{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:13:36Z","timestamp":1757312016020},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,3,20]],"date-time":"2014-03-20T00:00:00Z","timestamp":1395273600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Netw Model Anal Health Inform Bioinforma"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1007\/s13721-014-0055-0","type":"journal-article","created":{"date-parts":[[2014,3,19]],"date-time":"2014-03-19T02:58:53Z","timestamp":1395197933000},"source":"Crossref","is-referenced-by-count":11,"title":["A statistical feature selection technique"],"prefix":"10.1007","volume":"3","author":[{"given":"Pallabi","family":"Borah","sequence":"first","affiliation":[]},{"given":"Hasin A.","family":"Ahmed","sequence":"additional","affiliation":[]},{"given":"Dhruba K.","family":"Bhattacharyya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,20]]},"reference":[{"key":"55_CR9","doi-asserted-by":"crossref","unstructured":"Ahmed H, Mahanta P, Bhattacharyya D, Kalita JK (2011) Gerc: tree based clustering for gene expression data. In: 2011 IEEE 11th International conference on bioinformatics and bioengineering (BIBE). IEEE, pp 299\u2013302","DOI":"10.1109\/BIBE.2011.54"},{"issue":"4","key":"55_CR14","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/s13721-012-0018-2","volume":"1","author":"HA Ahmed","year":"2012","unstructured":"Ahmed HA, Mahanta P, Bhattacharyya DK, Kalita JK (2012) Module extraction from subspace co-expression networks. Netw Model Anal Health Inform Bioinform 1(4):183\u2013195","journal-title":"Netw Model Anal Health Inform Bioinform"},{"key":"55_CR4","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1002\/(SICI)1096-9136(199807)15:7<539::AID-DIA668>3.0.CO;2-S","volume":"15","author":"KGMM Alberti","year":"1998","unstructured":"Alberti KGMM, Zimmet P (1998) Definition, diagnosis and classification of diabetes mellitus and its complications. Diabetic Med 15:539\u2013553","journal-title":"Diabetic Med"},{"key":"55_CR40","unstructured":"Bache K, Lichman M (2013) UCI machine learning repository. Available http:\/\/archive.ics.uci.edu\/ml"},{"key":"55_CR21","unstructured":"Bradski GR (1998) Computer vision face tracking for use in a perceptual user interface"},{"key":"55_CR18","unstructured":"Cannady J (1998) Artificial neural networks for misuse detection. In: National information systems security conference, pp 368\u201381"},{"issue":"1","key":"55_CR16","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MIC.2006.5","volume":"10","author":"G Carl","year":"2006","unstructured":"Carl G, Kesidis G, Brooks RR, Rai S (2006) Denial-of-service attack-detection techniques. Internet Comput IEEE 10(1):82\u201389","journal-title":"Internet Comput IEEE"},{"key":"55_CR8","unstructured":"Cheng Y, Church GM (2000) Biclustering of expression data. In: Proceedings of the eighth international conference on intelligent systems for molecular biology, vol. 8, pp 93\u2013103"},{"issue":"1","key":"55_CR38","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/S1097-2765(00)80114-8","volume":"2","author":"R Cho","year":"1998","unstructured":"Cho R, Campbell M, Winzeler E, Steinmetz L, Conway A, Wodicka L, Wolfsberg T, Gabrielian A, Landsman D, Lockhart D et al (1998) A genome-wide transcriptional analysis of the mitotic cell cycle. Mol Cell 2(1):65\u201373","journal-title":"Mol Cell"},{"key":"55_CR28","unstructured":"Cover TM, Thomas JA (2012) Elements of information theory. John Wiley & Sons"},{"key":"55_CR29","unstructured":"Das S (2001) Filters, wrappers and a boosting-based hybrid for feature selection. In: Machine Learning-International Workshop Then Conference. Citeseer, pp 74\u201381"},{"issue":"1","key":"55_CR27","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/S0004-3702(03)00079-1","volume":"151","author":"M Dash","year":"2003","unstructured":"Dash M, Liu H (2003) Consistency-based search in feature selection. Artif Intell 151(1):155\u2013176","journal-title":"Artif Intell"},{"key":"55_CR30","first-page":"1531","volume":"5","author":"F Fleuret","year":"2004","unstructured":"Fleuret F (2004) Fast binary feature selection with conditional mutual information. J Mach Learn Res 5:1531\u20131555","journal-title":"J Mach Learn Res"},{"key":"55_CR39","unstructured":"Forina M, Leardi R, Armanino C, Lanteri S (1991) Parvus\u2014an extendible package for data exploration, classification and correlation"},{"key":"55_CR17","doi-asserted-by":"crossref","unstructured":"Gadge J, Patil AA (2008) Port scan detection. In: 16th IEEE International Conference on Networks, 2008. ICON 2008. IEEE, pp. 