Data Preprocessing For Supervised Learning
Data Preprocessing For Supervised Learning
net/publication/228084519
CITATIONS READS
779 26,352
3 authors:
P. E. Pintelas
University of Patras
189 PUBLICATIONS 8,085 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by P. E. Pintelas on 03 June 2014.
T HE data preprocessing can often have a significant impact have a significant impact on generalization performance of a
on generalization performance of a supervised ML ML algorithm. We present the most well know algorithms for
algorithm. The elimination of noise instances is one of the each step of data pre-processing so that one achieves the best
most difficult problems in inductive ML [48]. Usually the performance for their data set.
removed instances have excessively deviating instances that The next section covers instance selection and outliers
have too many null feature values. These excessively detection. The topic of processing unknown feature values is
deviating features are also referred to as outliers. In addition, a described in section 3. The problem of choosing the interval
common approach to cope with the infeasibility of learning borders and the correct arity (the number of categorical
from very large data sets is to select a single sample from the values) for the discretization is covered in section 4. The
large data set. Missing data handling is another issue often section 5 explains the data normalization techniques (such as
dealt with in the data preparation steps. scaling down transformation of the features) that are important
The symbolic, logical learning algorithms are able to for many neural network and k-Nearest Neighbourhood
process symbolic, categorical data only. However, real-world algorithms, while the section 6 describes the Feature Selection
problems involve both symbolic and numerical features. (FS) methods. Finally, the feature construction algorithms are
Therefore, there is an important issue to discretize numerical covered in section 7 and the closing section concludes this
(continuous) features. Grouping of values of symbolic work.
features is a useful process, too [18]. It is a known problem
that features with too many values are overestimated in the II. INSTANCE SELECTION AND OUTLIERS DETECTION
process of selecting the most informative features, both for Generally, instance selection approaches are distinguished
inducing decision trees and for deriving decision rules. between filter and wrapper [13], [21]. Filter evaluation only
Moreover, in real-world data, the representation of data considers data reduction but does not take into account
often uses too many features, but only a few of them may be activities. On contrary, wrapper approaches explicitly
related to the target concept. There may be redundancy, where emphasize the ML aspect and evaluate results by using the
specific ML algorithm to trigger instance selection.
Manuscript received Feb 19, 2006. The Project is Co-Funded by the Variable-by-variable data cleaning is straightforward filter
European Social Fund & National Resources - EPEAEK II. approach (those values that are suspicious due to their
S. B. Kotsiantis is with Educational Software Development Laboratory, relationship to a specific probability distribution, say a normal
University of Patras, Greece (phone: +302610997833; fax: +302610997313;
e-mail: sotos@ math.upatras.gr). distribution with a mean of 5, a standard deviation of 3, and a
D. Kanellopoulos is with Educational Software Development Laboratory, suspicious value of 10). Table 1 shows examples of how this
University of Patras, Greece (e-mail: dkanellop@ teipat.gr). metadata can help on detecting a number of possible data
P. E. Pintelas is with Educational Software Development Laboratory,
University of Patras, Greece (e-mail: pintelas@ math.upatras.gr). quality problems. Moreover, a number of authors focused on
the problem of duplicate instance identification and sets, and looked specifically at the number of instances
elimination, e.g., [16]. necessary before the learning curves reached a plateau.
Surprisingly, for these nineteen data sets, a plateau was
TABLE I
EXAMPLES FOR THE USE OF VARIABLE-BY-VARIABLE DATA reached after very few training instances.
CLEANING Reinartz [42] presents a unifying framework, which covers
individual state of the art approaches related to instance
Problems Metadata Examples/Heuristics selection. First, an application of a statistical sampling
e.g., cardinality (gender)> 2 technique draws an initial sample. In the next step, a
cardinality
indicates problem clustering technique groups the initial sample into subsets of
max, min should not be similar instances. For each of these subsets, the prototyping
Illegal max, min
outside of permissible range step selects or constructs a smaller set of representative
values
variance, deviation of prototypes. The set of prototypes then constitutes the final
variance,
statistical values should not output of instance selection.
