Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017 (2017), Article ID 6790975, 11 pages
https://doi.org/10.1155/2017/6790975
Research Article

Improved Instance Selection Methods for Support Vector Machine Speed Optimization

School of Mathematics, Statistics & Computer Science, University of KwaZulu-Natal, Private Bag X54001, Durban 4000, South Africa

Correspondence should be addressed to Aderemi O. Adewumi; moc.liamg@jtmeral

Received 1 July 2016; Accepted 22 August 2016; Published 9 January 2017

Academic Editor: Pascal Lorenz

Copyright © 2017 Andronicus A. Akinyelu and Aderemi O. Adewumi. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. N. Panda, E. Y. Chang, and G. Wu, “Concept boundary detection for speeding up SVMs,” in Proceedings of the 23rd International Conference on Machine Learning (ICML '06), pp. 681–688, Pittsburgh, Pa, USA, June 2006.
  2. S. Fine and K. Scheinberg, “Efficient SVM training using low-rank kernel representations,” The Journal of Machine Learning Research, vol. 2, pp. 243–264, 2001. View at Google Scholar
  3. J. A. Olvera-López, J. A. Carrasco-Ochoa, J. F. Martínez-Trinidad, and J. Kittler, “A review of instance selection methods,” Artificial Intelligence Review, vol. 34, no. 2, pp. 133–143, 2010. View at Publisher · View at Google Scholar · View at Scopus
  4. K. Lamond, “Credit Card Transactions Real World and Online,” 1996, http://www.virtualschool.edu/mon/ElectronicProperty/klamond/credit_card.htm.
  5. KrebsOnSecurity, “FBI: $1.2B Lost to Business Email Scams,” 2015, http://krebsonsecurity.com/2015/08/fbi-1-2b-lost-to-business-email-scams/.
  6. RSASecurity, “2013 A Year in Review,” 2014, http://www.emc.com/collateral/fraud-report/rsa-online-fraud-report-012014.pdf.
  7. S. García, J. Derrac, I. Triguero, C. J. Carmona, and F. Herrera, “Evolutionary-based selection of generalized instances for imbalanced classification,” Knowledge-Based Systems, vol. 25, no. 1, pp. 3–12, 2012. View at Publisher · View at Google Scholar · View at Scopus
  8. J. R. Cano, F. Herrera, and M. Lozano, “Using evolutionary algorithms as instance selection for data reduction in KDD: an experimental study,” IEEE Transactions on Evolutionary Computation, vol. 7, no. 6, pp. 561–575, 2003. View at Publisher · View at Google Scholar · View at Scopus
  9. Y. Li, Z. Hu, Y. Cai, and W. Zhang, “Support vector based prototype selection method for nearest neighbor rules,” in Proceedings of the International Conference on Natural Computation, pp. 528–535, Berlin, Germany, 2005.
  10. D. R. Wilson and T. R. Martinez, “Reduction techniques for instance-based learning algorithms,” Machine Learning, vol. 38, no. 3, pp. 257–286, 2000. View at Publisher · View at Google Scholar · View at Scopus
  11. U. Garain, “Prototype reduction using an artificial immune model,” Pattern Analysis and Applications, vol. 11, no. 3-4, pp. 353–363, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  12. H. Zhang and G. Sun, “Optimal reference subset selection for nearest neighbor classification by tabu search,” Pattern Recognition, vol. 35, no. 7, pp. 1481–1490, 2002. View at Publisher · View at Google Scholar · View at Scopus
  13. J. C. Riquelme, J. S. Aguilar-Ruiz, and M. Toro, “Finding representative patterns with ordered projections,” Pattern Recognition, vol. 36, no. 4, pp. 1009–1018, 2003. View at Publisher · View at Google Scholar · View at Scopus
