{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T08:51:38Z","timestamp":1769590298328,"version":"3.49.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1109\/icsmc.2003.1244611","type":"proceedings-article","created":{"date-parts":[[2004,3,30]],"date-time":"2004-03-30T17:17:26Z","timestamp":1080667046000},"page":"1417-1422 vol.2","source":"Crossref","is-referenced-by-count":0,"title":["Multilayered fuzzy clustering method based on distance and density"],"prefix":"10.1109","author":[{"family":"Xiaoping Qiu","sequence":"first","affiliation":[{"name":"Intelligent Control Dev. Center, Southwest Jiaotong Univ., Chengdu, China"}]},{"given":"D.","family":"Meng","sequence":"additional","affiliation":[{"name":"Intelligent Control Dev. Center, Southwest Jiaotong Univ., Chengdu, China"}]},{"family":"Yongchuan Tang","sequence":"additional","affiliation":[]},{"family":"Yang Xu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/3477.790444"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/21.120079"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/34.990133"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"209","DOI":"10.3233\/IFS-1994-2301","article-title":"Generation of fuzzy rules by mountain clustering","author":"yager","year":"1994","journal-title":"J Intell Fuzzy Systems"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/3477.956035"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1986.289321"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"267","DOI":"10.3233\/IFS-1994-2306","article-title":"Fuzzy model identification based on cluster estimation","author":"chiu","year":"1994","journal-title":"J Intell Fuzzy Systems"},{"key":"ref17","first-page":"2289","article-title":"Fast clustering with application to fuzzy rule generation","author":"cheng","year":"1995","journal-title":"FUZZ-IEEE\/IFES"},{"key":"ref18","first-page":"483","article-title":"Double-layered fuzzy clustering method based on distance and density","volume":"1","author":"qiu","year":"2003","journal-title":"Proc Fuzzy Information Processing Theories and Applications"},{"key":"ref19","first-page":"86","article-title":"A new fuzzy clustering method based on distance and density","volume":"7","author":"qiu","year":"2002","journal-title":"Proc IEEE International Conference on Systems Man and Cybernetics"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.1992.258640"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1174","DOI":"10.1109\/72.870048","article-title":"A fuzzy clustering neural networks(FCNs) system design methodology","volume":"11","author":"david","year":"2000","journal-title":"IEEE Trans Neural Networks"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-0114(98)00038-4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/3477.931536"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/34.391407"},{"key":"ref7","article-title":"Data mining - conception and techniques","author":"han","year":"2001"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/3477.809033"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/3477.809032"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.1992.258641"}],"event":{"name":"SMC '03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics","location":"Washington, DC, USA","start":{"date-parts":[[2003,10,8]]},"end":{"date-parts":[[2003,10,8]]}},"container-title":["SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8811\/27880\/01244611.pdf?arnumber=1244611","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T05:26:41Z","timestamp":1769491601000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/1244611\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icsmc.2003.1244611","relation":{},"subject":[],"published":{"date-parts":[[2003]]}}}