{"title":"Evolving support vector machine parameters","authors":"Anh Trần Quang, Qianli Zhang, Xing Li","doi":"10.1109/ICMLC.2002.1176817","DOIUrl":null,"url":null,"abstract":"The kernel type, kernel parameters and upper bound C control the generalization of support vector machines. The best choice of kernel or C depends on each other and the art of researchers. This paper presents a general optimization problem of support vector machine parameters including a mixed kernel and different upper bounds for unbalanced data. The objectives are /spl xi/a-estimators of the error rate, recall and precision. Evolutionary algorithms are used to solve the problem. The performance of this method is illustrated with a standard data set of intrusion detection application.","PeriodicalId":90702,"journal":{"name":"Proceedings. International Conference on Machine Learning and Cybernetics","volume":"57 1","pages":"548-551 vol.1"},"PeriodicalIF":0.0000,"publicationDate":"2002-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"34","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. International Conference on Machine Learning and Cybernetics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMLC.2002.1176817","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 34
Abstract
The kernel type, kernel parameters and upper bound C control the generalization of support vector machines. The best choice of kernel or C depends on each other and the art of researchers. This paper presents a general optimization problem of support vector machine parameters including a mixed kernel and different upper bounds for unbalanced data. The objectives are /spl xi/a-estimators of the error rate, recall and precision. Evolutionary algorithms are used to solve the problem. The performance of this method is illustrated with a standard data set of intrusion detection application.