Web Spam Detection Using Multiple Kernels in Twin Support Vector Machine
|
|
- Anissa Carroll
- 5 years ago
- Views:
Transcription
1 Web Spam Detecton Usng Multple Kernels n Twn Support Vector Machne ABSTRACT Seyed Hamd Reza Mohammad, Mohammad Al Zare Chahook Yazd Unversty, Yazd, Iran mohammad_6468@stu.yazd.ac.r chahook@yazd.ac.r Search engnes are the most mportant tools for web data acquston. Web pages are crawled and ndexed by search Engnes. Users typcally locate useful web pages by queryng a search engne. One of the challenges n search engnes admnstraton s spam pages whch waste search engne resources. These pages by decepton of search engne rankng algorthms try to be showed n the frst page of results. There are many approaches to web spam pages detecton such as measurement of HTML code style smlarty, pages lngustc pattern analyss and machne learnng algorthm on page content features. One of the famous algorthms has been used n machne learnng approach s Support Vector Machne (SVM) classfer. Recently basc structure of SVM has been changed by new extensons to ncrease robustness and classfcaton accuracy. In ths paper we mproved accuracy of web spam detecton by usng two nonlnear kernels nto Twn SVM (TSVM) as an mproved extenson of SVM. The classfer ablty to data separaton has been ncreased by usng two separated kernels for each class of data. Effectveness of new proposed method has been expermented wth two publcly used spam datasets called UK-2007 and UK Results show the effectveness of proposed kernelzed verson of TSVM n web spam page detecton. Indexng terms/keywords Search Engne, Web Spam Page Detecton, Machne Learnng, Twn Support Vector Machne (TSVM), Multple Kernels. 1.Introducton The ever-ncreasng volume of nformaton on the Internet has made search engnes vtal tools for nformaton extracton. From a theoretcal pont of vew, search engnes are nformaton retreval tools responsble for downloadng, ndexng, processng, retrevng, and rankng of nformaton [1]. Malcous content on the Internet, poses a unque challenge for search engnes; one that other nformaton retreval systems do not normally face. Malcous content refers to decetful nformaton created for the purpose of manpulatng a search engne s results. The open nature of the Internet allows any ndvdual to create and dstrbute arbtrary content. Thus, malcous content cannot be avoded. Web pages whch attempt to manpulate a search engne s results are the most mportant type of malcous content. Such pages are called Spam Pages. Other types of malcous content nclude spam queres, spam posts and Fshng pages. Most webste owners want to have hgher-rankng pages. Ths s because only 15% of users vst the second page of search engne results before changng ther query. Thus, search engnes are constantly tryng to assgn better ranks to the most relevant results. Ths mprovement ncreases ther revenue and popularty. Such attempts can be exploted, and led to the creaton of spam pages by profteers [2]. It should be noted that not all spam pages have commercal or explotve purposes. The contents of these pages dffer from the user s expectatons. They am to penetrate rankng algorthms and, therefore, can be classfed as spam pages. The man purpose of spam pages s to fraud rankng algorthms, wth the am of achevng a hgher rank among the top ten search engne s results of varous queres, as fast as possble [3]. Fg.1 llustrates a sample spam page. Snce the text n each page nclude multple valuable keywords, the content of the page s nsgnfcant for the user. From the perspectve of search engne, the most mportant effect of spam pages s dmnuton of search engne user s trust. Furthermore, the large number of spam pages, forces search engnes to allocate more resources (bandwdth, storage space, software) to crawlng, ndexng, storng, and processng contents of these pages. 1 P a g e
2 Fgure 1: An example spam page; although t contans popular keywords, the overall content s useless to a human user. Spam pages manly am to corrupt rankng algorthms n search engnes. Rankng s done by search engne whch estmates the qualty of a page wth respect to a partcular query. In other words, one scores s assgned to each retreved document. Documents are sorted n decreasng (or ncreasng) order of ther scores. Search engnes often use the followng measures to rank web pages: a) Relevance, measured as the degree of smlarty between the nput query and the text of the web page. b) Importance, nput query s gnored n t. Ths measure can be calculated as the number of tmes other pages are lnked to a certan page. As mentoned earler, spam pages are created wth the am of obtanng a hgh rank n a search engne s results. As a result, they are created wth the rankng algorthms n mnd [1]. The content of a spam page s organzed to match more queres. Therefore, a varety of useful keywords are used so that more user queres can be matched. Also, web spam content are changed based on the structure of web pages. Therefore, content rankng algorthms assgn hgher scores to these pages. If the goal s to match the target page to a certan request, then the target keywords need to be repeated multple tmes. In 2006, Najork et al. [4] presented an approach based on content analyss, usng examnaton of varous features of spam and non-spam pages. Ther fndngs formed a bass for dentfyng spam pages. Creatng a hgh number of lnks s another method used by spammers to mprove ther rank. In [6-8] a dfferent approach, based on the lnks between pages n the web graph, s used for detecton. The graph and patterns that emerge from t are used to dfferentate spam and non-spam pages. There have also been attempts to combne deas form both methods to acheve satsfactory results. In [5], spam pages are detected usng a combnaton of content-based and lnk-based methods. In recent years, user behavor has also been a decsve factor n detectng spam pages. Lu et al. [9] presented a behavor-based method. Modern technques for creatng spam pages nclude nformaton hdng, where users are encountered wth dfferent versons of pages compared to search engne crawlers. Varous methods of spam detecton have been proposed, ncludng those based on codng-style smlarty [18] and language pattern analyss [11]. Machne learnng algorthms have also been appled to page features [12-16]. The majorty of methods nvolved n creatng spam pages rely on content-based technques. Thus, analyzng the content features of these pages wll mprove much more effcency compared to other methods. Web pages have certan features that can be extracted usng content analyss. The values for these features are sgnfcantly dfferent across spam and non-spam pages. Snce the detecton problem seeks to label pages as ether spam or normal, t can be converted to a classfcaton problem wth two classes. Therefore, once 2 P a g e
