{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,29]],"date-time":"2024-01-29T13:02:32Z","timestamp":1706533352735},"reference-count":69,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,8,7]],"date-time":"2018-08-07T00:00:00Z","timestamp":1533600000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s11277-018-5909-9","type":"journal-article","created":{"date-parts":[[2018,8,7]],"date-time":"2018-08-07T07:48:02Z","timestamp":1533628082000},"page":"2363-2387","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Survey on Long Term Evolution Scheduling in Data Mining"],"prefix":"10.1007","volume":"102","author":[{"given":"Divya","family":"Mohan","sequence":"first","affiliation":[]},{"given":"Geetha Mary","family":"Amalanathan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,7]]},"reference":[{"issue":"1","key":"5909_CR1","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.aci.2014.10.001","volume":"12","author":"D Adeniyi","year":"2016","unstructured":"Adeniyi, D., Wei, Z., & Yongquan, Y. (2016). Automated web usage data mining and recommendation system using k-nearest neighbor (KNN) classification method. Applied Computing and Informatics, 12(1), 90\u2013108.","journal-title":"Applied Computing and Informatics"},{"issue":"8","key":"5909_CR2","doi-asserted-by":"publisher","first-page":"3320","DOI":"10.1007\/s00034-016-0459-4","volume":"36","author":"Z Albataineh","year":"2017","unstructured":"Albataineh, Z., & Salem, F. M. (2017). Adaptive blind CDMA receivers based on ICA filtered structures. Circuits, Systems, and Signal Processing, 36(8), 3320\u20133348.","journal-title":"Circuits, Systems, and Signal Processing"},{"key":"5909_CR3","doi-asserted-by":"crossref","unstructured":"Alfayly, A., Mkwawa, I.-H., Sun, L., & Ifeachor, E. (2012). QoE-based performance evaluation of scheduling algorithms over LTE. In IEEE globecom workshops, IEEE (pp. 1362\u20131366).","DOI":"10.1109\/GLOCOMW.2012.6477781"},{"key":"5909_CR4","first-page":"10","volume":"2011","author":"RM Alguliev","year":"2011","unstructured":"Alguliev, R. M., Aliguliyev, R. M., & Nazirova, S. A. (2011). Classification of textual e-mail spam using data mining techniques. Applied Computational Intelligence and Soft Computing, 2011, 10.","journal-title":"Applied Computational Intelligence and Soft Computing"},{"key":"5909_CR5","doi-asserted-by":"crossref","unstructured":"AlQahtani, S. A., & Alhassany, M. (2013 ). Comparing different LTE scheduling schemes. In 2013 9th international wireless communications and mobile computing conference (IWCMC), IEEE (pp. 264\u2013269).","DOI":"10.1109\/IWCMC.2013.6583570"},{"issue":"1","key":"5909_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-016-0565-9","volume":"2016","author":"P Ameigeiras","year":"2016","unstructured":"Ameigeiras, P., Navarro-Ortiz, J., Andres-Maldonado, P., Lopez-Soler, J. M., Lorca, J., Perez-Tarrero, Q., et al. (2016). 3GPP QoS-based scheduling framework for LTE. EURASIP Journal on Wireless Communications and Networking, 2016(1), 1\u201314.","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"issue":"5","key":"5909_CR7","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1109\/JSAC.2017.2680918","volume":"35","author":"Y Bao","year":"2017","unstructured":"Bao, Y., Wu, H., & Liu, X. (2017). From prediction to action: Improving user experience with data-driven resource allocation. IEEE Journal on Selected Areas in Communications, 35(5), 1062\u20131075.