{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T08:14:41Z","timestamp":1774599281007,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,7,9]],"date-time":"2021-07-09T00:00:00Z","timestamp":1625788800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,7,9]],"date-time":"2021-07-09T00:00:00Z","timestamp":1625788800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Ministerio de Ciencia, Innovaci\u00f3n y Universidades, Gobierno de Espa\u00f1a","award":["project ref. PGC2018-097848-B-I0"],"award-info":[{"award-number":["project ref. PGC2018-097848-B-I0"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s10489-021-02447-7","type":"journal-article","created":{"date-parts":[[2021,7,9]],"date-time":"2021-07-09T04:03:13Z","timestamp":1625803393000},"page":"3653-3677","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["A semi-hard voting combiner scheme to ensemble multi-class probabilistic classifiers"],"prefix":"10.1007","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1208-9236","authenticated-orcid":false,"given":"Rosario","family":"Delgado","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,9]]},"reference":[{"key":"2447_CR1","doi-asserted-by":"publisher","first-page":"5948","DOI":"10.1016\/j.eswa.2014.03.019","volume":"41","author":"N Abdelhamida","year":"2014","unstructured":"Abdelhamida N, Ayesha A, Thabtah F (2014) Phishing detection based associative classification data mining. Expert Syst Appl 41:5948\u20135959","journal-title":"Expert Syst Appl"},{"key":"2447_CR2","doi-asserted-by":"crossref","unstructured":"Amrieh EA, Hamtini T, Aljarah I (2015) Preprocessing and analyzing educational dataset using X-API for improving student\u2019s performance. In: IEEE jordan conference on applied electrical engineering and computing technologies (AEECT), Amman, 1\u20135","DOI":"10.1109\/AEECT.2015.7360581"},{"issue":"8","key":"2447_CR3","doi-asserted-by":"publisher","first-page":"119","DOI":"10.14257\/ijdta.2016.9.8.13","volume":"9","author":"EA Amrieh","year":"2016","unstructured":"Amrieh EA, Hamtini T, Aljarah I (2016) Mining educational data to predict student\u2019s academic performance using ensemble methods. Int J Database Theor Appl 9(8):119\u2013136","journal-title":"Int J Database Theor Appl"},{"issue":"3","key":"2447_CR4","first-page":"307","volume":"12","author":"H Benjamin Fredrick David","year":"2019","unstructured":"Benjamin Fredrick David H, Suruliandi A, Raja SP (2019) Preventing crimes ahead of time by predicting crime propensity in released prisoners using Data Mining techniques. Int J Appl Decis Sci 12(3):307\u2013336","journal-title":"Int J Appl Decis Sci"},{"issue":"15","key":"2447_CR5","doi-asserted-by":"publisher","first-page":"1731","DOI":"10.1016\/j.artint.2008.06.002","volume":"172","author":"Y Bi","year":"2008","unstructured":"Bi Y, Guan J, Bell D (2008) The combination of multiple classifiers using an evidential reasoning approach. Artif Intell 172(15):1731\u20131751","journal-title":"Artif Intell"},{"issue":"2","key":"2447_CR6","first-page":"123","volume":"26","author":"L Breiman","year":"1996","unstructured":"Breiman L (1996) Bagging predictors. Mach Learn 26(2):123\u2013140","journal-title":"Mach Learn"},{"key":"2447_CR7","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Machine Learn 45:5\u201332","journal-title":"Machine Learn"},{"key":"2447_CR8","unstructured":"Cortez P, Silva A (2008) Using data mining to predict secondary school student performance. In: Brito A, Teixeira J (eds) Proceedings of 5th FUture BUsiness TEChnology conference (FUBUTEC 2008) pp. 5\u201312, Porto, Portugal, April, 2008, EUROSIS ISBN 978-9077381-39-7,"},{"issue":"9","key":"2447_CR9","doi-asserted-by":"publisher","first-page":"e0222916","DOI":"10.1371\/journal.pone.0222916","volume":"14","author":"R