{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T05:06:56Z","timestamp":1774933616384,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2018,9,29]],"date-time":"2018-09-29T00:00:00Z","timestamp":1538179200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["18CX02036A"],"award-info":[{"award-number":["18CX02036A"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["15CX08011A"],"award-info":[{"award-number":["15CX08011A"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61305075"],"award-info":[{"award-number":["61305075"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2015AL014"],"award-info":[{"award-number":["ZR2015AL014"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR201709220208"],"award-info":[{"award-number":["ZR201709220208"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["11604181"],"award-info":[{"award-number":["11604181"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1007\/s00521-018-3748-y","type":"journal-article","created":{"date-parts":[[2018,9,29]],"date-time":"2018-09-29T16:17:07Z","timestamp":1538237827000},"page":"2445-2456","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["Convergence of a modified gradient-based learning algorithm with penalty for single-hidden-layer feed-forward networks"],"prefix":"10.1007","volume":"32","author":[{"given":"Jian","family":"Wang","sequence":"first","affiliation":[]},{"given":"Bingjie","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhaoyang","family":"Sang","sequence":"additional","affiliation":[]},{"given":"Yusong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Shujun","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Quan","family":"Miao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,29]]},"reference":[{"key":"3748_CR1","volume-title":"Neural networks for pattern recognition","author":"CM Bishop","year":"1993","unstructured":"Bishop CM (1993) Neural networks for pattern recognition. MIT Press, Cambridge"},{"issue":"4","key":"3748_CR2","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1109\/72.80269","volume":"1","author":"EA Wan","year":"1990","unstructured":"Wan EA (1990) Neural network classification: a Bayesian interpretation. IEEE Trans Neural Netw 1(4):303\u2013305","journal-title":"IEEE Trans Neural Netw"},{"key":"3748_CR3","doi-asserted-by":"crossref","unstructured":"Eberhart RC, Shi Y (2007) Neural network concepts and paradigms. In: Computational intelligence. Elsevier, New York, pp 145\u2013196. https:\/\/www.sciencedirect.com\/book\/9781558607590\/computational-intelligence","DOI":"10.1016\/B978-155860759-0\/50005-6"},{"issue":"2","key":"3748_CR4","first-page":"1","volume":"26","author":"K Zhang","year":"2018","unstructured":"Zhang K, Ma XP, Li YL, Wu HY, Cui CY, Zhang XM, Zhang H, Yao J (2018) Parameter prediction of hydraulic fracture for tight reservoir based on micro-seismic and history matching. Fractals 26(2):1\u201317","journal-title":"Fractals"},{"issue":"4","key":"3748_CR5","doi-asserted-by":"publisher","first-page":"879","DOI":"10.1109\/TNN.2006.875977","volume":"17","author":"G Bin Huang","year":"2006","unstructured":"Huang G Bin, Chen L, Siew CK (2006) Universal approximation using incremental constructive feedforward networks with random hidden nodes. IEEE Trans Neural Netw 17(4):879\u2013892","journal-title":"IEEE Trans Neural Netw"},{"issue":"2","key":"3748_CR6","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/0893-6080(91)90009-T","volume":"4","author":"K Hornik","year":"1991","unstructured":"Hornik K (1991) Approximation capabilities of multilayer feedforward networks. Neural Netw 4(2):251\u2013257","journal-title":"Neural Netw"},{"issue":"6","key":"3748_CR7","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/S0893-6080(05)80131-5","volume":"6","author":"M Leshno","year":"1993","unstructured":"Leshno M, Lin VY, Pinkus A, Schocken S (1993) Multilayer feedforward networks with a nonpolynomial activation function can approximate any function. Neural Netw 6(6):861\u2013867","journal-title":"Neural Netw"},{"issue":"2","key":"3748_CR8","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1162\/neco.1991.3.2.246","volume":"3","author":"J Park","year":"1991","unstructured":"Park J, Sandberg IW (1991) Universal approximation using radial-basis-function networks. Neural Comput 3(2):246\u2013257","journal-title":"Neural Comput"},{"key":"3748_CR9","unstructured":"Werbos PJ (1974) Beyond regression: new tools for prediction and analysis in the behavioral sciences. Dissertation, Harvard University"},{"key":"3748_CR10","doi-asserted-by":"publisher","DOI":"10.1038\/323533a0","volume-title":"Learning