{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T15:40:19Z","timestamp":1726760419104},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,11,14]],"date-time":"2015-11-14T00:00:00Z","timestamp":1447459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1007\/s10489-015-0724-4","type":"journal-article","created":{"date-parts":[[2015,11,14]],"date-time":"2015-11-14T00:59:34Z","timestamp":1447462774000},"page":"704-724","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Hybrid ensemble selection algorithm incorporating GRASP with path relinking"],"prefix":"10.1007","volume":"44","author":[{"given":"Ting","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Qun","family":"Dai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,14]]},"reference":[{"key":"724_CR1","doi-asserted-by":"crossref","first-page":"1434","DOI":"10.1016\/j.eswa.2007.01.009","volume":"34","author":"L Yu","year":"2008","unstructured":"Yu L, Wang S, Lai KK (2008) Credit risk assessment with a multistage neural network ensemble learning approach. Expert Syst Appl 34:1434\u20131444","journal-title":"Expert Syst Appl"},{"key":"724_CR2","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1016\/j.eswa.2010.06.048","volume":"38","author":"G Wang","year":"2011","unstructured":"Wang G, Hao J, Ma J, Jiang H (2011) A comparative assessment of ensemble learning for credit scoring. Expert Syst Appl 38:223\u2013230","journal-title":"Expert Syst Appl"},{"key":"724_CR3","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1111\/j.1467-985X.1997.00078.x","volume":"160","author":"DJ Hand","year":"1997","unstructured":"Hand DJ, Henley WE (1997) Statistical classification methods in consumer credit scoring: a review. J R Stat Soc A Stat Soc 160:523\u2013541","journal-title":"J R Stat Soc A Stat Soc"},{"key":"724_CR4","doi-asserted-by":"crossref","first-page":"543","DOI":"10.1016\/S0167-9236(03)00086-1","volume":"37","author":"Z Huang","year":"2004","unstructured":"Huang Z, Chen H, Hsu C-J, Chen W-H, Wu S (2004) Credit rating analysis with support vector machines and neural networks: a market comparative study. Decis Support Syst 37:543\u2013558","journal-title":"Decis Support Syst"},{"key":"724_CR5","doi-asserted-by":"crossref","first-page":"757","DOI":"10.2307\/2330408","volume":"15","author":"JC Wiginton","year":"1980","unstructured":"Wiginton JC (1980) A note on the comparison of logit and discriminant models of consumer credit behavior. J Financ Quant Anal 15:757\u2013770","journal-title":"J Financ Quant Anal"},{"key":"724_CR6","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1111\/j.1469-1809.1936.tb02137.x","volume":"7","author":"RA Fisher","year":"1936","unstructured":"Fisher RA (1936) The use of multiple measurements in taxonomic problems. Ann Eugen 7:179\u2013188","journal-title":"Ann Eugen"},{"key":"724_CR7","doi-asserted-by":"crossref","first-page":"771","DOI":"10.1111\/j.1540-5915.1990.tb01249.x","volume":"21","author":"F Glover","year":"1990","unstructured":"Glover F (1990) Improved linear programming models for discriminant analysis\u2217. Decis Sci 21:771\u2013785","journal-title":"Decis Sci"},{"key":"724_CR8","first-page":"254","volume":"33","author":"BJ Grablowsky","year":"1981","unstructured":"Grablowsky BJ, Talley WK (1981) Probit and discriminant functions for classifying credit applicants. J Econ Bus 33:254\u2013261","journal-title":"J Econ Bus"},{"key":"724_CR9","doi-asserted-by":"crossref","unstructured":"Henley W, Hand DJ (1996) A k-nearest-neighbour classifier for assessing consumer credit risk. The Statistician:77\u201395","DOI":"10.2307\/2348414"},{"key":"724_CR10","unstructured":"Van Gestel IT, Baesens B, Garcia IJ, Van Dijcke P (2003) A support vector machine approach to credit scoring. Bank en Financiewezen, pp 73\u201382"},{"key":"724_CR11","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1016\/S0957-4174(02)00191-4","volume":"24","author":"M-C Chen","year":"2003","unstructured":"Chen M-C, Huang S-H (2003) Credit scoring and rejected instances reassigning through evolutionary computation techniques. Expert Syst Appl 24:433\u2013441","journal-title":"Expert Syst