{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T19:58:37Z","timestamp":1760385517370,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T00:00:00Z","timestamp":1477353600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Basic Research Project of Knowledge Innovation Program in Shenzhen","award":["JCYJ20150324140036825"],"award-info":[{"award-number":["JCYJ20150324140036825"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundations of China","doi-asserted-by":"crossref","award":["71371063"],"award-info":[{"award-number":["71371063"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672358"],"award-info":[{"award-number":["61672358"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1007\/s13042-016-0615-y","type":"journal-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T07:50:25Z","timestamp":1477381825000},"page":"867-879","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["An initial study on the rank of input matrix for extreme learning machine"],"prefix":"10.1007","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0027-2378","authenticated-orcid":false,"given":"Xingmin","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Weipeng","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Hongyu","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Zhong","family":"Ming","sequence":"additional","affiliation":[]},{"given":"Rana Aamir Raza","family":"Ashfaq","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,25]]},"reference":[{"key":"615_CR1","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.neunet.2014.10.001","volume":"61","author":"G Huang","year":"2015","unstructured":"Huang G, Huang GB, Song S (2015) Trends in extreme learning machines: a review. Neural Netw Off J Int Neural Netw Soc 61:32\u201348","journal-title":"Neural Netw Off J Int Neural Netw Soc"},{"issue":"1\u20133","key":"615_CR2","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1016\/j.neucom.2005.12.126","volume":"70","author":"GB Huang","year":"2006","unstructured":"Huang GB, Zhu QY, Siew CK (2006) Extreme learning machine: theory and applications. Neurocomputing 70(1\u20133):489\u2013501","journal-title":"Neurocomputing"},{"issue":"16\u201318","key":"615_CR3","first-page":"3460","volume":"71","author":"GB Huang","year":"2008","unstructured":"Huang GB, Chen L (2008) Enhanced random search based incremental extreme learning machine. Neuro-computing 71(16\u201318):3460\u20133468","journal-title":"Neuro-computing"},{"issue":"4","key":"615_CR4","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1109\/TNN.2006.875977","volume":"17","author":"GB Huang","year":"2006","unstructured":"Huang GB, Chen L, Siew CK (2006) Universal approximation using incremental constructive feedforward networks with random hidden nodes. IEEE Trans Neural Netw 17(4):879\u2013892","journal-title":"IEEE Trans Neural Netw"},{"issue":"3","key":"615_CR5","doi-asserted-by":"crossref","first-page":"799","DOI":"10.1109\/72.846750","volume":"11","author":"GB Huang","year":"2000","unstructured":"Huang GB, Chen YQ, Babri HA (2000) Classification ability of single hidden layer feedforward neural networks.[J]. IEEE Trans Neural Netw 11(3):799\u2013801","journal-title":"IEEE Trans Neural Netw"},{"issue":"1","key":"615_CR6","first-page":"306","volume":"68","author":"MB Li","year":"2005","unstructured":"Li MB, Huang GB, Saratchandran P (2005) Fully complex extreme learning machine. Neurocomputing 68(1):306\u2013314","journal-title":"Neurocomputing"},{"issue":"6","key":"615_CR7","doi-asserted-by":"crossref","first-page":"1411","DOI":"10.1109\/TNN.2006.880583","volume":"17","author":"NY Liang","year":"2006","unstructured":"Liang NY, Huang GB, Saratchandran P (2006) A fast and accurate online sequential learning algorithm for feedforward networks. IEEE Trans Neural Netw 17(6):1411\u20131423","journal-title":"IEEE Trans Neural Netw"},{"key":"615_CR8","first-page":"305","volume-title":"Adaptive