representations by back-propagating errors","author":"DE Rumelhart","year":"1986","unstructured":"Rumelhart DE, Hinton GE, Williams RJ (1986) Learning representations by back-propagating errors. MIT Press, Cambridge"},{"issue":"3","key":"3748_CR11","doi-asserted-by":"publisher","first-page":"1113","DOI":"10.1118\/1.2836416","volume":"35","author":"JH Goodband","year":"2008","unstructured":"Goodband JH, Haas OC, Mills JA (2008) A comparison of neural network approaches for on-line prediction in IGRT. Med Phys 35(3):1113\u20131122","journal-title":"Med Phys"},{"key":"3748_CR12","unstructured":"Huang G Bin, Zhu QY, Siew CK (2004) Extreme learning machine: a new learning scheme of feedforward neural networks. In: IEEE International joint conference on neural networks, pp 985\u2013990"},{"issue":"1","key":"3748_CR13","first-page":"16","volume":"11","author":"GB Huang","year":"2005","unstructured":"Huang GB, Siew CK (2005) Extreme learning machine with randomly assigned RBF kernels. Int J Inf Technol 11(1):16\u201324","journal-title":"Int J Inf Technol"},{"issue":"1\u20133","key":"3748_CR14","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1016\/j.neucom.2005.12.126","volume":"70","author":"GB Huang","year":"2006","unstructured":"Huang GB, Zhu QY, Siew CK (2006) Extreme learning machine: theory and applications. Neurocomputing 70(1\u20133):489\u2013501","journal-title":"Neurocomputing"},{"issue":"1","key":"3748_CR15","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1016\/j.neucom.2005.03.002","volume":"68","author":"MB Li","year":"2005","unstructured":"Li MB, Huang GB, Saratchandran P, Sundararajan N (2005) Fully complex extreme learning machine. Neurocomputing 68(1):306\u2013314","journal-title":"Neurocomputing"},{"key":"3748_CR16","unstructured":"Huang G Bin, Siew CK (2004) Extreme learning machine: RBF network case. In: Control, automation, robotics and vision conference, pp 1029\u20131036"},{"key":"3748_CR17","doi-asserted-by":"crossref","unstructured":"Zhu WT, Miao J, Qing L (2014) Constrained extreme learning machine: a novel highly discriminative random feedforward neural network. In: International joint conference on neural networks. IEEE, pp 800\u2013807","DOI":"10.1109\/IJCNN.2014.6889761"},{"issue":"10","key":"3748_CR18","doi-asserted-by":"publisher","first-page":"1759","DOI":"10.1016\/j.patcog.2005.03.028","volume":"38","author":"QY Zhu","year":"2005","unstructured":"Zhu QY, Qin AK, Suganthan PN, Huang GB (2005) Evolutionary extreme learning machine. Pattern Recognit 38(10):1759\u20131763","journal-title":"Pattern Recognit"},{"issue":"1","key":"3748_CR19","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/s10462-013-9405-z","volume":"44","author":"S Ding","year":"2015","unstructured":"Ding S, Zhao H, Zhang Y, Xu X, Nie R (2015) Extreme learning machine: algorithm, theory and applications. Artif Intell Rev 44(1):103\u2013115","journal-title":"Artif Intell Rev"},{"issue":"5","key":"3748_CR20","doi-asserted-by":"publisher","first-page":"554","DOI":"10.1016\/j.patrec.2011.12.002","volume":"33","author":"D Yu","year":"2012","unstructured":"Yu D, Deng L (2012) Efficient and effective algorithms for training single-hidden-layer neural networks. Pattern Recognit Lett 33(5):554\u2013558","journal-title":"Pattern Recognit Lett"},{"issue":"16\u201318","key":"3748_CR21","doi-asserted-by":"publisher","first-page":"3460","DOI":"10.1016\/j.neucom.2007.10.008","volume":"71","author":"GB Huang","year":"2008","unstructured":"Huang GB, Chen L (2008) Enhanced random search based incremental extreme learning machine. Neurocomputing 71(16\u201318):3460\u20133468","journal-title":"Neurocomputing"},{"issue":"3","key":"3748_CR22","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/s11063-012-9236-y","volume":"36","author":"J Cao","year":"2012","unstructured":"Cao J, Lin Z, Huang GB (2012) Self-adaptive evolutionary extreme learning machine. Neural Process Lett 36(3):285\u2013305","journal-title":"Neural Process Lett"},{"issue":"5","key":"3748_CR23","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1142\/S0129065708001695","volume":"18","author":"HT Huynh","year":"2008","unstructured":"Huynh HT, Won Y, Kim JJ (2008) An improvement of extreme learning machine for compact single-hidden-layer feedforward neural networks. Int J Neural Syst 18(5):433\u2013441","journal-title":"Int J Neural Syst"},{"key":"3748_CR24","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.neucom.2011.12.062","volume":"116","author":"F Han","year":"2013","unstructured":"Han F, Yao HF, Ling QH (2013) An improved evolutionary extreme learning machine based