Catálogo de publicaciones - libros
Neural Information Processing: 13th International Conference, ICONIP 2006, Hong Kong, China, October 3-6, 2006, Proceedings, Part III
Irwin King ; Jun Wang ; Lai-Wan Chan ; DeLiang Wang (eds.)
En conferencia: 13º International Conference on Neural Information Processing (ICONIP) . Hong Kong, China . October 3, 2006 - October 6, 2006
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Artificial Intelligence (incl. Robotics); Computation by Abstract Devices; Computer Appl. in Administrative Data Processing; Information Systems Applications (incl. Internet); Database Management; Image Processing and Computer Vision
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2006 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-540-46484-6
ISBN electrónico
978-3-540-46485-3
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2006
Información sobre derechos de publicación
© Springer-Verlag Berlin Heidelberg 2006
Tabla de contenidos
doi: 10.1007/11893295_16
Evolving Hierarchical RBF Neural Networks for Breast Cancer Detection
Yuehui Chen; Yan Wang; Bo Yang
Hierarchical RBF networks consist of multiple RBF networks assembled in different level or cascade architecture. In this paper, an evolved hierarchical RBF network was employed to detect the breast cancel. For evolving a hierarchical RBF network model, Extended Compact Genetic Programming (ECGP), a tree-structure based evolutionary algorithm and the Differential Evolution (DE) are used to find an optimal detection model. The performance of proposed method was then compared with Flexible Neural Tree (FNT), Neural Network (NN), and RBF Neural Network (RBF-NN) by using the same breast cancer data set. Simulation results show that the obtained hierarchical RBF network model has a fewer number of variables with reduced number of input features and with the high detection accuracy.
- Bioinformatics and Biomedical Applications | Pp. 137-144
doi: 10.1007/11893295_17
Ovarian Cancer Prognosis by Hemostasis and Complementary Learning
T. Z. Tan; G. S. Ng; C. Quek; Stephen C. L. Koh
Ovarian cancer is a major cause of deaths worldwide. As a result, women are not diagnosed until the cancer has advanced to later stages. Accurate prognosis is required to determine the suitable therapeutic decision. Since abnormalities of hemostasis and increased risk of thrombosis are observed in cancer patient, assay involving hemostatic parameters can be potential prognosis tool. Thus a biological brain-inspired (CLFNN) is proposed, to complement the hemostasis in ovarian cancer prognosis. Experimental results that demonstrate the confluence of hemostasis and CLFNN offers a promising prognosis tool. Apart from superior performance, CLFNN provides interpretable rules to facilitate validation and justification of the system. Besides, CLFNN can be used as a concept validation tool for ovarian cancer prognosis.
- Bioinformatics and Biomedical Applications | Pp. 145-154
doi: 10.1007/11893295_18
Multi-class Cancer Classification with OVR-Support Vector Machines Selected by Naïve Bayes Classifier
Jin-Hyuk Hong; Sung-Bae Cho
Support vector machines (SVMs), originally designed for binary classification, have been applied for multi-class classification, where an effective fusion scheme is required for combining outputs from them and producing a final result. In this work, we propose a novel method in which the SVMs are generated with the one-vs-rest (OVR) scheme and dynamically organized by the naïve Bayes classifiers (NBs). This method might break the ties that frequently occur when working with multi-class classification systems with OVR SVMs. More specifically, we use the Pearson correlation measure to select informative genes and reduce the dimensionality of gene expression profiles when constructing the NBs. The proposed method has been validated on GCM cancer dataset consisting of 14 types of tumors with 16,063 gene expression levels and produced higher accuracy than other methods.
- Bioinformatics and Biomedical Applications | Pp. 155-164
doi: 10.1007/11893295_19
Breast Cancer Diagnosis Using Neural-Based Linear Fusion Strategies
Yunfeng Wu; Cong Wang; S. C. Ng; Anant Madabhushi; Yixin Zhong
Breast cancer is one of the leading causes of mortality among women, and the early diagnosis is of significant clinical importance. In this paper, we describe several linear fusion strategies, in particular the Majority Vote, Simple Average, Weighted Average, and Perceptron Average, which are used to combine a group of component multilayer perceptrons with optimal architecture for the classification of breast lesions. In our experiments, we utilize the criteria of mean squared error, absolute classification error, relative error ratio, and Receiver Operating Characteristic (ROC) curve to concretely evaluate and compare the performances of the four fusion strategies. The experimental results demonstrate that the Weighted Average and Perceptron Average strategies can achieve better diagnostic performance compared to the Majority Vote and Simple Average methods.