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"5909_CR8","doi-asserted-by":"crossref","unstructured":"Batina, L., Hogenboom, J., & van Woudenberg, J. G. (2012). Getting more from PCA: First results of using principal component analysis for extensive power analysis. In Cryptographers\u2019 track at the RSA conference (pp. 383\u2013397). Springer.","DOI":"10.1007\/978-3-642-27954-6_24"},{"issue":"2","key":"5909_CR9","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1016\/j.neuroimage.2012.02.020","volume":"62","author":"CF Beckmann","year":"2012","unstructured":"Beckmann, C. F. (2012). Modelling with independent components. Neuroimage, 62(2), 891\u2013901.","journal-title":"Neuroimage"},{"issue":"04","key":"5909_CR10","doi-asserted-by":"publisher","first-page":"355","DOI":"10.4236\/ajor.2016.64033","volume":"6","author":"BAP Bertrand","year":"2016","unstructured":"Bertrand, B. A. P., Moustapha, D., Etienne, S., Souleymane, O., & Matthieu, A. (2016). A genetic algorithm for overall designing and planning of a long term evolution advanced network. American Journal of Operations Research, 6(04), 355.","journal-title":"American Journal of Operations Research"},{"key":"5909_CR11","volume-title":"Advanced meta-heuristic approaches and their application to operational optimization in forest wildfire management, Ph.D Thesis","author":"MN Bilbao Mar\u00f3n","year":"2014","unstructured":"Bilbao Mar\u00f3n, M. N. (2014). Advanced meta-heuristic approaches and their application to operational optimization in forest wildfire management, Ph.D Thesis. Madrid: University of Alcala."},{"issue":"1","key":"5909_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.dcan.2015.02.001","volume":"1","author":"A Biral","year":"2015","unstructured":"Biral, A., Centenaro, M., Zanella, A., Vangelista, L., & Zorzi, M. (2015). The challenges of M2M massive access in wireless cellular networks. Digital Communications and Networks, 1(1), 1\u201319.","journal-title":"Digital Communications and Networks"},{"key":"5909_CR13","unstructured":"Challita, U., Dong, L., & Saad, W. (2017). Deep learning for proactive resource allocation in LTE-U networks. In European wireless technology conference."},{"key":"5909_CR14","volume-title":"Robust mobile data transport: Modeling, measurements, and implementation, Ph.D. Thesis","author":"Y.-C Chen","year":"2015","unstructured":"Chen, Y.-C. (2015). Robust mobile data transport: Modeling, measurements, and implementation, Ph.D. Thesis. Amherst: University of Massachusetts."},{"issue":"2","key":"5909_CR15","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/j.knosys.2010.09.004","volume":"24","author":"Y Chen","year":"2011","unstructured":"Chen, Y., Miao, D., Wang, R., & Wu, K. (2011). A rough set approach to feature selection based on power set tree. Knowledge-Based Systems, 24(2), 275\u2013281.","journal-title":"Knowledge-Based Systems"},{"key":"5909_CR16","doi-asserted-by":"crossref","unstructured":"Chernov, S., Chernogorov, F., Petrov, D., & Ristaniemi, T. (2014). Data mining framework for random access failure detection in LTE networks. In IEEE 25th annual international symposium on personal, indoor, and mobile radio communication (PIMRC), IEEE (pp. 1321\u20131326).","DOI":"10.1109\/PIMRC.2014.7136373"},{"issue":"9","key":"5909_CR17","first-page":"4175","volume":"9","author":"KSBaB Chidhambararajan","year":"2016","unstructured":"Chidhambararajan, K S Ba B. (2016). Fast and secure intelligence re-authentication m echanism for next generation subscribers. International Journal of Computer Technology and Applications, 9(9), 4175\u20134189.","journal-title":"International Journal of Computer Technology and Applications"},{"issue":"1","key":"5909_CR18","first-page":"58","volume":"14","author":"RF Chisab","year":"2014","unstructured":"Chisab, R. F., & Shukla, C. (2014). Performance evaluation Of 4G-LTE-SCFDMA scheme under SUI And ITU channel models. International Journal of Engineering & Technology IJET-IJENS\n                           , 14(1), 58\u201369.","journal-title":"International Journal of Engineering & Technology IJET-IJENS"},{"issue":"2","key":"5909_CR19","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1109\/TMC.2012.256","volume":"13","author":"DJ Dechene","year":"2014","unstructured":"Dechene, D. J., & Shami, A. (2014). Energy-aware resource allocation strategies for LTE uplink with synchronous HARQ constraints. IEEE Transactions on Mobile Computing, 13(2), 422\u2013433.