{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T11:13:05Z","timestamp":1761217985069,"version":"3.41.0"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319569901"},{"type":"electronic","value":"9783319569918"}],"license":[{"start":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T00:00:00Z","timestamp":1503446400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-56991-8_31","type":"book-chapter","created":{"date-parts":[[2017,8,22]],"date-time":"2017-08-22T03:57:16Z","timestamp":1503374236000},"page":"415-425","source":"Crossref","is-referenced-by-count":5,"title":["Performance Analysis of Various Missing Value Imputation Methods on Heart Failure Dataset"],"prefix":"10.1007","author":[{"given":"Mohammad","family":"Al Khaldy","sequence":"first","affiliation":[]},{"given":"Chandrasekhar","family":"Kambhampati","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,23]]},"reference":[{"key":"31_CR1","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.patcog.2015.10.001","volume":"52","author":"Z Liu","year":"2015","unstructured":"Liu, Z., Pan, Q., Dezert, J., Martin, A.: Adaptive imputation of missing values for incomplete pattern classification. Pattern Recogn. 52, 85\u201395 (2015)","journal-title":"Pattern Recogn."},{"key":"31_CR2","unstructured":"Razzaghi, T., Roderick, O., Safro, I., Marko, N.: Fast imbalanced classification of healthcare data with missing values. arXiv preprint arXiv:1503.06250 (2015)"},{"key":"31_CR3","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1080\/713827181","volume":"17","author":"GE Batista","year":"2003","unstructured":"Batista, G.E., Monard, M.C.: An analysis of four missing data treatment methods for supervised learning. Appl. Artif. Intell. 17, 519\u2013533 (2003)","journal-title":"Appl. Artif. Intell."},{"key":"31_CR4","doi-asserted-by":"crossref","first-page":"1689","DOI":"10.1109\/TKDE.2005.188","volume":"17","author":"S Zhang","year":"2005","unstructured":"Zhang, S., Qin, Z., Ling, C.X., Sheng, S.: \u201cMissing is useful\u201d: missing values in cost-sensitive decision trees. IEEE Trans. Knowl. Data Eng. 17, 1689\u20131693 (2005)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"31_CR5","unstructured":"Marivate, V.N., Nelwamodo, F.V., Marwala, T.: Autoencoder, principal component analysis and support vector regression for data imputation. arXiv preprint arXiv:0709.2506 (2007)"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Umathe, V.H., Chaudhary, G.: Imputation methods for incomplete data. In: 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), pp. 1\u20134 (2015)","DOI":"10.1109\/ICIIECS.2015.7193063"},{"key":"31_CR7","doi-asserted-by":"crossref","unstructured":"Carmona, C.J., Luengo, J., Gonzalez, P., del Jesus, M.J.: A preliminary study on missing data imputation in evolutionary fuzzy systems of subgroup discovery. In: 2012 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), pp. 1\u20137 (2012)","DOI":"10.1109\/FUZZ-IEEE.2012.6251182"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Kambhampati, C., Davis, D.N., Goode, K., Cleland, J.G.: A comparative study of missing value imputation with multiclass classification for clinical heart failure data. In: 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), pp. 2840\u20132844 (2012)","DOI":"10.1109\/FSKD.2012.6233805"},{"key":"31_CR9","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1177\/0049124189018002004","volume":"18","author":"RJ Little","year":"1989","unstructured":"Little, R.J., Rubin, D.B.: The analysis of social science data with missing values. Sociol. Methods Res. 18, 292\u2013326 (1989)","journal-title":"Sociol. Methods Res."