Loading...
Search for: classification-algorithm
0.007 seconds
Total 26 records

    Multi-Label Text Classification

    , M.Sc. Thesis Sharif University of Technology Kamali, Sajjad (Author) ; Beigy, Hamid (Supervisor)
    Abstract
    Nowadays, with the increasing size of data,it’s impossible to collect data and fast classification by human, and needs for an automated classification and data analysis, is more interested. Data classification is a process of giving the training data along with their class labels to the learning agent, which learns the relation between the instances and the labels. Then make a prediction to the label of the training data.In this thesis we will observe the classification of the multi-label data. Multi-label data have more than one label. In other words, each instance appears with a vector of labels.In this thesis, a method based on nearest neighbor is proposed to classify the multi-label... 

    Developing an approach to evaluate stocks by forecasting effective features with data mining methods

    , Article Expert Systems with Applications ; Volume 42, Issue 3 , February , 2014 , Pages 1325-1339 ; 09574174 (ISSN) Barak, S ; Modarres, M ; Sharif University of Technology
    Elsevier Ltd  2014
    Abstract
    In this research, a novel approach is developed to predict stocks return and risks. In this three stage method, through a comprehensive investigation all possible features which can be effective on stocks risk and return are identified. Then, in the next stage risk and return are predicted by applying data mining techniques for the given features. Finally, we develop a hybrid algorithm, on the basis of filter and function-based clustering; the important features in risk and return prediction are selected then risk and return re-predicted. The results show that the proposed hybrid model is a proper tool for effective feature selection and these features are good indicators for the prediction... 

    An automatic JPEG ghost detection approach for digital image forensics

    , Article 24th Iranian Conference on Electrical Engineering, ICEE 2016, 10 May 2016 through 12 May 2016 ; 2016 , Pages 1645-1649 ; 9781467387897 (ISBN) Azarian Pour, S ; Babaie Zadeh, M ; Sadri, A. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    In this paper we propose a new automatic method for discriminating original and tampered images based on 'JPEG ghost detection' method, which is a subset of format-based image forensics approaches. The inconsistency of quality factors indicates that the photo is a composite one created from at least two different cameras and therefore it is a manipulated photo. Our classification algorithm first extracts the ghost border. Then the image is classified as original or tampered groups by thresholding a distance in feature space. © 2016 IEEE  

    Knowledge discovery using a new interpretable simulated annealing based fuzzy classification system

    , Article Proceedings - 2009 1st Asian Conference on Intelligent Information and Database Systems, ACIIDS 2009, 1 April 2009 through 3 April 2009, Dong Hoi ; 2009 , Pages 271-276 ; 9780769535807 (ISBN) Mohamadia, H ; Habibib, J ; Moavena, S ; Sharif University of Technology
    2009
    Abstract
    This paper presents a new interpretable fuzzy classification system. Simulated annealing heuristic is employed to effectively investigate the large search space usually associated with classification problem. Here, two criteria are used to evaluate the proposed method. The first criterion is accuracy of extracted fuzzy if-then rules, and the other is comprehensibility of obtained rules. Experiments are performed with some data sets from UCI machine learning repository. Results are compared with several well-known classification algorithms, and show that the proposed approach provides more accurate and interpretable classification system. © 2009 IEEE  

    A novel ensemble strategy for classification of prostate cancer protein mass spectra

    , Article 29th Annual International Conference of IEEE-EMBS, Engineering in Medicine and Biology Society, EMBC'07, Lyon, 23 August 2007 through 26 August 2007 ; 2007 , Pages 5987-5990 ; 05891019 (ISSN) ; 1424407885 (ISBN); 9781424407880 (ISBN) Assareh, A ; Moradi, M. H ; Esmaeili, V ; Sharif University of Technology
    2007
    Abstract
    Protein mass spectra pattern recognition is a new forum in which many machine learning algorithms have been conducted to enhance the chance of early cancer diagnosis. The high-dimensionality-small-sample (HDSS) problem of cancer proteomic datasets still requires more sophisticated approaches to improve the classification accuracy. In this study we present a simple ensemble strategy based on measuring the generalizing capability of different subsets of training data and apply it in making final decision. Using a limited number of biomarkers along with 5 classification algorithms, the proposed method achieved a promising performance over a well-known prostate cancer mass spectroscopy dataset.... 

