{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T15:17:05Z","timestamp":1777043825262,"version":"3.51.4"},"reference-count":202,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1109\/iisa.2017.8316459","type":"proceedings-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T20:46:49Z","timestamp":1521146809000},"page":"1-8","source":"Crossref","is-referenced-by-count":194,"title":["A brief survey of machine learning methods and their sensor and IoT applications"],"prefix":"10.1109","author":[{"given":"Uday Shankar","family":"Shanthamallu","sequence":"first","affiliation":[]},{"given":"Andreas","family":"Spanias","sequence":"additional","affiliation":[]},{"given":"Cihan","family":"Tepedelenlioglu","sequence":"additional","affiliation":[]},{"given":"Mike","family":"Stanley","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","article-title":"Deep boltzmann machines","volume":"5","author":"salakhutdinov","year":"2009","journal-title":"Proc Conf AI and Statist"},{"key":"ref172","first-page":"1045","article-title":"Recurrent neural network based language model","author":"mikolov","year":"2010","journal-title":"Proc IEEE ICASSP"},{"key":"ref171","article-title":"A Deep Learning Approach To Multiple Kernel Fusion","author":"huan","year":"0","journal-title":"Proc IEEE ICASSP 2017"},{"key":"ref174","article-title":"Enterprise application development in the cloud with IBM Bluemix","author":"kris","year":"2014","journal-title":"Proc 24th Conf Comp Sc Soft Eng IBM"},{"key":"ref173","article-title":"Investigation of RNN architectures and learning methods for spoken language understanding","author":"mesnil","year":"0","journal-title":"Proc INTERSPEECH"},{"key":"ref176","first-page":"227","article-title":"Azure Machine Learning","author":"scott","year":"2017","journal-title":"IoT Solutions in Microsoft's Azure IoT Suite"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2016.2515422"},{"key":"ref178","article-title":"Python for data analysis: Data wrangling with Pandas, Numpy, and Ipython","author":"wes","year":"2012","journal-title":"O'Reilly Media Inc"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2011.37"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2016.7532682"},{"key":"ref169","article-title":"Advances in optimizing recurrent networks","author":"yoshua","year":"2013","journal-title":"Proc IEEE ICASSP-2013"},{"key":"ref39","first-page":"125","article-title":"Support vector clustering","volume":"2","author":"vladimir","year":"2001","journal-title":"Journal of Machine Learning Research"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CCDC.2016.7531963"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/WiSPNET.2016.7566393"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.4135\/9781412984805"},{"key":"ref30","article-title":"Logistic regression models","author":"hilbe","year":"2016","journal-title":"Boca Raton Chapman & Hall"},{"key":"ref37","article-title":"A Tutorial on Support Vector Machines for Pattern","volume":"2","author":"burges","year":"1998","journal-title":"Recognition Knowledge Discovery and Data Mining"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/130385.130401"},{"key":"ref35","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-77242-4","author":"steinwart","year":"2008","journal-title":"Support vector machines New York"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511801389"},{"key":"ref181","author":"fran\u00e7ois","year":"2015","journal-title":"Keras Deep learning library for theano and tensorflow"},{"key":"ref180","article-title":"Python Programming Language","volume":"41","author":"van rossum","year":"2007","journal-title":"USENIX Annual Technical Conf"},{"key":"ref185","author":"ba","year":"2016","journal-title":"Layer normalization"},{"key":"ref184","article-title":"Weight normalization: A reparameterization to accelerate training of neural networks","author":"salimans","year":"2016","journal-title":"Adva Neu Info Sys"},{"key":"ref183","article-title":"Normalization propagation: A parametric technique for removing covariate shift in deep networks","author":"arpit","year":"2016","journal-title":"ArXiv Preprint"},{"key":"ref182","author":"sergey","year":"2015","journal-title":"Batch Normalization Accelerating Deep Network Training by Reducing Internal Covariate Shift"},{"key":"ref189","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","article-title":"Internet of Things (IoT): A vision, architectural elements, and future directions","volume":"29","author":"jayavardhana","year":"2013","journal-title":"Future Generation Computer Systems"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/IISA.2017.8316460"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/IISA.2017.8316458"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/89.544528"},{"key":"ref28","first-page":"2957","volume":"270","author":"le","year":"1993","journal-title":"A