{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T04:59:55Z","timestamp":1747198795506,"version":"3.40.5"},"reference-count":36,"publisher":"Vilnius University Press","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"abstract":"<jats:p>In this paper we propose modifications of the well-known algorithm of particle swarm optimization (PSO). These changes affect the mapping of the motion of particles from continuous space to binary space for searching in it, which is widely used to solve the problem of feature selection. The modified binary PSO variations were tested on the dataset SVC2004 dedicated to the problem of user authentication based on dynamic features of a handwritten signature. In the example of k-nearest neighbours (kNN), experiments were carried out to find the optimal subset of features. The search for the subset was considered as a multicriteria optimization problem, taking into account the accuracy of the model and the number of features.<\/jats:p>","DOI":"10.15388\/21-infor472","type":"journal-article","created":{"date-parts":[[2022,1,5]],"date-time":"2022-01-05T16:09:47Z","timestamp":1641398987000},"page":"523-543","source":"Crossref","is-referenced-by-count":2,"title":["Binary PSO Variants for Feature Selection in Handwritten Signature Authentication"],"prefix":"10.15388","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3213-5191","authenticated-orcid":false,"given":"Emrah","family":"Hancer","sequence":"first","affiliation":[]},{"given":"Marina","family":"Bardamova","sequence":"additional","affiliation":[]},{"given":"Ilya","family":"Hodashinsky","sequence":"additional","affiliation":[]},{"given":"Konstantin","family":"Sarin","sequence":"additional","affiliation":[]},{"given":"Artem","family":"Slezkin","sequence":"additional","affiliation":[]},{"given":"Mikhail","family":"Svetlakov","sequence":"additional","affiliation":[]}],"member":"6097","published-online":{"date-parts":[[2022,1,5]]},"reference":[{"first-page":"430","volume-title":"Advanced Machine Learning Technologies and Applications","year":"2012","key":"2022092811185163353_j_infor472_ref_001"},{"key":"2022092811185163353_j_infor472_ref_002","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.eswa.2018.08.051","article-title":"Binary butterfly optimization approaches for feature selection","volume":"116","year":"2019","journal-title":"Expert Systems with Applications"},{"key":"2022092811185163353_j_infor472_ref_003","doi-asserted-by":"publisher","first-page":"8","DOI":"10.5815\/ijisa.2020.03.02","article-title":"Enhanced quantum inspired grey wolf optimizer for feature selection","volume":"12","year":"2020","journal-title":"International Journal of Intelligent Systems and Applications"},{"issue":"2","key":"2022092811185163353_j_infor472_ref_004","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/s10489-017-0894-3","article-title":"Application of binary quantum-inspired gravitational search algorithm in feature subset selection","volume":"47","year":"2017","journal-title":"Applied Intelligence"},{"issue":"4","key":"2022092811185163353_j_infor472_ref_005","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1109\/72.298224","article-title":"Using mutual information for selecting features in supervised neural net learning","volume":"5","year":"1994","journal-title":"IEEE Transactions on Neural Networks"},{"key":"2022092811185163353_j_infor472_ref_006","doi-asserted-by":"publisher","first-page":"12201","DOI":"10.1007\/s00521-019-04368-6","article-title":"Feature selection using binary grey wolf optimizer with elite-based crossover for Arabic text classification","volume":"32","year":"2020","journal-title":"Neural Computing and Applications"},{"issue":"4","key":"2022092811185163353_j_infor472_ref_007","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1016\/S0019-9958(72)90199-4","article-title":"A definition of a nonprobabilistic entropy in the setting of fuzzy sets theory","volume":"20","year":"1972","journal-title":"Information and Control"},{"key":"2022092811185163353_j_infor472_ref_008","doi-asserted-by":"publisher","first-page":"823","DOI":"10.1007\/978-3-642-22407-2_31","volume-title":"Pattern