    Design and Development of an Image-based Multivariate Control Chart

    , M.Sc. Thesis Sharif University of Technology Kazemi Kheiri, Setareh (Author) ; Akhavan Niaki, Taghi (Supervisor)
    Abstract
    Today we live in an era of continuous technology improvement which results in huge changes in different areas of diverse industries. Among the most recent systems for monitoring and quality control which benefits from high speed, are machine vision systems. The output of these systems, are digital images that can be used for monitoring instead of the original products. Unfortunately due to the computational complexity of data extracted from the digital images, traditional methods lose their efficiency. Therefore, in this thesis, a method is proposed to design a model for the monitoring and control of image-based processes, which uses classification methods, that are capable of classifying... 

    Analytical and numerical evaluation of steady flow of blood through artery

    , Article Biomedical Research (India) ; Volume 24, Issue 1 , 2013 , Pages 88-98 ; 0970938X (ISSN) Sedaghatizadeh, N ; Barari, A ; Soleimani, S ; Mofidi, M ; Sharif University of Technology
    2013
    Abstract
    Steady blood flow through a circular artery with rigid walls is studied by COSSERAT Continuum Mechanical Approach. To obtain the additional viscosities coefficients, feed forward multi-layer perceptron (MLP) type of artificial neural networks (ANN) and the results obtained in previous empirical works is used. The governing filed equations are derived and solution to the Hagen-Poiseuilli flow of a COSSERAT fluid in the artery is obtained analytically by Homotopy Perturbation Method (HPM) and numerically using finite difference method. Comparison of analytical results with numerical ones showed excellent agreement. In addition microrotation and the velocity profile along the radius are... 

    A new method of mining data streams using harmony search

    , Article Journal of Intelligent Information Systems ; Volume 39, Issue 2 , 2012 , Pages 491-511 ; 09259902 (ISSN) Karimi, Z ; Abolhassani, H ; Beigy, H ; Sharif University of Technology
    Springer  2012
    Abstract
    Incremental learning has been used extensively for data stream classification. Most attention on the data stream classification paid on non-evolutionary methods. In this paper, we introduce new incremental learning algorithms based on harmony search. We first propose a new classification algorithm for the classification of batch data called harmony-based classifier and then give its incremental version for classification of data streams called incremental harmony-based classif ier. Finally, we improve it to reduce its computational overhead in absence of drifts and increase its robustness in presence of noise. This improved version is called improved incremental harmony-based classifier. The... 

    New management operations on classifiers pool to track recurring concepts

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 7448 LNCS , 2012 , Pages 327-339 ; 03029743 (ISSN) ; 9783642325830 (ISBN) Hosseini, M. J ; Ahmadi, Z ; Beigy, H ; Sharif University of Technology
    Springer  2012
    Abstract
    Handling recurring concepts has become of interest as a challenging problem in the field of data stream classification in recent years. One main feature of data streams is that they appear in nonstationary environments. This means that the concept which the data are drawn from, changes over the time. If after a long enough time, the concept reverts to one of the previous concepts, it is said that recurring concepts has occurred. One solution to this challenge is to maintain a pool of classifiers, each representing a concept in the stream. This paper follows this approach and holds an ensemble of classifiers for each concept. As for each received batch of data, a new classifier is created;... 

    Interictal EEG noise cancellation: GEVD and DSS based approaches versus ICA and DCCA based methods

    , Article IRBM ; Volume 36, Issue 1 , 2015 , Pages 20-32 ; 19590318 (ISSN) Hajipour Sardouie, S ; Shamsollahi, M. B ; Albera, L ; Merlet, I ; Sharif University of Technology
    Elsevier Masson SAS  2015
    Abstract
    Denoising is an important preprocessing stage in some ElectroEncephaloGraphy (EEG) applications. For this purpose, Blind Source Separation (BSS) methods, such as Independent Component Analysis (ICA) and Decorrelated and Colored Component Analysis (DCCA), are commonly used. Although ICA and DCCA-based methods are powerful tools to extract sources of interest, the procedure of eliminating the effect of sources of non-interest is usually manual. It should be noted that some methods for automatic selection of artifact sources after BSS methods exist, although they imply a training supervised step. On the other hand, in cases where there are some a prioriinformation about the subspace of... 

    Detecting malicious applications using system services request behavior

    , Article 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2019, 12 November 2019 through 14 November 2019 ; 2019 , Pages 200-209 ; 9781450372831 (ISBN) Salehi, M ; Amini, M ; Crispo, B ; Sharif University of Technology
    Association for Computing Machinery  2019
    Abstract
    Widespread growth in Android malware stimulates security researchers to propose different methods for analyzing and detecting malicious behaviors in applications. Nevertheless, current solutions are ill-suited to extract the fine-grained behavior of Android applications accurately and efficiently. In this paper, we propose ServiceMonitor, a lightweight host-based detection system that dynamically detects malicious applications directly on mobile devices. ServiceMonitor reconstructs the fine-grained behavior of applications based on their interaction with system services (i.e. SMS manager, camera, wifi networking, etc). ServiceMonitor monitors the way applications request system services in... 