3 features of page content are extracted and a sutable set of pages are labeled (normal or spam), a proper classfer can be used to determne the beng spam of unlabeled pages collected by a search engne. Machne learnng methods use classfcaton algorthms to extract and detect patterns among normal and spam pages. Usng more powerful algorthms can ncrease the accuracy of detecton. In prevous researches, Hdden Markov Model [12], Decson tree [13], Bayesan networks [14], and artfcal neural network [15] are used to separate spam nstances from non-spam ones. Many machne learnng algorthms have been used for the bnary classfcaton problem. Support Vector Machne (SVM) s one of these algorthms, whch offers favorable results. SVM despte s successfully appled to many problems of dfferentatng postve and negatve nstances, sutable accuracy has not been reported for web spam detecton by t. However, studes on other applcatons demonstrate that new extensons of SVM have sgnfcantly superor performance [19]. Such versons am to mprove ts performance on dfferent data through changes n SVM structure. SVM s bnary classfer, whch constructs a hyper-plane among nstances such that the dstance from the nstances s maxmzed and, thus, a good separaton s acheved. In an extended verson of t, namely the Twn SVM (TWSVM), two separate hyper-planes are used for each class nstances. Based on the nature of web pages and number of extracted features n them, ths verson of SVM can be used for web spam classfcaton. In some cases, samples cannot be separated lnearly by ther attrbutes. The concept of kernel has been ntroduced n machne learnng methods to solve ths problem. In ths approach, the data are frst logcally mapped to a hgher-dmensonal space. The new dmensons are created such that they can be lnearly separated wth more accuracy, usng hyper-planes [21]. In ths paper, TSVM wth two non-lnear kernels s used for spam page detecton. The man nnovaton of the proposed method s embeddng two dfferent sutable kernels for each hyperplane n TSVM. Expermental results on UK-2006 and UK-2007 datasets demonstrated the effectveness of the proposed method for detectng spam pages. The remander of the paper s organzed as follows. Secton 2 presents a revew of varous extensons to the SVM. The mportance of usng non-lnear kernels s consdered n secton 3. The detals of the proposed method are dscussed n secton 4. Secton 5 presents the expermental results. Fnally, n secton 6, the concludng remarks and suggestons for future works are offered. 2- SVM Extensons Support Vector Machne (SVM) s a non-statstcal bnary classfer, whch has attracted a lot of attentons n recent years. In ths method, all the nstances are used n conjuncton wth an optmzaton algorthm to fnd nstances that form the boundares of classes. Usng these nstances, an optmal lnear decson boundary s created to separate classes, and t s solved usng the Quadratc Programmng Problem (QPP) [23]. Ths classfer does not rely on statstcs; the tranng ponts are drectly used to determne the decson boundary between two classes. Proxmal Support Vector Machne (PSVM) s a new verson of the SVM, whch ams to reduce computatonal costs. In ths algorthm, two parallel hyper-planes, rather than one, are used to separate nstances. Generalzed Egenvalue Proxmal SVM (GEPSVM), uses two non-parallel hyper-planes, each of whch s placed near one of the two classes. Snce a large QPP must be solved, the algorthm becomes very costly. 3 P a g e
4 The mproved GEPSVM, called Twn SVM (TWSVM), elmnates ths problem by solvng two smaller nstances of QPP. Therefore, computatonal cost s decreased, whle the algorthm becomes more robust. Then, a varaton of TWSVM, namely the Least Square TWSVM was ntroduced. The fnal soluton of the algorthm s obtaned by solvng two lnear equatons, rather than two QPPs. Although the algorthm s easer, however t s less robust, due to ts senstvty to nose. Knowledge-based TWSVM s another verson of TWSVM, whch uses current nstances along wth prevous knowledge to separate nstances nto two classes. Compared to other knowledge-based algorthms, t offers less complexty tme. In order to mprove the structure of TWSVM, Smooth TWSVM was ntroduced. The most mportant change n ths verson of the algorthm s the elmnaton of QPP lmtatons. 3- Non-lnear Kernels Usng lnear models for classfcaton s much easer and faster than non-lnear counterparts. Lnear models work on data that can be separable lnearly. Often, developng of lnear models s more approprate than non-lnear ones, snce they are assocated wth lower complexty tme. However, n some cases, the nstances are not ntrnscally lnear. Such nstances must be mapped to a more dmensonal space, where a lnear model s applcable. Fg.2 llustrates how the data are mapped to a new space. Mappng to a hghdmensonal space s not always straghtforward manner and can mpose much more costs than prmary dmenson space. By offerng a way to reduce assocated costs, the dea of kernel addresses ths shortcomng. A kernel mplctly maps the data to a hgher-dmensonal space. In order to classfy non-lnear data n a lnear manner, the SVM needs to use the dea of a kernel, whch leads to enhanced classfcaton capabltes [21]. Fgure 2 dea of usng kernel Generally, n algorthms where data are n the form of dot products, the dea of a kernel can be appled. There are varous types of kernel functons. Polynomal, Gaussan, lnear, and fuzzy are more common kernel functons [21]. Usng kernel functons together wth SVMs s lead to performance mprovement of bnary classfcaton. 4- Proposed Method In ths paper, non-lnear kernels n the extended SVM are used to present a bnary classfer, wth superor performance n detectng spam pages. In the followng, the learnng structure of the SVM s dscussed n detal. Next, the non-lnear kernels n the TWSVM are ntroduced. Fnally, the proposed method,.e. Multple Kernel TSVM, s presented. As shown n secton of expermental results, ths method mproves the accuracy of detectng spam pages. 4 P a g e