Recognition, Machine Intelligence and Biometrics","year":"2011"},{"issue":"1","key":"2022092811185163353_j_infor472_ref_009","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.asej.2010.09.007","article-title":"Online handwritten signature verification system based on DWT features extraction and neural network classification","volume":"1","year":"2010","journal-title":"Ain Shams Engineering Journal"},{"first-page":"523","volume-title":"Audio- and Video-Based Biometric Person Authentication","year":"2005","key":"2022092811185163353_j_infor472_ref_010"},{"key":"2022092811185163353_j_infor472_ref_011","doi-asserted-by":"publisher","first-page":"97890","DOI":"10.1109\/ACCESS.2020.2996611","article-title":"Binary social mimic optimization algorithm with X-shaped transfer function for feature selection","volume":"8","year":"2020","journal-title":"IEEE Access"},{"key":"2022092811185163353_j_infor472_ref_012","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1109\/SoCPaR.2009.139","volume-title":"International Conference of Soft Computing and Pattern Recognition","year":"2009"},{"issue":"13","key":"2022092811185163353_j_infor472_ref_013","doi-asserted-by":"publisher","first-page":"5233","DOI":"10.1007\/s00500-018-3545-7","article-title":"Differential evolution for feature selection: a fuzzy wrapper\u2014filter approach","volume":"23","year":"2019","journal-title":"Soft Computing"},{"key":"2022092811185163353_j_infor472_ref_014","doi-asserted-by":"publisher","first-page":"2929","DOI":"10.1007\/s00521-020-04744-7","article-title":"New filter approaches for feature selection using differential evolution and fuzzy rough set theory","volume":"32","year":"2020","journal-title":"Neural Computing and Applications"},{"key":"2022092811185163353_j_infor472_ref_015","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-021-05990-z"},{"issue":"1","key":"2022092811185163353_j_infor472_ref_016","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/S0004-3702(97)00043-X","article-title":"Wrappers for feature subset selection","volume":"97","year":"1997","journal-title":"Artificial Intelligence"},{"key":"2022092811185163353_j_infor472_ref_017","doi-asserted-by":"publisher","first-page":"2307","DOI":"10.3906\/elk-1203-104","article-title":"XOR-based artificial bee colony algorithm for binary optimization","volume":"21","year":"2012","journal-title":"Turkish Journal of Electrical Engineering and Computer Science"},{"issue":"1","key":"2022092811185163353_j_infor472_ref_018","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/0031-3203(89)90036-8","article-title":"Signature recognition through spectral analysis","volume":"22","year":"1989","journal-title":"Pattern Recognition"},{"volume-title":"Encyclopedia of Biometrics","year":"2015","key":"2022092811185163353_j_infor472_ref_019"},{"key":"2022092811185163353_j_infor472_ref_020","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1016\/j.forsciint.2018.08.021","article-title":"Dynamic signatures: a review of dynamic feature variation and forensic methodology","volume":"291","year":"2018","journal-title":"Forensic Science International"},{"key":"2022092811185163353_j_infor472_ref_021","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/ICTCS.2017.43","volume-title":"International Conference on New Trends in Computing Sciences (ICTCS2017)","year":"2017"},{"issue":"1","key":"2022092811185163353_j_infor472_ref_022","doi-asserted-by":"publisher","DOI":"10.11113\/jt.v48.218","article-title":"Biometric signature verification using pen position, time, velocity and pressure parameters","volume":"48","year":"2012","journal-title":"Jurnal Teknologi"},{"key":"2022092811185163353_j_infor472_ref_023","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.swevo.2012.09.002","article-title":"S-shaped versus V-shaped transfer functions for binary particle swarm optimization","volume":"9","year":"2013","journal-title":"Swarm and Evolutionary Computation"},{"key":"2022092811185163353_j_infor472_ref_024","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1109\/ICSMC.1991.169685","volume-title":"IEEE International Conference on Systems, Man, and