{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T08:43:05Z","timestamp":1771231385762,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,7,13]],"date-time":"2019-07-13T00:00:00Z","timestamp":1562976000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,7,13]],"date-time":"2019-07-13T00:00:00Z","timestamp":1562976000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004515","name":"Universiti Kebangsaan Malaysia","doi-asserted-by":"publisher","award":["DIP-2016-033"],"award-info":[{"award-number":["DIP-2016-033"]}],"id":[{"id":"10.13039\/501100004515","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Speech Technol"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s10772-019-09621-w","type":"journal-article","created":{"date-parts":[[2019,7,13]],"date-time":"2019-07-13T19:02:27Z","timestamp":1563044547000},"page":"711-727","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":58,"title":["Spoken language identification based on optimised genetic algorithm\u2013extreme learning machine approach"],"prefix":"10.1007","volume":"22","author":[{"given":"Musatafa Abbas Abbood","family":"Albadr","sequence":"first","affiliation":[]},{"given":"Sabrina","family":"Tiun","sequence":"additional","affiliation":[]},{"given":"Masri","family":"Ayob","sequence":"additional","affiliation":[]},{"given":"Fahad Taha","family":"AL-Dhief","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,13]]},"reference":[{"issue":"4","key":"9621_CR1","doi-asserted-by":"publisher","first-page":"e0194770","DOI":"10.1371\/journal.pone.0194770","volume":"13","author":"MAA Albadr","year":"2018","unstructured":"Albadr, M. A. A., et al. (2018). Spoken language identification based on the enhanced self-adjusting extreme learning machine approach. PLoS ONE, 13(4), e0194770.","journal-title":"PLoS ONE"},{"issue":"14","key":"9621_CR2","first-page":"4610","volume":"12","author":"MAA Albadra","year":"2017","unstructured":"Albadra, M. A. A., & Tiuna, S. (2017). Extreme learning machine: A review. International Journal of Applied Engineering Research, 12(14), 4610\u20134623.","journal-title":"International Journal of Applied Engineering Research"},{"key":"9621_CR4","unstructured":"Andrushia, A. D., & Thangarajan, R. (2019). RTS-ELM: An approach for saliency-directed image segmentation with ripplet transform (pp. 1\u201313). Pattern Analysis and Applications."},{"issue":"18","key":"9621_CR5","doi-asserted-by":"publisher","first-page":"5472","DOI":"10.1002\/sec.1711","volume":"9","author":"HA Atee","year":"2016","unstructured":"Atee, H. A., et al. (2016). A novel extreme learning machine-based cryptography system. Security and Communication Networks, 9(18), 5472\u20135489.","journal-title":"Security and Communication Networks"},{"issue":"13\u201315","key":"9621_CR6","doi-asserted-by":"publisher","first-page":"2394","DOI":"10.1016\/j.neucom.2010.01.023","volume":"73","author":"C Bi","year":"2010","unstructured":"Bi, C. (2010). Deterministic local alignment methods improved by a simple genetic algorithm. Neurocomputing, 73(13\u201315), 2394\u20132406.","journal-title":"Neurocomputing"},{"issue":"9","key":"9621_CR7","doi-asserted-by":"publisher","first-page":"e0137724","DOI":"10.1371\/journal.pone.0137724","volume":"10","author":"C Contreras-Bolton","year":"2015","unstructured":"Contreras-Bolton, C., & Parada, V. (2015). Automatic combination of operators in a genetic algorithm to solve the traveling salesman problem. PLoS ONE, 10(9), e0137724.","journal-title":"PLoS ONE"},{"issue":"2","key":"9621_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-014-5269-3","volume":"58","author":"C Deng","year":"2015","unstructured":"Deng, C., et al. (2015). Extreme learning machines: New trends and applications. Science China Information Sciences, 58(2), 1\u201316.","journal-title":"Science China Information Sciences"},{"issue":"4","key":"9621_CR9","first-page":"388","volume":"6","author":"A Garg","year":"2014","unstructured":"Garg, A., Gupta, V., & Jindal, M. (2014). A