树型混合学习模型及其应用研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
近年来,同时具有符号模型(如决策树)的可理解性及非符号模型(如神经网络)可在线学习的混合学习模型逐渐成为模式识别与理解领域的一个热门课题,它在生物医学、信息安全、故障诊断、面部表情分析等领域均显示了十分诱人的应用前景。本论文基于神经网络树和支撑向量机树,系统地研究了基于分而治之思想的树型混合学习模型的理论方法及应用,内容包括:
     1.针对连续特征输入情况提出一种基于特征自组织学习的神经网络树模型。在二值输入情况下,尽管每个专家神经网络的输入特征数很小,对连续特征问题的学习结果仍是难以解释的。为此,提出了一种基于特征自组织学习的神经网络树,并以UCI机器学习数据库中含连续特征的样本集为例验证模型的性能,实验结果表明提出的模型能够在保持识别精确率和不增加模型结构复杂度的同时,降低学习结果解释的空间复杂度。
     2.将基于特征自组织学习的神经网络树应用到入侵检测问题中。构建在KDD据库上的基于特征自组织学习的神经网络树模型获得了令人满意的训练和测试识别精确率,并从模型的学习结果中了解到对检测结果具有决定性影响的特征的信息。
     3.提出了一种基于混淆交叉的支撑向量机树学习模型(CSVMT)。首先针对复杂模式二分类问题,结合树型结构分而治之的思想,以混淆交叉因子控制相邻子节点间样例的交叉,构建二分类CSVMT模型;针对多分类问题,以启发式的方法产生教师信号,将二分类CSVMT扩展为多分类CSVMT。以双螺旋复杂二分类问题和UCI机器学习库中的多分类数据集作为仿真数据验证CSVMT模型的性能,结果说明CSVMT具有优良的泛化性能和较高的测试识别精确率。
     4.提出了基于有监督局部线性嵌入的支撑向量机树模型(SLLE-CSVMT)。为了解决高维特征空间中,每个中间节点学习结果可能包含冗余信息的问题,充分运用数据的类别信息,以及数据点之间的和各特征维之间的相互关系,本文分别采用两种训练方法实现基于有监督局部线性嵌入的支撑向量机树模型的构建。最后以UCI机器学习数据库中的optdigits样本集为例验证和分析了模型的结构和分类性能,实验表明SLLE-CSVMT学习方法能够在远低于原始特征维数的嵌入坐标空间中构建结构精简、识别性能优良的模型。
     5.针对SLLE-CSVMT模型对测试样本有较高的计算量和存储量要求的情况,提
Tree-structured hybrid learning models have been introduced by a number of authors in recent years. It combines the advantages of both symbolic and non-symbolic models to solve tough problems and indicates great potential application in the fields of biomedicine, information security, fault diagnosis and facial expression analysis. The research of this paper is focused on two types of hybrid learning models named neural network tree (NNT) and support vector machine tree (SVMT). They are hybrid decision trees in which each internal node is embedded with modular expert neural network or support vector machine. The main research contents and contributions are listed as follows:
     1. An interpretable neural network tree based on self-organized feature learning (SFL-NNT) is presented. With the assumption that the inputs are all binary numbers, the interpretation of an NNT trained on continuous features may be too complex to implement. To solve this problem, we propose an interpretable NNT learning approach through self-organized learning of continuous features. Experiments show that the recognition accuracy of SFL-NNT is competitive to that of NNT. Further, the SFL-NNT can reduce the spatial computational complexity for interpretation greatly.
     2. SFL-NNT is applied to intrusion detection problem. SFL-NNT constructed on KDD intrusion data set reaches satisfying training and test detection accuracy. Furthermore, the learned model contains the understandable information about those features of critical importance for detection.