Cybernetics","year":"1991"},{"issue":"4","key":"2022092811185163353_j_infor472_ref_025","doi-asserted-by":"publisher","first-page":"697","DOI":"10.33889\/IJMEMS.2020.5.4.056","article-title":"Feature selection using different transfer functions for binary bat algorithm","volume":"5","year":"2020","journal-title":"International Journal of Mathematical, Engineering and Management Sciences"},{"key":"2022092811185163353_j_infor472_ref_026","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1109\/ICASSP.2001.941084","volume-title":"IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings","volume":"2","year":"2001"},{"issue":"4","key":"2022092811185163353_j_infor472_ref_027","doi-asserted-by":"publisher","first-page":"642","DOI":"10.1016\/j.jvcir.2012.02.005","article-title":"A new approach to the reconstruction of contour lines extracted from topographic maps","volume":"23","year":"2012","journal-title":"Journal of Visual Communication and Image Representation"},{"issue":"3","key":"2022092811185163353_j_infor472_ref_028","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","article-title":"A mathematical theory of communication","volume":"27","year":"1948","journal-title":"Bell System Technical Journal"},{"key":"2022092811185163353_j_infor472_ref_029","doi-asserted-by":"publisher","first-page":"1945","DOI":"10.1109\/CEC.1999.785511","volume-title":"Proceedings of the 1999 Congress on Evolutionary Computation (CEC99)","volume":"3","year":"1999"},{"key":"2022092811185163353_j_infor472_ref_030","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/3377929.3390038","volume-title":"Proceedings of the 2020 Genetic and Evolutionary Computation Conference Companion, GECCO \u201920","year":"2020"},{"issue":"1","key":"2022092811185163353_j_infor472_ref_031","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/507338.507355","article-title":"Data mining: practical machine learning tools and techniques with Java implementations","volume":"31","year":"2002","journal-title":"SIGMOD Record"},{"issue":"1","key":"2022092811185163353_j_infor472_ref_032","doi-asserted-by":"publisher","first-page":"179","DOI":"10.3390\/s18010179","article-title":"A continuous identity authentication scheme based on physiological and behavioral characteristics","volume":"18","year":"2018","journal-title":"Sensors"},{"key":"2022092811185163353_j_infor472_ref_033","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/260516","article-title":"Online signature verification using fourier descriptors","volume":"2009","year":"2009","journal-title":"Journal on Advances in Signal Processing"},{"first-page":"16","volume-title":"Biometric Authentication","year":"2004","key":"2022092811185163353_j_infor472_ref_034"},{"issue":"4","key":"2022092811185163353_j_infor472_ref_035","doi-asserted-by":"publisher","first-page":"8049","DOI":"10.1016\/j.eswa.2008.10.047","article-title":"An improved binary particle swarm optimization for unit commitment problem","volume":"36","year":"2009","journal-title":"Expert Systems with Applications"},{"key":"2022092811185163353_j_infor472_ref_036","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.cie.2017.10.025","article-title":"A cooperative swarm intelligence algorithm based on quantum-inspired and rough sets for feature selection","volume":"115","year":"2018","journal-title":"Computers & Industrial Engineering"}],"container-title":["Informatica"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/informatica.vu.lt\/journal\/INFORMATICA\/article\/1244\/text","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/informatica.vu.lt\/journal\/INFORMATICA\/article\/1244\/text","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,28]],"date-time":"2022-09-28T10:42:24Z","timestamp":1664361744000},"score":1,"resource":{"primary":{"URL":"https:\/\/informatica.vu.lt\/doi\/10.15388\/21-INFOR472"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":36,"alternative-id":["10.15388\/21-INFOR472"],"URL":"https:\/\/doi.org\/10.15388\/21-infor472","relation":{},"ISSN":["0868-4952","1822-8844"],"issn-type":[{"type":"print","value":"0868-4952"},{"type":"electronic","value":"1822-8844"}],"subject":[],"published":{"date-parts":[[2022]]}}}