deviation
be higher than threshold Typically learners are expected to be able to generalize over
sorting on values often unseen instances of any class with equal accuracy. That is, in
feature
Misspellings brings misspelled values a two class domain of positive and negative examples, the
values
next to correct values learner will perform on an unseen set of examples with equal
accuracy on both the positive and negative classes. This of
An inlier is a data value that lies in the interior of a statistical course is the ideal situation. In many applications learners are
distribution and is in error. Because inliers are difficult to faced with imbalanced data sets, which can cause the learner
distinguish from good data values they are sometimes difficult to be biased towards one class. This bias is the result of one
to find and correct. Multivariate data cleaning is more class being heavily under represented in the training data
difficult, but is an essential step in a complete analysis [43]. compared to the other classes. It can be attributed to two
Examples are the distance based outlier detection algorithm factors that relate to the way in which learners are designed:
RT [22] and the density based outliers LOF [3]. Inductive learners are typically designed to minimize errors
Brodley and Friedl [4] focus on wrapper approach with over the training examples. Classes containing few examples
improving the quality of training data by identifying and can be largely ignored by learning algorithms because the cost
eliminating mislabelled instances prior to applying the chosen of performing well on the over-represented class outweighs
ML algorithm. Their first step is to identify candidate the cost of doing poorly on the smaller class. Another factor
instances by using m learning algorithms to tag instances as contributing to the bias is over-fitting. Over-fitting occurs
correctly or incorrectly labelled. The second step is to form a when a learning algorithm creates a hypothesis that performs
classifier using a new version of the training data for which all well over the training data but does not generalize well over
of the instances identified as mislabelled are removed. unseen data. This can occur on an under represented class
Filtering can be based on one or more of the m base level because the learning algorithm creates a hypothesis that can
classifiers’ tags. easily fit a small number of examples, but it fits them too
However, instance selection isn’t only used to handle noise specifically.
but for coping with the infeasibility of learning from very Imbalanced data sets have recently received attention in the
large data sets. Instance selection in this case is an machine learning community. Common solutions of instance
optimization problem that attempts to maintain the mining selection include:
quality while minimizing the sample size [33]. It reduces data • Duplicating training examples of the under represented
and enables a learning algorithm to function and work class [30]. This is in effect re-sampling the examples and
effectively with huge data. There is a variety of procedures for will be referred to in this paper as over-sampling.
sampling instances from a large data set. The most well • Removing training examples of the over represented class
known are [6]: [26]. This is referred to as downsizing to reflect that the
• Random sampling that selects a subset of instances overall size of the data set is smaller after this balancing
randomly. technique has taken place.
• Stratified sampling that is applicable when the class
values are not uniformly distributed in the training sets. III. MISSING FEATURE VALUES
Instances of the minority class(es) are selected with a
Incomplete data is an unavoidable problem in dealing with
greater frequency in order to even out the distribution.
most of the real world data sources. The topic has been
Sampling is well accepted by the statistics community, who
discussed and analyzed by several researchers in the field of
observe that “a powerful computationally intense procedure
ML [5], [14]. Generally, there are some important factors to
operating on a sub-sample of the data may in fact provide
be taken into account when processing unknown feature
superior accuracy than a less sophisticated one using the entire
values. One of the most important ones is the source of
data base” [12]. In practice, as the amount of data grows, the
’unknownness’: (i) a value is missing because it was forgotten
rate of increase in accuracy slows, forming the familiar
or lost; (ii) a certain feature is not applicable for a given
learning curve. Whether sampling will be effective depends
instance, e.g., it does not exist for a given instance; (iii) for a
on how dramatically the rate of increase slows. Oates and
given observation, the designer of a training set does not care
Jensen [37] studied decision tree induction for nineteen data
about the value of a certain feature (so-called don’t-care Continuous Attribute Sort Attribute Sorting
// Sorting continuous attribute
value).
Analogically with the case, the expert has to choose from a Get Cut Point/
// Selects a candidate cutpoint
number of methods for handling missing data [27]: Adjacent Intervals
// or adjacent intervals
• Method of Ignoring Instances with Unknown Feature Evaluation
// Invokes appropriate measure
Values: This method is the simplest: just ignore the Measure
Evaluation
that occurs most often is selected to be the value for all // Discretize by splitting or
the unknown values of the feature. Split/Merge
Attribute // merging adjacent intervals
Splitting/
value of the feature, which occurs the most common No Stopping // Controls the overall discretization
within the same class is selected to be the value for all the Criterion
Yes //based on some measure
Stopping
Some of FS procedures are based on making comparisons combinations of unknown features are used with equal
between the saliency of a candidate feature and the saliency of probability. Due to the probabilistic nature of the search, a
a noise feature [1]. feature that should be in the subset will win the race, even if it
LVF [31] is consistency driven method can handle noisy is dependent on another feature. An important aspect of the
domains if the approximate noise level is known a-priori. LVF genetic algorithm is that it is explicitly designed to exploit
generates a random subset S from the feature subset space epistasis (that is, interdependencies between bits in the string),
during each round of execution. If S contains fewer features and thus should be well-suited for this problem domain.