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"5909_CR20","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.neucom.2015.06.083","volume":"172","author":"E Emary","year":"2016","unstructured":"Emary, E., Zawbaa, H. M., & Hassanien, A. E. (2016). Binary grey wolf optimization approaches for feature selection. Neurocomputing, 172, 371\u2013381.","journal-title":"Neurocomputing"},{"issue":"7","key":"5909_CR21","doi-asserted-by":"publisher","first-page":"3239","DOI":"10.1109\/TIP.2012.2190081","volume":"21","author":"E Esser","year":"2012","unstructured":"Esser, E., Moller, M., Osher, S., Sapiro, G., & Xin, J. (2012). A convex model for nonnegative matrix factorization and dimensionality reduction on physical space. IEEE Transactions on Image Processing, 21(7), 3239\u20133252.","journal-title":"IEEE Transactions on Image Processing"},{"issue":"4","key":"5909_CR22","doi-asserted-by":"publisher","first-page":"2432","DOI":"10.1109\/COMST.2017.2707140","volume":"19","author":"ZM Fadlullah","year":"2017","unstructured":"Fadlullah, Z. M., Tang, F., Mao, B., Kato, N., Akashi, O., Inoue, T., et al. (2017). State-of-the-art deep learning: Evolving machine intelligence toward tomorrow\u2019s intelligent network traffic control systems. IEEE Communications Surveys & Tutorials, 19(4), 2432\u20132455.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"5909_CR23","doi-asserted-by":"crossref","unstructured":"Guangming, W., & Xiaoliang, W. (2009). Notice of retraction application of classification algorithm based on association rules in the labor market. In International conference on e-Learning, e-Business, enterprise information systems, and e-Government, EEEE\u20190, IEEE (pp. 255\u2013258).","DOI":"10.1109\/EEEE.2009.90"},{"key":"5909_CR24","doi-asserted-by":"crossref","unstructured":"Gupta, A., Verma, T., Bali, S., & Kaul, S. (2013). Detecting MS initiated signaling DDoS attacks in 3G\/4G wireless networks. In Fifth international conference on communication systems and networks (COMSNETS), IEEE (pp. 1\u201360).","DOI":"10.1109\/COMSNETS.2013.6465568"},{"issue":"2","key":"5909_CR25","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1109\/TSMCB.2011.2168604","volume":"42","author":"G-B Huang","year":"2012","unstructured":"Huang, G.-B., Zhou, H., Ding, X., & Zhang, R. (2012). Extreme learning machine for regression and multiclass classification. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), 42(2), 513\u2013529.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics)"},{"key":"5909_CR26","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1016\/j.neucom.2014.07.073","volume":"150","author":"S Ingram","year":"2015","unstructured":"Ingram, S., & Munzner, T. (2015). Dimensionality reduction for documents with nearest neighbor queries. Neurocomputing, 150, 557\u2013569.","journal-title":"Neurocomputing"},{"key":"5909_CR27","doi-asserted-by":"crossref","unstructured":"Juvonen, A., & Sipola, T. (2012). Adaptive framework for network traffic classification using dimensionality reduction and clustering. In 2012 4th international congress on ultra modern telecommunications and control systems and workshops (ICUMT), IEEE (pp. 274\u2013279).","DOI":"10.1109\/ICUMT.2012.6459678"},{"issue":"3","key":"5909_CR28","doi-asserted-by":"publisher","first-page":"3747","DOI":"10.1016\/j.eswa.2011.09.073","volume":"39","author":"MM Kabir","year":"2012","unstructured":"Kabir, M. M., Shahjahan, M., & Murase, K. (2012). A new hybrid ant colony optimization algorithm for feature selection. Expert Systems with Applications, 39(3), 3747\u20133763.","journal-title":"Expert Systems with Applications"},{"key":"5909_CR29","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1016\/j.neucom.2014.06.067","volume":"147","author":"S Kashef","year":"2015","unstructured":"Kashef, S., & Nezamabadi-pour, H. (2015). An advanced ACO algorithm for feature subset selection. Neurocomputing, 147, 271\u2013279.","journal-title":"Neurocomputing"},{"key":"5909_CR30","doi-asserted-by":"crossref","unstructured":"Khan, A. H., Qadeer, M. A., Ansari, J. A., & Waheed, S. (2009). 