A Linear Programming Model of Multi-class Support Vector Machine
Journal Title: Scholars Journal of Engineering and Technology - Year 2017, Vol 5, Issue 2
Abstract
The structure of K-SVCR algorithm is ‘one-against-one-against-rest’.Its advantage is in the process of each decomposition , make all training points of information have been fully taken advantage of. To a certain extent, can prevent the classification error by incomplete information . But this algorithm constructed a quadratic programming which restricted this algorithm’s speed and the range of applications. So, this paper constructed a linear programming model based on K-SVCR , and then adopt the effective algorithm of Predictor-corrector Method of Mehrotra to solve the linear programming. Preliminary numerical experiments on benchmark datasets show that the algorithm has good performance on both accuracy and training speed than K-class Support Vector Classification-Regression. Keywords: Support vector machine;Multi-class classification;Primal dual interior point method.
Authors and Affiliations
Sa Qi, Yuan Yuping, Tong Ying,, Kan Tao, Zhang Jing
Optimum Design of Weighting Matrices in Integrated Structural and Control Optimization
Large size, light weight and ease of assembly are some of the desirable attributes in design of space structures. The compromise between a large size and low weight results in a structure that is very flexible, but it m...
Enhancement of Efficiency of TiO2|Dye|CuI Solar Cell by Coupling Two Metal-Centered Dyes
The coupling effect of cis-bis(isothiocyanato)-bis(2,2’-bipyridyl-4,4’-dicarboxylato) ruthenium(II) with triscarboxy-rutheniumterpyridine [Ru(4,4',4"-(COOH)3-terpy) (NCS)3] on the sensitization process of solid-state TiO...
Ranking of Stochastic DEA with using an integrated method using Data envelopment analysis and Fuzzy preference relations
An integrated method using data envelopment analysis and fuzzy preference relation model is one of the models in data envelopment analysis widely used by DEA people and practitioners. However, in many real applications,...
Hybrid Scheme: Two Factor Authentication using Graphical password with Pass point scheme in Cloud computing
Cloud Computing is a completely new concept in the research area. Cloud computing focuses new challenging security threat. Hacking and data leakage are the common threats in cloud computing. As the security due to hacker...
Detection and Prevention of a Selfish attack in Cognitive Radio Adhoc Network
Cognitive radio network (CRN) is a network in which an un-licensed user is secondary user (SU) can use an empty channel in a spectrum band of licensed user known as primary user (PU). It is useful as well as harmful too...