     3. A novel hybrid-learning model named confusion-cross-based support vector machine tree (CSVMT) is proposed. The problems associated with complex two-class pattern recognition problems are firstly addressed. The construction of a CSVMT model is implemented by embedding SVMs in the internal nodes of a binary tree, in which two training subsets assigned to two internal sibling nodes perform confusion cross. A simplified heuristic method is introduced to extend binary CSVMT to a multi-classification one. Experimental results demonstrated on two-class complex distribution problem and databases taken from the machine-learning repository of UCI show that the proposed approach is
引文
[1] Broadley C E,Utgoff P E. Multivariate Decision Trees [J]. Machine Learning,1995 19:45-77
    [2] Li X B,Sweigart J R,Teng J T C,Donohue J M,et al. Multivariate decision trees using linear discriminants and tabu search [J]. IEEE Transactions on Systems, Man and Cybernetics—Part A,March,2003,33(2):194-205
    [3] Li Y H,Dong M,Kothari R. Classifiability-based omnivariate decision trees [J].IEEE Transactions on Neural Networks,November,2005,16(6):1547-1560
    [4] Yildiz C T,Alpaydin E. Omnivariate decision trees [J]. IEEE Transactions on Neural Networks,November,2001,12(6):1539-1546
    [5] Murthy S K,Kasif S,Salzberg S. A system for induction of oblique decision trees [J]. Artificial Intelligence Research,1994,2(1):1-32
    [6] Setiono R,Liu H. A connectionist approach to generating oblique decision trees[J]. IEEE Transactions on Systems, Man and Cybernetics, Part B,June,1999,29(3):440-444
    [7] Cantu-Paz E,Kamath C. Inducing oblique decision trees with evolutionary algorithms [J]. IEEE Transactions on Evolutionary Computation,Febuary,2003,7(1):54-68
    [8] Shawe-Taylor J,Cristianini N. Data-Dependent Structural Risk Minimisation for Perceptron Decision Trees [R]. NeuroCOLT2 Technical Report Series,NC2-TR-1998-003,May,1998,1-11
    [9] Bennett K,Cristianini N, Shaw-Taylor J,et al. Enlarging margins in perceptron decision trees [J]. Machine Learning,2000,41:295-313
    [10] Quinlan J R. Induction of decision trees [J]. Machine Learning,1986,l:81-106
    [11] Quilan J R. C4.5: Programs for Machine Learning [M]. San Mateo, Morgan Kaufmann Publishers,1993. 17-25
    [12] Rosenblatt F. The perceptron:A probalistic model for information storage and organization in the brain [J]. Psychological Review,1958,65:386-408
    [13] Widrow B,Hoff M E. Adaptive switching circuits [C]. In Institute of Radio Engineerings,Western Electronic Show and Convention,Convention Record,New York,Part 4,1960. 96-104
    [14] Minsky M,Papert S. Perceptrons [M]. expanded edition,Cambridge,MA:MIT Press,1988. 1-275
    [15] Rumelhart D E,McClelland J L,eds. Parallel distributed processing:Explorations in the microstructure of cognition [M]. Cambrige,MA:MIT Press,1986
    [16] Hopfield J J. Neural networks and physical systems with emergent collective computaional properties[C]. Proceedings of the National Academy of Science,79,1982. 2554-2558
    [17] Martin T Hagan,Howard B Demuth,Mark H Beale. Neural network design [M]. U.S.:PWS Publication Company,1995. 1-12
    [18] Foresti G L,Goffredo P. Exploiting neural trees in range image understanding [J].Pattern Recognition Letters,July,1998,19(9):869-878
    [19] Zhang P,Chen L H. A novel feature extraction method and hybrid tree classification for handwritten numeral recognition [J]. Pattern Recognition Letters,January,2002,23(1-3):45-56
    [20] Lippmann R P,Cunningham R K. Improving intrusion detection performance using keyword selection and neural networks [J]. Computer Networks,2000,34:597-603
    [21] Lee S C,Heinbuch D V. Training a neural-network based intrusion detector to recognize novel attacks [J]. IEEE Transactions on Systems, Man and Cybernetics,Part A,July,2001,31(4):294-299
    [22] Aminzadeh F,Katz S,Aki K. Adaptive neural nets for generation of artificial earthquake precursors [J]. IEEE Transactions on Geoscience and Remote Sensing,November,1994,32(6):1139-1143
    [23] Bodri B. A neural-network model for earthquake occurrence [J]. Journal of Geodynamics,2001,32:289-310
    [24] Boser B E,Guyon I M,Vapnik V N. A training algorithm for optimal marginclassifers [C]. In:Haussler D,eds. Proc.of the 5th Annual ACM Workshop on Computational Learning Theory,ACM Press 1992. 144-152
    [25] Cristianini N,Shawe-Taylor J. An Introduction to Support Vector Machines and Other Kernel-based Learning Methods [M]. Cambridge University Press,2000,1-143
    [26] Vapnik V N. An Overview of Statistical Learning Theory [J]. IEEE Transactions on Neural Networks,1999,10(5):988-999
    [27] Cortes C,Vapnik V N. Support Vector Learning [J]. Machine Learning,1995,20:273-297
    [28] Guo G D,Li S Z,Chan K L. Support vector machines for face recognition [J]. Image and Vision Computing,2001,19:631-638
    [29] Foody G M , Mathur A. A Relative Evaluation of Multiclass Image Classification by Vector Machines [J]. IEEE Transactions on Geoscience and remote Sensing,2004,42(6):1335-1343