4G as a next generation wireless network. In International conference on future computer and communication, ICFCC 2009, IEEE (pp. 334\u2013338).","DOI":"10.1109\/ICFCC.2009.108"},{"issue":"4","key":"5909_CR31","doi-asserted-by":"publisher","first-page":"2392","DOI":"10.1109\/COMST.2017.2727878","volume":"19","author":"PV Klaine","year":"2017","unstructured":"Klaine, P. V., Imran, M. A., Onireti, O., & Souza, R. D. (2017). A survey of machine learning techniques applied to self-organizing cellular networks. IEEE Communications Surveys & Tutorials, 19(4), 2392\u20132431.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"7","key":"5909_CR32","doi-asserted-by":"publisher","first-page":"1689","DOI":"10.1016\/j.comnet.2013.02.017","volume":"57","author":"WK Lai","year":"2013","unstructured":"Lai, W. K., & Tang, C.-L. (2013). QoS-aware downlink packet scheduling for LTE networks. Computer Networks, 57(7), 1689\u20131698.","journal-title":"Computer Networks"},{"key":"5909_CR33","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/j.ecolmodel.2014.09.018","volume":"295","author":"A Lausch","year":"2015","unstructured":"Lausch, A., Schmidt, A., & Tischendorf, L. (2015). Data mining and linked open data\u2014New perspectives for data analysis in environmental research. Ecological Modelling, 295, 5\u201317.","journal-title":"Ecological Modelling"},{"key":"5909_CR34","doi-asserted-by":"crossref","unstructured":"Lehtim\u00e4ki, P., & Raivio, K. A (2005). SOM based approach for visualization of GSM network performance data. In International conference on industrial, engineering and other applications of applied intelligent systems (pp. 588\u2013598). Springer.","DOI":"10.1007\/11504894_82"},{"key":"5909_CR35","doi-asserted-by":"crossref","unstructured":"Lei, L., You, L., Dai, G., Vu, T. X., Yuan, D., & Chatzinotas, S. (2017). A deep learning approach for optimizing content delivering in cache-enabled HetNet. In 2017 international symposium on wireless communication systems (ISWCS), IEEE (pp. 449\u2013453).","DOI":"10.1109\/ISWCS.2017.8108157"},{"issue":"2","key":"5909_CR36","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1109\/SURV.2014.022614.00186","volume":"16","author":"GY Li","year":"2014","unstructured":"Li, G. Y., Niu, J., Lee, D., Fan, J., & Fu, Y. (2014). Multi-cell coordinated scheduling and MIMO in LTE. IEEE Communications Surveys & Tutorials, 16(2), 761\u2013775.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"5909_CR37","doi-asserted-by":"crossref","unstructured":"Li, L., & Kianmehr, K. (2012). Internet traffic classification based on associative classifiers. In 2012 IEEE international conference on cyber technology in automation, control, and intelligent systems (CYBER), IEEE (pp. 263\u2013268).","DOI":"10.1109\/CYBER.2012.6392563"},{"issue":"4","key":"5909_CR38","doi-asserted-by":"publisher","first-page":"1185","DOI":"10.1109\/TGRS.2011.2165957","volume":"50","author":"W Li","year":"2012","unstructured":"Li, W., Prasad, S., Fowler, J. E., & Bruce, L. M. (2012). Locality-preserving dimensionality reduction and classification for hyperspectral image analysis. IEEE Transactions on Geoscience and Remote Sensing, 50(4), 1185\u20131198.","journal-title":"IEEE Transactions on Geoscience and Remote Sensing"},{"issue":"10","key":"5909_CR39","doi-asserted-by":"publisher","first-page":"3285","DOI":"10.1016\/j.asoc.2012.05.004","volume":"12","author":"S-W Lin","year":"2012","unstructured":"Lin, S.-W., Ying, K.-C., Lee, C.-Y., & Lee, Z.-J. (2012). An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection. Applied Soft Computing, 12(10), 3285\u20133290.","journal-title":"Applied Soft Computing"},{"key":"5909_CR40","doi-asserted-by":"crossref","unstructured":"Liu, L., Cheng, Y., Cai, L., Zhou, S., & Niu, Z. (2017). Deep learning based optimization in wireless network. In 2017 IEEE international conference on communications (ICC), IEEE (pp. 1\u20136).","DOI":"10.1109\/ICC.2017.7996587"},{"issue":"4","key":"5909_CR41","doi-asserted-by":"publisher","first-page":"876","DOI":"10.1109\/TPAMI.2014.2353639","volume":"37","author":"Z Ma","year":"2015","unstructured":"Ma, Z., Teschendorff, A. E., Leijon, A., Qiao, Y., Zhang, H., & Guo, J. (2015). Variational bayesian matrix factorization for bounded support data. IEEE Transactions on Pattern Analysis and Machine Intelligence, 37(4), 876\u2013889.