Delgado","year":"2019","unstructured":"Delgado R, Tibau XA (2019) Why Cohen\u2019s Kappa should be avoided as performance measure in classification. PLoSONE 14(9):e0222916. https:\/\/doi.org\/10.1371\/journal.pone.0222916","journal-title":"PLoSONE"},{"issue":"9","key":"2447_CR10","doi-asserted-by":"publisher","first-page":"1061","DOI":"10.1093\/bioinformatics\/btf867","volume":"19","author":"M Dettling","year":"2003","unstructured":"Dettling M, B\u00fchlmann P (2003) Boosting for tumor classification with gene expression data. Bioinformatics 19(9):1061\u20131069","journal-title":"Bioinformatics"},{"issue":"4","key":"2447_CR11","first-page":"97","volume":"8","author":"TG Dietterich","year":"1997","unstructured":"Dietterich TG (1997) Machine-learning research: Four current directions. The AI Magazine 8 (4):97\u2013136","journal-title":"The AI Magazine"},{"key":"2447_CR12","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1023\/A:1007607513941","volume":"40","author":"TG Dietterich","year":"2000","unstructured":"Dietterich TG (2000) An experimental comparison of three methods for constructing ensembles of decision trees: bagging, boosting, and randomization. Mach Learn 40:139\u2013157","journal-title":"Mach Learn"},{"key":"2447_CR13","unstructured":"Dua D, Graff C (2019) UCI Machine Learning Repository. [Http:\/\/archive.ics.uci.edu\/ml]. irvine, CA: University of California School of Information and Computer Science"},{"key":"2447_CR14","unstructured":"Freund Y, Schapire RE (1996) Experiments with a new boosting algorithm. In: ICML\u201996: Proceedings of the thirteenth international conference on international conference on machine learning, vol 96, pp 148\u2013156"},{"issue":"5-6","key":"2447_CR15","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/j.compbiolchem.2004.09.006","volume":"28","author":"J Gorodkin","year":"2004","unstructured":"Gorodkin J (2004) Comparing two k-category assignments by a k-category correlation coefficient. Computat Biol Chemist 28(5-6):367\u2013374","journal-title":"Computat Biol Chemist"},{"issue":"10","key":"2447_CR16","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1109\/34.58871","volume":"12","author":"LK Hansen","year":"1990","unstructured":"Hansen LK, Salamon P (1990) Neural networs ensembles. IEEE Trans Pattern Anal Machine Intell 12(10):993\u20131001","journal-title":"IEEE Trans Pattern Anal Machine Intell"},{"key":"2447_CR17","doi-asserted-by":"crossref","unstructured":"Hao J, Zhang B, Yue K, Wang J, Wu H Sun X, Chao HC, You X, Bertino E (eds) (2017) Performance measurement and configuration optimization of virtual machines based on the bayesian network, vol 10603. Springer, Cham","DOI":"10.1007\/978-3-319-68542-7_55"},{"issue":"3","key":"2447_CR18","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/34.667881","volume":"20","author":"J Kittler","year":"1998","unstructured":"Kittler J, Hatef M, Duin RPW, Matas J (1998) On combining classifiers. IEEE Trans Pattern Anal Machine Intell 20(3):226\u2013239","journal-title":"IEEE Trans Pattern Anal Machine Intell"},{"key":"2447_CR19","doi-asserted-by":"publisher","DOI":"10.1002\/0471660264","volume-title":"Combining pattern classifiers","author":"LI Kuncheva","year":"2004","unstructured":"Kuncheva LI (2004) Combining pattern classifiers. Wiley, New York"},{"key":"2447_CR20","doi-asserted-by":"crossref","unstructured":"Liu Q, Lu J, Chen S, Zhao K (2014) Multiple na\u00efve Bayes Classifiers Ensemble for Traffic Incident Detection, Mathematical Problems in Engineering, vol. 2014, Article ID 383671, 16 pages Hidawi Publishing Corporation","DOI":"10.1155\/2014\/383671"},{"issue":"2","key":"2447_CR21","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1016\/0005-2795(75)90109-9","volume":"405","author":"BW Matthews","year":"1975","unstructured":"Matthews