    [30] Holger S,Manuela Z,Katja I,et al. A pilot study on the application of statistical classification procedures to molecular epidemiological data [J]. Toxicology Letters,2004,151(1):291-299
    [31] Piliouras N,Kalatzis I,Dimitropoulos N,et al. Development of the cubic least squares mapping linear-kernel support vector machine classifier for improving the characterization of breast lesions on ultrasound [J]. Computerized Medical Imaging and Graphics,July,2004,28 (5):247-255
    [32] Bennett K,Wu D,Auslender L. On support vector decision Trees for data base marketing [R]. Math Report No. 98-100,Rensselaer Polytechnic Institute,Troy,NY,1998
    [33] Genov R. Silicon Support vector machine with on-line learning [J]. International Journal of Pattern Recognition and Artificial Intelligence,2003,17:385-404
    [34] Tsujino K. Implementation and refinement of decision trees using neural networks for hybrid knowledge acquisition [J]. Artificial Intelligence in Engineering,1995,9:265-276
    [35] Xu Q Z,Zhao Q F,Pei W J,et al. Interpretable neural network tree for continuous-feature data sets [J]. Neural Information Processing--Letters and Reviews,2004,3(3):77-84
    [36] Zhao Q F. Evolutionary design of neural network tree -- integration of decision tree, neural network and GA [C] Proc. Of IEEE Congress on Evolutionary Computation(CEC2001),Seoul,2001,240-244
    [37] Hendler J. Developing hybrid symbolic/connectionist models[M]. In: Barnden J A,Pollack J B,eds. Advances in Connectionist and Neural Computation Theory, Vol.1 : High Level Connectionist Models , Ablex Publishing Corporation:Norwood,NJ,1991,165-179
    [38] Xu Q Z,Zhao Q F,Pei W J,et al. Design interpretable neural network trees through self-organized learning of features [C]. Proc.of International Joint Conference on Neural Networks,Hungary,2004 (IJCNN04),1433-1438
    [39] Brent R P. Fast training algorithm for multiplayer neural nets [J]. IEEE Transaction On Neural Networks,1991,2(3):346-354
    [40] Kubat M. Decision trees can initialize radial-basis function networks [J]. IEEE Transaction on Neural Networks,1998,9(5):813-821
    [41] Towell G G,Shavlik J W. Knowledge-based artificial neural network[J]. Artificial intelligence,1994,70(1-2):119-165
    [42] Tsang E C C,Wang X Z,Yeung D S. Improving Learning Accuracy of Fuzzy Decision Trees by Hybrid Neural Networks [J]. IEEE Trans. Fuzzy Systems, 2000,8(5):601-614.
    [43] Guo H,Gelfand S B. Classification trees with neural network feature extraction [J]. IEEE Transaction on Neural Networks,November,1992,3(6):923-933
    [44] Krishnan R,Sivakumar G,Bhattacharya P. Extracting decision trees from trained neural networks [J]. Pattern Recognition,1999,32:1999-2009.
    [45] Schmitz G P J,Aldrich C,Gouws F S. ANN-DT: an algorithm for extraction of decision trees from artificial neural networks [J]. IEEE Transaction On Neural Networks,1999,10(6):1392-1401
    [46] Li T,Tang Y Y,Fang L Y. A Structure-parameter-adaptive (SPA) Neural Tree For Recognition of Large Character Set [J]. Pattern recognition,1995,28(3):315-329.
    [47] Foresti G L,Micheloni C. Generalized Neural Trees for Pattern Classification [J]. IEEE Transaction On Neural Networks,2002, 13(6):1540-1547
    [48] Foresti G L,Dolso T. An Adaptive High-Order Neural Tree for Pattern Recognition [J]. IEEE Transaction on Systems,man,Cybernetics—Part B:Cybernetics,2004,34(2):988-996.
    [49] Behnke S,Karayiannis N B. Competitive neural trees for pattern classification [J]. IEEE Transaction on Neural Networks,1998,9(6):1352-1369
    [50] Davey N,Adams R G,George S J. The architecture and performance of a stochastic competitive evolutionary neural tree network [J]. Applied Intelligence,2000,12:75-93
    [51] Zhou Z H,Chen Z Q. Hybrid Decision Tree [J]. Knowledge based Systems,2002,15:515-528
    [52] Zhao Q F. A new method for efficient design of neural network trees [R]. Technical report of IEICE, PRMU2004-115,November,2004, 59-64
    [53] Cheong S,Oh S H,Lee S Y. Support vector machines with binary tree architecture for multi-class classification [J]. Neural Information Processing—Letters and Reviews,2004,2:47-51
    [54] Sethi I K. Entropy nets: from decision trees to neural networks [J]. Proceeding of IEEE,1990,78(10):1605-1613
    [55] Tsukimoto H. Extracting rules from trained neural networks [J]. IEEE Trans. On Neural Networks,2000, 11(2):377-389
    [56] Zhang B T,Mühlenbein H. Evolving optimal neural networks using genetic algorithms with Occam’s razor [J]. Complex Systems,1993 7(3):199-220
    [57] Jacobs R A,Jordan M I. Adaptive mixtures of local experts [J]. Neural Computation,1991,3:79-87
    [58] Rovithakis G A,Chalkiadakis I,Zervakis M E. High-Order Neural Network Structure Selection for Function Approximation Applications Using Genetic Algorithms [J]. IEEE Transaction On Systems, Man, And Cybernetics—Part B:Cybernetics,2004,34(1):150-158
    [59] Knerr S,Personnaz L,Dreyfus G. Single-layer learning revisited: A stepwise procedure for building and training a neural networks [M]. In:Fogelman J,Neuro computing: Algorithm, Architectures and Applications, Ed. New York:Springer-Verlag,1990.
