{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,24]],"date-time":"2025-01-24T05:14:55Z","timestamp":1737695695104,"version":"3.33.0"},"edition-number":"1","reference-count":56,"publisher":"Wiley","isbn-type":[{"type":"print","value":"9780471383932"},{"type":"electronic","value":"9780470050118"}],"license":[{"start":{"date-parts":[[2007,12,14]],"date-time":"2007-12-14T00:00:00Z","timestamp":1197590400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Dimensionality reduction studies methods that effectively reduce data dimensionality for efficient data processing tasks such as pattern recognition, machine learning, text retrieval, and data mining. We introduce the field of dimensionality reduction by dividing it into two parts: feature extraction and feature selection. Feature extraction creates new features resulting from the combination of the original features; and feature selection produces a subset of the original features. Both attempt to reduce the dimensionality of a dataset to facilitate efficient data processing tasks. We introduce key concepts of feature extraction and feature selection, describe some basic methods, and illustrate their applications with some practical cases. Extensive research into dimensionality reduction has being carried out for many decades. Even today its demand is further increasing due to important high\u2010dimensional applications such as gene expression data, text categorization, and document indexing.<\/jats:p>","DOI":"10.1002\/9780470050118.ecse112","type":"other","created":{"date-parts":[[2007,12,6]],"date-time":"2007-12-06T17:49:24Z","timestamp":1196963364000},"source":"Crossref","is-referenced-by-count":7,"title":["Dimensionality Reduction"],"prefix":"10.1002","author":[{"given":"Manoranjan","family":"Dash","sequence":"first","affiliation":[]},{"given":"Huan","family":"Liu","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2007,12,14]]},"reference":[{"key":"e_1_2_6_2_1_1","unstructured":"A. Y.Ng Preventing overfitting of crossvalidation data inProc. of Fourteenth International Conference on Machine Learning 1997 pp.245\u2013253."},{"key":"e_1_2_6_2_2_1","doi-asserted-by":"publisher","DOI":"10.1515\/9781400874668"},{"key":"e_1_2_6_2_3_1","unstructured":"J. H.Friedman On Bias Variance 0\/1 \u2010 Loss and the Curse\u2010of\u2010Dimensionality.Technical Report.Stanford CA:Stanford University 1996."},{"key":"e_1_2_6_2_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/0471725293"},{"key":"e_1_2_6_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-21606-5"},{"key":"e_1_2_6_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/545151.545174"},{"key":"e_1_2_6_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1969.222678"},{"key":"e_1_2_6_2_8_1","first-page":"59","volume-title":"Feature Selection and Extraction","author":"Kittler J.","year":"1986"},{"key":"e_1_2_6_2_9_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781412985475"},{"key":"e_1_2_6_2_10_1","first-page":"121","volume-title":"Machine Learning: Proceedings of the Eleventh International Conference","author":"John G. H.","year":"1994"},{"key":"e_1_2_6_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1975.224208"},{"key":"e_1_2_6_2_12_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.290.5500.2323"},{"key":"e_1_2_6_2_13_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.290.5500.2319"},{"key":"e_1_2_6_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-1904-8"},{"volume-title":"Numerical Recipes in C","year":"1988","author":"Press W. H.","key":"e_1_2_6_2_15_1"},{"key":"e_1_2_6_2_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(98)00049-X"},{"key":"e_1_2_6_2_17_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781412985130"},{"key":"e_1_2_6_2_18_1","unstructured":"T.Kohonen J.Hynninen J.Kangas andJ.Laaksonen Som pak: The self\u2010organizing map program package 1996."},{"key":"e_1_2_6_2_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1088-467X(97)00008-5"},{"key":"e_1_2_6_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5725-8"},{"key":"e_1_2_6_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5689-3"},{"key":"e_1_2_6_2_22_1","first-page":"1205","article-title":"Efficient feature selection via analysis of relevance and redundancy","volume":"5","author":"Yu L.","year":"2004","journal-title":"J. Machine Learning Res."},{"key":"e_1_2_6_2_23_1","doi-asserted-by":"crossref","unstructured":"J. C.Schlimmer Efficiently inducing determinations: A complete and systematic search algorithm that uses optimal pruning Proc. of the Tenth International Conference on Machine Learning 1993 pp.284\u2013290.","DOI":"10.1016\/B978-1-55860-307-3.50043-5"},{"key":"e_1_2_6_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1977.1674939"},{"key":"e_1_2_6_2_25_1","unstructured":"J.Doak An Evaluation of Feature Selection Methods and Their Application to Computer Security.Technical Report.Davis CA:University of California Department of Computer Science 1992."},{"key":"e_1_2_6_2_26_1","unstructured":"H.LiuandR.Setiono A probabilistic approach to feature selection\u2014a filter solution inL.Saitta (ed.) Proceedings of International Conference on Machine Learning (ICML\u201096) July 3\u20106 1996.San Francisco CA:Morgan Kaufmann 1996 pp.319\u2013327."