},{"key":"31_CR10","unstructured":"Nelwamondo, F.V., Mohamed, S., Marwala, T.: Missing data: a comparison of neural network and expectation maximisation techniques. arXiv preprint arXiv:0704.3474 (2007)"},{"key":"31_CR11","doi-asserted-by":"crossref","first-page":"692","DOI":"10.1109\/TSMCA.2007.902631","volume":"37","author":"A Farhangfar","year":"2007","unstructured":"Farhangfar, A., Kurgan, L., Pedrycz, W.: A novel framework for imputation of missing values in databases. IEEE Trans. Syst. Man Cybern. Part A: Syst. Hum. 37, 692\u2013709 (2007)","journal-title":"IEEE Trans. Syst. Man Cybern. Part A: Syst. Hum."},{"key":"31_CR12","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1016\/j.neucom.2014.01.047","volume":"141","author":"LA Belanche","year":"2014","unstructured":"Belanche, L.A., Kobayashi, V., Aluja, T.: Handling missing values in kernel methods with application to microbiology data. Neurocomputing 141, 110\u2013116 (2014)","journal-title":"Neurocomputing"},{"key":"31_CR13","doi-asserted-by":"crossref","unstructured":"Jordanov, I., Petrov, N.: Sets with incomplete and missing data\u2014NN radar signal classification. In: 2014 International Joint Conference on Neural Networks (IJCNN), pp. 218\u2013224 (2014)","DOI":"10.1109\/IJCNN.2014.6889852"},{"key":"31_CR14","doi-asserted-by":"crossref","first-page":"3039","DOI":"10.1016\/j.neucom.2010.06.021","volume":"73","author":"IA Gheyas","year":"2010","unstructured":"Gheyas, I.A., Smith, L.S.: A neural network-based framework for the reconstruction of incomplete data sets. Neurocomputing 73, 3039\u20133065 (2010)","journal-title":"Neurocomputing"},{"key":"31_CR15","doi-asserted-by":"crossref","unstructured":"Min, P.: Based on kernel function and non-parametric multiple imputation algorithm to solve the problem of missing data. In: 2011 International Conference on Management Science and Industrial Engineering (MSIE), pp. 905\u2013909 (2011)","DOI":"10.1109\/MSIE.2011.5707554"},{"key":"31_CR16","doi-asserted-by":"crossref","unstructured":"Chauhan, H., Kumar, V., Pundir, S., Pilli, E.S.: A comparative study of classification techniques for intrusion detection. In: 2013 International Symposium on Computational and Business Intelligence (ISCBI), pp. 40\u201343 (2013)","DOI":"10.1109\/ISCBI.2013.16"},{"key":"31_CR17","doi-asserted-by":"crossref","unstructured":"Moore, L., Kambhampati, C., Cleland, J.G.F.: Classification of a real live heart failure clinical dataset- Is TAN Bayes better than other Bayes? In: 2014 IEEE International Conference on Systems, Man and Cybernetics (SMC), pp. 882\u2013887 (2014)","DOI":"10.1109\/SMC.2014.6974023"},{"key":"31_CR18","doi-asserted-by":"crossref","unstructured":"My Chau, T., Dongil, S., Dongkyoo, S.: A comparative study of medical data classification methods based on decision tree and bagging algorithms. In: 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2009, pp. 183\u2013187 (2009)","DOI":"10.1109\/DASC.2009.40"},{"key":"31_CR19","doi-asserted-by":"crossref","first-page":"27","DOI":"10.4236\/ojs.2014.41004","volume":"4","author":"M Nakai","year":"2014","unstructured":"Nakai, M., Chen, D.-G., Nishimura, K., Miyamoto, Y.: Comparative study of four methods in missing value imputations under missing completely at random mechanism. Open J. Stat. 4, 27\u201337 (2014)","journal-title":"Open J. Stat."