than the current best subset, the inconsistency rate of the However, genetic algorithms typically require a large number
dimensionally reduced data described by S is compared with of evaluations to reach a minimum.
the inconsistency rate of the best subset. If S is at least as Piramuthu [39] compared a number of FS techniques
consistent as the best subset, replaces the best subset. LVS without finding a real winner. To combine the advantages of
[32] is a variance of LVF that can decrease the number of filter and wrapper models, algorithms in a hybrid model have
checkings especially in the case of large datasets. recently been proposed to deal with high dimensional data
In Hall [17], a correlation measure is applied to evaluate the [25]. In these algorithms, first, a goodness measure of feature
goodness of feature subsets based on the hypothesis that a subsets based on data characteristics is used to choose best
good feature subset is one that contains features highly subsets for a given cardinality, and then, cross validation is
correlated with the class, yet uncorrelated with each other. Yu exploited to decide a final best subset across different
and Liu [50] introduced a novel concept, predominant cardinalities.
correlation, and proposed a fast filter method which can
identify relevant features as well as redundancy among
VII. FEATURE CONSTRUCTION
relevant features without pairwise correlation analysis.
Generally, an optimal subset is always relative to a certain The problem of feature interaction can be also addressed by
evaluation function (i.e., an optimal subset chosen using one constructing new features from the basic feature set. This
evaluation function may not be the same as that which uses technique is called feature construction/transformation. The
another evaluation function). Wrapper methods wrap the FS new generated features may lead to the creation of more
around the induction algorithm to be used, using cross- concise and accurate classifiers. In addition, the discovery of
validation to predict the benefits of adding or removing a meaningful features contributes to better comprehensibility of
feature from the feature subset used. In forward stepwise the produced classifier, and better understanding of the
selection, a feature subset is iteratively built up. Each of the learned concept.
unused variables is added to the model in turn, and the Assuming the original set A of features consists of a1, a2, ...,
variable that most improves the model is selected. In an, some variants of feature transformation is defined below.
backward stepwise selection, the algorithm starts by building a Feature transformation process can augment the space of
model that includes all available input variables (i.e. all bits features by inferring or creating additional features. After
are set). In each iteration, the algorithm locates the variable feature construction, we may have additional m features an+1,
that, if removed, most improves the performance (or causes an+2, ..., an+m. For example, a new feature ak (n < k ≤ n + m)
least deterioration). A problem with forward selection is that it could be constructed by performing a logical operation of ai
may fail to include variables that are interdependent, as it adds and aj from the original set of features.
variables one at a time. However, it may locate small effective The GALA algorithm [19] performs feature construction
subsets quite rapidly, as the early evaluations, involving throughout the course of building a decision tree classifier.
relatively few variables, are fast. In contrast, in backward New features are constructed at each created tree node by
selection interdependencies are well handled, but early performing a branch and bound search in feature space. The
evaluations are relatively expensive. Due to the naive Bayes search is performed by iteratively combining the feature
classifier’s assumption that, within each class, probability having the highest InfoGain value with an original basic
distributions for features are independent of each other, feature that meets a certain filter criterion. GALA constructs
Langley and Sage [29] note that its performance on domains new binary features by using logical operators such as
with redundant features can be improved by removing such conjunction, negation, and disjunction. On the other hand,
features. A forward search strategy is employed to select Zheng [51] creates at-least M-of-N features. For a given
features for use with naïve Bayes, as opposed to the backward instance, the value of an at-least M-of-N representation is true
strategies that are used most often with decision tree if at least M of its conditions is true of the instance while it is
algorithms and instance based learners. false, otherwise.
