{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:02:58Z","timestamp":1773511378793,"version":"3.50.1"},"reference-count":52,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T00:00:00Z","timestamp":1659916800000},"content-version":"vor","delay-in-days":219,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2022,1]]},"abstract":"<jats:p>Feature selection is the process of identifying the most relevant features from the given data having a large feature space. Microarray datasets are comprised of high\u2010quality features and very few samples of data. Feature selection is performed on such datasets to identify the optimal feature subset. The major goal of feature selection is to improve the accuracy by identifying a minimal feature subset. For this purpose, the proposed research focused on analyzing and identifying effective feature selection algorithms. A novel framework is proposed which utilizes different feature selection methods from filters, wrappers, and embedded algorithms. Furthermore, classification is then performed on selected features to classify the data using a support vector machine (SVM) classifier. Two publically available benchmark datasets are used, i.e., the Microarray dataset and the Cleveland Heart Disease dataset, for experimentation and analysis, and they are archived from the UCI data repository. The performance of SVM is analyzed using accuracy, sensitivity, specificity, and f\u2010measure. The accuracy of 94.45% and 91% is achieved on each dataset, respectively.<\/jats:p>","DOI":"10.1155\/2022\/8190814","type":"journal-article","created":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T14:20:05Z","timestamp":1659968405000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":45,"title":["A Novel Feature Selection Method for Classification of Medical Data Using Filters, Wrappers, and Embedded Approaches"],"prefix":"10.1155","volume":"2022","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6292-0628","authenticated-orcid":false,"given":"Saba","family":"Bashir","sequence":"first","affiliation":[]},{"given":"Irfan Ullah","family":"Khattak","sequence":"additional","affiliation":[]},{"given":"Aihab","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Farhan Hassan","family":"Khan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4388-020X","authenticated-orcid":false,"given":"Abdullah","family":"Gani","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0149-7413","authenticated-orcid":false,"given":"Muhammad","family":"Shiraz","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2022,8,8]]},"reference":[{"key":"e_1_2_9_1_2","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/636371"},{"key":"e_1_2_9_2_2","doi-asserted-by":"publisher","DOI":"10.1001\/jama.291.21.2616"},{"key":"e_1_2_9_3_2","article-title":"The Euro Heart Failure survey program, a survey on the quality of care among patients with heart failure in Europe. Part 1: patient characteristics and diagnosis","volume":"63","author":"Cleland J. G.","year":"2003","journal-title":"European Heart Journal"},{"key":"e_1_2_9_4_2","article-title":"Heart disease and stroke statistics\u20132012","volume":"220","author":"Roger V. L.","year":"2012","journal-title":"A report from the American Heart Association"},{"key":"e_1_2_9_5_2","doi-asserted-by":"publisher","DOI":"10.1093\/eurjhf\/hfr116"},{"key":"e_1_2_9_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejheart.2004.03.011"},{"key":"e_1_2_9_7_2","article-title":"Confirmation of a Heart Failure Epidemic: Findings from the Resource Utilization Among Congestive Heart Failure","volume":"39","author":"McCullough P. A.","year":"2002","journal-title":"(REACH) study"},{"key":"e_1_2_9_8_2","doi-asserted-by":"publisher","DOI":"10.1093\/eurheartj\/ehs104"},{"key":"e_1_2_9_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.mayocp.2014.01.004"},{"key":"e_1_2_9_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jchf.2014.04.006"},{"key":"e_1_2_9_11_2","doi-asserted-by":"publisher","DOI":"10.1001\/jamainternmed.2015.0924"},{"key":"e_1_2_9_12_2","volume-title":"The Accuracy of Machine Learning (ML) Forecasting Methods versus Statistical Ones: Extending the Results of the M#-Competition","author":"Makridakis S.","year":"2017"},{"key":"e_1_2_9_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.09.013"},{"key":"e_1_2_9_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2015.12.001"},{"key":"e_1_2_9_15_2","article-title":"Medical data mining: knowledge discovery in a clinical data warehouse","author":"Prather J. C.","year":"1997","journal-title":"Proceedings of the AMIA Annual Fall Symposium"},{"key":"e_1_2_9_16_2","unstructured":"Diaz-DiazN Aguilar-RuizJ. S. NepomucenoJ. A. andGarciaJ. Feature selection based on bootstrapping Proceedings of the 2005 ICSC Congress on Computational Intelligence Methods and Applications December 2005 Istanbul Turkey IEEE."