{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T20:36:44Z","timestamp":1769114204872,"version":"3.49.0"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T00:00:00Z","timestamp":1674000000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T00:00:00Z","timestamp":1674000000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Evolving Systems"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s12530-022-09483-9","type":"journal-article","created":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T06:03:13Z","timestamp":1674021793000},"page":"1025-1034","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Fast and efficient exception tolerant ensemble for limited training"],"prefix":"10.1007","volume":"14","author":[{"given":"Sayan","family":"Sikder","sequence":"first","affiliation":[]},{"given":"Pankaj","family":"Dadure","sequence":"additional","affiliation":[]},{"given":"Sanjeev K.","family":"Metya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,18]]},"reference":[{"key":"9483_CR1","unstructured":"Asuncion A, Newman D (2007) \u201cUCI machine learning repository\u201d,"},{"key":"9483_CR2","doi-asserted-by":"publisher","unstructured":"Breiman L (1996) \u201cBagging predictors\u201d Machine learning, vol.\u00a024, no. 2, pp.\u00a0123\u2013140, https:\/\/doi.org\/10.1007\/BF00058655","DOI":"10.1007\/BF00058655"},{"issue":"2","key":"9483_CR3","doi-asserted-by":"publisher","first-page":"193","DOI":"10.3233\/FI-1993-182-408","volume":"18","author":"G Busse","year":"1993","unstructured":"Busse G, Jerzy W (1993) Selected algorithms of machine learning from examples. Fundamenta Informaticae 18(2):193\u2013207","journal-title":"Fundamenta Informaticae"},{"issue":"4","key":"9483_CR4","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/S0020-7373(87)80003-2","volume":"27","author":"J Cendrowska","year":"1987","unstructured":"Cendrowska J (1987) Prism: an algorithm for inducing modular rules. Int J Man Mach Stud 27(4):349\u2013370. https:\/\/doi.org\/10.1016\/S0020-7373(87)80003-2","journal-title":"Int J Man Mach Stud"},{"key":"9483_CR5","doi-asserted-by":"publisher","unstructured":"Chen T, Guestrin C (2016) \u201cXgboost: A scalable tree boosting system\u201d, Proceedings of the 22nd acm sigkdd international conference on knowledge discovery and data mining, pp.\u00a0785\u2013794, https:\/\/doi.org\/10.1145\/2939672.2939785","DOI":"10.1145\/2939672.2939785"},{"issue":"2","key":"9483_CR6","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1109\/72.363487","volume":"6","author":"S Cho","year":"1995","unstructured":"Cho S, Kim JH (1995) Multiple network fusion using fuzzy logic. IEEE Trans Neural Networks 6(2):497\u2013501. https:\/\/doi.org\/10.1109\/72.363487","journal-title":"IEEE Trans Neural Networks"},{"key":"9483_CR7","doi-asserted-by":"publisher","unstructured":"Clark P, Niblett T (1989) The CN2 induction algorithm\u201d machine learning 3.4. 261\u2013283. https:\/\/doi.org\/10.1023\/A:1022641700528","DOI":"10.1023\/A:1022641700528"},{"key":"9483_CR8","doi-asserted-by":"publisher","unstructured":"Dasarathy V, Sheela B (1979) \u201cA composite classifier system design: Concepts and methodology\u201d, Proceedings of the IEEE, vol.\u00a067, no.5, pp.\u00a0708\u2013713, https:\/\/doi.org\/10.1109\/PROC.1979.11321","DOI":"10.1109\/PROC.1979.11321"},{"key":"9483_CR9","first-page":"1","volume":"7","author":"J Demsar","year":"2006","unstructured":"Demsar J (2006) Statistical comparisons of classifiers over multiple data sets. J Mach Learn Res 7:1\u201330","journal-title":"J Mach Learn Res"},{"key":"9483_CR10","doi-asserted-by":"publisher","unstructured":"Derbeko P, El-Yaniv R, Meir R (2002) \u201cVariance optimized bagging\u201d, European conference on machine learning, Springer, Berlin, Heidelberg, pp.\u00a060\u201372, https:\/\/doi.org\/10.1007\/3-540-36755-1_6","DOI":"10.1007\/3-540-36755-1_6"},{"key":"9483_CR11","doi-asserted-by":"publisher","unstructured":"Domingos P (1994) \u201cThe RISE system: Conquering without separating\u201d, In Proceedings Sixth International Conference on Tools with Artificial Intelligence, pp.