5 4-1- TSVM The TSVM was frst ntroduced by Jayada [22], based on the normal SVM. In ths algorthm, nstead of usng a sngle plane and ncreasng ts margns toward bnary classfcaton, two non-parallel planes are used to separate nstances nto two classes. In ths classfer, each class s determned usng one of the hyper-planes. The procedure s demonstrated n Fg.3. Fgure 3: Operaton of Twn Support Vector Machne (TSVM) Assume that we are gven a set of data contanng postve and negatve nstances. In order to separate them, two equatons are formed for each hyper-plane, whch can segregate the data n TWSVM n a lnear fashon. F ( X ) W X b, F ( X ) W X b (1) T T where W W b, n, and b In the next step, two QPPs must be solved to obtan the optmal hyper-planes. QPPs can be challengng to solve; thus, they should be smplfed and solved usng Lagrange s method of undetermned coeffcents. Once the QPP s solved, the fnal equaton of the TWSVM to separate the nstances s obtaned n as follows. Class arg x w b mn (2) 1,2 w x w T where. s the absolute value and refers to classes of nstances Any new nstance can be classfed usng Eq(2) Usng kernels n the TWSVM As mentoned earler, n order to convert non-lnear classfcaton to a lnear one, nstances are mapped to a new hgh-dmensonal space before classfcaton phase. In secton 3, the dea of mappng the data to a new space was explaned n detal. Furthermore, n the prevous subsecton, the fnal equaton for the TWSVM classfer was presented. Here, we am to rewrte ths equaton usng a kernel functon. Eq(3) shows the fnal classfer by kernel desgn. 5 P a g e
6 Class arg K( x, C ) w b mn w K( x, C ) w 1,2 T (3) Where K s kernel functon whch maps data to hgher dmenson and any arbtrary kernel can be used to replace K, n ths equaton Multple non-lnear kernels n the TWSVM As prevously mentoned, n ths paper for the frst tme two separate kernels are adjusted n TWSVM. The ratonale behnd ths s the nature of spam pages as well as the dstrbuton of nstance. Ths paper tres to mprove classfcaton performance by desgnng two sutable kernels, both of whch are used to map the nput data to a new space. In the followng, detals of desgnng and matchng two approprate kernels for the TWSVM are dscussed. In subsecton 4-2, kernel desgn n the TSVM s explaned. Based on dmenson space of samples, an effcent kernel must be desgned to separate the samples both lnearly and optmally, n the new space. The choce or desgn of the kernel functon has a drect mpact on the effcency of the classfer algorthm. Kernel functons can be created as combnatons of standard kernels. The resultng kernel must satsfy Mercer s condton (Mercer s theorem checks the valdty of kernel functons). In ths paper, a sutable kernel functon for spam web pages s obtaned usng the method of fxed rule and a combnaton of two standard kernels. The frst kernel s lnear, whch s powerful and has low computatonal costs. The lnear kernel s shown n Eq(4). K( X, X j ) = X. X j + b (4) where X n, X j and b Lnear kernel s most effectve when the data are normally dstrbuted. Snce non-spam pages have a normal dstrbuton, ths kernel functon s used to map these nput nstances to a new space. The other kernel functon s the hyperbolc tangent, whch s used for non-lnear patterns n the data. The functon can be seen n Eq(5). K( X, X j ) = tanh (k X. X j - b) (5) where X n, X j and k, b Snce each kernel functon creates a smlarty matrx, t must be desgned such that the matrx for each nstance of the two classes matches the real patterns n the data. Therefore, the choce of the functon s very mportant. In ths paper, the lnear method s used, whch offers smplcty whle mantanng the advantages of both kernel functons. Eq(6) presents the lnear combnaton of the two functons. K = tanh(k X tran X t ' -b) 2 + ( X tran X t' ) (6) where X tran s the set of postve nstances (spam) and X t represents the entre set of data. After several experments, the coeffcents k and b were assgned 1 and 0, respectvely. A functon must satsfy Mercer s condtons before t can be consdered a kernel functon. The condtons are true for the proposed functon. 6 P a g e
7 After the approprate kernel s chosen, t must be adapted to the TSVM. As shown earler, n the TWSVM classfer the class of a new nstance s determned usng Eq(7). Class K( x, C ) w b arg mn 1,2 T (7) w K( x, C ) w In the proposed method, Eq(6) s appled to spam pages, whereas Eq(4) s used for normal nstances. As mentoned before, the TWSVM classfer uses two separate hyper-planes for each nstance, whch allows the mappng of the nput data to a new space. As a result, the hyper-planes become more effectve n segregatng of nstances. After the desgned kernel s adjusted to the TWSVM, the classfer must be traned. A porton of nstancesn each dataset s used for tranng purposes. The traned classfer can then determne whch class each new nstance belongs. 