Appl"},{"key":"724_CR12","doi-asserted-by":"crossref","first-page":"1421","DOI":"10.1016\/S0378-4266(98)00059-4","volume":"22","author":"F Varetto","year":"1998","unstructured":"Varetto F (1998) Genetic algorithms applications in the analysis of insolvency risk. J Bank Financ 22:1421\u20131439","journal-title":"J Bank Financ"},{"key":"724_CR13","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/S0305-0483(03)00016-1","volume":"31","author":"R Malhotra","year":"2003","unstructured":"Malhotra R, Malhotra D (2003) Evaluating consumer loans using neural networks. Omega 31:83\u201396","journal-title":"Omega"},{"key":"724_CR14","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1016\/0893-6080(94)90028-0","volume":"7","author":"R Smalz","year":"1994","unstructured":"Smalz R, Conrad M (1994) Combining evolution with credit apportionment: a new learning algorithm for neural nets. Neural Netw 7:341\u2013351","journal-title":"Neural Netw"},{"key":"724_CR15","doi-asserted-by":"crossref","first-page":"1275","DOI":"10.1016\/j.eswa.2007.08.030","volume":"35","author":"H Abdou","year":"2008","unstructured":"Abdou H, Pointon J, El-Masry A (2008) Neural nets versus conventional techniques in credit scoring in Egyptian banking. Expert Syst Appl 35:1275\u20131292","journal-title":"Expert Syst Appl"},{"key":"724_CR16","doi-asserted-by":"crossref","first-page":"733","DOI":"10.1016\/j.qref.2007.04.001","volume":"48","author":"E Angelini","year":"2008","unstructured":"Angelini E, di Tollo G, Roli A (2008) A neural network approach for credit risk evaluation. Q Rev Econ Finance 48:733\u2013755","journal-title":"Q Rev Econ Finance"},{"key":"724_CR17","doi-asserted-by":"crossref","first-page":"6233","DOI":"10.1016\/j.eswa.2010.02.101","volume":"37","author":"A Khashman","year":"2010","unstructured":"Khashman A (2010) Neural networks for credit risk evaluation: investigation of different neural models and learning schemes. Expert Syst Appl 37:6233\u20136239","journal-title":"Expert Syst Appl"},{"key":"724_CR18","doi-asserted-by":"crossref","unstructured":"Lai KK, Yu L, Wang S, Zhou L (2006) Credit risk analysis using a reliability-based neural network ensemble model. In: Artificial neural networks\u2013ICANN 2006. Springer, Berlin, pp 682\u2013690","DOI":"10.1007\/11840930_71"},{"key":"724_CR19","doi-asserted-by":"crossref","first-page":"1762","DOI":"10.1016\/j.eswa.2007.08.070","volume":"35","author":"JH Min","year":"2008","unstructured":"Min JH, Lee Y-C (2008) A practical approach to credit scoring. Expert Syst Appl 35:1762\u20131770","journal-title":"Expert Syst Appl"},{"key":"724_CR20","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1016\/j.neucom.2005.12.126","volume":"70","author":"G-B Huang","year":"2006","unstructured":"Huang G-B, Zhu Q-Y, Siew C-K (2006) Extreme learning machine: theory and applications. Neurocomputing 70:489\u2013501","journal-title":"Neurocomputing"},{"key":"724_CR21","doi-asserted-by":"crossref","first-page":"754","DOI":"10.1109\/LSP.2010.2053356","volume":"17","author":"N Liu","year":"2010","unstructured":"Liu N, Wang H (2010) Ensemble based extreme learning machine. IEEE Signal Process Lett 17:754\u2013757","journal-title":"IEEE Signal Process Lett"},{"key":"724_CR22","doi-asserted-by":"crossref","first-page":"S10","DOI":"10.1186\/1471-2105-14-S8-S10","volume":"14","author":"Z-H You","year":"2013","unstructured":"You Z-H, Lei Y-K, Zhu L, Xia J, Wang B (2013) Prediction of protein-protein interactions from amino acid sequences with ensemble extreme learning machines and principal component analysis. BMC Bioinf 14:S10","journal-title":"BMC Bioinf"},{"key":"724_CR23","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/s00521-013-1446-3","volume":"24","author":"C Lian","year":"2014","unstructured":"Lian C, Zeng Z, Yao W, Tang H (2014) Ensemble of extreme learning machine for landslide displacement prediction based on time series analysis. Neural Comput & Applic 24:99\u2013107","journal-title":"Neural Comput & Applic"},{"key":"724_CR24","doi-asserted-by":"crossref","first-page":"1493","DOI":"10.1007\/s00500-012-0824-6","volume":"16","author":"J-H Zhai","year":"2012","unstructured":"Zhai