new simplified acute physiology score (SAPS II) based on a European\/north American multicenter study"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1097\/00005373-198704000-00005"},{"key":"ref179","article-title":"Mastering ML with scikit-learn","author":"hackeling","year":"2014","journal-title":"Packt Publ"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/0021-9681(67)90082-3"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/9780471722199"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195171792.001.0001","author":"motulsky","year":"2004","journal-title":"Fitting models to biological data using linear and nonlinear regression A practical guide to curve fitting"},{"key":"ref21","author":"montgomery","year":"2012","journal-title":"Introduction to Linear Regression Analysis"},{"key":"ref24","first-page":"3141","author":"chandler","year":"1993","journal-title":"Constrained Linear Regression for Flight Control System Failure Identification &#x2019; ACC"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICICES.2014.7034088"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TNSRE.2016.2519350"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2015.7387563"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/GCIS.2012.19"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"11","DOI":"10.4156\/jcit.vol8.issue6.2","article-title":"The study of the application in intrusion detection based on SVM","volume":"8","author":"guangping","year":"2013","journal-title":"J Converg Info Tech"},{"key":"ref154","article-title":"Deep learning","year":"2015","journal-title":"Nature 521 7553"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2010.938364"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1037\/h0042519"},{"key":"ref155","first-page":"1090","article-title":"ImageNet classification with deep convolutional NN","volume":"25","year":"2012","journal-title":"Adv Neural Info Process Sys"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2016.7606814"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.50"},{"key":"ref151","author":"goodfellow","year":"2017","journal-title":"Deep Learning"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2585661"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPCT.2016.7530275"},{"key":"ref148","first-page":"614","article-title":"Speech recognition based on k-means clustering and NN ensembles","author":"li","year":"2011","journal-title":"7th Int Conf on Natural Comp"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/IPTA.2016.7821010"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0026666"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSE.2012.6282321"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/564376.564395"},{"key":"ref56","article-title":"D.; Tackling the poor assumptions of Naive Bayes classifiers","author":"rennie","year":"2003","journal-title":"ICML"},{"key":"ref55","article-title":"An empirical study of the naive Bayes classifier","author":"rish","year":"2001","journal-title":"Proc IJCAI Workshop Empirical Methods AI"},{"key":"ref54","author":"russell","year":"1994","journal-title":"Artificial Intelligence A Modern Approach"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2009.5335328"},{"key":"ref52","first-page":"1","article-title":"A comparative analysis of SVM and its stacking with other classification algorithms","author":"chand","year":"2016","journal-title":"ICACCA"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.4249\/scholarpedia.5187"},{"key":"ref167","article-title":"Going deeper with convolutions","author":"christian","year":"2015","journal-title":"Proceedings of the IEEE Conf on Computer Vision and Pattern Recognition"},{"key":"ref166","article-title":"Fast speaker adaptation of hybrid NN\/HMM model for speech recognition based on discriminative learning of speaker code","author":"ossama","year":"2013","journal-title":"Proc IEEE ICASSP 2013 Vancouver"},{"key":"ref165","author":"dong","year":"2014","journal-title":"Automatic Speech Recognition?A Deep Learning Approach"},{"key":"ref164","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1126\/science.1127647","article-title":"Reducing the dimensionality of data with neural networks","volume":"313","author":"hinton","year":"2006","journal-title":"Science"},{"key":"ref163","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1109\/MSP.2010.939038","article-title":"Deep learning and its applications to signal at information processing","volume":"28","author":"dong","year":"2011","journal-title":"IEEE Sig Pro Mag"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2205597"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1017\/atsip.2013.9"},{"key":"ref160","first-page":"1929","article-title":"Dropout: A simple way to prevent neural networks from overfitting","volume":"15","author":"srivastava","year":"2014","journal-title":"J