Ensemble models of extreme learning machines for time series prediction, artificial neural networks\u2014ICANN","author":"MV Heeswijk","year":"2009","unstructured":"Heeswijk MV, Miche Y, Lindh-Knuutila T (2009) Adaptive Ensemble models of extreme learning machines for time series prediction, artificial neural networks\u2014ICANN. Springer, Berlin, pp 305\u2013314"},{"issue":"1\u20133","key":"615_CR9","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1016\/j.neucom.2008.01.005","volume":"72","author":"HJ Rong","year":"2008","unstructured":"Rong HJ, Ong YS, Tan AH (2008) A fast pruned-extreme learning machine for classification problem. Neurocomputing 72(1\u20133):359\u2013366","journal-title":"Neurocomputing"},{"key":"615_CR10","unstructured":"Deng W, Zheng Q, Chen L (2009) Regularized extreme learning machine \/\/computational intelligence and data mining. CIDM \u201809. IEEE Symposium on. IEEE, pp 389\u2013395"},{"issue":"3","key":"615_CR11","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1109\/TNN.2010.2103956","volume":"22","author":"E Soria-Olivas","year":"2011","unstructured":"Soria-Olivas E, G\u00f3mez-Sanchis J, Mart\u00edn JD (2011) BELM: Bayesian extreme learning machine. IEEE Trans Neural Netw 22(3):505\u2013509","journal-title":"IEEE Trans Neural Netw"},{"issue":"16","key":"615_CR12","doi-asserted-by":"crossref","first-page":"3028","DOI":"10.1016\/j.neucom.2010.07.012","volume":"73","author":"Y Lan","year":"2010","unstructured":"Lan Y, Soh YC, Huang GB (2010) Two-stage extreme learning machine for regression. Neurocomputing 73(16):3028\u20133038","journal-title":"Neurocomputing"},{"key":"615_CR13","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.neunet.2015.09.003","volume":"77","author":"WY Deng","year":"2016","unstructured":"Deng WY, Bai Z, Huang GB (2016) A fast SVD-hidden-nodes based extreme learning machine for large-scale data analytics. Neural Netw Off J Int Neural Netw Soc 77:14\u201328","journal-title":"Neural Netw Off J Int Neural Netw Soc"},{"issue":"9","key":"615_CR14","first-page":"1","volume":"45","author":"H Zhou","year":"2014","unstructured":"Zhou H, Huang GB, Lin Z (2014) Stacked extreme learning machines. IEEE Trans Cybern 45(9):1","journal-title":"IEEE Trans Cybern"},{"issue":"PA","key":"615_CR15","first-page":"253","volume":"149","author":"X Liu","year":"2013","unstructured":"Liu X, Wang L, Huang GB (2013) Multiple kernel extreme learning machine. Neurocomputing 149(PA):253\u2013264","journal-title":"Neurocomputing"},{"issue":"C","key":"615_CR16","first-page":"75","volume":"146","author":"AM Fu","year":"2014","unstructured":"Fu AM, Wang XZ, He YL (2014) A study on residence error of training an extreme learning machine and its application to evolutionary algorithms. Neurocomputing 146(C):75\u201382","journal-title":"Neurocomputing"},{"issue":"2","key":"615_CR17","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1109\/TSMCB.2011.2168604","volume":"42","author":"GB Huang","year":"2012","unstructured":"Huang GB, Zhou H, Ding X (2012) Extreme learning machine for regression and multiclass classification. IEEE Trans Syst Man Cybern Part B Cybern Publ IEEE Syst Man Cybern Soc 42(2):513\u2013529","journal-title":"IEEE Trans Syst Man Cybern Part B Cybern Publ IEEE Syst Man Cybern Soc"},{"issue":"4","key":"615_CR18","doi-asserted-by":"crossref","first-page":"743","DOI":"10.3233\/IDA-150743","volume":"19","author":"SX Lu","year":"2015","unstructured":"Lu SX, Wang XZ, Zhang GQ, Zhou X (2015) Effective algorithms of the Moore-Penrose inverse matrices for extreme learning machine. Intell Data Anal 19(4):743\u2013760","journal-title":"Intell Data Anal"},{"issue":"16","key":"615_CR19","doi-asserted-by":"crossref","first-page":"2475","DOI":"10.1016\/j.neucom.2010.12.037","volume":"74","author":"Y Yuan","year":"2011","unstructured":"Yuan Y, Wang Y, Cao F (2011) Optimization