survey of language identification techniques and applications. Journal of Emerging Technologies in Web Intelligence, 6(4), 388\u2013400.","journal-title":"Journal of Emerging Technologies in Web Intelligence"},{"issue":"2","key":"9621_CR10","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1023\/A:1022602019183","volume":"3","author":"DE Goldberg","year":"1988","unstructured":"Goldberg, D. E., & Holland, J. H. (1988). Genetic algorithms and machine learning. Machine Learning, 3(2), 95\u201399.","journal-title":"Machine Learning"},{"issue":"6","key":"9621_CR11","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/s00530-012-0266-0","volume":"18","author":"RP Hafen","year":"2012","unstructured":"Hafen, R. P., & Henry, M. J. (2012). Speech information retrieval: A review. Multimedia Systems, 18(6), 499\u2013518.","journal-title":"Multimedia Systems"},{"key":"9621_CR12","doi-asserted-by":"crossref","unstructured":"Han, K., Yu, D., & Tashev, I. (2014). Speech emotion recognition using deep neural network and extreme learning machine. In Fifteenth annual conference of the international speech communication association.","DOI":"10.21437\/Interspeech.2014-57"},{"key":"9621_CR13","volume-title":"Adaption in natural and artificial systems. An introductory analysis with application to biology, control and artificial intelligence","author":"JH Holland","year":"1975","unstructured":"Holland, J. H. (1975). Adaption in natural and artificial systems. An introductory analysis with application to biology, control and artificial intelligence. Ann Arbor: University of Michigan Press."},{"issue":"3","key":"9621_CR14","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/s12559-014-9255-2","volume":"6","author":"G-B Huang","year":"2014","unstructured":"Huang, G.-B. (2014). An insight into extreme learning machines: Random neurons, random features and kernels. Cognitive Computation, 6(3), 376\u2013390.","journal-title":"Cognitive Computation"},{"issue":"4","key":"9621_CR15","doi-asserted-by":"publisher","first-page":"879","DOI":"10.1109\/TNN.2006.875977","volume":"17","author":"G-B Huang","year":"2006","unstructured":"Huang, G.-B., Chen, L., & Siew, C. K. (2006a). Universal approximation using incremental constructive feedforward networks with random hidden nodes. IEEE Transactions on Neural Networks, 17(4), 879\u2013892.","journal-title":"IEEE Transactions on Neural Networks"},{"issue":"1","key":"9621_CR16","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1016\/j.neucom.2005.12.126","volume":"70","author":"G-B Huang","year":"2006","unstructured":"Huang, G.-B., Zhu, Q.-Y., & Siew, C.-K. (2006b). Extreme learning machine: Theory and applications. Neurocomputing, 70(1), 489\u2013501.","journal-title":"Neurocomputing"},{"issue":"2","key":"9621_CR17","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1109\/TSMCB.2011.2168604","volume":"42","author":"G-B Huang","year":"2012","unstructured":"Huang, G.-B., et al. (2012). Extreme learning machine for regression and multiclass classification. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), 42(2), 513\u2013529.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics)"},{"issue":"12","key":"9621_CR18","doi-asserted-by":"publisher","first-page":"2405","DOI":"10.1109\/TCYB.2014.2307349","volume":"44","author":"G Huang","year":"2014","unstructured":"Huang, G., et al. (2014). Semi-supervised and unsupervised extreme learning machines. IEEE Transactions on Cybernetics, 44(12), 2405\u20132417.","journal-title":"IEEE Transactions on Cybernetics"},{"issue":"1","key":"9621_CR19","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1109\/TCYB.2015.2401973","volume":"46","author":"A Iosifidis","year":"2016","unstructured":"Iosifidis, A., Tefas, A., & Pitas, I. (2016). Graph embedded extreme learning machine. IEEE Transactions on Cybernetics, 46(1), 311\u2013324.","journal-title":"IEEE Transactions on