{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:13:37Z","timestamp":1771024417010,"version":"3.50.1"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/isncc.2019.8909099","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T19:01:09Z","timestamp":1574708469000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["A Systematic Approach to Identify an Appropriate Classifier for Limited-Sized Data Sets"],"prefix":"10.1109","author":[{"given":"Alanoud Bin","family":"Dris","sequence":"first","affiliation":[]},{"given":"Najla","family":"Alzakari","sequence":"additional","affiliation":[]},{"given":"Heba","family":"Kurdi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17254-0_27"},{"key":"ref38","first-page":"1137","article-title":"A study of cross-validation and bootstrap for accuracy estimation and model selection","volume":"14","author":"kohavi","year":"1995","journal-title":"IJCAI"},{"key":"ref33","author":"han","year":"2011","journal-title":"Data Mining Concepts and Techniques"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2006.875988"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.12.027"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2016.1213447"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.12.006"},{"key":"ref36","volume":"55","author":"blake","year":"1998","journal-title":"UCI repository of machine learning databases"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"ref34","article-title":"The weka workbench","author":"eibe","year":"2016","journal-title":"Online Appendix for Data Mining Practical Machine Learning Tools and Techniques"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.15837\/ijccc.2010.3.2481"},{"key":"ref40","first-page":"85","article-title":"Support vector machines for classification and regression","volume":"14","author":"gunn","year":"0","journal-title":"ISIS Technical Report"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/GSIS.2013.6714832"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-016-1003-3"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISDA.2006.67"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IIAI-AAI.2016.16"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2010.12.010"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44748-3_3"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.02.075"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-015-0719-1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-006-0043-5"},{"key":"ref28","author":"kumari","year":"2011","journal-title":"Comparative study of data mining classification methods in cardiovascular disease prediction"},{"key":"ref4","author":"tan","year":"2006","journal-title":"Introduction to Data Mining"},{"key":"ref27","first-page":"1890","article-title":"A comparative study of classification algorithms for spam email data analysis","volume":"3","author":"sharma","year":"2011","journal-title":"International Journal on Computer Science and Engineering"},{"key":"ref3","author":"witten","year":"2016","journal-title":"Data Mining Practical Machine Learning Tools and Techniques"},{"key":"ref6","author":"marcoulides","year":"2005","journal-title":"Discovering Knowledge in Data an Introduction to Data Mining"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(98)00046-0"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.254"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/11573067_20"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1201\/b17320"},{"key":"ref2","author":"stanton","year":"2013","journal-title":"An Introduction to Data Science"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.22"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloudW.2017.86"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2016.0193"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TLT.2013.2296520"},{"key":"ref21","author":"cortez","year":"2008","journal-title":"Using Data Mining to Predict Secondary School Student Performance"},{"key":"ref24","first-page":"239","article-title":"Comparative study of classification algorithms","volume":"5","author":"aher","year":"2012","journal-title":"International Journal of Information Technology"},{"key":"ref23","first-page":"89","article-title":"Critical factors of becoming secondary school teachers: Mining the process of teacher education by decision trees","volume":"62","author":"huang","year":"2017","journal-title":"Journal of Research in Education Sciences"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.2991\/jrnal.2016.3.1.6"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-015-0899-3"}],"event":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","location":"Istanbul, Turkey","start":{"date-parts":[[2019,6,18]]},"end":{"date-parts":[[2019,6,20]]}},"container-title":["2019 International Symposium on Networks, Computers and Communications (ISNCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8894812\/8909084\/08909099.pdf?arnumber=8909099","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:53:01Z","timestamp":1658094781000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8909099\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/isncc.2019.8909099","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}