{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:27:32Z","timestamp":1742984852426,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030267650"},{"type":"electronic","value":"9783030267667"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-26766-7_57","type":"book-chapter","created":{"date-parts":[[2019,7,29]],"date-time":"2019-07-29T23:18:04Z","timestamp":1564442284000},"page":"629-639","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Integrated Classification Algorithm Using Forecasting Probability Strategies for Mobile App Statistics"],"prefix":"10.1007","author":[{"given":"Jingyuan","family":"Cao","sequence":"first","affiliation":[]},{"given":"Hong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Mo","family":"Pang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,24]]},"reference":[{"key":"57_CR1","doi-asserted-by":"publisher","first-page":"1088","DOI":"10.1016\/j.cie.2018.04.003","volume":"128","author":"JW Liu","year":"2018","unstructured":"Liu, J.W.: Using big data database to construct new Gfuzzy text mining and decision algorithm for targeting and classifying customers. Comput. Ind. Eng. 128, 1088\u20131095 (2018)","journal-title":"Comput. Ind. Eng."},{"issue":"9","key":"57_CR2","doi-asserted-by":"crossref","first-page":"2010","DOI":"10.1109\/TNNLS.2016.2572204","volume":"28","author":"Q Liu","year":"2016","unstructured":"Liu, Q., Liu, C.: A novel locally linear KNN method with applications to visual recognition. IEEE Trans. Neural Netw. Learn. Syst. 28(9), 2010\u20132021 (2016)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"1","key":"57_CR3","first-page":"65","volume":"10","author":"SK Sahu","year":"2017","unstructured":"Sahu, S.K., Kumar, P., Singh, A.P.: Modified K-NN algorithm for classification problems with improved accuracy. Int. J. Inf. Technol. 10(1), 65\u201370 (2017)","journal-title":"Int. J. Inf. Technol."},{"issue":"21","key":"57_CR4","doi-asserted-by":"publisher","first-page":"2941","DOI":"10.1002\/sim.6526","volume":"34","author":"J Wolfson","year":"2015","unstructured":"Wolfson, J., Bandyopadhyayy, S., et al.: A naive Bayes machine learning approach to risk prediction using censored, time-to-event data. Stat. Med. 34(21), 2941\u20132957 (2015)","journal-title":"Stat. Med."},{"key":"57_CR5","unstructured":"Hu, C., Steingrimsson, J.A.: Personalized risk prediction in clinical oncology research: applications and practical issues using survival trees and random forests. J. Biopharm. Stat. 1\u201317 (2017)"},{"key":"57_CR6","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.asoc.2017.05.043","volume":"59","author":"\u00d6F Arar","year":"2017","unstructured":"Arar, \u00d6.F., Ayan, K.: A feature dependent naive Bayes approach and its application to the software defect prediction problem. Appl. Soft Comput. 59, 197\u2013209 (2017)","journal-title":"Appl. Soft Comput."},{"key":"57_CR7","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.eswa.2016.12.008","volume":"72","author":"G Cano","year":"2017","unstructured":"Cano, G., Garcia-Rodriguez, J., Garcia-Garcia, A., Perez-Sanchez, H., Benediktsson, J.A., Thapa, A., et al.: Automatic selection of molecular descriptors using random forest: application to drug discovery. Expert Syst. Appl. 72, 151\u2013159 (2017)","journal-title":"Expert Syst. Appl."},{"key":"57_CR8","doi-asserted-by":"crossref","unstructured":"Yoonseok, S.: Application of boosting regression trees to preliminary cost estimation in building construction projects. Comput. Intell. Neurosci. 1\u20139 (2015)","DOI":"10.1155\/2015\/149702"},{"key":"57_CR9","doi-asserted-by":"publisher","first-page":"870","DOI":"10.1016\/j.ecolind.2015.08.036","volume":"60","author":"RM Yang","year":"2016","unstructured":"Yang, R.M., Zhang, G.L., et al.: Comparison of boosted regression tree and random forest models for mapping topsoil organic carbon concentration in an alpine ecosystem. Ecol. Indic. 60, 870\u2013878 (2016)","journal-title":"Ecol. Indic."},{"key":"57_CR10","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"1309","DOI":"10.1007\/978-81-322-2119-7_127","volume-title":"Power Electronics and Renewable Energy Systems","author":"S Prabhakar Karthikeyan","year":"2015","unstructured":"Prabhakar Karthikeyan, S., Jacob Raglend, I., Sathish Kumar, K., Kumar Sahoo, S., Priya Esther, B.: Application of SVM as classifier in estimating market power under deregulated electricity market. In: Kamalakannan, C., Suresh, L.P., Dash, S.S., Panigrahi, B.K. (eds.) Power Electronics and Renewable Energy Systems. LNEE, vol. 326, pp. 1309\u20131317. Springer, New Delhi (2015). https:\/\/doi.org\/10.1007\/978-81-322-2119-7_127"},{"key":"57_CR11","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1016\/j.procs.2015.04.201","volume":"48","author":"M Zareapoor","year":"2015","unstructured":"Zareapoor, M., Shamsolmoali, P.: Application of credit card fraud detection: based on bagging ensemble classifier. Procedia Comput. Sci. 48, 679\u2013685 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"57_CR12","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.eswa.2017.02.039","volume":"79","author":"KS Gyamfi","year":"2017","unstructured":"Gyamfi, K.S., Brusey, J., Hunt, A., Gaura, E.: Linear classifier design under heteroscedasticity in linear discriminant analysis. Expert Syst. Appl. 79, 44\u201352 (2017)","journal-title":"Expert Syst. Appl."},{"key":"57_CR13","doi-asserted-by":"crossref","unstructured":"Nugrahaeni, R.A., Mutijarsa, K.: Comparative analysis of machine learning KNN, SVM, and random forests algorithm for facial expression classification. In: Technology of Information & Communication, pp. 163\u2013168 (2017)","DOI":"10.1109\/ISEMANTIC.2016.7873831"},{"key":"57_CR14","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1016\/j.future.2017.01.019","volume":"78","author":"W Wang","year":"2017","unstructured":"Wang, W., Li, Y., Wang, X., Liu, J., Zhang, X.: Detecting android malicious apps and categorizing benign apps with ensemble of classifiers. Futur. Gener. Comput. Syst. 78, 987\u2013994 (2017)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"57_CR15","first-page":"1","volume":"54","author":"Q Zhou","year":"2016","unstructured":"Zhou, Q.: A comparative study of various supervised learning approaches to selective omission in a road network. Cartogr. J. 54, 1\u201311 (2016)","journal-title":"Cartogr. J."},{"issue":"2","key":"57_CR16","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/j.procs.2010.11.034","volume":"2","author":"B Gopinath","year":"2010","unstructured":"Gopinath, B., Gupt, D.B.R.: Majority voting based classification of thyroid carcinoma. Procedia Comput. Sci. 2(2), 265\u2013271 (2010)","journal-title":"Procedia Comput. Sci."},{"issue":"6","key":"57_CR17","doi-asserted-by":"publisher","first-page":"786","DOI":"10.1093\/comjnl\/bxp074","volume":"53","author":"X Zhu","year":"2010","unstructured":"Zhu, X., Song, Q., Jia, Z.: A weighted voting-based associative classification algorithm. Comput. J. 53(6), 786\u2013801 (2010)","journal-title":"Comput. J."}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Methodologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-26766-7_57","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T10:29:32Z","timestamp":1710325772000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-26766-7_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030267650","9783030267667"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-26766-7_57","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanchang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ic-ic.tongji.edu.cn\/2019\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}