BW (1975) Comparison of the predicted and observed secondary structure of t4 phage lysozyme. Biochim Biophys Acta (BBA)-Protein Struct 405(2):442\u2013451","journal-title":"Biochim Biophys Acta (BBA)-Protein Struct"},{"key":"2447_CR22","unstructured":"R Core Team R (2013) A language and environment for statistical computing. R Foundation for Statistical Computing, Vienna, Austria http:\/\/www.R-project.org\/"},{"issue":"3-4","key":"2447_CR23","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1093\/biomet\/52.3-4.591","volume":"52","author":"SS Shapiro","year":"1965","unstructured":"Shapiro SS, Wilk MB (1965) An analysis of variance test for normality (complete samples). Biometrika 52(3-4):591\u2013611","journal-title":"Biometrika"},{"key":"2447_CR24","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/BF00118940","volume":"43","author":"L Shapley","year":"1984","unstructured":"Shapley L, Grofman B (1984) Optimizing group judgement accuracy in the presence of interdependencies. Public Choice 43:329\u2013343","journal-title":"Public Choice"},{"key":"2447_CR25","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/s10618-016-0460-3","volume":"31","author":"M Sharma","year":"2017","unstructured":"Sharma M, Bilgic M (2017) Evidence-based uncertainty sampling for active learning. Data Minning Knowl Discov 31:164\u2013202","journal-title":"Data Minning Knowl Discov"},{"issue":"6","key":"2447_CR26","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1021\/ci034160g","volume":"43","author":"V Svetnik","year":"2003","unstructured":"Svetnik V, Liaw A, Tong C, Culberson JC, Sheridan RP, Feuston BP (2003) Random forest: A classification and regression tool for compound classification and QSAR modeling. J Chem Inform Comput Sci 43(6):1947\u20131958","journal-title":"J Chem Inform Comput Sci"},{"issue":"4","key":"2447_CR27","doi-asserted-by":"publisher","first-page":"3326","DOI":"10.1016\/j.eswa.2009.10.018","volume":"37","author":"B Twala","year":"2010","unstructured":"Twala B (2010) Multiple classifier application to credit risk assessment. Expert Syst Appl 37 (4):3326\u20133336","journal-title":"Expert Syst Appl"},{"issue":"6","key":"2447_CR28","doi-asserted-by":"publisher","first-page":"80","DOI":"10.2307\/3001968","volume":"1","author":"F Wilcoxon","year":"1945","unstructured":"Wilcoxon F (1945) Individual comparisons by ranking methods. Biomet Bull 1(6):80\u201383","journal-title":"Biomet Bull"},{"issue":"1","key":"2447_CR29","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/4235.585893","volume":"1","author":"DH Wolpert","year":"1997","unstructured":"Wolpert DH, Macready WG (1997) No free lunch theorems for optimization. IEEE Trans Evol Comput 1(1):67\u201382","journal-title":"IEEE Trans Evol Comput"},{"key":"2447_CR30","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1109\/21.155943","volume":"22","author":"L Xu","year":"1992","unstructured":"Xu L, Krzyzak A, Suen CY (1992) Methods of combining multiple classifiers and their application to handwriting recognition. IEEE Trans Syst Man Cybern 22:418\u2013435","journal-title":"IEEE Trans Syst Man Cybern"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02447-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-021-02447-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02447-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T06:37:54Z","timestamp":1645511874000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-021-02447-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,9]]},"references-count":30,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["2447"],"URL":"https:\/\/doi.org\/10.1007\/s10489-021-02447-7","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,9]]},"assertion":[{"value":"20 April 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}