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"5","key":"5909_CR42","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/MNET.2017.1600319","volume":"31","author":"Z Ma","year":"2017","unstructured":"Ma, Z., Xie, J., Li, H., Sun, Q., Si, Z., Zhang, J., et al. (2017). The role of data analysis in the development of intelligent energy networks. IEEE Network, 31(5), 88\u201395.","journal-title":"IEEE Network"},{"key":"5909_CR43","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/TNNLS.2016.2616445","volume":"29","author":"Z Ma","year":"2016","unstructured":"Ma, Z., Xue, J.-H., Leijon, A., Tan, Z.-H., Yang, Z., & Guo, J. (2016). Decorrelation of neutral vector variables: Theory and applications. IEEE Transactions on Neural Networks and Learning Systems, 29(1),\u00a0129\u2013143.","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"issue":"11","key":"5909_CR44","doi-asserted-by":"publisher","first-page":"1946","DOI":"10.1109\/TC.2017.2709742","volume":"66","author":"B Mao","year":"2017","unstructured":"Mao, B., Fadlullah, Z. M., Tang, F., Kato, N., Akashi, O., Inoue, T., et al. (2017). Routing or computing? The paradigm shift towards intelligent computer network packet transmission based on deep learning. IEEE Transactions on Computers, 66(11), 1946\u20131960.","journal-title":"IEEE Transactions on Computers"},{"key":"5909_CR45","doi-asserted-by":"crossref","unstructured":"Mercaldo, F., Visaggio, C. A., Canfora, G., & Cimitile, A. (2016). Mobile malware detection in the real world. In IEEE\/ACM international conference on software engineering companion (ICSE-C), IEEE (pp. 744\u2013746).","DOI":"10.1145\/2889160.2892656"},{"key":"5909_CR46","doi-asserted-by":"publisher","unstructured":"Moysen, J., Giupponi, L., & Mangues-Bafalluy, J. (2016). A machine learning enabled network planning tool. In 2016 IEEE 27th annual international symposium on personal, indoor, and mobile radio communications (PIMRC) (pp. 1\u20137). \n                    https:\/\/doi.org\/10.1109\/pimrc.2016.7794909\n                    \n                  .","DOI":"10.1109\/pimrc.2016.7794909"},{"issue":"1","key":"5909_CR47","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TEVC.2013.2290086","volume":"18","author":"A Mukhopadhyay","year":"2014","unstructured":"Mukhopadhyay, A., Maulik, U., Bandyopadhyay, S., & Coello, C. A. C. (2014). A survey of multiobjective evolutionary algorithms for data mining: Part I. IEEE Transactions on Evolutionary Computation, 18(1), 4\u201319.","journal-title":"IEEE Transactions on Evolutionary Computation"},{"issue":"1","key":"5909_CR48","first-page":"29","volume":"7","author":"G Nagpal","year":"2015","unstructured":"Nagpal, G., & Rajpoot, A. S. (2015). Scheduling exploiting frequency and multi-user diversity in LTE downlink systems with heterogeneous mobilities. MR International Journal of Engineering & Technology, 7(1), 29\u201340.","journal-title":"MR International Journal of Engineering & Technology"},{"key":"5909_CR49","unstructured":"Nguyen, D., Memik, G., Memik, S. O., & Choudhary, A. (2015). Real-time feature extraction for high speed networks. In International conference on field programmable logic and applications, 2005, IEEE (pp. 438\u2013443)."},{"issue":"4","key":"5909_CR50","doi-asserted-by":"publisher","first-page":"1843","DOI":"10.1109\/TWC.2013.022013.121020","volume":"12","author":"J Niu","year":"2013","unstructured":"Niu, J., Lee, D., Ren, X., Li, G. Y., & Su, T. (2013). Scheduling exploiting frequency and multi-user diversity in LTE downlink systems. IEEE Transactions on Wireless Communications, 12(4), 1843\u20131849.