Sciweavers

CORR
2010
Springer
149views Education» more  CORR 2010»
13 years 11 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh
BMCBI
2008
116views more  BMCBI 2008»
13 years 11 months ago
The combination approach of SVM and ECOC for powerful identification and classification of transcription factor
Background: Transcription factors (TFs) are core functional proteins which play important roles in gene expression control, and they are key factors for gene regulation network co...
Guangyong Zheng, Ziliang Qian, Qing Yang, Chaochun...
BMCBI
2010
182views more  BMCBI 2010»
13 years 11 months ago
L2-norm multiple kernel learning and its application to biomedical data fusion
Background: This paper introduces the notion of optimizing different norms in the dual problem of support vector machines with multiple kernels. The selection of norms yields diff...
Shi Yu, Tillmann Falck, Anneleen Daemen, Lé...
BIBE
2008
IEEE
150views Bioinformatics» more  BIBE 2008»
13 years 11 months ago
Automatic DNA microarray gridding based on Support Vector Machines
This paper presents a novel method for DNA microarray gridding based on Support Vector Machine (SVM) classifiers. It employs a set of soft-margin SVMs to estimate the lines of the ...
Dimitris G. Bariamis, Dimitris Maroulis, Dimitrios...
ICASSP
2010
IEEE
13 years 11 months ago
Training a support vector machine to classify signals in a real environment given clean training data
When building a classifier from clean training data for a particular test environment, knowledge about the environmental noise and channel should be taken into account. We propos...
Kevin Jamieson, Maya R. Gupta, Eric Swanson, Hyrum...
ICASSP
2010
IEEE
13 years 11 months ago
Camera-based clear path detection
In using image analysis to assist a driver to avoid obstacles on the road, traditional approaches rely on various detectors designed to detect different types of objects. We propo...
Qi Wu, Wende Zhang, Tsuhan Chen, B. V. K. Vijaya K...
GECCO
2008
Springer
177views Optimization» more  GECCO 2008»
13 years 12 months ago
Reduced computation for evolutionary optimization in noisy environment
Evolutionary Algorithms’ (EAs’) application to real world optimization problems often involves expensive fitness function evaluation. Naturally this has a crippling effect on ...
Maumita Bhattacharya
FSKD
2008
Springer
174views Fuzzy Logic» more  FSKD 2008»
13 years 12 months ago
A Hybrid Re-sampling Method for SVM Learning from Imbalanced Data Sets
Support Vector Machine (SVM) has been widely studied and shown success in many application fields. However, the performance of SVM drops significantly when it is applied to the pr...
Peng Li, Pei-Li Qiao, Yuan-Chao Liu
ECCV
2010
Springer
13 years 12 months ago
Object of Interest Detection by Saliency Learning
In this paper, we present a method for object of interest detection. This method is statistical in nature and hinges in a model which combines salient features using a mixture of l...
WCE
2007
14 years 3 hour ago
Gene Selection for Tumor Classification Using Microarray Gene Expression Data
– In this paper we perform a t-test for significant gene expression analysis in different dimensions based on molecular profiles from microarray data, and compare several computa...
Krishna Yendrapalli, Ram B. Basnet, Srinivas Mukka...