5- Expermental Results In ths secton, we present the detals of mplementaton and testng of the proposed algorthm, ncludng descrpton of datasets, evaluaton crteron, and expermental results Dataset In order to tran, execute, and determne the accuracy of the proposed algorthm, UK-2006 and UK-2007 datasets were used. These data sets have been used n numerous studes on spam pages. UK-2006 contans around hosts from.uk doman where 61.75% of documents are labeled as normal, 22.08% as spam, and 16.16% as unknown [26]. UK-2007 holds hosts from.uk doman where 94% of them are labeled as normal and the remanng 6% are spam. In ths paper we gnore documents wth Unknown label. The samples n two datasets are randomly dvded nto two parts, 75% as tran and other 25% as test sets Evaluaton In order to present the algorthm s results and compare them to those of other algorthms, a standard crteron s necessary for evaluaton. Accuracy s a measure of how many nstances are classfed correctly. It s popular n the context of decepton detecton. Compared to other measures, t s qute robust. TP TN Accuracy (8) P N In order to evaluate the accuracy of our classfer, we employed a technque known as ten-fold cross valdaton [4]. Ten-fold cross valdaton nvolves dvdng the judged data set randomly nto 10 equally-szed parttons, and performng 10 tranng/testng steps, where each step uses nne parttons to tran the classfer and the remanng partton to test ts effectveness Comparson of the proposed algorthm to SVMs Despte acceptable performance n classfyng varous types of data, the standard SVM algorthm has faled n the context of spam pages. The standard SVM was mplemented usng several kernels. A comparson of the results can be seen n Table 1. As evdent, the choce of kernel does not lead to sgnfcant changes n algorthm s performance, whch may be due to ts own structure. The standard SVM only uses one separatng plane; thus, t s not able to dfferentate between relatvely smlar spam and normal nstances. There are 7 P a g e
8 many smlar nstances wth opposng labels n the data sets. As a result, the SVM classfer demonstrates poor performance n web spam detecton. Table 1: Comparson between proposed method wth SVM and TWSVM by dfferent kernels Algorthm Kernel )%( Accuracy UK-2006 )%( Accuracy UK-2007 Lnear SVM RBF Hyperbolc Lnear TWSVM (One Kernel) RBF Custom Kernel TWSVM (Two Kernel) Kernel1 = Lnear Kernel2 = RBF Kernel1 = RBF Kernel2 = CK Kernel1 = Lnear Kernel2 = CK Comparson to other algorthms As mentoned before, dfferent classfers have been used for web sapm detecton, ncludng decson trees [14] and artfcal neural networks [16]. Furthermore, other studes such as [13] and [15] use dfferent algorthms, whch cannot be compared to the proposed algorthm due to ncompatble datasets. Tables 2 and 3 present our results along wth those of the most accurate algorthms n KU-2006, UK-2007 respectvely. Table 2: Comparson between proposed method wth other algorthm Algorthm Neural Network [16] HMM [13] Decson Tree[14] TWSVM MKTWSVM UK-2006 )%( Accuracy F-M Table 3: Comparson between proposed method wth other algorthm UK-2007 Algorthm Genetc Algorthm [24] Supervsed Neural Network [25] HTWSVM )%( Accuracy P a g e
9 MKTWSVM 95.6 MKTWSVM whch uses two hyper-planes to separate nstances of the two classes, wth two kernels for each, s able to acheve acceptable accuracy. Interestngly, n ths method, the nput data are mapped such that a lnear model can be used for dfferentaton. The choce and desgn of the kernel s an mportant ssue n ths problem. The proposed kernel n ths paper mproves the accuracy of a lnear classfer. Thus, a non-lnear kernel can be consdered the key component of a classfer. As shown n Table 3, nearly 3% of the ncrease n accuracy s assocated wth two separate kernels n the structure of the TWSVM. Advantages of ths method nclude low computatonal complexty snce the algorthm works n lnear space. 6- Concluson and Future Works In ths paper, by usng two non-lnear kernels n TSVM, hgh accuracy n detectng spam pages was acheved. Furthermore, n order to demonstrate the effectveness of non-lnear kernels, SVM and TWSVM were tested both wth and wthout kernel functons. The proposed method proved that two non-lnear kernels n TWSVM ncreases accuracy and reduces computatonal complexty. An avenue for future studes nvolves alterng the structure of extended versons of SVM so that accuracy s ncreased and computatonal complexty becomes more satsfactory. Moreover, snce the optmal combnaton of basc kernel functons for ether of the hyper-planes can mprove classfcaton accuracy, genetc programmng can be ncorporated to fnd the optmal combnaton of basc kernel functons. References [1] G. V. Cormack, M. D. Smucker, and C. L. A. Clarke, Effcent and effectve spam flterng and re-rankng for large web datasets, Informaton Retreval, pp. 1-25, [2] P. T. Metaxas and J. DeStefano, Web Spam, Propaganda and Trust, n Proceedngs of the 1st Internatonal Workshop on Adversaral Informaton Retreval on the Web, pp , [3] D. Fetterly, M. Manasse, and M. Najork, Spam, damn spam, and statstcs, n Proceedngs of the 7th Internatonal Workshop on the Web and Databases, pp , [4] A. Ntoulas, M. Najork, M. Manasse, and D. Fetterly, Detectng spam web pages through content analyss, n Proceedngs of the 15th Internatonal Conference on World Wde Web,Chna Bejn Unversty, pp , [5] L. Becchett, C. Castllo, D. Donato, S. Leonard, and R. Baeza-Yates, Web spam detecton: Lnk-based and content-based technques, n The European Integrated Project Dynamcally Evolvng Large Scale Informaton Systems (DELIS): Proceedngs of the Fnal Workshop, Paderborn Unversty, pp , [6] D. Zhou, J. Huang, and B. Schölkopf, Learnng from labeled and unlabeled data on a drected graph, n Proceedngs of the 22nd Internatonal Conference on Machne learnng, Brazl Pugn Unversty, pp , [7] L. Becchett, C. Castllo, D. Donato, R. Baeza-Yates, and S. Leonard, Lnk analyss for web spam detecton, ACM Transactons on the Web (TWEB), Chna, vol. 2, pp. 1-42, [8] C. Castllo, D. Donato, A. Gons, V. Murdock, and F. Slvestr, Know your neghbors: web spam detecton usng the web topology, n Proceedngs of the 30th Annual Internatonal ACM SIGIR conference on Research and Development n Informaton Retreval, Amsterdam, The Netherlands, P a g e
