{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T01:49:38Z","timestamp":1770342578827,"version":"3.49.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/icacci.2015.7275751","type":"proceedings-article","created":{"date-parts":[[2015,9,28]],"date-time":"2015-09-28T21:27:30Z","timestamp":1443475650000},"page":"1065-1070","source":"Crossref","is-referenced-by-count":8,"title":["Classification and clustering for neuroinformatics: Assessing the efficacy on reverse-mapped NeuroNLP data using standard ML techniques"],"prefix":"10.1109","author":[{"given":"Nidheesh","family":"Melethadathil","sequence":"first","affiliation":[]},{"given":"Priya","family":"Chellaiah","sequence":"additional","affiliation":[]},{"given":"Bipin","family":"Nair","sequence":"additional","affiliation":[]},{"given":"Shyam","family":"Diwakar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1963192.1963249"},{"key":"ref11","first-page":"154","article-title":"A Comparative Study of clustering algorithms Using weka tools","volume":"1","author":"chaudhari","year":"2012"},{"key":"ref12","first-page":"1925","article-title":"WEKA Approach for Comparative Study of Classification Algorithm","volume":"2","author":"sharma","year":"2013"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"ref14","article-title":"Modest AdaBoost-teaching AdaBoost to generalize better","author":"vezhnevets","year":"0","journal-title":"Graphicon 2005"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.90"},{"key":"ref16","first-page":"1","article-title":"Naive Bayes classifiers Generative classifiers","author":"murphy","year":"2006"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-005-0466-3"},{"key":"ref18","article-title":"Majority vote classifiers: theory and applications","author":"james","year":"1998"},{"key":"ref19","first-page":"44","article-title":"Stacking classifiers for anti-spam filtering of e-mail","author":"sakkis","year":"2001"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(01)00173-8"},{"key":"ref4","first-page":"163","article-title":"Stream Data Mining and Comparative Study of Classification Algorithms","volume":"3","author":"shukla","year":"2013"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2004.1329931"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2004.03.017"},{"key":"ref6","article-title":"Comparative study of classification algorithms","volume":"5","author":"aher","year":"2012"},{"key":"ref5","first-page":"1964","article-title":"A Comparative Study of Performances of Various Classification Algorithms for Predicting Salary Classes of Employees","volume":"5","author":"chakraborti","year":"2014"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03095-1_11"},{"key":"ref7","first-page":"51","article-title":"A comparative study on feature selection and classification methods using gene expression profiles and proteomicpatterns","volume":"13","author":"liu","year":"2002","journal-title":"Genome Inform"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1136\/jamia.2009.002733"},{"key":"ref9","article-title":"A Comparative study of Clustering algorithms on Narrow-Domain abstracts","author":"pinto","year":"2006","journal-title":"Proces del Leng"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/380995.381030"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2517-6161.1977.tb01600.x","article-title":"Maximum likelihood from incomplete data via the EM algorithm","volume":"39","author":"dempster","year":"1977","journal-title":"J R Stat Soc"},{"key":"ref21","article-title":"Evaluating hoeffding tree algorithm in real-time web applications environment","author":"yang","year":"0","journal-title":"IMT CASE Journal"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/NUiCONE.2013.6780187"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1017616"},{"key":"ref26","first-page":"1425","article-title":"Characterization, Stability and Convergence of Hierarchical Clustering Methods","volume":"11","author":"carlsson","year":"2010","journal-title":"J Mach Learn Res"},{"key":"ref25","first-page":"67","article-title":"Performance comparison of various clustering algorithm","volume":"3","author":"revathi","year":"2013","journal-title":"International Journal of Advanced Research"}],"event":{"name":"2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","location":"Kochi, India","start":{"date-parts":[[2015,8,10]]},"end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7259950\/7275573\/07275751.pdf?arnumber=7275751","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T21:01:50Z","timestamp":1748638910000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7275751\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icacci.2015.7275751","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}