1\u20136","DOI":"10.1109\/ICON.2008.4772622"},{"key":"55_CR22","unstructured":"Hall MA (1999) Correlation-based feature selection for machine learning. Ph.D. dissertation, The University of Waikato"},{"key":"55_CR6","unstructured":"Hartigan JA (1975) Clustering algorithms. John Wiley & Sons Inc"},{"issue":"2","key":"55_CR41","first-page":"83","volume":"27","author":"T Hastie","year":"2005","unstructured":"Hastie T, Tibshirani R, Friedman J, Franklin J (2005) The elements of statistical learning: data mining, inference and prediction. Math Intell 27(2):83\u201385","journal-title":"Math Intell"},{"key":"55_CR43","doi-asserted-by":"crossref","unstructured":"Holmes G, Donkin A, Witten I (1994) Weka: a machine learning workbench. In: Proceedings of the 1994 Second Australian and New Zealand Conference on intelligent information systems, 1994. IEEE, pp 357\u2013361","DOI":"10.1109\/ANZIIS.1994.396988"},{"issue":"3","key":"55_CR7","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1145\/331499.331504","volume":"31","author":"AK Jain","year":"1999","unstructured":"Jain AK, Murty MN, Flynn PJ (1999) Data clustering: a review. ACM Comput Surv (CSUR) 31(3):264\u2013323","journal-title":"ACM Comput Surv (CSUR)"},{"key":"55_CR25","unstructured":"Kira K, Rendell LA (1992) The feature selection problem: Traditional methods and a new algorithm. In: Proceedings of the National Conference on Artificial Intelligence. John Wiley & Sons Ltd, pp 129\u2013129"},{"issue":"1","key":"55_CR12","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/S0004-3702(97)00043-X","volume":"97","author":"R Kohavi","year":"1997","unstructured":"Kohavi R, John GH (1997) Wrappers for feature subset selection. Artif intell 97(1):273\u2013324","journal-title":"Artif intell"},{"issue":"1","key":"55_CR26","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1023\/A:1008280620621","volume":"7","author":"I Kononenko","year":"1997","unstructured":"Kononenko I, \u0160imec E, Robnik-\u0160ikonja M (1997) Overcoming the myopia of inductive learning algorithms with RELIEFF. Appl Intell 7(1):39\u201355","journal-title":"Appl Intell"},{"issue":"1","key":"55_CR35","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1007\/s10489-011-0315-y","volume":"37","author":"S Lee","year":"2012","unstructured":"Lee S, Park Y-T, dAuriol BJ (2012) A novel feature selection method based on normalized mutual information. Appl Intell 37(1):100\u2013120","journal-title":"Appl Intell"},{"key":"55_CR20","doi-asserted-by":"crossref","unstructured":"Lienhart R, Maydt J (2002) An extended set of haar-like features for rapid object detection. In: International Conference on image processing. 2002. Proceedings. 2002 , vol. 1. IEEE, pp I\u2013900","DOI":"10.1109\/ICIP.2002.1038171"},{"issue":"2","key":"55_CR34","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1166\/jctn.2014.3374","volume":"11","author":"X Lu","year":"2014","unstructured":"Lu X, Peng X, Deng Y, Feng B, Liu P, Liao B (2014) A novel feature selection method based on correlation-based feature selection in cancer recognition. J Comput Theor Nanosci 11(2):427\u2013433","journal-title":"J Comput Theor Nanosci"},{"key":"55_CR2","unstructured":"Ma BLWHY (1998) Integrating classification and association rule mining. Proceedings of the 4th, 1998"},{"key":"55_CR10","doi-asserted-by":"crossref","unstructured":"Mahanta P, Ahmed H, Bhattacharyya D, Kalita JK (2011) Triclustering in gene expression data analysis: A selected survey. In: 2nd National Conference on emerging trends and applications in computer science (NCETACS), 2011, IEEE, pp 1\u20136","DOI":"10.1109\/NCETACS.2011.5751409"},{"issue":"Suppl 13","key":"55_CR24","doi-asserted-by":"crossref","first-page":"S4","DOI":"10.1186\/1471-2105-13-S13-S4","volume":"13","author":"P Mahanta","year":"2012","unstructured":"Mahanta P, Ahmed HA, Bhattacharyya DK, Kalita JK (2012) An effective method for network module extraction from microarray data. BMC Bioinform 13(Suppl 13):S4","journal-title":"BMC Bioinform"},{"issue":"3","key":"55_CR32","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1109\/34.990133","volume":"24","author":"P Mitra","year":"2002","unstructured":"Mitra P, Murthy C, Pal S (2002) Unsupervised feature selection using feature similarity. IEEE Trans Pattern Anal Mach Intell 24(3):301\u2013312","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"55_CR13","doi-asserted-by":"crossref","unstructured":"Nagi S, Bhattacharyya DK (2013) Classification of microarray cancer data using ensemble approach. Netw Model Anal Health Inform Bioinform, pp 1\u201315","DOI":"10.1007\/s13721-013-0034-x"},{"issue":"3","key":"55_CR36","first-page":"290","volume":"20","author":"B