approximation solution for regression problem based on extreme learning machine. Neurocomputing 74(16):2475\u20132482","journal-title":"Neurocomputing"},{"key":"615_CR20","unstructured":"Michie D, Spiegelhalter D, Taylor C (1994) Machine learning, neural and statistical classification. Prentice Hall, Englewood Cliffs"},{"issue":"11","key":"615_CR21","doi-asserted-by":"crossref","first-page":"1137","DOI":"10.1109\/34.809107","volume":"21","author":"SY Sohn","year":"1999","unstructured":"Sohn SY (1999) Meta analysis of classification algorithms for pattern recognition. IEEE Trans Pattern Anal Mach Intell 21(11):1137\u20131144","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"3","key":"615_CR22","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1109\/34.990132","volume":"24","author":"TK Ho","year":"2002","unstructured":"Ho TK, Basu M (2002) Complexity measures of supervised classification problems. Pattern Anal Mach Intell IEEE Trans 24(3):289\u2013300","journal-title":"Pattern Anal Mach Intell IEEE Trans"},{"key":"615_CR23","unstructured":"Hoekstra A, Duin RPW (1996) On the nonlinearity of pattern classifiers\/\/International Conference on Pattern Recognition IV. IEEE Computer Society p 271"},{"issue":"3","key":"615_CR24","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1007\/s12559-014-9255-2","volume":"6","author":"GB Huang","year":"2014","unstructured":"Huang GB (2014) An insight into extreme learning machines: random neurons, random features and kernels. Cogn Comput 6(3):376\u2013390","journal-title":"Cogn Comput"},{"key":"615_CR25","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.asoc.2016.03.019","volume":"44","author":"ASC Alencar","year":"2016","unstructured":"Alencar ASC, Neto ARR, Gomes JPP (2016) A new pruning method for extreme learning machines via genetic algorithms. Appl Soft Comput 44:101\u2013107","journal-title":"Appl Soft Comput"},{"key":"615_CR26","unstructured":"Zhai JH, Shao QY, Wang XZ (2015) Architecture selection of ELM networks based on sensitivity of hidden nodes. Neural Process Lett 1\u201319"},{"issue":"9","key":"615_CR27","doi-asserted-by":"crossref","first-page":"1493","DOI":"10.1007\/s00500-012-0824-6","volume":"16","author":"JH Zhai","year":"2012","unstructured":"Zhai JH, Xu HY, Wang XZ (2012) Dynamic ensemble extreme learning machine based on sample entropy. Soft Comput 16(9):1493\u20131502","journal-title":"Soft Comput"},{"issue":"5","key":"615_CR28","first-page":"285","volume":"128","author":"HM Zhong","year":"2013","unstructured":"Zhong HM, Miao CY, Shen ZQ, Feng YH (2013) Comparing the learning effectiveness of BP, ELM, I-ELM, and SVM for corparate credit ratings. Neurocomputing 128(5):285\u2013295","journal-title":"Neurocomputing"},{"issue":"8","key":"615_CR29","first-page":"1","volume":"14","author":"ZH You","year":"2013","unstructured":"You ZH, Lei YK, Zhu L, Xia JF, Wang B (2013) Prediction of protein-protein interactions from amino acid sequences with ensemble extreme learning machines and principal component analysis. BMC Bioinformatics 14(8):1\u201311","journal-title":"BMC Bioinformatics"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13042-016-0615-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-016-0615-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-016-0615-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,20]],"date-time":"2018-04-20T02:00:34Z","timestamp":1524189634000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13042-016-0615-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,25]]},"references-count":29,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,5]]}},"alternative-id":["615"],"URL":"https:\/\/doi.org\/10.1007\/s13042-016-0615-y","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"type":"print","value":"1868-8071"},{"type":"electronic","value":"1868-808X"}],"subject":[],"published":{"date-parts":[[2016,10,25]]}}}