\u00a0704\u2013707, https:\/\/doi.org\/10.1109\/TAI.1994.346421","DOI":"10.1109\/TAI.1994.346421"},{"key":"9483_CR12","unstructured":"Domingos P (1996a) \u201cUsing partitioning to speed up specific-to-general rule induction\u201d, In Proceedings of the AAAI-96 Workshop on Integrating Multiple Learned Models, pp.\u00a029\u201334,"},{"key":"9483_CR13","doi-asserted-by":"publisher","unstructured":"Domingos P (1996b) \u201cUnifying instance-based and rule-based induction\u201d, Machine Learning 24.2, pp.\u00a0141\u2013168, https:\/\/doi.org\/10.1007\/BF00058656","DOI":"10.1007\/BF00058656"},{"key":"9483_CR14","doi-asserted-by":"crossref","unstructured":"Dong X, Yu Z, Cao W, Shi Y, Ma Q (2020) \u201cA survey on ensemble learning\u201d, Frontiers of Computer Science, Springer, 14(2), pp.241\u2013258,","DOI":"10.1007\/s11704-019-8208-z"},{"key":"9483_CR15","unstructured":"Freund Y, Schapire RE (1996) Experiments with a new boosting algorithm\u201d, icml. 96:148\u2013156"},{"key":"9483_CR16","first-page":"933","volume":"4","author":"Y Freund","year":"2003","unstructured":"Freund Y, Iyer R, Schapire R, Singer Y (2003) An efficient boosting algorithm for combining preferences. J Mach Learn Res 4:933\u2013969","journal-title":"J Mach Learn Res"},{"key":"9483_CR17","doi-asserted-by":"publisher","unstructured":"Hansen KL, Salamon P (1990) \u201cNeural network ensembles\u201d, IEEE transactions on pattern analysis and machine intelligence, vol.\u00a012, no. 10, pp.\u00a0993\u20131001, https:\/\/doi.org\/10.1109\/34.58871","DOI":"10.1109\/34.58871"},{"key":"9483_CR18","doi-asserted-by":"crossref","unstructured":"Kuncheva L (2014) Combining pattern classifiers: methods and algorithms. John Wiley & Sons","DOI":"10.1002\/9781118914564"},{"key":"9483_CR19","unstructured":"McCarthy J (1959) \u201cDiscussion of oliver selfridge,\u201cPandemonium: A paradigm for learning\u201d, Symposium on the mechanization of thought processes. HM Stationery Office: London,"},{"key":"9483_CR20","doi-asserted-by":"publisher","unstructured":"Michie D (1986) \u201cTechnology Lecture: The superarticulacy phenomenon in the context of software manufacture\u201d, Proceedings of the Royal Society of London, A Mathematical and Physical Sciences, vol.\u00a0405, no. 1829, pp.\u00a0185\u2013212, https:\/\/doi.org\/10.1098\/rspa.1986.0049","DOI":"10.1098\/rspa.1986.0049"},{"issue":"4","key":"9483_CR21","first-page":"293","volume":"1","author":"A Mohammad","year":"2014","unstructured":"Mohammad A, Rezaeenour J, Hadavandi E (2014) Effective intrusion detection with a neural network ensemble using fuzzy clustering and stacking combination method. J Comput Secur 1(4):293\u2013305","journal-title":"J Comput Secur"},{"key":"9483_CR22","doi-asserted-by":"publisher","unstructured":"Pina A, Zaverucha G (2004) \u201cSUNRISE: Improving the Performance of the RISE Algorithm\u201d, Knowledge Discovery in Databases: PKDD 2004, pp.\u00a0518\u2013520, https:\/\/doi.org\/10.1007\/978-3-540-30116-5_52","DOI":"10.1007\/978-3-540-30116-5_52"},{"key":"9483_CR23","doi-asserted-by":"crossref","unstructured":"Pohlert T (2014) \u201cThe pairwise multiple comparison of mean ranks package (PMCMR)\u201d, R package, pp.2004\u20132006,","DOI":"10.32614\/CRAN.package.PMCMR"},{"key":"9483_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-1-4419-9326-7_1","volume-title":"\u201cEnsemble learning\u201d, Ensemble machine learning","author":"R Polikar","year":"2012","unstructured":"Polikar R (2012) \u201cEnsemble learning\u201d, Ensemble machine learning. Springer, Boston, MA, pp 1\u201334. https:\/\/doi.org\/10.1007\/978-1-4419-9326-7_1"},{"key":"9483_CR25","doi-asserted-by":"publisher","unstructured":"Quinlan JR (1993) \u201cC4.5: programs for machine learning\u201d, Morgan kaufmann, vol.\u00a01, https:\/\/doi.org\/10.1007\/BF00993309","DOI":"10.1007\/BF00993309"},{"key":"9483_CR26","unstructured":"Quinlan R (2004) \u201cData mining tools see5 and c5.0\u201d,RuleQuest Research,"},{"key":"9483_CR27","unstructured":"Quinlan JR (2014) C4. 