Performance Evaluation of Support Vector Regression Models for Survival Analysis: A Simulation Study
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 6
Abstract
Desirable features of support vector regression (SVR) models have led to researchers extending them to survival problems. In current paper we evaluate and compare performance of different SVR models and the Cox model using simulated and real data sets with different characteristics. Several SVR models are applied: 1) SVR with only regression constraints (standard SVR); 2) SVR with regression and ranking constraints; 3) SVR with positivity constraints; and 4) L1-SVR. Also, a SVR model based on mean residual life is proposed. Our findings from evaluation of real data sets indicate that for data sets with high censoring rate and high number of features, SVR model significantly outperforms the Cox model. Simulated data sets also show similar results. For some real data sets L1-SVR has a significantly degraded performance in comparison to the standard SVR. Performance of other SVR models is not substantially different from the standard SVR with the real data sets. Nevertheless, the results of simulated data sets show that standard SVR slightly outperforms SVR with regression and ranking constraints.
Authors and Affiliations
Professor Hossein Mahjub, Shahrbanoo Goli, Hossein Mahjub, Javad Faradmal, Ali-Reza Soltanian
Dual Security Testing Model for Web Applications
In recent years, web applications have evolved from small websites into large multi-tiered applications. The quality of web applications depends on the richness of contents, well structured navigation and most importantl...
BYOD Implementation Factors in Schools: A Case Study in Malaysia
The Bring Your Own Device (BYOD) initiative has been implemented widely in developed countries as a mechanism to prepare the students for the 4th industrial revolution. Success stories of the initiative vary depending on...
Crypto-Steganographic LSB-based System for AES-Encrypted Data
The purpose of this work is to increase the level of concealment of information from unauthorized access by pre-encrypting and hiding it in multimedia files such as images. A crypto-steganographic information protection...
A Carrier Signal Approach for Intermittent Fault Detection and Health Monitoring for Electronics Interconnections System
Intermittent faults are completely missed out by traditional monitoring and detection techniques due to non-stationary nature of signals. These are the incipient events of a precursor of permanent faults to come. Intermi...
A Block Cipher Involving a Key and a Key Bunch Matrix, Supplemented with Key-Based Permutation and Substitution
In this paper, we have developed a block cipher involving a key and a key bunch matrix. In this cipher, we have made use of key-based permutation and key-based substitution. The cryptanalysis carried out in this investig...