    [60] Kre?el U. Pairwise classification and support vector machines [M]. Advancesin Kernel Methods--Support Vector Learning, Cambridge, MA: MIT Press, 1999. 255-268
    [61] Bottou L,Cortes C,Denker J,Drucker H,et al. Comparison of classifier methods: A case study in handwriting digit recognition [C]. Proc. of International conference on Pattern Recognition, IEEE Computer Society Press,1994. 77-87
    [62] Platt J C,Cristianini N,Shawe-Talor J. Large Margin DAGs for Multiclass Classification [J]. Advance in Neural Information Processing Systems, Cambridge, MA: MIT Press,2000,12:547-553
    [63] Hsu C W,Lin C J. A Comparison of Methods for Multiclass Support Vector Machines [J]. IEEE Transactions on Neural Networks, 2002,13(2):415-525
    [64] 刘志刚,李德仁,秦前清,等. 基于特征空间中类间可分性的层次性多类支撑向量机[J]. 武汉大学学报,信息科学版,2004,29(4):324-328
    [65] Allwein E L,Schapire R E,Singer Y. Reducing Multiclass to Binary: A Unifying Approach for Margin Classifiers [J]. Journal of Machine Learning Research,2001,1:113-141
    [66] Pang S P,Kim D J, Bang S Y. Face membership authentication using SVM classification tree generated by membership based LLE data partition [J], IEEE transactions on neural networks,2005,16(2):436-446
    [67] http://www.ll.mit.edu/IST/ideval/pubs/pubs_index.html [DB/OL]
    [68] Sindhwani V,Rakshit S,Deodhare D,et al. Feature se-lection in MLPs and SVMs based on maximum output information [J]. IEEE transactions on neural networks,2004,15(4):937-948
    [69] Mizuno S,Zhao Q F. Neural network trees with nodes of limited inputs are good for learning and understanding [C]. Proc.of the 4th Asia-Pacific Conference on Simulated Evolution And Learning (SEAL2002),Singapore,2002. 573-576
    [70] Goldberg D E. Genetic Algorithms in Search Optimization and Machine Learning [M]. Addison Wesley Publishing Company, 1989. 1-432
    [71] Endou T,Zhao Q F. Generation of comprehensible decision trees through evolution of training data [C]. Proc. of the 2002 Congress on Evolutionary Computation (CEC2002),2,May 2002. 1221-1225
    [72] Kohonen T. Self-Organized formation of topologically correct feature maps [J]. Biological Cybernetics,1982,43:59-69
    [73] Kohonen T. The self-organization map [J]. Proceeding of IEEE, September,1990,78(9):1464-1480
    [74] Theuns V , Ray H. Intrusion detection techniques and approaches [J]. Computer Communications,2002,25(15):1356-1365
    [75] Biermann E,Cloete E,Venter L M. A comparison of Intrusion detection systems [J]. Computers and Security,2001,20(8):676-683
    [76] Nikulin V. Threshold-based clustering with merging and regularization in application to network intrusion detection [J]. Computational Statistics & Data Analysis,Available online 13 December 2005,In Press,Corrected Proof
    [77] Cho S B. Incorporating soft computing techniques into a probabilistic intrusion detection system [J]. IEEE Transaction on Systems, Man, and Cybernetics—Part C: Applications and Reviews,2002,32(2):154-160
    [78] Cho S B,Park H J. Efficient anomaly detection by modeling privilege flows using hidden Markov model [J]. Computers and Security,2003,22(1):45-55
    [79] Lee S J,Chung B C,Kim H Y,et al. Real-time analysis of intrusion detection alerts via correlation [J]. Computers & Security, Available online,14,November,2005,In Press, Corrected Proof.
    [80] Jiang S Y,Song X Y,Wang H,et al. A clustering-based method for unsupervised intrusion detections [J]. Pattern Recognition Letters, Available online, 18,January,2006,In Press, Corrected Proof
    [81] Sarasamma S T,Zhu Q A,Huff J. Hierarchical Kohonenen net for anomaly detection in network security [J]. IEEE Transactions on Systems, Man and Cybernetics--Part B,April,2005,35(2):302-312
    [82] Bace R G. Intrusion Detection [M]. Indianapolis: Macmillan Technical Publishing,2001,1-315.