  14. A. Lyhyaoui, M. Martínez, I. Mora, M. Vázquez, J.-L. Sancho, and A. R. Figueiras-Vidal, “Sample selection via clustering to construct support vector-like classifiers,” IEEE Transactions on Neural Networks, vol. 10, no. 6, pp. 1474–1481, 1999. View at Publisher · View at Google Scholar · View at Scopus
  15. M. B. De Almeida, A. De Pádua Braga, and J. P. Braga, “SVM-KM: speeding SVMs learning with a priori cluster selection and k-means,” in Proceedings of the 6th Brazilian Symposium on Neural Networks (SBRN '00), pp. 162–167, IEEE, Rio de Janeiro, Brazil, November 2000. View at Publisher · View at Google Scholar · View at Scopus
  16. J. Chen, C. Zhang, X. Xue, and C.-L. Liu, “Fast instance selection for speeding up support vector machines,” Knowledge-Based Systems, vol. 45, pp. 1–7, 2013. View at Publisher · View at Google Scholar · View at Scopus
  17. S. García, J. R. Cano, and F. Herrera, “A memetic algorithm for evolutionary prototype selection: a scaling up approach,” Pattern Recognition, vol. 41, no. 8, pp. 2693–2709, 2008. View at Publisher · View at Google Scholar · View at Scopus
  18. C. Group, “SpamAssassin Data,” 2006, http://www.csmining.org/index.php/spam-assassin-datasets.html.
  19. J. Nazario, “Phishing Corpus,” 2009, http://www.monkey.org/jose/wiki/doku.php?id=phishingcorpus.
  20. A. A. Akinyelu and A. O. Adewumi, “Classification of phishing email using random forest machine learning technique,” Journal of Applied Mathematics, vol. 2014, Article ID 425731, 6 pages, 2014. View at Publisher · View at Google Scholar · View at Scopus
  21. C.-C. Chang and C.-J. Lin, “LIBSVM: a library for support vector machines,” ACM Transactions on Intelligent Systems and Technology (TIST), vol. 2, pp. 1–27, 2011. View at Google Scholar
  22. X.-S. Yang, Nature-Inspired Metaheuristic Algorithms, Luniver Press, 2010.
  23. C.-W. Hsu, C.-C. Chang, and C.-J. Lin, A Practical Guide to Support Vector Classification, Department of Computer Science, National Taiwan University, Taipei, Taiwan, 2003.
  24. X.-S. Yang, Nature-Inspired Metaheuristic Algorithms, Luniver Press, Beckington, UK, 2008.
  25. X. S. Yang and X. He, “Firefly algorithm: recent advances and applications,” International Journal of Swarm Intelligence, vol. 1, no. 1, pp. 36–50, 2013. View at Publisher · View at Google Scholar
  26. MathWorks, “Edge Detection,” 2016, http://www.mathworks.com/discovery/edge-detection.html.
  27. D. Ray, “Edge Detection in Digital Image Processing,” 2013, https://www.math.washington.edu/~morrow/336_13/papers/debosmit.pdf.
  28. S. E. Umbaugh, Digital Image Processing and Analysis: Human and Computer Vision Applications with CVIPtools, CRC Press, 2010.
  29. A. Asuncion and D. Newman, “UCI Machine Learning Repository,” 2007, http://archive.ics.uci.edu/ml/datasets.html.
  30. J. A. Olvera-López, J. A. Carrasco-Ochoa, and J. F. Martínez-Trinidad, “A new fast prototype selection method based on clustering,” Pattern Analysis and Applications, vol. 13, no. 2, pp. 131–141, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  31. C.-H. Chou, B.-H. Kuo, and F. Chang, “The generalized condensed nearest neighbor rule as a data reduction method,” in Proceedings of the 18th International Conference on Pattern Recognition (ICPR '06), pp. 556–559, IEEE, Hong Kong, August 2006. View at Publisher · View at Google Scholar · View at Scopus
  32. T. Raicharoen and C. Lursinsap, “A divide-and-conquer approach to the pairwise opposite class-nearest neighbor (POC-NN) algorithm,” Pattern Recognition Letters, vol. 26, no. 10, pp. 1554–1567, 2005. View at Publisher · View at Google Scholar · View at Scopus