Machine Learning Res"},{"key":"ref4","author":"kodratoff","year":"1993","journal-title":"Introduction to Machine Learning"},{"key":"ref3","article-title":"Machine learning: An algorithmic perspective","author":"marsland","year":"2009","journal-title":"Boca Raton Chapman & Hall"},{"key":"ref6","author":"friedman","year":"2009","journal-title":"The Elements of Statistical Learning Data Mining Inference and Prediction"},{"key":"ref5","author":"michalski","year":"1983","journal-title":"Machine Learning An Artificial Intelligence Approach"},{"key":"ref8","article-title":"Machine learning","year":"2016","journal-title":"Wikipedia Wikimedia Foundation"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20010-1"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2012.11.005"},{"key":"ref157","article-title":"Learning convolutional feature hierarchies for visual recognition","author":"koray","year":"2010","journal-title":"Adv in Neural Info Proc Syst"},{"key":"ref9","author":"lpaydin","year":"2010","journal-title":"Introduction to Machine Learning"},{"key":"ref158","article-title":"Distributed representations of words and phrases and their compositionality","author":"tomas","year":"2013","journal-title":"NIPS"},{"key":"ref46","first-page":"19","article-title":"Single class support vector machines, Unsupervised learning","author":"scholkopf","year":"1999","journal-title":"Dagstuhl Seminar Rep"},{"key":"ref45","author":"bernhard","year":"2000","journal-title":"SVM Method for Novelty detection"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-011-0625-3"},{"key":"ref47","first-page":"251","article-title":"Data description by support vectors","author":"tax","year":"1999","journal-title":"Proceedings ESANN"},{"key":"ref42","article-title":"Incremental support vector clustering with outlier detection","author":"huang","year":"2012","journal-title":"ICPR"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2013.55"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1023\/A:1018628609742","article-title":"Least squares support vector machine classifiers","volume":"9","author":"suykens","year":"1999","journal-title":"Neural Processing Letters"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/PPRS.2012.6398309"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.1992.227212"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2001.958585"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24211-8"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.5120\/21131-4058"},{"key":"ref76","doi-asserted-by":"crossref","first-page":"420","DOI":"10.21275\/v5i6.NOV164061","article-title":"Detection of brain tumor using k-means clustering","volume":"5","author":"mandwe","year":"2016","journal-title":"IJSR"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.7763\/IJCEE.2009.V1.24"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/IIAI-AAI.2016.26"},{"key":"ref75","doi-asserted-by":"crossref","first-page":"1049","DOI":"10.21275\/v5i4.NOV162776","article-title":"A survey on k-means clustering and web-text mining","volume":"5","author":"bindal","year":"2016","journal-title":"IJSR"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btp526"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.4018\/jkdb.2010040102"},{"key":"ref60","article-title":"K-nearest neighbors","year":"2016","journal-title":"S Inc"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.4249\/scholarpedia.1883"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053964"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/1862413.1862417"},{"key":"ref64","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1080\/00031305.1992.10475879","article-title":"An Introduction to Kernel and Nearest-Neighbor Nonparametric Regression","volume":"46","author":"altman","year":"1992","journal-title":"The Amer Stat"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053964"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49257-7_15"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICISA.2014.6847340"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2481559"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ICBME.2015.7404123"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2272099"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"},{"key":"ref199","author":"miller","year":"2015","journal-title":"Multipath Effects in GPS Receivers Synthesis Lectures on Communications"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1177\/0583102406061499"},{"key":"ref194","article-title":"(February 2013). &#x201C;Smart Cities Seoul: a case study","author":"jong-sung","year":"2016","journal-title":"(PDF) ITU-T Technology Watch"},{"key":"ref195","first-page":"22","article-title":"(February 2014). &#x201C;Internet of Things for Smart Cities","volume":"1","author":"andrea","year":"2015","journal-title":"IEEE Internet