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"2","key":"5909_CR51","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/TNN.2010.2091281","volume":"22","author":"SJ Pan","year":"2011","unstructured":"Pan, S. J., Tsang, I. W., Kwok, J. T., & Yang, Q. (2011). Domain adaptation via transfer component analysis. IEEE Transactions on Neural Networks, 22(2), 199\u2013210.","journal-title":"IEEE Transactions on Neural Networks"},{"key":"5909_CR52","volume-title":"Distributed cognitive rat selection in 5G heterogeneous networks: A machine learning approach, Ph.D. Thesis","author":"JS Perez Rodriguez","year":"2016","unstructured":"Perez Rodriguez, J. S. (2016). Distributed cognitive rat selection in 5G heterogeneous networks: A machine learning approach, Ph.D. Thesis. Albuquerque, New Mexico: University of New Mexico."},{"issue":"5","key":"5909_CR53","doi-asserted-by":"publisher","first-page":"1052","DOI":"10.1109\/TMM.2011.2152381","volume":"13","author":"G Piro","year":"2011","unstructured":"Piro, G., Grieco, L. A., Boggia, G., Fortuna, R., & Camarda, P. (2011). Two-level downlink scheduling for real-time multimedia services in LTE networks. IEEE Transactions on Multimedia, 13(5), 1052\u20131065.","journal-title":"IEEE Transactions on Multimedia"},{"issue":"10","key":"5909_CR54","first-page":"1334","volume":"3","author":"V Prabhu","year":"2014","unstructured":"Prabhu, V., & Nagaraja, G. (2014). Survey, classification and future direction for packet scheduling in 4G networks to provide quality of service. IJRCCT, 3(10), 1334\u20131339.","journal-title":"IJRCCT"},{"issue":"1","key":"5909_CR55","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/TMC.2012.230","volume":"13","author":"N Prasad","year":"2014","unstructured":"Prasad, N., Zhang, H., Zhu, H., & Rangarajan, S. (2014). Multiuser scheduling in the 3GPP LTE cellular uplink. IEEE Transactions on Mobile Computing, 13(1), 130\u2013145.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"5909_CR56","doi-asserted-by":"crossref","unstructured":"Rossi, M., Benatti, S., Farella, E., & Benini, L. (2015). Hybrid EMG classifier based on HMM and SVM for hand gesture recognition in prosthetics. In IEEE international conference on industrial technology (ICIT), IEEE (pp. 1700\u20131705).","DOI":"10.1109\/ICIT.2015.7125342"},{"issue":"2","key":"5909_CR57","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1109\/TNSM.2014.2321838","volume":"11","author":"S Secci","year":"2014","unstructured":"Secci, S., Pujolle, G., Nguyen, T. M. T., & Nguyen, S. C. (2014). Performance-cost trade-off strategic evaluation of multipath TCP communications. IEEE Transactions on Network and Service Management, 11(2), 250\u2013263.","journal-title":"IEEE Transactions on Network and Service Management"},{"issue":"12","key":"5909_CR58","doi-asserted-by":"publisher","first-page":"2634","DOI":"10.1109\/TVCG.2013.153","volume":"19","author":"M Sedlmair","year":"2013","unstructured":"Sedlmair, M., Munzner, T., & Tory, M. (2013). Empirical guidance on scatterplot and dimension reduction technique choices. IEEE Transactions on Visualization and Computer Graphics, 19(12), 2634\u20132643.","journal-title":"IEEE Transactions on Visualization and Computer Graphics"},{"issue":"9","key":"5909_CR59","doi-asserted-by":"publisher","first-page":"2798","DOI":"10.1016\/j.patcog.2015.03.020","volume":"48","author":"S Tabakhi","year":"2015","unstructured":"Tabakhi, S., & Moradi, P. (2015). Relevance\u2013redundancy feature selection based on ant colony optimization. Pattern Recognition, 48(9), 2798\u20132811.","journal-title":"Pattern Recognition"},{"key":"5909_CR60","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.future.2017.03.026","volume":"75","author":"M Tennant","year":"2017","unstructured":"Tennant, M., Stahl, F., Rana, O., & Gomes, J. B. (2017). Scalable real-time classification of data streams with concept drift. Future Generation Computer Systems, 75, 187\u2013199.","journal-title":"Future Generation Computer Systems"},{"issue":"2","key":"5909_CR61","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s10922-013-9284-2","volume":"22","author":"MI