Niu","year":"2013","unstructured":"Niu B, Yuan X-C, Roeper P, Su Q, Peng C-R, Yin J-Y, Ding J, Li H, Lu W-C (2013) Hiv-1 protease cleavage site prediction based on two-stage feature selection method. Protein Peptide Lett 20(3):290\u2013298","journal-title":"Protein Peptide Lett"},{"issue":"8","key":"55_CR23","doi-asserted-by":"crossref","first-page":"1226","DOI":"10.1109\/TPAMI.2005.159","volume":"27","author":"H Peng","year":"2005","unstructured":"Peng H, Long F, Ding C (2005) Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy. IEEE Trans Pattern Anal Mach Intell 27(8):1226\u20131238","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"55_CR42","unstructured":"Quinlan JR, Compton P, Horn K, Lazarus L (1987) Inductive knowledge acquisition: a case study. In: Proceedings of the Second Australian Conference on applications of expert systems. Addison-Wesley Longman Publishing Co., Inc, pp 137\u2013156"},{"key":"55_CR11","doi-asserted-by":"crossref","unstructured":"Saeys Y, Inza I, Larra\u00f1aga P (2007) A review of feature selection techniques in bioinformatics. Bioinformatics, vol. 23, no. 19","DOI":"10.1093\/bioinformatics\/btm344"},{"key":"55_CR5","unstructured":"Sneath PH, Sokal RR, et al (1973) Numerical taxonomy. The principles and practice of numerical classification"},{"key":"55_CR33","doi-asserted-by":"crossref","unstructured":"Soliman OS, Rassem A (2012) Correlation based feature selection using quantum bio inspired estimation of distribution algorithm. In: Multi-disciplinary Trends in Artificial Intelligence. Springer, Berlin, pp 318\u2013329","DOI":"10.1007\/978-3-642-35455-7_29"},{"key":"55_CR3","doi-asserted-by":"crossref","unstructured":"Vaidya J, Clifton C (2002) Privacy preserving association rule mining in vertically partitioned data. In: Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining.ACM, pp 639\u2013644","DOI":"10.1145\/775047.775142"},{"issue":"1\u20132","key":"55_CR37","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/s13721-012-0006-6","volume":"1","author":"J Hulse Van","year":"2012","unstructured":"Van Hulse J, Khoshgoftaar TM, Napolitano A, Wald R (2012) Threshold-based feature selection techniques for high-dimensional bioinformatics data. Netw Model Anal Health Inform Bioinform 1(1\u20132):47\u201361","journal-title":"Netw Model Anal Health Inform Bioinform"},{"key":"55_CR19","doi-asserted-by":"crossref","unstructured":"Weiner P (1973) Linear pattern matching algorithms. In: IEEE Conference Record of 14th Annual Symposium on switching and automata theory, (1973) SWAT\u201908. IEEE, pp. 1\u201311","DOI":"10.1109\/SWAT.1973.13"},{"issue":"2","key":"55_CR1","first-page":"856","volume":"20","author":"L Yu","year":"2003","unstructured":"Yu L, Liu H (2003) Feature selection for high-dimensional data: a fast correlation-based filter solution. Mach Learn Int Workshop Then Conf 20(2):856","journal-title":"Mach Learn Int Workshop Then Conf"},{"issue":"3","key":"55_CR31","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1023\/A:1011219601502","volume":"16","author":"N Zhong","year":"2001","unstructured":"Zhong N, Dong J, Ohsuga S (2001) Using rough sets with heuristics for feature selection. J Intell Inf Systems 16(3):199\u2013214","journal-title":"J Intell Inf Systems"},{"issue":"1\u20132","key":"55_CR15","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s13721-012-0008-4","volume":"1","author":"Y Zhou","year":"2012","unstructured":"Zhou Y, Qureshi R, Sacan A (2012) Data simulation and regulatory network reconstruction from time-series microarray data using stepwise multiple linear regression. Netw Model Anal Health Inform Bioinform 1(1\u20132):3\u201317","journal-title":"Netw Model Anal Health Inform Bioinform"}],"container-title":["Network Modeling Analysis in Health Informatics and Bioinformatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13721-014-0055-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13721-014-0055-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13721-014-0055-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T12:52:13Z","timestamp":1565268733000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13721-014-0055-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,20]]},"references-count":43,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["55"],"URL":"https:\/\/doi.org\/10.1007\/s13721-014-0055-0","relation":{},"ISSN":["2192-6662","2192-6670"],"issn-type":[{"value":"2192-6662","type":"print"},{"value":"2192-6670","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,3,20]]},"article-number":"55"}}