of Things Journal"},{"key":"ref196","year":"0","journal-title":"Sensor networks and the smart campus &#x2022; 2014"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1039\/C4JA00109E"},{"key":"ref94","first-page":"688","volume":"18","author":"wichern","year":"2010","journal-title":"Segmentation Indexing and Retrieval for Environmental and Natural Sounds IEEE Trans on ASLP"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-5185-2"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2015.2477805"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2009.5334925"},{"key":"ref92","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-02250-0","author":"thiagarajan","year":"2014","journal-title":"Image Understanding Using Sparse Representations Synth Lect on Image Video and Multimedia Proc"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2013.6684987"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPIT.2016.7886051"},{"key":"ref90","author":"spanias","year":"2014","journal-title":"Digital Signal Processing An Interactive Approach"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2014.7094773"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/ESPA.2012.6152431"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6855187"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2012.6467560"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898718348"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2008.00048"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ISPACS.2012.6473533"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.9.2.443-450"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.5121\/ijcsa.2012.2502"},{"key":"ref89","author":"theodorides","year":"2015","journal-title":"Machine Learning A Bayesian and Optimization Perspective"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ICICIC.2006.371"},{"key":"ref86","article-title":"An Introduction to Kalman Filtering with MATLAB Examples, Synthesis Lect","volume":"6","author":"kovvali","year":"2013","journal-title":"Signal Proc"},{"key":"ref87","author":"widrow","year":"1985","journal-title":"Adaptive Signal Processing"},{"key":"ref88","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-01537-3","author":"foutz","year":"2008","journal-title":"Narrowband Direction of Arrival Estimation for Antenna Arrays Synthesis Lectures on Antennas"},{"key":"ref200","author":"zhang","year":"2016","journal-title":"Node Localization in Wireless Sensor Networks Synthesis Lectures on Communications"},{"key":"ref101","article-title":"An 18 kW Solar Array Research Facility for Fault Detection Experiments","author":"spanias","year":"2016","journal-title":"Proc 18Th Melecon"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1049\/ic.2011.0154"},{"key":"ref201","article-title":"Mitigation of GPS periodic multipath using nonlinear regression","author":"phan","year":"2011","journal-title":"19th European Signal Processing Conference Barcelona"},{"key":"ref202","year":"0"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/BMEiCon.2013.6687668"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/ICETACS.2013.6691384"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298764"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/EuCAP.2016.7481582"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/KAMW.2008.4810534"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2013.2273127"},{"key":"ref130","first-page":"387","article-title":"Gaussian Processes, Kernel Methods, and SVM","author":"baldi","year":"2001","journal-title":"Machine Learning and Bioinformatics"},{"key":"ref133","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1109\/IEEC.2009.85","article-title":"Weighted Gaussian Kernel with Multiple Widths and Support Vector Clsssifications","author":"tian","year":"2009","journal-title":"Int Symposium on Info Engg and Electronic Commerce"},{"key":"ref134","first-page":"40","article-title":"Efficient model selection for SVM with Gaussian kernel function","author":"tang","year":"2009","journal-title":"2009 IEEE CIDM"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2010.2053026"},{"key":"ref132","first-page":"29","article-title":"Time Series Classification Using SVM with Gaussian Elastic Metric Kernel","author":"zhang","year":"2010","journal-title":"ICPR"},{"key":"ref136","first-page":"v7-383","article-title":"A new text categorization method based on HMM and SVM","author":"donghui","year":"0","journal-title":"2nd Int'l Conf on Computer Engineering and Technology 2010"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2015.7351263"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/CSSE.2008.571"},{"key":"ref137","first-page":"27","article-title":"An Investigation on Linear SVM and its Variants","author":"kumar","year":"2010","journal-title":"Int Conf Mach\/ Learn and Comp"},{"key":"ref139","author":"sharma","year":"2012","journal-title":"Handwritten