Sequential forward floating selection (SFFS) and sequential Feature transformation process can also extract a set of new
backward floating selection (SBFS) are characterized by the features from the original features through some functional
changing number of features included or eliminated at mapping. After feature extraction, we have b1, b2,..., bm (m <
different stages of the procedure [46]. The adaptive floating n), bi = fi(a1, a2,...,an), and fi is a mapping function. For
search [47] is able to find a better solution, of course at the instance for real valued features a1 and a2, for every object x
expense of significantly increased computational time. we can define b1(x) = c1*a1(x) + c2*a2(x) where c1 and c2 are
The genetic algorithm is another well-known approach for constants. While FICUS [36] is similar in some aspects to
FS [49]. In each iteration, a feature is chosen and raced some of the existing feature construction algorithms (such as
between being in the subset or excluded from it. All GALA), its main strength and contribution are its generality
and flexibility. FICUS was designed to perform feature discriminative ability than the best subset of given features,
generation given any feature representation specification but these new features may not have a clear physical meaning.
(mainly the set of constructor functions) using its general- It would be nice if a single sequence of data pre-processing
purpose grammar. algorithms had the best performance for each data set but this
The choice between FS and feature construction depends on is not happened. Thus, we presented the most well known
the application domain and the specific training data, which algorithms for each step of data pre-processing so that one
are available. FS leads to savings in measurements cost since achieves the best performance for their data set.
some of the features are discarded and the selected features
retain their original physical interpretation. In addition, the REFERENCES
retained features may be important for understanding the [1] Bauer, K.W., Alsing, S.G., Greene, K.A., 2000. Feature screening using
physical process that generates the patterns. On the other signal-to-noise ratios. Neurocomputing 31, 29–44.
hand, transformed features generated by feature construction [2] M. Boulle. Khiops: A Statistical Discretization Method of Continuous
Attributes. Machine Learning 55:1 (2004) 53-69
may provide a better discriminative ability than the best subset [3] Breunig M. M., Kriegel H.-P., Ng R. T., Sander J.: ‘LOF: Identifying
of given features, but these new features may not have a clear Density-Based Local Outliers’, Proc. ACM SIGMOD Int. Conf. On
physical meaning. Management of Data (SIGMOD 2000), Dallas, TX, 2000, pp. 93-104.
[4] Brodley, C.E. and Friedl, M.A. (1999) "Identifying Mislabeled Training
Data", AIR, Volume 11, pages 131-167.
VIII. CONCLUSION [5] Bruha and F. Franek: Comparison of various routines for unknown
Machine learning algorithms automatically extract knowledge attribute value processing: covering paradigm. International Journal of
from machine-readable information. Unfortunately, their Pattern Recognition and Artificial Intelligence, 10, 8 (1996), 939-955
[6] J.R. Cano, F. Herrera, M. Lozano. Strategies for Scaling Up
success is usually dependant on the quality of the data that Evolutionary Instance Reduction Algorithms for Data Mining. In: L.C.
they operate on. If the data is inadequate, or contains Jain, A. Ghosh (Eds.) Evolutionary Computation in Data Mining,
extraneous and irrelevant information, machine learning Springer, 2005, 21-39
algorithms may produce less accurate and less understandable [7] C. Cardie. Using decision trees to improve cased-based learning. In
Proceedings of the First International Conference on Knowledge
results, or may fail to discover anything of use at all. Thus, Discovery and Data Mining. AAAI Press, 1995.
data pre-processing is an important step in the machine [8] M. Dash, H. Liu, Feature Selection for Classification, Intelligent Data
learning process. The pre-processing step is necessary to Analysis 1 (1997) 131–156.
resolve several types of problems include noisy data, [9] S. Das. Filters, wrappers and a boosting-based hybrid for feature
selection. Proc. of the 8th International Conference on Machine
redundancy data, missing data values, etc. All the inductive Learning, 2001.
learning algorithms rely heavily on the product of this stage, [10] T. Elomaa, J. Rousu. Efficient multisplitting revisited: Optima-
which is the final training set. preserving elimination of partition candidates. Data Mining and
By selecting relevant instances, experts can usually remove Knowledge Discovery 8:2 (2004) 97-126
[11] Fayyad U., and Irani K. (1993). Multi-interval discretization of
irrelevant ones as well as noise and/or redundant data. The continuous-valued attributes for classification learning. In Proc. of the
high quality data will lead to high quality results and reduced Thirteenth Int. Joint Conference on Artificial Intelligence, 1022-1027.