Cybernetics"},{"issue":"7","key":"9621_CR20","doi-asserted-by":"publisher","first-page":"e100795","DOI":"10.1371\/journal.pone.0100795","volume":"9","author":"B Jiang","year":"2014","unstructured":"Jiang, B., et al. (2014). Deep bottleneck features for spoken language identification. PLoS ONE, 9(7), e100795.","journal-title":"PLoS ONE"},{"issue":"3\u20134","key":"9621_CR21","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/s00521-012-0946-x","volume":"22","author":"Y Lan","year":"2013","unstructured":"Lan, Y., et al. (2013). An extreme learning machine approach for speaker recognition. Neural Computing and Applications, 22(3\u20134), 417\u2013425.","journal-title":"Neural Computing and Applications"},{"key":"9621_CR23","doi-asserted-by":"crossref","unstructured":"Lefebvre, G., & Cumin, J. (2016). Recognizing human actions based on extreme learning machines. In 11th international joint conference on computer vision, imaging and computer graphics theory and applications.","DOI":"10.5220\/0005675004780483"},{"key":"9621_CR24","doi-asserted-by":"crossref","unstructured":"Li, J., et al. (2015). LSTM time and frequency recurrence for automatic speech recognition. In 2015 IEEE workshop on automatic speech recognition and understanding (ASRU). IEEE.","DOI":"10.1109\/ASRU.2015.7404793"},{"issue":"6","key":"9621_CR25","doi-asserted-by":"publisher","first-page":"1411","DOI":"10.1109\/TNN.2006.880583","volume":"17","author":"N-Y Liang","year":"2006","unstructured":"Liang, N.-Y., et al. (2006). A fast and accurate online sequential learning algorithm for feedforward networks. IEEE Transactions on Neural Networks, 17(6), 1411\u20131423.","journal-title":"IEEE Transactions on Neural Networks"},{"issue":"2","key":"9621_CR26","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s00521-014-1777-8","volume":"27","author":"B Liu","year":"2016","unstructured":"Liu, B., et al. (2016). Manifold regularized extreme learning machine. Neural Computing and Applications, 27(2), 255\u2013269.","journal-title":"Neural Computing and Applications"},{"issue":"3","key":"9621_CR27","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/BF03024314","volume":"18","author":"Z Michalewicz","year":"1996","unstructured":"Michalewicz, Z., & Hartley, S. J. (1996). Genetic algorithms\u2009+\u2009data structures\u2009=\u2009evolution programs. Mathematical Intelligencer, 18(3), 71.","journal-title":"Mathematical Intelligencer"},{"issue":"17","key":"9621_CR28","doi-asserted-by":"publisher","first-page":"3180","DOI":"10.1016\/j.neucom.2011.04.009","volume":"74","author":"MH Mohamed","year":"2011","unstructured":"Mohamed, M. H. (2011). Rules extraction from constructively trained neural networks based on genetic algorithms. Neurocomputing, 74(17), 3180\u20133192.","journal-title":"Neurocomputing"},{"issue":"7","key":"9621_CR29","doi-asserted-by":"publisher","first-page":"2107","DOI":"10.1007\/s00521-015-2010-0","volume":"27","author":"P Nayak","year":"2016","unstructured":"Nayak, P., et al. (2016). Comparison of modified teaching\u2013learning-based optimization and extreme learning machine for classification of multiple power signal disturbances. Neural Computing and Applications, 27(7), 2107\u20132122.","journal-title":"Neural Computing and Applications"},{"issue":"3","key":"9621_CR30","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1007\/s11063-016-9496-z","volume":"44","author":"P Niu","year":"2016","unstructured":"Niu, P., et al. (2016). A kind of parameters self-adjusting extreme learning machine. Neural Processing Letters, 44(3), 813\u2013830.","journal-title":"Neural Processing Letters"},{"key":"9621_CR31","doi-asserted-by":"crossref","unstructured":"Padmanabhan, S. A., & Kanchikere, J. (2019). An efficient face recognition system based on hybrid optimized KELM (pp. 1\u201321). Multimedia Tools and Applications.","DOI":"10.1007\/s11042-019-7243-y"},{"issue":"9","key":"9621_CR32","doi-asserted-by":"publisher","first-page":"853","DOI":"10.1080\/2150704X.2013.805279","volume":"4","author":"M