},{"key":"31_CR20","doi-asserted-by":"crossref","unstructured":"Kumdee, O., Ritthipravat, P., Bhongmakapat, T., Cheewaruangroj, W.: Dealing with missing values for effective prediction of NPC recurrence. In: 2008 SICE Annual Conference, pp. 1290\u20131294 (2008)","DOI":"10.1109\/SICE.2008.4654856"},{"key":"31_CR21","unstructured":"Dodge, Y., Zoppe, A.: Adjusting the EM algorithm for design of experiments with missing data. In: 2004 26th International Conference on Information Technology Interfaces, vol. 1, pp. 9\u201312 (2004)"},{"key":"31_CR22","doi-asserted-by":"crossref","unstructured":"Karmaker, A., Kwek, S.: Incorporating an EM-approach for handling missing attribute-values in decision tree induction. In: 2005 Fifth International Conference on Hybrid Intelligent Systems, HIS 2005, p. 6 (2005)","DOI":"10.1109\/ICHIS.2005.64"},{"key":"31_CR23","doi-asserted-by":"crossref","unstructured":"Li, D., Deogun, J., Spaulding, W., Shuart, B.: Towards missing data imputation: a study of fuzzy k-means clustering method. In: Rough Sets and Current Trends in Computing, pp. 573\u2013579 (2004)","DOI":"10.1007\/978-3-540-25929-9_70"},{"key":"31_CR24","doi-asserted-by":"crossref","unstructured":"Grzymala-Busse, J.W., Goodwin, L.K., Grzymala-Busse, W.J., Zheng, X.: Handling missing attribute values in preterm birth data sets. In: Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing, pp. 342\u2013351. Springer (2005)","DOI":"10.1007\/11548706_36"},{"key":"31_CR25","doi-asserted-by":"crossref","first-page":"42","DOI":"10.20470\/jsi.v5i1.178","volume":"5","author":"J Kaiser","year":"2014","unstructured":"Kaiser, J.: Dealing with missing values in data. J. Syst. Integrat. 5, 42\u201351 (2014)","journal-title":"J. Syst. Integrat."},{"key":"31_CR26","first-page":"29","volume":"1","author":"T Sivapriya","year":"2012","unstructured":"Sivapriya, T., Kamal, A.N.B., Thavavel, V.: Imputation and classification of missing data using least square support vector machines\u2013a new approach in dementia diagnosis. Int. J. Adv. Res. Artif. Intell. 1, 29\u201333 (2012)","journal-title":"Int. J. Adv. Res. Artif. Intell."},{"key":"31_CR27","unstructured":"Rogers, S.D.: Support vector machines for classification and imputation (2012)"},{"key":"31_CR28","doi-asserted-by":"crossref","unstructured":"Liu, Y., Liu, Y.: Incremental learning method of least squares support vector machine. In: 2010 International Conference on Intelligent Computation Technology and Automation (ICICTA), pp. 529\u2013532 (2010)","DOI":"10.1109\/ICICTA.2010.104"},{"key":"31_CR29","doi-asserted-by":"crossref","unstructured":"Lomax, S., Vadera, S., Saraee, M.: A multi-armed bandit approach to cost-sensitive decision tree learning. In: 2012 IEEE 12th International Conference on Data Mining Workshops (ICDMW), pp. 162\u2013168 (2012)","DOI":"10.1109\/ICDMW.2012.33"},{"key":"31_CR30","first-page":"341","volume":"3","author":"GL Agrawal","year":"2013","unstructured":"Agrawal, G.L., Gupta, H.: Optimization of C4.5 decision tree algorithm for data mining application. Int. J. Emerg. Technol. Adv. Eng. 3, 341\u2013345 (2013)","journal-title":"Int. J. Emerg. Technol. Adv. Eng."},{"key":"31_CR31","doi-asserted-by":"crossref","unstructured":"Sharma, P., Singh, D., Singh, A.: Classification algorithms on a large continuous random dataset using rapid miner tool. In: 2015 2nd International Conference on Electronics and Communication Systems (ICECS), pp. 704\u2013709 (2015)","DOI":"10.1109\/ECS.2015.7125003"},{"key":"31_CR32","first-page":"13","volume":"98","author":"G Kaur","year":"2014","unstructured":"Kaur, G., Chhabra, A.: Improved J48 classification algorithm for the prediction of diabetes. Int. J. Comput. Appl. 98, 13\u201317 (2014)","journal-title":"Int. J. Comput. Appl."},{"key":"31_CR33","doi-asserted-by":"crossref","unstructured":"Almutairi, A., Parish, D.: Using classification techniques for creation of predictive intrusion detection model. In: 2014 9th International Conference on Internet Technology and Secured Transactions (ICITST), pp. 223\u2013228 (2014)","DOI":"10.1109\/ICITST.2014.7038810"},{"key":"31_CR34","first-page":"1","volume":"46","author":"A Galathiya","year":"2012","unstructured":"Galathiya, A., Ganatra, A., Bhensdadia, C.: Classification with an improved Decision Tree Algorithm. Int. J. Comput. Appl. 46, 1\u20136 (2012)","journal-title":"Int. J. Comput. Appl."