costs for data mining. In addition, when a data set is too huge, [12] Friedman, J.H. 1997. Data mining and statistics: What’s the connection?
it may not be possible to run a ML algorithm. In this case, Proceedings of the 29th Symposium on the Interface Between Computer
Science and Statistics.
instance selection reduces data and enables a ML algorithm to [13] Marek Grochowski, Norbert Jankowski: Comparison of Instance
function and work effectively with huge data. Selection Algorithms II. Results and Comments. ICAISC 2004a: 580-
In most cases, missing data should be pre-processed so as to 585.
allow the whole data set to be processed by a supervised ML [14] Jerzy W. Grzymala-Busse and Ming Hu, A Comparison of Several
Approaches to Missing Attribute Values in Data Mining, LNAI 2005,
algorithm. Moreover, most of the existing ML algorithms are
pp. 378−385, 2001.
able to extract knowledge from data set that store discrete [15] Isabelle Guyon, André Elisseeff; An Introduction to Variable and
features. If the features are continuous, the algorithms can be Feature Selection, JMLR Special Issue on Variable and Feature
integrated with a discretization algorithm that transforms them Selection, 3(Mar):1157--1182, 2003.
[16] Hernandez, M.A.; Stolfo, S.J.: Real-World Data is Dirty: Data Cleansing
into discrete attributes. A number of studies [23], [20]
and the Merge/Purge Problem. Data Mining and Knowledge Discovery
comparing the effects of using various discretization 2(1):9-37, 1998.
techniques (on common ML domains and algorithms) have [17] Hall, M. (2000). Correlation-based feature selection for discrete and
found the entropy based methods to be superior overall. numeric class machine learning. Proceedings of the Seventeenth
Feature subset selection is the process of identifying and International Conference on Machine Learning (pp. 359–366).
[18] K. M. Ho, and P. D. Scott. Reducing Decision Tree Fragmentation
removing as much of the irrelevant and redundant information Through Attribute Value Grouping: A Comparative Study, in Intelligent
as possible. Feature wrappers often achieve better results than Data Analysis Journal, 4(1), pp.1-20, 2000.
filters due to the fact that they are tuned to the specific [19] Hu, Y.-J., & Kibler, D. (1996). Generation of attributes for learning
interaction between an induction algorithm and its training algorithms. Proc. 13th International Conference on Machine Learning.
[20] J. Hua, Z. Xiong, J. Lowey, E. Suh, E.R. Dougherty. Optimal number of
data. However, they are much slower than feature filters. features as a function of sample size for various classification rules.
Moreover, the problem of feature interaction can be addressed Bioinformatics 21 (2005) 1509-1515
by constructing new features from the basic feature set [21] Norbert Jankowski, Marek Grochowski: Comparison of Instances
(feature construction). Generally, transformed features Selection Algorithms I. Algorithms Survey. ICAISC 2004b: 598-603.
[22] Knorr E. M., Ng R. T.: ‘A Unified Notion of Outliers: Properties and
generated by feature construction may provide a better Computation’, Proc. 4th Int. Conf. on Knowledge Discovery and Data
Mining (KDD’97), Newport Beach, CA, 1997, pp. 219-222.
[23] R. Kohavi and M. Sahami. Error-based and entropy-based discretisation [51] Zheng (2000), Constructing X-of-N Attributes for Decision Tree
of continuous features. In Proceedings of the Second International Learning, Machine Learning, 40, 35–75, 2000, Kluwer Academic
Conference on Knowledge Discovery and Data Mining. AAAI Press, Publishers.
1996.
[24] Kononenko, I., Simec, E., and Robnik-Sikonja, M.(1997).Overcoming
the myopia of inductive learning algorithms with RELIEFF. Applied
Intelligence, 7: 39–55.
[25] S. B. Kotsiantis, P. E. Pintelas (2004), Hybrid Feature Selection instead S. B. Kotsiantis received a diploma in mathematics, a Master and a Ph.D.
of Ensembles of Classifiers in Medical Decision Support, Proceedings of degree in computer science from the University of Patras, Greece. His
Information Processing and Management of Uncertainty in Knowledge- research interests are in the field of data mining and machine learning. He has
Based Systems, July 4-9, Perugia - Italy, pp. 269-276. more than 40 publications to his credit in international journals and
[26] Kubat, M. and Matwin, S., 'Addressing the Curse of Imbalanced Data conferences.
