{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T17:26:53Z","timestamp":1771003613682,"version":"3.50.1"},"reference-count":24,"publisher":"SAGE Publications","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCM"],"published-print":{"date-parts":[[2021,12,7]]},"abstract":"<jats:p>Some factors affecting the physical and mental health of vocational college students, the sense of inferiority plays a very important role in cultivating students with physical and mental health. Inverse random under sampling algorithm is improved based on integrated learning, which can improve the performance of the classifier. Stacking integrated learning and flip random sampling reduction algorithm SIRUS is proposed. Select the individual subjective factors studied in this paper is important in self-attribution and social objective factors are important social support factors, and the only demographic variables is a significant difference.<\/jats:p>","DOI":"10.3233\/jcm-215409","type":"journal-article","created":{"date-parts":[[2021,8,13]],"date-time":"2021-08-13T13:43:26Z","timestamp":1628862206000},"page":"1739-1746","source":"Crossref","is-referenced-by-count":1,"title":["Inferiority complex of higher vocational students based on improved random sampling"],"prefix":"10.1177","volume":"21","author":[{"given":"Weifu","family":"Sun","sequence":"first","affiliation":[{"name":"Information Engineering Department, Yantai Vocational College, Yantai, Shangdong, China"}]},{"given":"Wenbo","family":"Yang","sequence":"additional","affiliation":[{"name":"General Affairs Office, Yantai Vocational College, Yantai, Shangdong, China"}]},{"given":"Guohong","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Open Education, Yantai Vocational College, Yantai, Shangdong, China"}]},{"given":"Xu","family":"Yang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Tongji University, Shanghai, China"}]}],"member":"179","reference":[{"issue":"1","key":"10.3233\/JCM-215409_ref1","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/BF00116251","article-title":"Induction on decision tree","volume":"1","author":"Quinlan","year":"1986","journal-title":"Machine Learning"},{"key":"10.3233\/JCM-215409_ref2","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1007\/BFb0017015","article-title":"Semi-naive bayesian classifier","volume":"482","author":"Kononenko","year":"1991","journal-title":"Lecture Notes in Computer Science"},{"key":"10.3233\/JCM-215409_ref4","doi-asserted-by":"crossref","unstructured":"C.K. Maurya, D. Toshniwal and G.V. Venkoparao, Online Anomaly Detection Via Class-imbalance Learning, in: Eighth International Conference on Contemporary Computing, IEEE, 2015, pp. 30\u201335.","DOI":"10.1109\/IC3.2015.7346648"},{"issue":"1","key":"10.3233\/JCM-215409_ref5","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1007730.1007738","article-title":"Minority report in fraud detection: classification of skewed data","volume":"6","author":"Phua","year":"2014","journal-title":"Acm Sigkdd Explorations Newsletter"},{"issue":"1","key":"10.3233\/JCM-215409_ref6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4249\/scholarpedia.2776","article-title":"Ensemble learning","volume":"4","author":"Polikar","year":"2009","journal-title":"Scholarpedia"},{"issue":"1","key":"10.3233\/JCM-215409_ref7","first-page":"2","article-title":"Current trends in fraud and its detection","volume":"17","author":"Albrecht","year":"2008","journal-title":"Information Systems Security"},{"key":"10.3233\/JCM-215409_ref8","doi-asserted-by":"crossref","unstructured":"Y.Q. Liu, C. Wang and L. Zhang, Decision Tree Based Predictive Models for Breast Cancer Survivability on Imbalanced Data, in: International Conference on Bioinformatics and Biomedical Engineering, IEEE, 2009, pp. 1\u20134.","DOI":"10.1109\/ICBBE.2009.5162571"},{"issue":"4","key":"10.3233\/JCM-215409_ref9","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1007\/s11280-012-0178-0","article-title":"Effective detection of sophisticated online banking fraud on extremely imbalanced data","volume":"16","author":"Wei","year":"2013","journal-title":"World Wide Web"},{"issue":"8","key":"10.3233\/JCM-215409_ref10","first-page":"1263","article-title":"Learning from imbalanced data","volume":"21","author":"He","year":"2009","journal-title":"IEEE Transactions on Knowledge & Data Engineering"},{"key":"10.3233\/JCM-215409_ref11","first-page":"1","article-title":"C4.5, class imbalance, and cost sensitivity: why under-sampling beats over-sampling, workshop on learning from imbalanced datasets II","volume":"11","author":"Drummond","year":"2003","journal-title":"Washington