    [83] Dasgupta D,Gonzalez F. An immunity-based technique to characterize intrusions in computer networks [J]. IEEE Transactions on Evolutionary Computation,June,2002,6(3):281-291
    [84] Harmer P K,Williams P D,Gunsch G H,et al. An artificial immune system architecture for computer security applications [J]. IEEE Transactions onEvolutionary Computation,June 2002,6(3):252-280
    [85] Boukerche A,Jucá K R L,Sobral J B, et al. An artificial immune based intrusion detection model for computer and telecommunication systems [J]. Parallel Computing,2004,30(5-6):629–646
    [86] Demirkol I,Alagoz F,Delic H,et al. Wireless sensor networks for intrusion detection: packet traffic modeling [J]. IEEE Communications Letters ,January,2006,10(1):22-24
    [87] Gaspary L P,Sanchez R N,Antunes D W,et al. A SNMP-based platform for distributed stateful intrusion detection in enterprise networks [J]. IEEE Transaction on Selected Areas in Communications,October,2005,23(10):1973-1982
    [88] Wang H N,Zhang D L,Shin K G. Change-point monitoring for the detection of DoS attacks [J]. IEEE Transactions on Dependable and Secure Computing,Oct-Dec,2004,1(4):193-208
    [89] Watson D,Smart M,Malan G R,et al. Protocol scrubbing: network security through transparent flow modification [J]. IEEE/ACM Transactions on Networking,April,2004,12(2):261-273
    [90] Marques O,Baillargeon P. A Multimedia Traffic Classification Scheme for Intrusion Detection Systems [C].Proc of Third International Conference on Information Technology and Applications, 2005(ICITA 2005),2,July 2005. 496-501
    [91] Foo S Y,Arradondo M. Mobile agents for computer intrusion detection [C]. Proc. of the Thirty-Sixth Southeastern Symposium on System Theory, 2004. 517-521
    [92] Zhang C L,Jiang J,Mohamed K. Intrusion detection using hierarchical neural networks [J]. Pattern Recognition Letters, May,2005,26(6):779-791
    [93] Han S J,Cho S B. Evolutionary Neural Networks for Anomaly Detection Based on the Behavior of a Program [J]. IEEE Transactions on Systems, Man, and Cybernetics--Part B: Cybernetics : Accepted for future publication.
    [94] Joo D,Hong T,Han I. The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors [J]. Expert Systems with Applications,July,2003,25(1):69-75
    [95] Jiang W B,Song H,Dai Y Q. Real-time intrusion detection for high-speednetworks [J]. Computers & Security,June,2005,24(4):287-294
    [96] Baker Z K,Prasanna V K. A computationally efficient engine for flexible intrusion detection [J]. IEEE Transactions on Very Large Scale Integration (VLSI) Systems,October,2005,13(10):1179-1189
    [97] Pietraszek T,Tanner A. Data mining and machine learning—Towards reducing false positives in intrusion detection [R]. Information Security Technical Report,2005,10(3):169-183
    [98] Manganaris S,Christensen M,Zerkle D,et al. A data mining analysis of RTID alarms [J]. Computer Networks,October,2000,34(4):571-577
    [99] Porras P. STAT - A State Transition Analysis Tool for Intrusion Detection [R]. Technical Report TRCS93-25, Computer Science Department,University of California at Santa Barbara,November 1993
    [100] Kumar S. Classification and detection of computer intrusions [D]. PhD thesis,Purdue University,1995
    [101] Juan M. Estévez-Tapiador,Pedro García-Teodoro,Jesús E. Díaz-Verdejo. NSDF: a computer network system description framework and its application to network security [J]. Computer Networks,December,2003,43(5):573-600
    [102] Balajinath B,Raghavan S V. Intrusion detection through learning behavior model [J]. Computer Communications,July,2001,24(12):1202-1212
    [103] Buchtala O,Klimek M,Sick B. Evolutionary optimization of radial basis function classifiers for data mining applications [J]. IEEE Transactions on Systems, Man and Cybernetics--Part B,October,2005,35(5):928-947
    [104] Dong S,Heywood M I,Zincir-Heywood A N. Training genetic programming on half a million patterns: an example from anomaly detection [J]. IEEE Transactions on Evolutionary Computation,June,2005,9(3):225-239
    [105] http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html [DB/OL]
    [106] Ranum M J. Intrusion Detection: Challenges and Myths [Z]. Network Security Library :Intrusion Detection , http://www.windowsecurity.com/whitepaper/ Intrusion_Detection_Challenges_and_Myths_.html,October,2002
    [107] Bouillant S, Miteran J, Paindavoine M, et al. Real-time flaw detection on complex part: classification with SVM and Hyperrectangle based method [C]. In:Price Jeffery R,Mériaudeau Fabrice,eds. Machine Vision Applications inIndustrial Inspection XII,Proceedings of the International Society for Optical Engineering(SPIE),BBA LIB,May,2004,5303:170-177
    [108] Cohen I,Sebe N,Gozman F G,et al. Learning Bayesian network classifiers for facial expression recognition both labeled and unlabeled data[C].Proc of IEEE Computer Society Conference on Computer Vision and Pattern Recognition,2003. 595-601.
    [109] Bennett K,Mangasarian O. Robust linear programming discrimination of two linearly inseparable sets [J]. Optimization Methods and Software,1992,1:23-34
    [110] Bennett K , Mangasarian O. Multicategory discrimination via linear programming [J]. Optimization Methods and Software, 1994,3: 29-39.
    [111] Bennett K P,Mangasarian O. Serial and parallel multicategory discrimination [J]. Optimization Methods and Software,1994,4:103-116
    [112] Murthy S K,Kasif S,Salzberg S. A System for Induction of Oblique Decision Trees [J]. Journal of Artificial Intelligence Research,1994,2:1-32
    [113] Platt J C. Fast training of support vector machines using sequential minimal optimization [M]. In: Sch?lkopf B,Burges C, Smola A,eds. Advances in kernel methods: support vector learning,MIT Press: Cambridge,MA,1999. 185-208
    [114] Chang C C,Lin C J. LIBSVM: a library for support vector machines [Z]. Available: http://www.csie.ntu.edu.tw/cjlin/papers/libsvm. pdf,September,2002.