- Bioinformatics and Biomedical Applications | Pp. 165-175
doi: 10.1007/11893295_20
A Quantitative Diagnostic Method Based on Bayesian Networks in Traditional Chinese Medicine
Huiyan Wang; Jie Wang
Traditional Chinese Medicine (TCM) is one of the most important complementary and alternative medicines. Due to the subjectivity and fuzziness of diagnosis in TCM, quantitative model or methods are needed to facilitate the popularization of TCM. In this article, a novel quantitative method for syndrome differentiation based on BNs is proposed. First the symptoms are selected by a novel mutual information based symptom selection algorithm (MISS) and then the mapping relationships between the selected symptoms and key elements are constructed. Finally, the corresponding syndromes are output by combining the key elements. The results show that the diagnostic model obtains relative reliable predictions of syndrome, and its average predictive accuracy rate reach 91.68%, which testifies that the method we proposed is feasible and effective and can be expected to be useful in the modernization of TCM.
- Bioinformatics and Biomedical Applications | Pp. 176-183
doi: 10.1007/11893295_21
High-Order Markov Kernels for Network Intrusion Detection
Shengfeng Tian; Chuanhuan Yin; Shaomin Mu
In intrusion detection systems, sequences of system calls executed by running programs can be used as evidence to detect anomalies. Markov chain is often adopted as the model in the detection systems, in which high-order Markov chain model is well suited for the detection, but as the order of the chain increases, the number of parameters of the model increases exponentially and rapidly becomes too large to be estimated efficiently. In this paper, one-class support vector machines (SVMs) using high-order Markov kernel are adopted as the anomaly detectors. This approach solves the problem of high dimension parameter space. Experiments show that this system can produce good detection performance with low computational overhead.
- Information Security | Pp. 184-191
doi: 10.1007/11893295_22
Improved Realtime Intrusion Detection System
Byung-Joo Kim; Il Kon Kim
We developed earlier version of realtime intrusion detection system using emperical kernel map combining least squares SVM(LS-SVM). I consists of two parts. One part is feature extraction by empirical kernel map and the other one is classification by LS-SVM. The main problem of earlier system is that it is not operated realtime because LS-SVM is executed in batch way. In this paper we propose an improved real time intrusion detection system incorporating earlier developed system with incremental LS-SVM. Applying the proposed system to KDD CUP 99 data, experimental results show that it has a remarkable feature feature extraction, classification performance and reducing detection time compared to earlier version of realtime ntrusion detection system.
- Information Security | Pp. 192-200
doi: 10.1007/11893295_23
A Distributed Neural Network Learning Algorithm for Network Intrusion Detection System
Yanheng Liu; Daxin Tian; Xuegang Yu; Jian Wang
To make network intrusion detection systems can be used in Gigabit Ethernet, a distributed neural network learning algorithm (DNNL) is put forward to keep up with the increasing network throughput. The main idea of DNNL is splitting the overall traffic into subsets and several sensors learn them in parallel way. The advantage of this method is that the large data set can be split randomly thus reduce the complicacy of the splitting algorithm. The experiments are performed on the KDD’99 Data Set which is a standard intrusion detection benchmark. Comparisons with other approaches on the same benchmark show that DNNL can perform detection with high detection rate.
- Information Security | Pp. 201-208
doi: 10.1007/11893295_24
A DGC-Based Data Classification Method Used for Abnormal Network Intrusion Detection
Bo Yang; Lizhi Peng; Yuehui Chen; Hanxing Liu; Runzhang Yuan
The data mining techniques used for extracting patterns that represent abnormal network behavior for intrusion detection is an important research area in network security. This paper introduces the concept of gravitation and gravitation field into data classification by utilizing analogical inference, and studied the method to calculate data gravitation. Based on the theoretical model of data gravitation and data gravitation field, the paper presented a new classification model called Data Gravitation based Classifier (DGC). The proposed approach was applied to an Intrusion Detection System (IDS) with 41 inputs (features). Experimental results show that the proposed method was efficient in data classification and suitable for abnormal detection using netowrk processor-based platforms.
- Information Security | Pp. 209-216
doi: 10.1007/11893295_26
A Novel Color Image Watermarking Method Based on Genetic Algorithm and Neural Networks
Jialing Han; Jun Kong; Yinghua Lu; Yulong Yang; Gang Hou
In the past a few years, many watermarking approaches have been proposed for solving the copyright protection problems, most of the watermarking schemes employ gray-level images to embed the watermarks, whereas the application to color images is scarce and usually works on the luminous or individual color channel. In this paper, a novel intensity adaptive color image watermarking algorithm based on genetic algorithm (CIWGA) is presented. The adaptive embedding scheme in color image’s three component sub-images’ wavelet coefficients, which belong to texture-active regions, not only improves image quality, but also furthest enhances security and robustness of the watermarked image. Then a novel watermark recovering method is proposed based on neural networks, which enhance the performance of watermark system successfully. The experimental results show that our method is more flexible than traditional methods and successfully fulfills the compromise between robustness and image quality.
- Information Security | Pp. 225-233