10 [9] Y.Lu, R.Cen, M.Zhang, S.Ma, and L.Ru. Identfyng web spam wth user behavor analyss.proceedngs of the 4th Internatonal Workshop on Adversaral Informaton Retreval on the Web, pp. 9-61, [10] B. Wu and B. D. Davson, Cloakng and redrecton: A prelmnary study, Proceedngs of the 1st Internatonal Workshop on Adversaral Informaton Retreval on the Web (AIRWeb), pp. 7, [11] K. Chellaplla and A. Maykov, Cross-Lngual Web Spam Classfcaton,n Proceedngs of the 3rd Internatonal Workshop on Adversaral Informaton Retreval on the Web, pp , [12] Hmed, H.Najadat and Ismal Web Spam Detecton Usng Machne Learnng n Specfc Doman Features Journal. of Informaton Assurance and Securty, Vol. 38, pp , [13] A.Torab, K.Taghpour, and Sh.Khadv. "Web Spam Detecton: New Approach wth Hdden Markov Models." In Informaton Retreval Technology, Vol. 13, pp , [14] Tundalwar, R.Rashm, and M.Kulkarn. "New Classfcaton Method Based on Decson Tree for Web Spam Detecton.", Internatonal Journal of Current Engneerng and Technology, Vol. 8, Issue 9, pp , [15] Son, A.Anand, and A.Mathur. "Content based web spam detecton usng nave bayes wth dfferent feature representaton technque.", Journal of Engneerng Research and Applcatons, Vol. 3, Issue 5, pp , [16] Slva, M.Renato, T.A.Almeda, and A.Yamakam. "Artfcal neural networks for content-based web spam detecton." In Proc. of the 14th Internatonal Conference on Artfcal Intellgence (ICAI 12), pp [67] S. Büttcher, C. L. A. Clarke, and G. V. Cormack, "Informaton Retreval: Implementng and Evaluatng Search Engnes". Cambrdge, Mass.: MIT Press, [68] T. Urvoy, T. Lavergne, and P. Floche, Trackng web spam wth hdden style smlarty, n Proceedngs of the 2nd Internatonal Workshop on Adversaral Informaton Retreval on the Web (AIRWeb), p , [69] S.Bernhard, A.Smola, C.Wllamson, and L.Bartlett. "New support vector algorthms". Journal of Neural computaton, Vol. 4, Issue 7, pp , [20] Dng, J.Yu, B.Q, and H.Huang. "An overvew on twn support vector machnes." Journal of Artfcal Intellgence Revew, Vol. 3, Issue 7, pp 18-27, [21] S.Taylor, John, and N.Crstann. "Kernel methods for pattern analyss", Cambrdge unversty press, MA, [22] R. Khemchandan, Jayadeva. "Twn Support Vector Machnes for Pattern Classfcaton", IEEE Transacto on Pattern Analyss and Machne Intellgence, Vol. 29, No. 5, [23] S.Taylor, John, and N.Crstann. "Support Vector Machnes and Kernel Method", Journal of Artfcal Intellgence Revew, Vol. 12, No. 5, [24] A.Keyhanpour, and B.Moshr. "Desgnng a Web Spam Classfer Based on Feature Fuson n the Layered Mult- Populaton Genetc Programmng Framework", 16th Internatonal Conference on, pp IEEE, [25] A.Chandra, M.Suab, R.Beg. "Web Spam Classfcaton Usng Supervsed Artfcal Neural Network Algorthms", Advanced Computatonal Intellgence: An Internatonal Journal, Vol.2, No.1, January [26] Castllo, Carlos, D.Donato, L.Becchett, P.Bold, S.Leonard, M.Santn, and S.Vgna. " A reference collecton for web spam ", In ACM Sgr Forum, Vol. 40, No. 2, pp ACM, [27] M.Danadeh, S.N.Razav. "Web Spam Detecton Inspred by the Immune System", Internatonal Journal of Computer Networks and Communcatons Securty, Vol. 3, No. 4, pp , P a g e
Support Vector Machines
/9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.
More informationThe Research of Support Vector Machine in Agricultural Data Classification
The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou
More informationTerm Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task
Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto
More informationSupport Vector Machines
Support Vector Machnes Decson surface s a hyperplane (lne n 2D) n feature space (smlar to the Perceptron) Arguably, the most mportant recent dscovery n machne learnng In a nutshell: map the data to a predetermned
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationClassification / Regression Support Vector Machines
Classfcaton / Regresson Support Vector Machnes Jeff Howbert Introducton to Machne Learnng Wnter 04 Topcs SVM classfers for lnearly separable classes SVM classfers for non-lnearly separable classes SVM
More informationOutline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1
4/14/011 Outlne Dscrmnatve classfers for mage recognton Wednesday, Aprl 13 Krsten Grauman UT-Austn Last tme: wndow-based generc obect detecton basc ppelne face detecton wth boostng as case study Today:
More informationMachine Learning. Support Vector Machines. (contains material adapted from talks by Constantin F. Aliferis & Ioannis Tsamardinos, and Martin Law)
Machne Learnng Support Vector Machnes (contans materal adapted from talks by Constantn F. Alfers & Ioanns Tsamardnos, and Martn Law) Bryan Pardo, Machne Learnng: EECS 349 Fall 2014 Support Vector Machnes
More informationEdge Detection in Noisy Images Using the Support Vector Machines
Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona
More informationDetermining the Optimal Bandwidth Based on Multi-criterion Fusion
Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn
More information12/2/2009. Announcements. Parametric / Non-parametric. Case-Based Reasoning. Nearest-Neighbor on Images. Nearest-Neighbor Classification
Introducton to Artfcal Intellgence V22.0472-001 Fall 2009 Lecture 24: Nearest-Neghbors & Support Vector Machnes Rob Fergus Dept of Computer Scence, Courant Insttute, NYU Sldes from Danel Yeung, John DeNero
More informationMachine Learning 9. week
Machne Learnng 9. week Mappng Concept Radal Bass Functons (RBF) RBF Networks 1 Mappng It s probably the best scenaro for the classfcaton of two dataset s to separate them lnearly. As you see n the below
More informationSmoothing Spline ANOVA for variable screening
Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory
More informationClassifier Selection Based on Data Complexity Measures *
Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.