    [115] Flake G,Lawrence S. Efficient SVM regression training with SMO [J]. Machine Learning,2002,46(1/3):271-290
    [116] Keerthi S,Shevade S,Bhattcharyya C,et al. Improvements to Platt’s SMO algorithm for SVM classifier design [J]. Neural Computation,2001,13(3):637-649
    [117] Keerthi S,Gilbert E. Convergence of a generalized SMO algorithm for SVM classifier design [J]. Machine Learning,2002,46(1/3):351-360
    [118] 李建民,张钹,林福宗. 序贯最小优化的改进算法[J].软件学报,2003,14(5):918-924
    [119] Duda R,Hart P,Stork D. Pattern classification [M]. New York, NY:Wiley-interscience,2000,1-680
    [120] Casasent D,Wang Y C. A hierarchical classifier using new support vector machines for automatic target recognition [J]. Neural Networks,2005,18:541-548
    [121] Ou Y Y,Chen C Y,Hwang S C,et al. Expediting model selection for support vector machines based on data reduction [C]. Proc.of the IEEE International Conference on Systems, Man and Cybernetics,2003. 786-791
    [122] Hsu C W,Chang C C,Lin C J. A practical guide to support vector classification [R]. Technical report,Taiwan,National Taiwan University,2004.
    [123] Carlos S,Pavel B,Brazdil P,A meta-learning method to select the kernel width in support vector regression [J]. Machine Learning,2004,54(3):195-209
    [124] Keerthi S S,Lin C J. Asymptotic behaviors of support vector machines with Gaussian kernel [J]. Neural Computation,2003,15(7):1667-1689
    [125] Ali S,Smith K A. Kernel Width Selection for SVM Classification:A Meta-Learning Approach [J]. International Journal of Data Warehousing & Mining,October-December,2005,1(4):78-97
    [126] Belousov A I,Verzakov S A,Von F J. A flexible classification approach with optimal generalization performance: Support vector machines [J]. Chemometrics and Intelligent Laboratory Systems,2002,64:15–25
    [127] Pandzic I S,Forchheimer R,Eds. MPEG-4 Facial Animation:The Standard, Implementation and Applications [M]. New York: Wiley,2002. 1-288
    [128] Aleksic P S,Katsaggelos A K. Automatic facial expression recognition using facial animation parameters and multistream HMMs [J]. IEEE Transactions on Information Forensics and Security,March,2006,1(1):3-11
    [129] Ekman P,Friesen W V. Facial Action Coding System:A technique for the measurement of facial movement [M]. Palo Alto , CA: Consulting Psychologists Press,1978.
    [130] Mase K,Pentland A. Recognition of facial expression from optical flow [J]. Institute of electronics information and communication engineers transactions,1991,E74(10):3474-3483
    [131] Rowley H A,Baluja S,Kanade T. Neural network based face detection [J].IEEE Transactions on Pattern Analysis and Machine Intelligence,January,1998,20(1):23-38
    [132] Sung K K,Poggio T. Example-based learning for view basedhuman face detection [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence,1998,20(1):39–51
    [133] Xu Q Z,Wan S R,Pei W J,et al. A wavelet-based blind deconvolution algorithm for ultrasonic image processing [J]. International Journal of Circuits, Systems and Computers,2005,14(1):15-26
    [134] He Z Y,Xu Q Z,Wei C J,et al. Adaptive Semi-blind Immune Algorithm for Image Enhancement [J]. International Journal of Multidimensional Systems and Signal Processing,2005,16:107-118
    [135] 张韵农,何振亚,蔚承建,等. 图像增强的自适应免疫算法,东南大学学报,2002,32(3):346-350
    [136] Pan R L ,Nikias C L. The complex cepstrum of higher order cumulants and nonminimum phase system identification [J]. IEEE Transactions on Acoustics, Speech, and Signal Processing [see also IEEE Transactions on Signal Processing],1988,36(2):186 –205
    [137] Sandeep P G,Akbar M S,Richard G B. Improved Wavelet Denoising Via Empirical Wiener Filtering [C]. In Proceeding of SPIE, Mathematical Imaging,San Diego,1997
    [138] Tubbs J D , A Note on Parametric Image Enhancement [J]. Pattern Recognition,1987,20(6):617-621
    [139] Kanade T, Cohn J F,Tian Y I. Comprehensive database for facial expression analysis[C].Proc of the Fourth IEEE International Conference on Automatic Face and Gesture Recognition(FG’00),March,2000. 46-53
    [140] Pantic M,Patras I. Dynamics of Facial Expression: Recognition of Facial Actions and Their Temporal Segments From Face Profile Image Sequences [J]. IEEE Transactions on Systems, Man and Cybernetics--Part B,April,2006,36(2):433-449
    [141] 章品正,面部表情自动分类的方法与系统研究[D].博士论文,东南大学,2005
    [142] Fasel B,Luettin J. Automatic facial expression analysis:A survey [J]. Pattern Recognition,2003,36(1):259-275
    [143] Pardàs M , Bonafonte A. Facial animation parameters extraction and expression detection using HMM [J]. Signal Processing : Image Communication,2002,17:675–688