Tiwana","year":"2014","unstructured":"Tiwana, M. I., & Tiwana, M. I. (2014). A novel framework of automated RRM for LTE son using data mining: Application to LTE mobility. Journal of Network and Systems Management, 22(2), 235\u2013258.","journal-title":"Journal of Network and Systems Management"},{"issue":"20","key":"5909_CR62","doi-asserted-by":"publisher","first-page":"4625","DOI":"10.1016\/j.ins.2010.05.037","volume":"181","author":"A Unler","year":"2011","unstructured":"Unler, A., Murat, A., & Chinnam, R. B. (2011). mr2PSO: A maximum relevance minimum redundancy feature selection method based on swarm intelligence for support vector machine classification. Information Sciences, 181(20), 4625\u20134641.","journal-title":"Information Sciences"},{"key":"5909_CR63","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1109\/ACCESS.2014.2353297","volume":"2","author":"Y Xu","year":"2014","unstructured":"Xu, Y., Yue, G., & Mao, S. (2014). User grouping for massive MIMO in FDD systems: New design methods and analysis. IEEE Access, 2, 947\u2013959.","journal-title":"IEEE Access"},{"issue":"6","key":"5909_CR64","doi-asserted-by":"publisher","first-page":"1656","DOI":"10.1109\/TSMCB.2012.2227469","volume":"43","author":"B Xue","year":"2013","unstructured":"Xue, B., Zhang, M., & Browne, W. N. (2013). Particle swarm optimization for feature selection in classification: a multi-objective approach. IEEE transactions on cybernetics, 43(6), 1656\u20131671.","journal-title":"IEEE transactions on cybernetics"},{"issue":"5","key":"5909_CR65","first-page":"859","volume":"4","author":"J Yu","year":"2010","unstructured":"Yu, J., Lee, H., Im, Y., Kim, M.-S., & Park, D. (2010). Real-time classification of internet application traffic using a hierarchical multi-class SVM. KSII Transactions on Internet & Information Systems, 4(5), 859\u2013876.","journal-title":"KSII Transactions on Internet & Information Systems"},{"key":"5909_CR66","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.neucom.2012.09.049","volume":"148","author":"Y Zhang","year":"2015","unstructured":"Zhang, Y., Gong, D., Hu, Y., & Zhang, W. (2015). Feature selection algorithm based on bare bones particle swarm optimization. Neurocomputing, 148, 150\u2013157.","journal-title":"Neurocomputing"},{"issue":"5","key":"5909_CR67","doi-asserted-by":"publisher","first-page":"5197","DOI":"10.1016\/j.eswa.2010.10.041","volume":"38","author":"M Zhao","year":"2011","unstructured":"Zhao, M., Fu, C., Ji, L., Tang, K., & Zhou, M. (2011). Feature selection and parameter optimization for support vector machines: A new approach based on genetic algorithm with feature chromosomes. Expert Systems with Applications, 38(5), 5197\u20135204.","journal-title":"Expert Systems with Applications"},{"key":"5909_CR68","doi-asserted-by":"crossref","unstructured":"Zhenqi, S., Haifeng, Y., Xuefen, C., & Hongxia, L. (2013). Research on uplink scheduling algorithm of massive M2M and H2H services in LTE. In IET international conference on Information and communications technologies (IETICT 2013), IET (pp. 365\u2013369).","DOI":"10.1049\/cp.2013.0070"},{"key":"5909_CR69","unstructured":"Zolotukhin, M. (2014). On data mining applications in mobile networking and network security. Jyv\u00e4skyl\u00e4 studies in computing, 189."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-018-5909-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5909-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5909-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T23:04:56Z","timestamp":1565132696000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-018-5909-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,7]]},"references-count":69,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["5909"],"URL":"https:\/\/doi.org\/10.1007\/s11277-018-5909-9","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,7]]},"assertion":[{"value":"7 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}