Pal","year":"2013","unstructured":"Pal, M., Maxwell, A. E., & Warner, T. A. (2013). Kernel-based extreme learning machine for remote-sensing image classification. Remote Sensing Letters, 4(9), 853\u2013862.","journal-title":"Remote Sensing Letters"},{"key":"9621_CR33","doi-asserted-by":"crossref","unstructured":"Rujirakul, K., & So-In, C. (2018) Histogram equalized deep PCA with ELM classification for expressive face recognition. In 2018 international workshop on advanced image technology (IWAIT). IEEE.","DOI":"10.1109\/IWAIT.2018.8369725"},{"key":"9621_CR34","unstructured":"Sokolova, M., Japkowicz, N., & Szpakowicz, S. (2006). Beyond accuracy, F-score and ROC: A family of discriminant measures for performance evaluation. In Australasian joint conference on artificial intelligence. Berlin: Springer."},{"issue":"16","key":"9621_CR36","doi-asserted-by":"publisher","first-page":"2483","DOI":"10.1016\/j.neucom.2010.11.030","volume":"74","author":"Y Wang","year":"2011","unstructured":"Wang, Y., Cao, F., & Yuan, Y. (2011). A study on effectiveness of extreme learning machine. Neurocomputing, 74(16), 2483\u20132490.","journal-title":"Neurocomputing"},{"key":"9621_CR37","unstructured":"Xiang, J., et al. (2014). Using extreme learning machine for intrusion detection in a big data environment. In: Proceedings of the 2014 workshop on artificial intelligent and security workshop. ACM."},{"issue":"1","key":"9621_CR38","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1186\/s13636-015-0066-5","volume":"2015","author":"J Xu","year":"2015","unstructured":"Xu, J., et al. (2015). Regularized minimum class variance extreme learning machine for language recognition. EURASIP Journal on Audio, Speech, and Music Processing, 2015(1), 22.","journal-title":"EURASIP Journal on Audio, Speech, and Music Processing"},{"key":"9621_CR39","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/394083","author":"S Yaacob","year":"2015","unstructured":"Yaacob, S., Muthusamy, H., & Polat, K. (2015). Improved emotion recognition using gaussian mixture model and extreme learning machine in speech and glottal signals. Mathematical Problems in Engineering. https:\/\/doi.org\/10.1155\/2015\/394083 .","journal-title":"Mathematical Problems in Engineering"},{"issue":"1","key":"9621_CR40","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/s11571-015-9358-9","volume":"10","author":"Z Yang","year":"2016","unstructured":"Yang, Z., Zhang, T., & Zhang, D. (2016). A novel algorithm with differential evolution and coral reef optimization for extreme learning machine training. Cognitive Neurodynamics, 10(1), 73\u201383.","journal-title":"Cognitive Neurodynamics"},{"issue":"1","key":"9621_CR41","doi-asserted-by":"publisher","first-page":"e0146917","DOI":"10.1371\/journal.pone.0146917","volume":"11","author":"R Zazo","year":"2016","unstructured":"Zazo, R., et al. (2016). Language identification in short utterances using long short-term memory (LSTM) recurrent neural networks. PLoS ONE, 11(1), e0146917.","journal-title":"PLoS ONE"}],"container-title":["International Journal of Speech Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-019-09621-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10772-019-09621-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-019-09621-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T21:27:58Z","timestamp":1663968478000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10772-019-09621-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,13]]},"references-count":38,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["9621"],"URL":"https:\/\/doi.org\/10.1007\/s10772-019-09621-w","relation":{},"ISSN":["1381-2416","1572-8110"],"issn-type":[{"value":"1381-2416","type":"print"},{"value":"1572-8110","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,13]]},"assertion":[{"value":"1 January 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 July 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}