},{"key":"31_CR35","doi-asserted-by":"crossref","unstructured":"Mohamed, W.N.H.W., Salleh, M.N.M., Omar, A.H.: A comparative study of Reduced Error Pruning method in decision tree algorithms. In: 2012 IEEE International Conference on Control System, Computing and Engineering (ICCSCE), pp. 392\u2013397 (2012)","DOI":"10.1109\/ICCSCE.2012.6487177"},{"key":"31_CR36","doi-asserted-by":"crossref","unstructured":"Balasundaram, A., Bhuvaneswari, P.T.V.: Comparative study on decision tree based data mining algorithm to assess risk of epidemic. In: IET Chennai Fourth International Conference on Sustainable Energy and Intelligent Systems (SEISCON 2013), pp. 390\u2013396 (2013)","DOI":"10.1049\/ic.2013.0344"},{"key":"31_CR37","doi-asserted-by":"crossref","unstructured":"Junghun, P., Hsiao-Rong, T., Kuo, C.C.J.: GA-based internet traffic classification technique for qos provisioning. In: 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2006, pp. 251\u2013254 (2006)","DOI":"10.1109\/IIH-MSP.2006.264991"},{"key":"31_CR38","doi-asserted-by":"crossref","unstructured":"Jian, X., Chen, P., Bin, L.: Random forest for relational classification with application to terrorist profiling. In: 2009 IEEE International Conference on Granular Computing, GRC 2009, pp. 630\u2013633 (2009)","DOI":"10.1109\/GRC.2009.5255041"},{"key":"31_CR39","doi-asserted-by":"crossref","first-page":"1947","DOI":"10.1021\/ci034160g","volume":"43","author":"V Svetnik","year":"2003","unstructured":"Svetnik, V., Liaw, A., Tong, C., Culberson, J.C., Sheridan, R.P., Feuston, B.P.: Random forest: a classification and regression tool for compound classification and QSAR modeling. J. Chem. Inf. Comput. Sci. 43, 1947\u20131958 (2003)","journal-title":"J. Chem. Inf. Comput. Sci."},{"key":"31_CR40","doi-asserted-by":"crossref","unstructured":"Cuzzocrea, A., Francis, S.L., Gaber, M.M.: An information-theoretic approach for setting the optimal number of decision trees in random forests. In: 2013 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 1013\u20131019 (2013)","DOI":"10.1109\/SMC.2013.177"},{"key":"31_CR41","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: an update. SIGKDD Explor. 11, 10\u201318 (2009)","journal-title":"SIGKDD Explor."},{"issue":"2\u20133","key":"31_CR42","first-page":"255","volume":"17","author":"AFJ Alcal\u00e1-Fdez","year":"2011","unstructured":"Alcal\u00e1-Fdez, A.F.J., Luengo, J., Derrac, J., Garc\u00eda, S., S\u00e1nchez, L., Herrera, F.: KEEL data-mining software tool: data set repository, integration of algorithms and experimental analysis framework. J. Multiple-Valued Logic Soft Comput. 17(2\u20133), 255\u2013287 (2011)","journal-title":"J. Multiple-Valued Logic Soft Comput."},{"issue":"3","key":"31_CR43","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/s00500-008-0323-y","volume":"13","author":"J Alcal\u00e1-Fdez","year":"2009","unstructured":"Alcal\u00e1-Fdez, J., S\u00e1nchez, L., Garc\u00eda, S., Jesus, M.J., Ventura, S., Garrell, J.M., et al.: KEEL: a software tool to assess evolutionary algorithms to data mining problems. Soft Comput. 13(3), 307\u2013318 (2009)","journal-title":"Soft Comput."}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-56991-8_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T00:22:53Z","timestamp":1750810973000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-56991-8_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,23]]},"ISBN":["9783319569901","9783319569918"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-56991-8_31","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2017,8,23]]}}}