digit recognition using SVM"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/ITI.2001.938010"},{"key":"ref141","article-title":"Handwritten digit recognition by SVM optimized by bat algo","author":"eva","year":"2016","journal-title":"24th Int Conf WSCG"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.929816"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1049\/iet-epa.2012.0306"},{"key":"ref2","author":"duda","year":"2000","journal-title":"Pattern Classification Pattern Classification"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/18.782116"},{"key":"ref1","author":"bishop","year":"2008","journal-title":"Pattern Recognition and Machine Learning (Information Science and Statistics)"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.548"},{"key":"ref109","author":"witten","year":"2011","journal-title":"Data Mining Practical Machine Learning Tools and Techniques"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.12948\/issn14531305\/17.1.2013.04"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/5.326413"},{"key":"ref106","first-page":"84","article-title":"An Algorithm for Vector Quantization","author":"linde yoseph buzo andr\u00e9s gray","year":"1980","journal-title":"IEEE Com-28"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1002\/0470041978"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1186\/s13636-014-0049-y"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1985.13340"},{"key":"ref102","author":"gersho","year":"1991","journal-title":"Vector Quantization and Signal Compression"},{"key":"ref111","author":"webber-cross","year":"2014","journal-title":"Learning Microsoft azure A comprehensive guide to cloud application development using MS azure UK Packt Publi"},{"key":"ref112","author":"fontama","year":"2014","journal-title":"Predictive Analytics with MS azure machine learning build and deploy solutions in minutes"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6227-9"},{"key":"ref10","author":"johannes smola","year":"2008","journal-title":"Introduction to Machine Learning"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1147\/rd.33.0210"},{"key":"ref12","author":"mitchell","year":"1997","journal-title":"Machine Learning"},{"key":"ref13","first-page":"1","article-title":"A quick view on current techniques and machine learning algorithms for big data analytics","author":"berral-garc\u00eda","year":"2016","journal-title":"ICTON"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CCE.2016.7562650"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IGARSS.2015.7325898"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.15546\/aeei-2014-0021"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/78.218137"},{"key":"ref17","author":"galton","year":"1989","journal-title":"Proc of Royal Soc"},{"key":"ref117","author":"blockeel","year":"2013","journal-title":"Machine learning and knowledge discovery in databases Berlin"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.2307\/2841583"},{"key":"ref19","first-page":"135","article-title":"Co-relations and their measurement, chiefly from anthropometric data","author":"galton","year":"1989","journal-title":"Proc of Royal Soc"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2016.7852231"},{"key":"ref114","first-page":"2825","author":"pedregosa","year":"2011","journal-title":"Scikit-learn Machine learning in Python Journal of Machine Learning Research"},{"key":"ref113","article-title":"R Development Core Team (2008)","year":"0","journal-title":"R A language and environment for statistical computing R foundation for statistical computing"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1016\/0925-2312(93)90006-O"},{"key":"ref115","author":"abadi","year":"2015","journal-title":"TensorFlow Large-Scale Machine Learning on Heterogeneous Systems"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.1991.155326"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2003.1264284"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/ICTSS.2014.7013173"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/iNIS.2015.56"}],"event":{"name":"2017 8th International Conference on Information, Intelligence, Systems & Applications (IISA)","location":"Larnaca","start":{"date-parts":[[2017,8,27]]},"end":{"date-parts":[[2017,8,30]]}},"container-title":["2017 8th International Conference on Information, Intelligence, Systems &amp; Applications (IISA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8308011\/8316350\/08316459.pdf?arnumber=8316459","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T20:42:41Z","timestamp":1751488961000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8316459\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":202,"URL":"https:\/\/doi.org\/10.1109\/iisa.2017.8316459","relation":{},"subject":[],"published":{"date-parts":[[2017,8]]}}}