More informationUB at GeoCLEF Department of Geography Abstract
UB at GeoCLEF 2006 Mguel E. Ruz (1), Stuart Shapro (2), June Abbas (1), Slva B. Southwck (1) and Davd Mark (3) State Unversty of New York at Buffalo (1) Department of Lbrary and Informaton Studes (2) Department
More informationBAYESIAN MULTI-SOURCE DOMAIN ADAPTATION
BAYESIAN MULTI-SOURCE DOMAIN ADAPTATION SHI-LIANG SUN, HONG-LEI SHI Department of Computer Scence and Technology, East Chna Normal Unversty 500 Dongchuan Road, Shangha 200241, P. R. Chna E-MAIL: slsun@cs.ecnu.edu.cn,
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationBOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET
1 BOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET TZU-CHENG CHUANG School of Electrcal and Computer Engneerng, Purdue Unversty, West Lafayette, Indana 47907 SAUL B. GELFAND School
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationA Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines
A Modfed Medan Flter for the Removal of Impulse Nose Based on the Support Vector Machnes H. GOMEZ-MORENO, S. MALDONADO-BASCON, F. LOPEZ-FERRERAS, M. UTRILLA- MANSO AND P. GIL-JIMENEZ Departamento de Teoría
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationTsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance
Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for
More informationFace Recognition Based on SVM and 2DPCA
Vol. 4, o. 3, September, 2011 Face Recognton Based on SVM and 2DPCA Tha Hoang Le, Len Bu Faculty of Informaton Technology, HCMC Unversty of Scence Faculty of Informaton Scences and Engneerng, Unversty
More informationAnnouncements. Supervised Learning
Announcements See Chapter 5 of Duda, Hart, and Stork. Tutoral by Burge lnked to on web page. Supervsed Learnng Classfcaton wth labeled eamples. Images vectors n hgh-d space. Supervsed Learnng Labeled eamples
More informationA New Approach For the Ranking of Fuzzy Sets With Different Heights
New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays
More informationA Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems
A Unfed Framework for Semantcs and Feature Based Relevance Feedback n Image Retreval Systems Ye Lu *, Chunhu Hu 2, Xngquan Zhu 3*, HongJang Zhang 2, Qang Yang * School of Computng Scence Smon Fraser Unversty
More informationClassification of Face Images Based on Gender using Dimensionality Reduction Techniques and SVM
Classfcaton of Face Images Based on Gender usng Dmensonalty Reducton Technques and SVM Fahm Mannan 260 266 294 School of Computer Scence McGll Unversty Abstract Ths report presents gender classfcaton based
More informationSum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints
Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan
More informationFace Recognition Method Based on Within-class Clustering SVM
Face Recognton Method Based on Wthn-class Clusterng SVM Yan Wu, Xao Yao and Yng Xa Department of Computer Scence and Engneerng Tong Unversty Shangha, Chna Abstract - A face recognton method based on Wthn-class
More informationClassifying Acoustic Transient Signals Using Artificial Intelligence
Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)
More informationLecture 5: Multilayer Perceptrons
Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented
More informationCollaboratively Regularized Nearest Points for Set Based Recognition
Academc Center for Computng and Meda Studes, Kyoto Unversty Collaboratvely Regularzed Nearest Ponts for Set Based Recognton Yang Wu, Mchhko Mnoh, Masayuk Mukunok Kyoto Unversty 9/1/013 BMVC 013 @ Brstol,
More informationFace Recognition University at Buffalo CSE666 Lecture Slides Resources:
Face Recognton Unversty at Buffalo CSE666 Lecture Sldes Resources: http://www.face-rec.org/algorthms/ Overvew of face recognton algorthms Correlaton - Pxel based correspondence between two face mages Structural
More informationUsing Neural Networks and Support Vector Machines in Data Mining
Usng eural etworks and Support Vector Machnes n Data Mnng RICHARD A. WASIOWSKI Computer Scence Department Calforna State Unversty Domnguez Hlls Carson, CA 90747 USA Abstract: - Multvarate data analyss
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationUser Authentication Based On Behavioral Mouse Dynamics Biometrics
User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA
More informationNetwork Intrusion Detection Based on PSO-SVM
TELKOMNIKA Indonesan Journal of Electrcal Engneerng Vol.1, No., February 014, pp. 150 ~ 1508 DOI: http://dx.do.org/10.11591/telkomnka.v1.386 150 Network Intruson Detecton Based on PSO-SVM Changsheng Xang*
More informationFeature Reduction and Selection
Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components
More informationFuzzy Modeling of the Complexity vs. Accuracy Trade-off in a Sequential Two-Stage Multi-Classifier System
Fuzzy Modelng of the Complexty vs. Accuracy Trade-off n a Sequental Two-Stage Mult-Classfer System MARK LAST 1 Department of Informaton Systems Engneerng Ben-Guron Unversty of the Negev Beer-Sheva 84105
More informationEfficient Text Classification by Weighted Proximal SVM *
Effcent ext Classfcaton by Weghted Proxmal SVM * Dong Zhuang 1, Benyu Zhang, Qang Yang 3, Jun Yan 4, Zheng Chen, Yng Chen 1 1 Computer Scence and Engneerng, Bejng Insttute of echnology, Bejng 100081, Chna
More informationMachine Learning: Algorithms and Applications
14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of
More information2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements
Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationHuman Face Recognition Using Generalized. Kernel Fisher Discriminant
Human Face Recognton Usng Generalzed Kernel Fsher Dscrmnant ng-yu Sun,2 De-Shuang Huang Ln Guo. Insttute of Intellgent Machnes, Chnese Academy of Scences, P.O.ox 30, Hefe, Anhu, Chna. 2. Department of
More informationCAN COMPUTERS LEARN FASTER? Seyda Ertekin Computer Science & Engineering The Pennsylvania State University
CAN COMPUTERS LEARN FASTER? Seyda Ertekn Computer Scence & Engneerng The Pennsylvana State Unversty sertekn@cse.psu.edu ABSTRACT Ever snce computers were nvented, manknd wondered whether they mght be made
More informationProper Choice of Data Used for the Estimation of Datum Transformation Parameters
Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and
More informationSubspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;
Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationChapter 6 Programmng the fnte element method Inow turn to the man subject of ths book: The mplementaton of the fnte element algorthm n computer programs. In order to make my dscusson as straghtforward
More informationDiscriminative classifiers for object classification. Last time
Dscrmnatve classfers for object classfcaton Thursday, Nov 12 Krsten Grauman UT Austn Last tme Supervsed classfcaton Loss and rsk, kbayes rule Skn color detecton example Sldng ndo detecton Classfers, boostng
More informationThe Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique
//00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy
More informationS1 Note. Basis functions.