J-H, Xu H-Y, Wang X-Z (2012) Dynamic ensemble extreme learning machine based on sample entropy. Soft Comput 16:1493\u20131502","journal-title":"Soft Comput"},{"key":"724_CR25","doi-asserted-by":"crossref","unstructured":"Tsoumakas G, Partalas I, Vlahavas I (2009) An ensemble pruning primer. In: Applications of supervised and unsupervised ensemble methods. Springer, Berlin, pp 1\u201313","DOI":"10.1007\/978-3-642-03999-7_1"},{"key":"724_CR26","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/s10994-010-5172-0","volume":"81","author":"I Partalas","year":"2010","unstructured":"Partalas I, Tsoumakas G, Vlahavas I (2010) An ensemble uncertainty aware measure for directed hill climbing ensemble pruning. Mach Learn 81:257\u2013282","journal-title":"Mach Learn"},{"key":"724_CR27","doi-asserted-by":"crossref","unstructured":"Caruana R, Niculescu-Mizil A, Crew G, Ksikes A (2004) Ensemble selection from libraries of models. In: Proceedings of the 21st international conference on machine learning, p 18","DOI":"10.1145\/1015330.1015432"},{"key":"724_CR28","unstructured":"Partalas I, Tsoumakas G, Vlahavas I A study on greedy algorithms for ensemble pruning, Technical Report TR-LPIS-360-12, Department of Informatics, Aristotle University of Thessaloniki, Greece 2012"},{"key":"724_CR29","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1109\/TPAMI.2008.78","volume":"31","author":"G Martinez-Muoz","year":"2009","unstructured":"Martinez-Muoz G, Hern\u00e1ndez-Lobato D, Su\u00e1rez A (2009) An analysis of ensemble pruning techniques based on ordered aggregation. IEEE Trans Pattern Anal Mach Intell 31:245\u2013259","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"724_CR30","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1016\/j.neucom.2013.06.026","volume":"122","author":"Q Dai","year":"2013","unstructured":"Dai Q (2013) A novel ensemble pruning algorithm based on randomized greedy selective strategy and ballot. Neurocomputing 122:258\u2013265","journal-title":"Neurocomputing"},{"key":"724_CR31","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1016\/j.knosys.2012.08.024","volume":"37","author":"Q Dai","year":"2013","unstructured":"Dai Q (2013) A competitive ensemble pruning approach based on cross-validation technique. Knowl-Based Syst 37:394\u2013414","journal-title":"Knowl-Based Syst"},{"key":"724_CR32","doi-asserted-by":"crossref","first-page":"4292","DOI":"10.1016\/j.asoc.2013.06.023","volume":"13","author":"Q Dai","year":"2013","unstructured":"Dai Q, Liu Z (2013) ModEnPBT: a modified backtracking ensemble pruning algorithm. Appl Soft Comput 13:4292\u20134302","journal-title":"Appl Soft Comput"},{"key":"724_CR33","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1007\/s10489-013-0510-0","volume":"41","author":"Z Liu","year":"2014","unstructured":"Liu Z, Dai Q, Liu N (2014) Ensemble selection by GRASP. Appl Intell 41:128\u2013144","journal-title":"Appl Intell"},{"key":"724_CR34","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1016\/j.inffus.2004.04.005","volume":"6","author":"RE Banfield","year":"2005","unstructured":"Banfield RE, Hall LO, Bowyer KW, Kegelmeyer WP (2005) Ensemble diversity measures and their application to thinning. Inf Fusion 6:49\u201362","journal-title":"Inf Fusion"},{"key":"724_CR35","unstructured":"Margineantu DD, Dietterich TG (1997) Pruning adaptive boosting. In: ICML, pp 211\u2013218"},{"key":"724_CR36","unstructured":"Mart\u00fdnez-Munoz G, Su\u00e1rez A (2004) Aggregation ordering in bagging. In: Proceedings of the IASTED international conference on artificial intelligence and applications, pp 258\u2013263"},{"key":"724_CR37","first-page":"2.4","volume":"11","author":"P Festa","year":"2007","unstructured":"Festa P, Pardalos PM, Pitsoulis LS, Resende MG (2007) GRASP with path relinking for the weighted MAXSAT problem. Journal of Experimental Algorithmics (JEA) 11:2.4","journal-title":"Journal of Experimental Algorithmics (JEA)"},{"key":"724_CR38","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1109\/TNN.2003.809401","volume":"14","author":"G-B Huang","year":"2003","unstructured":"Huang G-B (2003) Learning capability and storage capacity of