{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T21:13:31Z","timestamp":1776374011447,"version":"3.51.2"},"reference-count":78,"publisher":"Wiley","license":[{"start":{"date-parts":[[2015,6,11]],"date-time":"2015-06-11T00:00:00Z","timestamp":1433980800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Advances in Bioinformatics"],"published-print":{"date-parts":[[2015,6,11]]},"abstract":"<jats:p>We summarise various ways of performing dimensionality reduction on high-dimensional microarray data. Many different feature selection and feature extraction methods exist and they are being widely used. All these methods aim to remove redundant and irrelevant features so that classification of new instances will be more accurate. A popular source of data is microarrays, a biological platform for gathering gene expressions. Analysing microarrays can be difficult due to the size of the data they provide. In addition the complicated relations among the different genes make analysis more difficult and removing excess features can improve the quality of the results. We present some of the most popular methods for selecting significant features and provide a comparison between them. Their advantages and disadvantages are outlined in order to provide a clearer idea of when to use each one of them for saving computational time and resources.<\/jats:p>","DOI":"10.1155\/2015\/198363","type":"journal-article","created":{"date-parts":[[2015,6,12]],"date-time":"2015-06-12T01:40:38Z","timestamp":1434073238000},"page":"1-13","source":"Crossref","is-referenced-by-count":696,"title":["A Review of Feature Selection and Feature Extraction Methods Applied on Microarray Data"],"prefix":"10.1155","volume":"2015","author":[{"given":"Zena M.","family":"Hira","sequence":"first","affiliation":[{"name":"Department of Computing, Imperial College London, London SW7 2AZ, UK"}]},{"given":"Duncan F.","family":"Gillies","sequence":"additional","affiliation":[{"name":"Department of Computing, Imperial College London, London SW7 2AZ, UK"}]}],"member":"311","reference":[{"key":"7","year":"1957"},{"key":"50","year":"2009"},{"key":"36","year":"2005"},{"issue":"5","key":"83","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1145\/253769.253804","volume":"40","year":"1997","journal-title":"Communications of the ACM"},{"key":"99","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-004-0751-8"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/s1470-2045(12)70137-7"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(05)80010-3"},{"key":"37","year":"1989"},{"key":"80","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btm344"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(97)00063-5"},{"issue":"4","key":"11","volume":"3","year":"2002","journal-title":"Genome biology"},{"issue":"13","key":"97","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1186\/gb-2005-6-13-405","volume":"6","year":"2005","journal-title":"Genome Biology"},{"key":"59","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-6-76"},{"key":"91","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiolchem.2004.11.001"},{"key":"63","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gnh002"},{"key":"93","doi-asserted-by":"publisher","DOI":"10.1016\/j.artmed.2004.01.011"},{"key":"72","doi-asserted-by":"publisher","DOI":"10.1016\/0167-8655(94)90127-9"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1023\/a:1012450327387"},{"issue":"12","key":"57","volume":"4","year":"2009","journal-title":"PLoS ONE"},{"key":"86","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-7-95"},{"key":"94","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0081683"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.102102699"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1023\/a:1012487302797"},{"key":"56","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2164-12-s5-s1"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-6-148"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-11-567"},{"key":"79","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.11.001"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88436-1_22"},{"issue":"2","key":"77","first-page":"113","volume":"40","year":"2012","journal-title":"Journal of Theoretical and Applied Information Technology"},{"issue":"3","key":"24","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1080\/01969727308546046","volume":"3","year":"1973","journal-title":"Journal of Cybernetics"},{"key":"8","year":"1981"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-7-3"},{"key":"62","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.08.047"},{"key":"87","doi-asserted-by":"publisher","DOI":"10.1109\/tcbb.2007.1028"},{"key":"98","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-7-197"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.95.25.14863"},{"key":"71","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btl060"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-6-27"},{"key":"40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1007\/978-3-540-24840-8_26","volume-title":"Feature selection by bayesian networks","volume":"3060","year":"2004"},{"key":"75","doi-asserted-by":"publisher","DOI":"10.2202\/1544-6115.1513"},{"key":"96","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-11-s1-s5"},{"key":"66","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/19.1.37"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/321250.321256"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-5-81"},{"key":"61","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-8-60"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-9-267"},{"issue":"4","key":"52","volume":"3","year":"2002","journal-title":"Genome Biology"},{"key":"64","doi-asserted-by":"publisher","DOI":"10.1101\/gr.225302"},{"key":"65","series-title":"Lecture Notes in Computer Science","first-page":"82","volume-title":"Penalized principal component analysis of microarray data","volume":"6160","year":"2009"},{"key":"90","doi-asserted-by":"publisher","DOI":"10.1002\/sim.2082"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1198\/016214505000000628"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pbio.0020108"},{"issue":"2","key":"39","first-page":"1","volume":"1","year":"2000","journal-title":"Genome Biology"},{"key":"12","series-title":"Springer Series in Statistics","year":"2005"},{"key":"89","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-9-179"},{"issue":"1","key":"38","first-page":"100","volume":"28","year":"1979","journal-title":"Journal of the Royal Statistical Society Series C: Applied Statistics"},{"key":"88","doi-asserted-by":"publisher","DOI":"10.1126\/science.290.5500.2319"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1126\/science.295.5552.7a"},{"key":"67","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2011.09.016"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-6-195"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1186\/1753-6561-5-s2-s3"},{"key":"60","doi-asserted-by":"publisher","DOI":"10.1155\/jbb.2005.155"},{"key":"78","doi-asserted-by":"publisher","DOI":"10.1186\/1752-0509-8-s2-s6"},{"key":"48","first-page":"509","volume-title":"Self-organized formation of topologically correct feature maps","year":"1988"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2010.07.001"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1186\/gb-2003-4-11-r76"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/S0925-2312(03)00433-8"},{"key":"81","first-page":"525","volume":"27","year":"2005","journal-title":"Journal of Machine Learning Research"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gkh978"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1109\/tcbb.2007.70267"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1081\/BIP-200025659"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1089\/cmb.2008.12TT"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btl065"},{"key":"69","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btl011"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1038\/msb4100180"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btn081"},{"key":"74","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-8-35"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/532989"}],"container-title":["Advances in Bioinformatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/archive\/2015\/198363.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/archive\/2015\/198363.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/archive\/2015\/198363.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,8]],"date-time":"2020-12-08T21:22:16Z","timestamp":1607462536000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/abi\/2015\/198363\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,11]]},"references-count":78,"alternative-id":["198363","198363"],"URL":"https:\/\/doi.org\/10.1155\/2015\/198363","relation":{},"ISSN":["1687-8027","1687-8035"],"issn-type":[{"value":"1687-8027","type":"print"},{"value":"1687-8035","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,6,11]]}}}