S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type
More informationLearning-Based Top-N Selection Query Evaluation over Relational Databases
Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **
More informationCourse Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms
Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques
More informationExtraction of Fuzzy Rules from Trained Neural Network Using Evolutionary Algorithm *
Extracton of Fuzzy Rules from Traned Neural Network Usng Evolutonary Algorthm * Urszula Markowska-Kaczmar, Wojcech Trelak Wrocław Unversty of Technology, Poland kaczmar@c.pwr.wroc.pl, trelak@c.pwr.wroc.pl
More informationSUMMARY... I TABLE OF CONTENTS...II INTRODUCTION...
Summary A follow-the-leader robot system s mplemented usng Dscrete-Event Supervsory Control methods. The system conssts of three robots, a leader and two followers. The dea s to get the two followers to
More informationOutline. Type of Machine Learning. Examples of Application. Unsupervised Learning
Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton
More informationAn Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices
Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal
More informationPrivate Information Retrieval (PIR)
2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market
More informationISSN: International Journal of Engineering and Innovative Technology (IJEIT) Volume 1, Issue 4, April 2012
Performance Evoluton of Dfferent Codng Methods wth β - densty Decodng Usng Error Correctng Output Code Based on Multclass Classfcaton Devangn Dave, M. Samvatsar, P. K. Bhanoda Abstract A common way to
More informationCSCI 5417 Information Retrieval Systems Jim Martin!
CSCI 5417 Informaton Retreval Systems Jm Martn! Lecture 11 9/29/2011 Today 9/29 Classfcaton Naïve Bayes classfcaton Ungram LM 1 Where we are... Bascs of ad hoc retreval Indexng Term weghtng/scorng Cosne
More informationParallel matrix-vector multiplication
Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more
More informationCHAPTER 3 SEQUENTIAL MINIMAL OPTIMIZATION TRAINED SUPPORT VECTOR CLASSIFIER FOR CANCER PREDICTION
48 CHAPTER 3 SEQUENTIAL MINIMAL OPTIMIZATION TRAINED SUPPORT VECTOR CLASSIFIER FOR CANCER PREDICTION 3.1 INTRODUCTION The raw mcroarray data s bascally an mage wth dfferent colors ndcatng hybrdzaton (Xue
More informationIncremental Learning with Support Vector Machines and Fuzzy Set Theory
The 25th Workshop on Combnatoral Mathematcs and Computaton Theory Incremental Learnng wth Support Vector Machnes and Fuzzy Set Theory Yu-Mng Chuang 1 and Cha-Hwa Ln 2* 1 Department of Computer Scence and
More informationLearning a Class-Specific Dictionary for Facial Expression Recognition
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 16, No 4 Sofa 016 Prnt ISSN: 1311-970; Onlne ISSN: 1314-4081 DOI: 10.1515/cat-016-0067 Learnng a Class-Specfc Dctonary for
More informationAvailable online at Available online at Advanced in Control Engineering and Information Science
Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced
More informationAn Entropy-Based Approach to Integrated Information Needs Assessment
Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology
More informationExperiments in Text Categorization Using Term Selection by Distance to Transition Point
Experments n Text Categorzaton Usng Term Selecton by Dstance to Transton Pont Edgar Moyotl-Hernández, Héctor Jménez-Salazar Facultad de Cencas de la Computacón, B. Unversdad Autónoma de Puebla, 14 Sur
More informationAn Anti-Noise Text Categorization Method based on Support Vector Machines *
An Ant-Nose Text ategorzaton Method based on Support Vector Machnes * hen Ln, Huang Je and Gong Zheng-Hu School of omputer Scence, Natonal Unversty of Defense Technology, hangsha, 410073, hna chenln@nudt.edu.cn,
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationSpam Filtering Based on Support Vector Machines with Taguchi Method for Parameter Selection
E-mal Spam Flterng Based on Support Vector Machnes wth Taguch Method for Parameter Selecton We-Chh Hsu, Tsan-Yng Yu E-mal Spam Flterng Based on Support Vector Machnes wth Taguch Method for Parameter Selecton
More informationA Robust LS-SVM Regression
PROCEEDIGS OF WORLD ACADEMY OF SCIECE, EGIEERIG AD ECHOLOGY VOLUME 7 AUGUS 5 ISS 37- A Robust LS-SVM Regresson József Valyon, and Gábor Horváth Abstract In comparson to the orgnal SVM, whch nvolves a quadratc
More informationSimulation: Solving Dynamic Models ABE 5646 Week 11 Chapter 2, Spring 2010
Smulaton: Solvng Dynamc Models ABE 5646 Week Chapter 2, Sprng 200 Week Descrpton Readng Materal Mar 5- Mar 9 Evaluatng [Crop] Models Comparng a model wth data - Graphcal, errors - Measures of agreement
More informationSkew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach
Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research
More informationOptimizing Document Scoring for Query Retrieval
Optmzng Document Scorng for Query Retreval Brent Ellwen baellwe@cs.stanford.edu Abstract The goal of ths project was to automate the process of tunng a document query engne. Specfcally, I used machne learnng