    [144] Tsapatsoulis N,Raouzaiou A,Kollias S,et al. Emotion recognition and synthesis based on MPEG-4 FAPs [M].In:Pandzic I,Forchheimer R,Eds. MPEG-4 Facial Animation - The standard,implementations,applications. U.K.:Wiley,2002
    [145] Liu C J. Gabor-based kernel PCA with fractional power polynomial models for face recognition [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence,May,2004,26(5):572-581
    [146] Liu C J. Enhanced independent component analysis and its application to content based face image retrieval [J]. IEEE Transactions on Systems, Man and Cybernetics--Part B,April,2004,34(2):1117-1127
    [147] Abboud B,Davoine F. Bilinear factorisation for facial expression analysis and synthesis [J]. IEE Proceedings-Vision, Image and Signal Processing,June,2005,152(3):327-333
    [148] Ma L , Khorasani K. Facial expression recognition using constructive feedforward neural networks [J]. IEEE Transactions on Systems, Man and Cybernetics--Part B,June,2004,34(3):1588-1595
    [149] Teh C H,Chin R T. On image analysis by the methods of moments [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence,1988,10(4):496-513
    [150] Chong C W,Raveendran P,Mukundan R. An Efficient Algorithm for Fast Computation of Pseudo-Zernike Moments [J]. International Journal of Pattern Recognition and Artificial Intelligence,2003,17(6):1011-1023
    [151] Littlewort G,Bartlett M,Fasel I,et al. Dynamics of facial expression extracted automatically from video [C]. Proc. Of IEEE Conference on Computer Vision and Pattern Recognition,Workshop on Face Processing in Video(CVPR). Orlando,FL,2004.5:p.80
    [152] Chibelushi C C,Bourel F. Hierarchical multistream recognition of facial expressions [J]. IEE Proceedings on Vision, Image and Signal Processing,2004,151(4):307-313
    [153] Cohen I,Sebe N,Chen L,et al. Facial Expression Recognition from VideoSequences: Temporal and Static Modeling [J]. Computer Vision and Image Understanding,2003,91(1):160-187
    [154] Roweis S T,Saul L K. Nonlinear Dimensionality Reduction by Locally Linear Embedding [J]. Science,2000,290:2323-2326
    [155] Saul L K,Roweis S T. Think globally, fit locally: Unsupervised learning of low dimensional manifolds [J]. Journal of Machine Learning Research,2004,4(2):119–155
    [156] Ridder D de,Duin R P W. Locally linear embedding for classification [R]. Technical Report PH-2002-01,Pattern Recognition Group, Dept. of Imaging Science &Technology , Delft University of Technology , Delft , The Netherlands,2002
    [157] Roweis S T,Saul L K. An introduction to locally linear embedding [Z]. http://www.gatsby.ecl.ac.uk/~roweis/lle/papers/ lleintro.pdf,2001
    [158] Bai Z,Demmel J,Dongarra J. et al.,Eds. Templates for the Solution of Algebraic Eigenvalue Problems: A Practical Guide [M]. Society for Industrial and Applied Mathematics,Philadelphia,PA,2000. 1-410
    [159] 徐志节,杨杰,王猛. 一种新的彩色图像降维方法 [J].上海交通大学学报,2004,38(12):2063-2072
    [160] Liang D,Yang J,Zheng Z L,et al. A facial expression recognition system based on supervised locally linear embedding [J]. Pattern Recognition Letters,November,2005,26(15):2374-2389
    [161] Devroye L,Gyorfi L,Lugosi G. A Probabilistic Theory of Pattern Recognition [M]. New York: Springer-Verlag, 1996. 1-660
    [162] John G H,Kohavi R,Pfleger K. Irrelevant features and the subset selection problem [C]. Proc.of the 11th International Conference on Machine Learning,San Mateo,CA,1994. 121-129
    [163] Lee H M,Chen C M,Chen J M,et al. An efficient fuzzy classifier with feature selection based on fuzzy entropy [J]. IEEE Transactions on Systems, Man and Cybernetics--Part B,June,2001,31(3):426-432
    [164] Jain A,Zongker D. Feature selection: Evaluation, application, and small sample performance [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence,February,1997,19(2):153-158
    [165] Thawonmas R,Abe S. A novel approach to feature selection based on analysis of class regions [J]. IEEE Transactions on Systems, Man and Cybernetics--Part B,April,1997,27(2):196-207
    [166] Dash M,Liu H. Feature selection for classification [J]. Intelligent Data Analysis,1997,1(3):131-156
    [167] Jensen R,Shen Q. Fuzzy-rough data reduction with ant colony optimization [J]. Fuzzy Sets and Systems,January,2005,149(1):5-20
    [168] Guyon I,Elisseeff A. An introduction to variable and feature selection [J]. Journal of Machine Learning Research,(Special Issue on Variable and Feature Selection), 2003,3:1157-1182
    [169] Bekkerman R,El-Yaniv R,Tishby N,etc. Distributional word clusters vs. words for text categorization [J]. Journal of Machine Learning Research,2003,3:1183-1208
    [170] Battiti R. Using mutual information for selecting features in supervised neural net training [J]. IEEE Transactions on Neural Networks,July,1994,5(4):537-550