},{"key":"e_1_2_9_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3309541"},{"key":"e_1_2_9_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2018.05.005"},{"key":"e_1_2_9_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-017-9541-y"},{"key":"e_1_2_9_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-016-9516-4"},{"key":"e_1_2_9_21_2","first-page":"175","article-title":"Projection-based measure for efficient feature selection","volume":"12","author":"Ruiz R.","year":"2003","journal-title":"Journal of Intelligent and Fuzzy Systems"},{"key":"e_1_2_9_22_2","article-title":"An Evaluation of Feature Selection Methods and Their Apllication to Computer Security","volume":"105","author":"Doak J.","year":"1992","journal-title":"Univ. of California at Davis, Dept. Computer Science"},{"key":"e_1_2_9_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ygeno.2019.07.002"},{"key":"e_1_2_9_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3053759"},{"key":"e_1_2_9_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-018-9459-x"},{"key":"e_1_2_9_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/tfuzz.2019.2940415"},{"key":"e_1_2_9_27_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-0680-8_13"},{"key":"e_1_2_9_28_2","doi-asserted-by":"publisher","DOI":"10.1134\/s0361768818060129"},{"key":"e_1_2_9_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.01.126"},{"key":"e_1_2_9_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-016-2604-1"},{"key":"e_1_2_9_31_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.01.001"},{"key":"e_1_2_9_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2017.02.001"},{"key":"e_1_2_9_33_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.fiae.2016.09.004"},{"key":"e_1_2_9_34_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.07.007"},{"key":"e_1_2_9_35_2","doi-asserted-by":"crossref","unstructured":"EmaryE. ZawbaaH. M. GrosanC. andHassenianA. E. Feature subset selection approach by gray-wolf optimization Proceedings of the Afro-European Conference for Industrial Advancement 2015 Cham Switzerland 1\u201313 https:\/\/doi.org\/10.1007\/978-3-319-13572-4_1 2-s2.0-84912033576.","DOI":"10.1007\/978-3-319-13572-4_1"},{"key":"e_1_2_9_36_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.05.014"},{"key":"e_1_2_9_37_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.03.015"},{"key":"e_1_2_9_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.05.042"},{"key":"e_1_2_9_39_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.10.052"},{"key":"e_1_2_9_40_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0166017"},{"key":"e_1_2_9_41_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-017-1145-y"},{"key":"e_1_2_9_42_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.04.005"},{"key":"e_1_2_9_43_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2017.11.005"},{"key":"e_1_2_9_44_2","article-title":"Feature selection algorithm for intrusions detection system using sequential forward search and random forest classifier","volume":"11","author":"Lee J.","year":"2017","journal-title":"KSII Transactions on Internet & Information Systems"},{"key":"e_1_2_9_45_2","volume-title":"Feature Extraction: Foundations and Applications","author":"Guyon I","year":"2008"},{"key":"e_1_2_9_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcyb.2020.3015756"},{"key":"e_1_2_9_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcyb.2020.3042243"},{"key":"e_1_2_9_48_2","doi-asserted-by":"publisher","DOI":"10.38094\/jastt1224"},{"key":"e_1_2_9_49_2","doi-asserted-by":"publisher","DOI":"10.17706\/jcp.13.5.571-579"},{"key":"e_1_2_9_50_2","doi-asserted-by":"publisher","DOI":"10.1007\/11494669_93"},{"key":"e_1_2_9_51_2","doi-asserted-by":"crossref","unstructured":"PadmajaD. L.andVishnuvardhanB. Comparative study of feature subset selection methods for dimensionality reduction on scientific data Proceedings of the 2016 IEEE 6th International Conference on Advanced Computing (IACC) February 2016 Bhimavaram India IEEE 31\u201334 https:\/\/doi.org\/10.1109\/iacc.2016.16 2-s2.0-84987730812.","DOI":"10.1109\/IACC.2016.16"},{"key":"e_1_2_9_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2005.50"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2022\/8190814","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1155\/2022\/8190814","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2022\/8190814","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T21:18:57Z","timestamp":1769116737000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2022\/8190814"}},"subtitle":[],"editor":[{"given":"Xiaoan","family":"Yan","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2022,1]]},"references-count":52,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["10.1155\/2022\/8190814"],"URL":"https:\/\/doi.org\/10.1155\/2022\/8190814","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"value":"1076-2787","type":"print"},{"value":"1099-0526","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1]]},"assertion":[{"value":"2022-06-13","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-07-21","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-08-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"8190814"}}