analyzing Unstructured Information, pp. 157\u2013195. Springer (2010)"},{"key":"35_CR7","doi-asserted-by":"crossref","unstructured":"Pazzani, M.J., Billsus, D.: Content-Based Recommendation Systems, pp. 325\u2013341. Springer (2007)","DOI":"10.1007\/978-3-540-72079-9_10"},{"key":"35_CR8","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1016\/j.infsof.2014.07.014","volume":"58","author":"J Ferrer","year":"2015","unstructured":"Ferrer, J., Kruse, P.M., Chicano, F.E., Alba, E.: Search based algorithms for test sequence generation in functional testing. Inf. Softw. Technol. 58, 419\u2013432 (2015)","journal-title":"Inf. Softw. Technol."},{"key":"35_CR9","doi-asserted-by":"crossref","unstructured":"Ferragina, P., Piccinno, F., Santoro, R.: On analyzing hashtags in twitter. In: Proceedings of the Ninth International AAAI Conference on Web and Social Media, pp. 110\u2013119 (2015)","DOI":"10.1609\/icwsm.v9i1.14584"},{"key":"35_CR10","doi-asserted-by":"crossref","unstructured":"Bart, P., Knijnenburg, M.C., Willemsen, K.A.: A pragmatic procedure to support the user-centric evaluation of recommender systems. In: RecSys\u201911, pp. 321\u2013324. ACM (2011)","DOI":"10.1145\/2043932.2043993"},{"key":"35_CR11","unstructured":"Bahdanau, D., Cho, K., Bengio Y.: Neural machine translation by jointly learning to align and translate. In: International Conference on Learning Representations, pp. 1\u201315 (2015)"},{"issue":"4","key":"35_CR12","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1504\/IJWS.2012.052535","volume":"1","author":"A Bandyopadhyay","year":"2012","unstructured":"Bandyopadhyay, A., Ghosh, K., Majumder, P., Mitra, M.: Query expansion for microblog retrieval. Int. J. Web Sci. 1(4), 368\u2013380 (2012)","journal-title":"Int. J. Web Sci."},{"key":"35_CR13","doi-asserted-by":"crossref","unstructured":"Teppan, E.C.: Implications of psychological phenomenons for recommender systems. In: RecSys\u201908, pp. 323\u2013326. ACM (2008)","DOI":"10.1145\/1454008.1454063"},{"key":"35_CR14","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/j.eswa.2016.03.042","volume":"60","author":"P Saurabh","year":"2016","unstructured":"Saurabh, P., Verma, B.: An efficient proactive artificial immune system based anomaly detection and prevention system. Expert Syst. Appl. 60, 311\u2013320 (2016). Elsevier","journal-title":"Expert Syst. Appl."},{"key":"35_CR15","unstructured":"Saurabh, P., Verma, B,: Immunity inspired cooperative agent based security system. Int. Arab. J. Inf. Technol. 15(2), 289\u2013295 (2018)"},{"key":"35_CR16","doi-asserted-by":"crossref","unstructured":"Saurabh, P., Verma, B., Sharma, S.: An immunity inspired anomaly detection system: a general framework a general framework. In: 7th International conference on bio-inspired computing: theories and applications (BIC-TA 2012), vol 202, AISC, pp. 417\u2013428. Springer (2012)","DOI":"10.1007\/978-81-322-1041-2_36"},{"key":"35_CR17","doi-asserted-by":"crossref","unstructured":"Saurabh, P., Verma, B, Sharma, S.: Biologically Inspired Computer Security System: The Way Ahead, Recent Trends in Computer Networks and Distributed Systems Security, CCIS, vol. 335, pp. 474-484. Springer (2011)","DOI":"10.1007\/978-3-642-34135-9_46"}],"container-title":["Advances in Intelligent Systems and Computing","Soft Computing for Problem Solving"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-0184-5_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,23]],"date-time":"2023-09-23T11:20:20Z","timestamp":1695468020000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-0184-5_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,28]]},"ISBN":["9789811501838","9789811501845"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-0184-5_35","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,11,28]]},"assertion":[{"value":"28 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}