on particle swarm optimization. Neurocomputing 116:87\u201393","journal-title":"Neurocomputing"},{"key":"3748_CR25","unstructured":"Yu D, Tashev I (2014) Speech emotion recognition using deep neural network and extreme learning machine. In: Interspeech, pp 223\u2013227"},{"key":"3748_CR26","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1016\/j.neucom.2014.04.073","volume":"149","author":"Y Wang","year":"2015","unstructured":"Wang Y, Li D, Yi D, Zhisong P (2015) Anomaly detection in traffic using L1-norm minimization extreme learning machine. Neurocomputing 149:415\u2013425","journal-title":"Neurocomputing"},{"issue":"13","key":"3748_CR27","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/0004-3702(89)90049-0","volume":"40","author":"GE Hinton","year":"1989","unstructured":"Hinton GE (1989) Connectionist learning procedures. Artif Intell 40(13):185\u2013234","journal-title":"Artif Intell"},{"issue":"5","key":"3748_CR28","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1109\/72.248452","volume":"4","author":"R Reed","year":"1993","unstructured":"Reed R (1993) Pruning algorithm\u2014a survey. IEEE Trans Neural Netw 4(5):740\u2013747","journal-title":"IEEE Trans Neural Netw"},{"issue":"3","key":"3748_CR29","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1016\/0893-6080(96)83696-3","volume":"9","author":"M Ishikawa","year":"1996","unstructured":"Ishikawa M (1996) Structural learning with forgetting. Neural Netw 9(3):509\u2013521","journal-title":"Neural Netw"},{"issue":"1","key":"3748_CR30","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1162\/neco.1997.9.1.185","volume":"9","author":"R Setiono","year":"1997","unstructured":"Setiono R (1997) A penalty-function approach for pruning feedforward neural networks. Neural Comput 9(1):185\u2013204","journal-title":"Neural Comput"},{"key":"3748_CR31","volume-title":"Neural networks: a comprehensive foundation","author":"S Haykin","year":"1994","unstructured":"Haykin S (1994) Neural networks: a comprehensive foundation. Macmillan, New York"},{"key":"3748_CR32","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1111\/j.2517-6161.1996.tb02080.x","volume":"58","author":"R Tibshirani","year":"1994","unstructured":"Tibshirani R (1994) Regression shrinkage and selection via the lasso. J R Stat Soc 58:267\u2013288","journal-title":"J R Stat Soc"},{"key":"3748_CR33","first-page":"54","volume":"58","author":"AE Hoerl","year":"1962","unstructured":"Hoerl AE (1962) Application of ridge analysis to regression problems. Chem Eng Prog 58:54\u201359","journal-title":"Chem Eng Prog"},{"key":"3748_CR34","first-page":"1035","volume":"4","author":"AN Tychonoff","year":"1963","unstructured":"Tychonoff AN (1963) Solution of incorrectly formulated problems and the regularization method. Sov Math 4:1035\u20131038","journal-title":"Sov Math"},{"key":"3748_CR35","doi-asserted-by":"crossref","unstructured":"Takase H, Kita H, Hayashi T (2003) Effect of regularization term upon fault tolerant training. In: International joint conference on neural networks, pp 1048\u20131053","DOI":"10.1109\/IJCNN.2003.1223835"},{"issue":"1","key":"3748_CR36","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1080\/00401706.2000.10485983","volume":"42","author":"AE Hoerl","year":"1970","unstructured":"Hoerl AE, Kennard RW (1970) Ridge regression: biased estimation for nonorthogonal problems. Technometrics 42(1):80\u201386","journal-title":"Technometrics"},{"key":"3748_CR37","volume-title":"Optimization theory and methods","author":"W Sun","year":"2001","unstructured":"Sun W, Yuan YX (2001) Optimization theory and methods. Science Press, Beijing"},{"key":"3748_CR38","unstructured":"Lichman M (2013) UCI machine learning repository. http:\/\/archive.ics.uci.edu\/ml . Accessed 12 Mar 2017"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-018-3748-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-018-3748-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-018-3748-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T22:10:38Z","timestamp":1720649438000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-018-3748-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,29]]},"references-count":38,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2020,4]]}},"alternative-id":["3748"],"URL":"https:\/\/doi.org\/10.1007\/s00521-018-3748-y","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,29]]},"assertion":[{"value":"28 July 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 September 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 September 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}