Earticle

현재 위치 Home

Imbalanced Data SVM Classification Method Based on Cluster Boundary Sampling and DT-KNN Pruning

첫 페이지 보기
  • 발행기관
    보안공학연구지원센터(IJSIP) 바로가기
  • 간행물
    International Journal of Signal Processing, Image Processing and Pattern Recognition 바로가기
  • 통권
    Vol.7 No.2 (2014.04)바로가기
  • 페이지
    pp.61-68
  • 저자
    Li Peng, Yu Xiao-yang, Bi Ting-ting, Huang Jiu-ling
  • 언어
    영어(ENG)
  • URL
    https://www.earticle.net/Article/A230994

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

원문정보

초록

영어
This paper presents a SVM classification method based on cluster boundary sampling and sample pruning. We actively explore an effective solution to solve the difficult problem of imbalanced data set classification from data re-sampling and algorithm improving. Firstly, we creatively propose the method of cluster boundary sampling, using the clustering density threshold and the boundary density threshold to determine the cluster boundaries, in order to guide the process of re-sampling more scientifically and accurately. Secondly, we put forward a new sample pruning algorithm based on dynamic threshold KNN to deal with the complexity and overlapping problem of imbalanced data set. The phenomenon of data complexity and overlapping will reduce the classification performance and generalization ability of SVM classifier. Experiments show that our method acquires obviously promotion effect in various different imbalanced data sets and it can prove the validity and st

목차

Abstract
 1. Introduction
 2. Cluster Boundary Sampling Method based on Density Clustering
  2.1. Density Clustering Algorithm
  2.2. Cluster Boundary Under-sampling Method
 3. Pruning Algorithm based on Dynamic Threshold KNN
  3.1. Complexity and Overlapping Analysis of Imbalanced Data Set
  3.2. DT-KNN Pruning Algorithm
 4. The Results and Analysis of Experiment
 5. Conclusion
 Acknowledgements
 References

키워드

Imbalanced Data Sets Support Vector Machine Cluster Sampling Sample pruning Classification

저자

  • Li Peng [ Higher Educational Key Laboratory for Measuring and Control Technology, Instrumentations of Heilongjiang Province, Harbin University of Science and Technology, 150080 Harbin, China, School of Computer Science and Technology, Harbin University of Science and Technology, 150080 Harbin, China ]
  • Yu Xiao-yang [ Higher Educational Key Laboratory for Measuring and Control Technology, Instrumentations of Heilongjiang Province, Harbin University of Science and Technology, 150080 Harbin, China ]
  • Bi Ting-ting [ School of Computer Science and Technology, Harbin University of Science and Technology, 150080 Harbin, China ]
  • Huang Jiu-ling [ School of Computer Science and Technology, Harbin University of Science and Technology, 150080 Harbin, China ]

참고문헌

자료제공 : 네이버학술정보

간행물 정보

발행기관

  • 발행기관명
    보안공학연구지원센터(IJSIP) [Science & Engineering Research Support Center, Republic of Korea(IJSIP)]
  • 설립연도
    2006
  • 분야
    공학>컴퓨터학
  • 소개
    1. 보안공학에 대한 각종 조사 및 연구 2. 보안공학에 대한 응용기술 연구 및 발표 3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최 4. 보안공학 기술의 상호 협조 및 정보교환 5. 보안공학에 관한 표준화 사업 및 규격의 제정 6. 보안공학에 관한 산학연 협동의 증진 7. 국제적 학술 교류 및 기술 협력 8. 보안공학에 관한 논문지 발간 9. 기타 본 회 목적 달성에 필요한 사업

간행물

  • 간행물명
    International Journal of Signal Processing, Image Processing and Pattern Recognition
  • 간기
    격월간
  • pISSN
    2005-4254
  • 수록기간
    2008~2016
  • 십진분류
    KDC 505 DDC 605

이 권호 내 다른 논문 / International Journal of Signal Processing, Image Processing and Pattern Recognition Vol.7 No.2

    피인용수 : 0(자료제공 : 네이버학술정보)

    함께 이용한 논문 이 논문을 다운로드한 분들이 이용한 다른 논문입니다.

      페이지 저장