},{"key":"e_1_2_6_2_27_1","doi-asserted-by":"crossref","unstructured":"I.Kononenko Estimating attributes: Analysis and extension of RELIEF inProc. of European Conference on Machine Learning (ECML) 1994. pp.171\u2013182.","DOI":"10.1007\/3-540-57868-4_57"},{"volume-title":"C4.5: Programs for Machine Learning","year":"1993","author":"Quinlan J. R.","key":"e_1_2_6_2_28_1"},{"key":"e_1_2_6_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1971.223398"},{"key":"e_1_2_6_2_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(97)00063-5"},{"key":"e_1_2_6_2_31_1","doi-asserted-by":"crossref","unstructured":"M.DashandH.Liu Feature selection for clustering Proc. of Fourth Pacific\u2010Asia Conference on Knowledge Discovery and Data Mining (PAKDD) 2000.","DOI":"10.1007\/3-540-45571-X_13"},{"key":"e_1_2_6_2_32_1","doi-asserted-by":"crossref","unstructured":"J. G.DyandC. E.Brodley Visualization and interactive feature selection for unsupervised data Proc. of the International Conference on Knowledge Discovery and Data Mining (KDD) 2000 pp.360\u2013364.","DOI":"10.1145\/347090.347168"},{"key":"e_1_2_6_2_33_1","first-page":"845","article-title":"Feature selection for unsupervised learning","volume":"5","author":"Dy J. G.","year":"2004","journal-title":"J. Machine Learning Res."},{"key":"e_1_2_6_2_34_1","unstructured":"M.DevaneyandA.Ram Efficient feature selection in conceptual clustering Proc. of the International Conference on Machine Learning (ICML) 1997 pp.92\u201397."},{"key":"e_1_2_6_2_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00114265"},{"key":"e_1_2_6_2_36_1","unstructured":"L.Talavera Feature selection as a preprocessing step for hierarchical clustering inProc. of International Conference on Machine Learning (ICML) 1999."},{"key":"e_1_2_6_2_37_1","unstructured":"L.Talavera Feature selection and incremental learning of probabilistic concept hierarchies inProc. of International Conference on Machine Learning (ICML) 2000."},{"key":"e_1_2_6_2_38_1","unstructured":"S.VaithyanathanandB.Dom Model selection in unsupervised learning with applications to document clustering.Proc. of the International Conference on Machine Learning (ICML) 1999 pp.433\u2013443."},{"key":"e_1_2_6_2_39_1","unstructured":"M.Dash K.Choi P.Scheuermann andH.Liu Feature selection for clustering\u2014A filter solution Proc. of IEEE International Conference on Data Mining (ICDM) 2002."},{"key":"e_1_2_6_2_40_1","doi-asserted-by":"crossref","unstructured":"C. C.Aggarwal C.Procopiuc J. L.Wolf P. S.Yu andJ. S.Park.Fast algorithms for projected clustering.Proc. of ACM SIGMOD Conference on Management of Data 1999 pp.61\u201372.","DOI":"10.1145\/304181.304188"},{"key":"e_1_2_6_2_41_1","doi-asserted-by":"crossref","unstructured":"RAgrawal J.Gehrke D.Gunopulos andP.Raghavan Automatic subspace clustering of high dimensional data for data mining applications Proc. of ACM SIGMOD Conference on Management of Data 1998.","DOI":"10.1145\/276304.276314"},{"key":"e_1_2_6_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/331499.331504"},{"volume-title":"Pattern Classification","year":"2001","author":"Duda R. O.","key":"e_1_2_6_2_43_1"},{"key":"e_1_2_6_2_44_1","doi-asserted-by":"crossref","unstructured":"S.Raychaudhuri J. M.Stuart andR. B.Altman Principal components analysis to summarize microarray experiments: Application to sporulation time series Proc. of Pacific Symposium on Biocomputing 2000 pp.455\u2013466.","DOI":"10.1142\/9789814447331_0043"},{"key":"e_1_2_6_2_45_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.282.5389.699"},{"key":"e_1_2_6_2_46_1","doi-asserted-by":"crossref","unstructured":"C. H.Papadimitriou P.Raghavan H.Tamaki andS.Vempala Latent semantic indexing: A probabilistic analysis Proc. of the ACM Conference on Principles of Database Systems (PODS) 1998.","DOI":"10.1145\/275487.275505"},{"key":"e_1_2_6_2_47_1","doi-asserted-by":"crossref","unstructured":"D. L.SwetsandJ. J.Weng Efficient content\u2010based image retrieval using automatic feature selection inProc. IEEE International Symposium on Computer Vision 1995 pp.85\u201390.","DOI":"10.1109\/ISCV.1995.476982"},{"key":"e_1_2_6_2_48_1","doi-asserted-by":"publisher","DOI":"10.1006\/jvci.1999.0413"},{"issue":"6","key":"e_1_2_6_2_49_1","first-page":"569","article-title":"Customer retention via data mining","volume":"14","author":"Ng K. S.","year":"2000","journal-title":"AI Rev."},{"issue":"6","key":"e_1_2_6_2_50_1","first-page":"533","article-title":"Adaptive intrusion detection: A data mining approach","volume":"14","author":"Lee W.","year":"2000","journal-title":"AI Rev."},{"key":"e_1_2_6_2_51_1","unstructured":"E.Xing M.Jordan andR.Karp Feature selection for high\u2010dimensional genomic microarray data inProc. of the Eighteenth International Conference On Machine Learning 2001."},{"key":"e_1_2_6_2_52_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1012491419635"},{"key":"e_1_2_6_2_53_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007692713085"},{"key":"e_1_2_6_2_54_1","unstructured":"YYangandJ. O.Pederson A comparative study on feature selection in text categorization inProc. of Fourteenth International Conference on Machine Learning 1997 pp.412\u2013420."},{"key":"e_1_2_6_3_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1088-467X(97)00008-5"},{"key":"e_1_2_6_3_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5689-3"}],"container-title":["Wiley Encyclopedia of Computer Science and Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/9780470050118.ecse112","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T09:20:17Z","timestamp":1737624017000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/9780470050118.ecse112"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,12,14]]},"ISBN":["9780471383932","9780470050118"],"references-count":56,"alternative-id":["10.1002\/9780470050118.ecse112","10.1002\/9780470050118"],"URL":"https:\/\/doi.org\/10.1002\/9780470050118.ecse112","archive":["Portico"],"relation":{},"subject":[],"published":{"date-parts":[[2007,12,14]]}}}