Sets: One Sided Sampling', in the Proceedings of the Fourteenth D. Kanellopoulos received a diploma in electrical engineering and a Ph.D.
International Conference on Machine Learning, pp. 179-186, 1997. degree in electrical and computer engineering from the University of Patras,
[27] Lakshminarayan K., S. Harp & T. Samad, Imputation of Missing Data in Greece. He has more than 40 publications to his credit in international journals
Industrial Databases, Applied Intelligence 11, 259–275 (1999). and conferences.
[28] Langley, P., Selection of relevant features in machine learning. In: P. E. Pintelas is a Professor in the Department of Mathematics, University of
Proceedings of the AAAI Fall Symposium on Relevance, 1–5, 1994. Patras, Greece. His research interests are in the field of educational software
[29] P. Langley and S. Sage. Induction of selective Bayesian classifiers. In and machine learning. He has more than 100 publications in international
Proc. of 10th Conference on Uncertainty in Artificial Intelligence, journals and conferences.
Seattle, 1994.
[30] Ling, C. and Li, C., 'Data Mining for Direct Marketing: Problems and
Solutions', Proceedings of KDD-98.
[31] Liu, H. and Setiono, R., A probabilistic approach to feature selection—a
filter solution. Proc. of International Conference on ML, 319–327, 1996.
[32] H. Liu and R. Setiono. Some Issues on scalable feature selection. Expert
Systems and Applications, 15 (1998) 333-339. Pergamon.
[33] Liu, H. and H. Metoda (Eds), Instance Selection and Constructive Data
Mining, Kluwer, Boston, MA, 2001
[34] H. Liu, F. Hussain, C. Lim, M. Dash. Discretization: An Enabling
Technique. Data Mining and Knowledge Discovery 6:4 (2002) 393-423.
[35] Maas W. (1994). Efficient agnostic PAC-learning with simple
hypotheses. Proc. of the 7th ACM Conf. on Computational Learning
Theory, 67-75.
[36] Markovitch S. & Rosenstein D. (2002), Feature Generation Using
General Constructor Functions, Machine Learning, 49, 59–98, 2002.
[37] Oates, T. and Jensen, D. 1997. The effects of training set size on
decision tree complexity. In ML: Proc. of the 14th Intern. Conf., pp.
254–262.
[38] Pfahringer B. (1995). Compression-based discretization of continuous
attributes. Proc. of the 12th International Conference on Machine
Learning.
[39] S. Piramuthu. Evaluating feature selection methods for learning in data
mining applications. European Journal of Operational Research 156:2
(2004) 483-494
[40] Pyle, D., 1999. Data Preparation for Data Mining. Morgan Kaufmann
Publishers, Los Altos, CA.
[41] Quinlan J.R. (1993), C4.5: Programs for Machine Learning, Morgan
Kaufmann, Los Altos, California.
[42] Reinartz T., A Unifying View on Instance Selection, Data Mining and
Knowledge Discovery, 6, 191–210, 2002, Kluwer Academic Publishers.
[43] Rocke, D. M. and Woodruff, D. L. (1996) “Identification of Outliers in
Multivariate Data,” Journal of the American Statistical Association, 91,
1047–1061.
[44] Setiono, R., Liu, H., 1997. Neural-network feature selector. IEEE Trans.
Neural Networks 8 (3), 654–662.
[45] M. Singh and G. M. Provan. Efficient learning of selective Bayesian
network classifiers. In Machine Learning: Proceedings of the Thirteenth
International Conference on Machine Learning. Morgan Kaufmann,
1996.
[46] Somol, P., Pudil, P., Novovicova, J., Paclik, P., 1999. Adaptive floating
search methods in feature selection. Pattern Recognition Lett. 20
(11/13), 1157–1163.
[47] P. Somol, P. Pudil. Feature Selection Toolbox. Pattern Recognition 35
(2002) 2749-2759.
[48] C. M. Teng. Correcting noisy data. In Proc. 16th International Conf. on
Machine Learning, pages 239–248. San Francisco, 1999.
[49] Yang J, Honavar V. Feature subset selection using a genetic algorithm.
IEEE Int Systems and their Applications 1998; 13(2): 44–49.
[50] Yu and Liu (2003), Proceedings of the Twentieth International
Conference on Machine Learning (ICML-2003), Washington DC.