5: programs for machine learning. Elsevier"},{"issue":"8","key":"9483_CR28","doi-asserted-by":"publisher","first-page":"983","DOI":"10.1109\/TMI.2004.830803","volume":"23","author":"T Rohlfing","year":"2004","unstructured":"Rohlfing T, Russakoff DB, Maurer CR (2004) Performance-based classifier combination in atlas-based image segmentation using expectation-maximization parameter estimation. IEEE Trans Med Imaging 23(8):983\u2013994. https:\/\/doi.org\/10.1109\/TMI.2004.830803","journal-title":"IEEE Trans Med Imaging"},{"key":"9483_CR29","doi-asserted-by":"publisher","unstructured":"Ruggieri S (2002) \u201cEfficient c4.5 [classification algorithm]\u201d, IEEE transactions on knowledge and data engineering, vol.\u00a014, no. 2, pp.\u00a0438\u2013444, https:\/\/doi.org\/10.1109\/69.991727","DOI":"10.1109\/69.991727"},{"key":"9483_CR30","doi-asserted-by":"crossref","unstructured":"Ruta D, Gabrys B (2005) Classifier selection for majority voting\u201d. 6:63\u201381 Information fusion 1","DOI":"10.1016\/j.inffus.2004.04.008"},{"key":"9483_CR31","doi-asserted-by":"publisher","first-page":"57","DOI":"10.35940\/ijitee.B1039.1292S19","volume":"9","author":"S Sikder","year":"2019","unstructured":"Sikder S, Metya SK, Goswami RS (2019a) Exception included, ordered rule induction from the Set of Exemplars (ExIORISE). Int J Innovative Technol Exploring Eng (IJITEE) 9:57\u201362. https:\/\/doi.org\/10.35940\/ijitee.B1039.1292S19","journal-title":"Int J Innovative Technol Exploring Eng (IJITEE)"},{"key":"9483_CR32","doi-asserted-by":"publisher","unstructured":"Sikder S, Metya SK, Goswami R (2019b) \u201cException-Tolerant Decision Tree\/Rule Based Classifiers\u201d, Ing\u00e9nierie des Syst\u00e8mes d Inf, vol.\u00a024, no. 5, pp.\u00a0553\u2013558, https:\/\/doi.org\/10.18280\/isi.240514","DOI":"10.18280\/isi.240514"},{"key":"9483_CR33","doi-asserted-by":"publisher","unstructured":"Wen Y, Dustin T, Jimmy B (2020) \u201cBatchensemble: an alternative approach to efficient ensemble and lifelong learning\u201d, Eighth International Conference on Learning Representations, https:\/\/doi.org\/10.48550\/arXiv.2002.06715","DOI":"10.48550\/arXiv.2002.06715"},{"key":"9483_CR34","doi-asserted-by":"crossref","unstructured":"Wu Y, Liu L, Xie Z, Chow KH, Wei W (2021) \u201cBoosting ensemble accuracy by revisiting ensemble diversity metrics\u201d, In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition,","DOI":"10.1109\/CVPR46437.2021.01620"},{"key":"9483_CR35","doi-asserted-by":"publisher","unstructured":"Zheng Z, Balaji P, Zheng H (2004) \u201cA DEA approach for model combination\u201d, Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, pp.\u00a0755\u2013760, https:\/\/doi.org\/10.1145\/1014052.1014152","DOI":"10.1145\/1014052.1014152"},{"issue":"1","key":"9483_CR36","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1080\/00220973.1993.9943832","volume":"62","author":"DW Zimmerman","year":"1993","unstructured":"Zimmerman DW, Zumbo BD (1993) Relative power of the wilcoxon test,the Friedman test, and repeated-measures ANOVA on ranks. J Experimental Educ 62(1):75\u201386. https:\/\/doi.org\/10.1080\/00220973.1993.9943832","journal-title":"J Experimental Educ"}],"container-title":["Evolving Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12530-022-09483-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12530-022-09483-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12530-022-09483-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,12]],"date-time":"2024-10-12T11:30:43Z","timestamp":1728732643000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12530-022-09483-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,18]]},"references-count":36,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["9483"],"URL":"https:\/\/doi.org\/10.1007\/s12530-022-09483-9","relation":{},"ISSN":["1868-6478","1868-6486"],"issn-type":[{"value":"1868-6478","type":"print"},{"value":"1868-6486","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,18]]},"assertion":[{"value":"5 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 January 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}