DC: Citeseer"},{"issue":"10","key":"10.3233\/JCM-215409_ref12","first-page":"769","article-title":"Two modifications of CNN","volume":"SMC-6","author":"Tomek","year":"1976","journal-title":"IEEE Transactions on Systems Man & Cybernetics"},{"key":"10.3233\/JCM-215409_ref13","first-page":"179","article-title":"Addressing the curse of imbalanced training sets: one-sided selection","volume":"97","author":"Kubat","year":"1997","journal-title":"ICML"},{"issue":"3","key":"10.3233\/JCM-215409_ref14","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1109\/TSMC.1972.4309137","article-title":"Asymptotic properties of nearest neighbor rules using edited data","volume":"2","author":"Wilson","year":"2007","journal-title":"IEEE Transactions on Systems Man and Cybernetics"},{"issue":"1","key":"10.3233\/JCM-215409_ref15","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1613\/jair.953","article-title":"SMOTE: synthetic minority over-sampling technique","volume":"16","author":"Chawla","year":"2002","journal-title":"Journal of Artificial Intelligence Research"},{"issue":"1","key":"10.3233\/JCM-215409_ref18","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1145\/1007730.1007735","article-title":"A study of the behavior of several methods for balancing machine learning training data","volume":"6","author":"Batista","year":"2004","journal-title":"Acm Sigkdd Explorations Newsletter"},{"issue":"5","key":"10.3233\/JCM-215409_ref20","doi-asserted-by":"crossref","first-page":"429","DOI":"10.3233\/IDA-2002-6504","article-title":"The class imbalance problem: a systematic study","volume":"6","author":"Japkowicz","year":"2002","journal-title":"Intelligent Data Analysis"},{"issue":"3","key":"10.3233\/JCM-215409_ref21","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/MCAS.2006.1688199","article-title":"Ensemble based systems in decision making","volume":"6","author":"Polikar","year":"2006","journal-title":"IEEE Circuits and Systems Magazine"},{"issue":"1","key":"10.3233\/JCM-215409_ref22","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1006\/jcss.1997.1504","article-title":"A decision-theoretic generalization of on-line learning and an application to boosting","volume":"55","author":"Freund","year":"1997","journal-title":"Journal of Computer and System Sciences"},{"issue":"2","key":"10.3233\/JCM-215409_ref23","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/BF00058655","article-title":"Bagging predictors","volume":"24","author":"Breiman","year":"1996","journal-title":"Machine Learning"},{"issue":"2","key":"10.3233\/JCM-215409_ref24","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1016\/S0893-6080(05)80023-1","article-title":"Stacked generalization","volume":"5","author":"Wolpert","year":"1992","journal-title":"Neural Networks"},{"issue":"3","key":"10.3233\/JCM-215409_ref25","doi-asserted-by":"crossref","first-page":"488","DOI":"10.1016\/j.patcog.2005.10.002","article-title":"Fuzzy bagging: a novel ensemble of classifiers","volume":"39","author":"Nanni","year":"2006","journal-title":"Pattern Recognition"},{"issue":"5","key":"10.3233\/JCM-215409_ref26","doi-asserted-by":"crossref","first-page":"7713","DOI":"10.1109\/JIOT.2019.2901759","article-title":"An efficient passenger-hunting recommendation framework with multi-task deep learning","volume":"6","author":"Huang","year":"2019","journal-title":"IEEE Internet of Things Journal"},{"key":"10.3233\/JCM-215409_ref27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TNNLS.2020.3036825","article-title":"An efficient group recommendation model with multiattention-based neural networks","author":"Huang","year":"2020","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"issue":"6","key":"10.3233\/JCM-215409_ref28","doi-asserted-by":"crossref","first-page":"10675","DOI":"10.1109\/JIOT.2019.2940709","article-title":"Multimodal representation learning for recommendation in internet of things","volume":"6","author":"Huang","year":"2019","journal-title":"IEEE Internet of Things Journal"}],"container-title":["Journal of Computational Methods in Sciences and Engineering"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JCM-215409","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T16:32:33Z","timestamp":1771000353000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JCM-215409"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,7]]},"references-count":24,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.3233\/jcm-215409","relation":{},"ISSN":["1472-7978","1875-8983"],"issn-type":[{"value":"1472-7978","type":"print"},{"value":"1875-8983","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12,7]]}}}