two-hidden-layer feedforward networks. IEEE Trans Neural Netw 14:274\u2013281","journal-title":"IEEE Trans Neural Netw"},{"key":"724_CR39","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1109\/72.655045","volume":"9","author":"G-B Huang","year":"1998","unstructured":"Huang G-B, Babri HA (1998) Upper bounds on the number of hidden neurons in feedforward networks with arbitrary bounded nonlinear activation functions. IEEE Trans Neural Netw 9:224\u2013229","journal-title":"IEEE Trans Neural Netw"},{"key":"724_CR40","volume-title":"Generalized inverse of matrices and its applications, vol 7","author":"CR Rao","year":"1971","unstructured":"Rao CR, Mitra SK (1971) Generalized inverse of matrices and its applications, vol 7. Wiley, New York"},{"key":"724_CR41","doi-asserted-by":"crossref","unstructured":"Johnson CR (1990) Matrix theory and applications: american mathematical soc.","DOI":"10.1090\/psapm\/040"},{"key":"724_CR42","first-page":"123","volume":"24","author":"L Breiman","year":"1996","unstructured":"Breiman L (1996) Bagging predictors. Mach Learn 24:123\u2013140","journal-title":"Mach Learn"},{"key":"724_CR43","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/BF01096763","volume":"6","author":"TA Feo","year":"1995","unstructured":"Feo TA, Resende MG (1995) Greedy randomized adaptive search procedures. J Glob Optim 6:109\u2013133","journal-title":"J Glob Optim"},{"key":"724_CR44","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1504\/IJBRA.2013.054695","volume":"9","author":"A Layeb","year":"2013","unstructured":"Layeb A, Selmane M, Elhoucine MB (2013) A new greedy randomised adaptive search procedure for multiple sequence alignment. Int J Bioinforma Res Appl 9:323\u2013335","journal-title":"Int J Bioinforma Res Appl"},{"key":"724_CR45","doi-asserted-by":"crossref","unstructured":"Glover F (1997) Tabu search and adaptive memory programming\u2014advances, applications and challenges. In: Interfaces in computer science and operations research. Springer, Berlin, pp 1\u201375","DOI":"10.1007\/978-1-4615-4102-8_1"},{"key":"724_CR46","unstructured":"Gevezes T, Pitsoulis L (2013) A greedy randomized adaptive search procedure with path relinking for the shortest superstring problem. J Comb Optim:1\u201325"},{"key":"724_CR47","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1007\/s10732-011-9167-1","volume":"18","author":"CC Ribeiro","year":"2012","unstructured":"Ribeiro CC, Resende MG (2012) Path-relinking intensification methods for stochastic local search algorithms. J Heuristics 18:193\u2013214","journal-title":"J Heuristics"},{"key":"724_CR48","doi-asserted-by":"crossref","unstructured":"Mart\u00ednez-Mu\u00f1oz G, Su\u00e1rez A (2006) Pruning in ordered bagging ensembles. In: Proceedings of the 23rd international conference on Machine learning, pp 609\u2013616","DOI":"10.1145\/1143844.1143921"},{"key":"724_CR49","unstructured":"Asuncion A, Newman D UCI repository of machine learning databases. http:\/\/www.ics.uci.edu\/~mlearn\/MLRepository.html or ftp.ics.uci.edu:pub\/machine-learning-databases"},{"key":"724_CR50","doi-asserted-by":"crossref","first-page":"860","DOI":"10.1287\/opre.42.5.860","volume":"42","author":"TA Feo","year":"1994","unstructured":"Feo TA, Resende MG, Smith SH (1994) A greedy randomized adaptive search procedure for maximum independent set. Oper Res 42:860\u2013878","journal-title":"Oper Res"},{"key":"724_CR51","unstructured":"Lin CJ LIBSVM: a library for support vector machines. http:\/\/www.csie.ntu.edu.tw\/~cjlin\/"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-015-0724-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10489-015-0724-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-015-0724-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T14:46:01Z","timestamp":1567349161000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10489-015-0724-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,14]]},"references-count":51,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,4]]}},"alternative-id":["724"],"URL":"https:\/\/doi.org\/10.1007\/s10489-015-0724-4","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11,14]]}}}