More informationAn Image Fusion Approach Based on Segmentation Region
Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua
More informationPruning Training Corpus to Speedup Text Classification 1
Prunng Tranng Corpus to Speedup Text Classfcaton Jhong Guan and Shugeng Zhou School of Computer Scence, Wuhan Unversty, Wuhan, 430079, Chna hguan@wtusm.edu.cn State Key Lab of Software Engneerng, Wuhan
More informationSolitary and Traveling Wave Solutions to a Model. of Long Range Diffusion Involving Flux with. Stability Analysis
Internatonal Mathematcal Forum, Vol. 6,, no. 7, 8 Soltary and Travelng Wave Solutons to a Model of Long Range ffuson Involvng Flux wth Stablty Analyss Manar A. Al-Qudah Math epartment, Rabgh Faculty of
More informationAn Evaluation of Divide-and-Combine Strategies for Image Categorization by Multi-Class Support Vector Machines
An Evaluaton of Dvde-and-Combne Strateges for Image Categorzaton by Mult-Class Support Vector Machnes C. Demrkesen¹ and H. Cherf¹, ² 1: Insttue of Scence and Engneerng 2: Faculté des Scences Mrande Galatasaray
More informationFINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK
FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,
More informationAn Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed
More informationQuery Clustering Using a Hybrid Query Similarity Measure
Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan
More informationDesigning a Web Spam Classifier Based on
Feature Fuson n the Layered Mult- Populaton Amr Hosen Keyhanpour, Behzad Moshr School of Electrcal and Computer Engneerng, College of Engneerng, Unversty of Tehran, Tehran, Iran KEYWORD ABSTRACT Web Spam
More informationImplementation Naïve Bayes Algorithm for Student Classification Based on Graduation Status
Internatonal Journal of Appled Busness and Informaton Systems ISSN: 2597-8993 Vol 1, No 2, September 2017, pp. 6-12 6 Implementaton Naïve Bayes Algorthm for Student Classfcaton Based on Graduaton Status
More informationImpact of a New Attribute Extraction Algorithm on Web Page Classification
Impact of a New Attrbute Extracton Algorthm on Web Page Classfcaton Gösel Brc, Banu Dr, Yldz Techncal Unversty, Computer Engneerng Department Abstract Ths paper ntroduces a new algorthm for dmensonalty
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationA Deflected Grid-based Algorithm for Clustering Analysis
A Deflected Grd-based Algorthm for Clusterng Analyss NANCY P. LIN, CHUNG-I CHANG, HAO-EN CHUEH, HUNG-JEN CHEN, WEI-HUA HAO Department of Computer Scence and Informaton Engneerng Tamkang Unversty 5 Yng-chuan
More informationHelsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)
Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute
More informationThe Study of Remote Sensing Image Classification Based on Support Vector Machine
Sensors & Transducers 03 by IFSA http://www.sensorsportal.com The Study of Remote Sensng Image Classfcaton Based on Support Vector Machne, ZHANG Jan-Hua Key Research Insttute of Yellow Rver Cvlzaton and
More informationGeneral Vector Machine. Hong Zhao Department of Physics, Xiamen University
General Vector Machne Hong Zhao (zhaoh@xmu.edu.cn) Department of Physcs, Xamen Unversty The support vector machne (SVM) s an mportant class of learnng machnes for functon approach, pattern recognton, and
More informationDeep Classification in Large-scale Text Hierarchies
Deep Classfcaton n Large-scale Text Herarches Gu-Rong Xue Dkan Xng Qang Yang 2 Yong Yu Dept. of Computer Scence and Engneerng Shangha Jao-Tong Unversty {grxue, dkxng, yyu}@apex.sjtu.edu.cn 2 Hong Kong
More informationJournal of Process Control
Journal of Process Control (0) 738 750 Contents lsts avalable at ScVerse ScenceDrect Journal of Process Control j ourna l ho me pag e: wwwelsevercom/locate/jprocont Decentralzed fault detecton and dagnoss
More informationUnsupervised Learning
Pattern Recognton Lecture 8 Outlne Introducton Unsupervsed Learnng Parametrc VS Non-Parametrc Approach Mxture of Denstes Maxmum-Lkelhood Estmates Clusterng Prof. Danel Yeung School of Computer Scence and
More informationSolving two-person zero-sum game by Matlab
Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by
More informationSupport Vector Machines. CS534 - Machine Learning
Support Vector Machnes CS534 - Machne Learnng Perceptron Revsted: Lnear Separators Bnar classfcaton can be veed as the task of separatng classes n feature space: b > 0 b 0 b < 0 f() sgn( b) Lnear Separators
More informationCLASSIFICATION OF ULTRASONIC SIGNALS
The 8 th Internatonal Conference of the Slovenan Socety for Non-Destructve Testng»Applcaton of Contemporary Non-Destructve Testng n Engneerng«September -3, 5, Portorož, Slovena, pp. 7-33 CLASSIFICATION
More informationSRBIR: Semantic Region Based Image Retrieval by Extracting the Dominant Region and Semantic Learning
Journal of Computer Scence 7 (3): 400-408, 2011 ISSN 1549-3636 2011 Scence Publcatons SRBIR: Semantc Regon Based Image Retreval by Extractng the Domnant Regon and Semantc Learnng 1 I. Felc Raam and 2 S.
More information