    [171] Eriksson T,Kim S,Kang H G,et al. An information-theoretic perspective on feature selection in speaker recognition [J]. IEEE Signal Processing Letters,July,2005,12(7):500-503
    [172] Kwak N,Choi C H. Input feature selection for classification problems [J]. IEEE Transactions on Neural Network,January,2002,13(1):143-159
    [173] Chow T W S,Huang D. Estimating optimal feature subsets using efficient estimation of high-dimensional mutual information [J]. IEEE Transactions on Neural Networks,January,2005,16(1):213–224
    [174] Kwak N,Choi C H. Input feature selection by mutual information based on Parzen window [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence,December,2002,24(12):1667-1671
    [175] Peng H H,Long F H,Ding C. Feature Selection Based on Mutual Information: Criteria of Max-Dependency, Max-Relevance, and Min-Redundancy [J]. IEEE Transactions on Pattern Analysis And Machine Intelligence,August,2005,27(8):1226-1238
    [176] Hall M A. Correlation-based feature selection for machine learning [D]. Ph.D. thesis,Department of Computer Science,NZ: Waikato University,Waikato,New Zealand,1999
    [177] Mitra P,Murthy C A,Pal S K. Unsupervised feature selection using feature similarity [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence,March,2002,24(3):301-312
    [178] Mao K Z. Fast orthogonal forward selection algorithm for feature subset selection [J]. IEEE Transactions on Neural Networks, September,2002,13(5):1218-1224
    [179] Pal N R,Cahoon T C,Bezdek J C,et al. A new approach to target recognition for LADAR data [J]. IEEE Transactions on Fuzzy Systems,Febuary,2001,9(1):44-52
    [180] Huang D,Chow T W S,Efficiently searching the important input variables using Bayesian discriminant [J]. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications,[see also IEEE Transactions on Circuits and Systems I:Regular Papers,] April,2005,52(4):785-793
    [181] Krishnapuram B,Harternink A J,Carin L,et al. A Bayesian approach to joint feature selection and classifier design [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence,September,2004,26(9):1105-1111
    [182] Chouchoulas A, Shen Q. Rough set-aided keyword reduction for text categorisation [J]. Applied Artificial Intelligence,2001,15(9):843-873
    [183] Jensen R,Shen Q. Finding rough set reducts with ant colony optimization [C]. Proc.of 2003 UK Workshop on Computational Intelligence,2003. 15-22
    [184] Pawlak Z. Rough Sets: Theoretical Aspects of Reasoning about Data [M]. Boston:Kluwer Academic Publishing, Dordrecht,October,1991. 1-252
    [185] Jensen R,Shen Q. Fuzzy-rough attribute reduction with application to web categorization [J]. Fuzzy Sets and Systems,2004,141(3):469-485
    [186] Wolf L,Shashua A. Feature selection for unsupervised and supervised inference: The emergence of sparsity in a weighted-based approach [R]. Hebrew University, Jerusalem, Israel, Technical Report 2003-58,June,2003
    [187] Li L,Jiang W,Li X,Moser K L,et al. A robust hybrid between genetic algorithm and support vector machine for extracting an optimal feature gene subset [J]. Genomics,January,2005,85(1):16-23
    [188] Muni D P,Pal N R,Das J. Genetic programming for simultaneous featureselection and classifier design [J]. IEEE Transactions on Systems, Man and Cybernetics--Part B,February,2006,36(1):106-117
    [189] Liu H,Dougherty E R, Dy J G,et al. Evolving feature selection [J]. IEEE Intelligent Systems, see also IEEE Intelligent Systems and Their Applications,November-December,2005,20(6):64-76
    [190] Setiono R,Liu H. Neural-network feature selector [J]. IEEE Transactions on Neural Networks,May,1997,8(3):654-662
    [191] Somol P,Pudil P,Grim J. Branch & Bound Algorithm with Partial Prediction for Use with Recursive and Non-Recursive Criterion Forms [J]. Lecture Notes in Computer Science,2001,2013:230-238
    [192] Somol P,Pudil P,Kittler J. Fast branch & bound algorithms for optimal feature selection [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence,July,2004,26(7):900-912
    [193] Vapnik V. Statistical Learning Theory [M]. New York: Wiley –Interscience,1998. 1-736
    [194] Lawrence K S,Sam T R. Think globally, fit locally: unsupervised learning of low dimensional manifolds [J]. Journal of Machine Learning Research,2004,4(2):119-155
    [195] Teng X L,Wu B,Yu W W,et al. A hand gesture recognition system based on local linear embedding [J].Journal Of Visual Languages And Computing,October,2005,16(5):442-454
    [196] Bennett K P,Shawe-Taylor J,Demiriz A. Linear Programming Boosting via Column Generation [J]. Machine Learning,2001,46(1):225-254

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700