    DSCA: an inline and adaptive application identification approach in encrypted network traffic

    , Article 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019 with Workshop 2019 the 4th International Conference on Multimedia and Image Processing, ICMIP 2019, 19 January 2019 through 21 January 2019 ; 2019 , Pages 39-43 ; 9781450366182 (ISBN) Nazari, Z ; Noferesti, M ; Jalili, R ; Sharif University of Technology
    Association for Computing Machinery  2019
    Abstract
    Adaptive application detection in today's high-bandwidth networks is resource consuming and inaccurate due to the high volume, velocity, and variety characteristics of the networks traffic. To generate a robust classifier for identifying applications over encrypted traffic, we proposed DSCA as a DPI-based Stream Classification Algorithm. DSCA utilizes applications detected by the DPI, Deep Packet Inspection technique, as ground truth data and updates the classification model accordingly. To reduce the classification algorithms overhead without accuracy reduction, a feature selection method, named CfsSubsetEval, is deployed in DSCA. The proposed approach is implemented via the MOA tool and... 

    LSTM-Based ecg classification for continuous monitoring on personal wearable devices

    , Article IEEE Journal of Biomedical and Health Informatics ; Volume 24, Issue 2 , 2020 , Pages 515-523 Saadatnejad, S ; Oveisi, M ; Hashemi, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    Objective: A novel electrocardiogram (ECG) classification algorithm is proposed for continuous cardiac monitoring on wearable devices with limited processing capacity. Methods: The proposed solution employs a novel architecture consisting of wavelet transform and multiple long short-term memory (LSTM) recurrent neural networks (see Fig. 1). Results: Experimental evaluations show superior ECG classification performance compared to previous works. Measurements on different hardware platforms show the proposed algorithm meets timing requirements for continuous and real-time execution on wearable devices. Conclusion: In contrast to many compute-intensive deep-learning based approaches, the... 

    Integrated one-against-one classifiers as tools for virtual screening of compound databases: A case study with CNS inhibitors

    , Article Molecular Informatics ; Volume 32, Issue 8 , 2013 , Pages 742-753 ; 18681743 (ISSN) Jalali Heravi, M ; Mani-Varnosfaderani, A ; Valadkhani, A ; Sharif University of Technology
    2013
    Abstract
    A total of 21 833 inhibitors of the central nervous system (CNS) were collected from Binding-database and analyzed using discriminant analysis (DA) techniques. A combination of genetic algorithm and quadratic discriminant analysis (GA-QDA) was proposed as a tool for the classification of molecules based on their therapeutic targets and activities. The results indicated that the one-against-one (OAO) QDA classifiers correctly separate the molecules based on their therapeutic targets and are comparable with support vector machines. These classifiers help in charting the chemical space of the CNS inhibitors and finding specific subspaces occupied by particular classes of molecules. As a next... 

    Unsupervised domain adaptation via representation learning and adaptive classifier learning

    , Article Neurocomputing ; Volume 165 , 2015 , Pages 300-311 ; 09252312 (ISSN) Gheisari, M ; Baghshah Soleimani, M ; Sharif University of Technology
    Abstract
    The existing learning methods usually assume that training data and test data follow the same distribution, while this is not always true. Thus, in many cases the performance of these methods on the test data will be severely degraded. In this paper, we study the problem of unsupervised domain adaptation, where no labeled data in the target domain is available. The proposed method first finds a new representation for both the source and the target domain and then learns a prediction function for the classifier by optimizing an objective function which simultaneously tries to minimize the loss function on the source domain while also maximizes the consistency of manifold (which is based on... 

    K-nearest neighbor search in peer-to-peer systems

    , Article AP2PS 2010 - 2nd International Conference on Advances in P2P Systems ; 2010 , Pages 100-105 ; 9781612081021 (ISBN) Mashayekhi, H ; Habibi, J ; Sharif University of Technology
    Abstract
    Data classification in large scale systems, such as peer-to-peer networks, can be very communication-expensive and impractical due to the huge amount of available data and lack of central control. Frequent data updates pose even more difficulties when applying existing classification techniques in peer-to-peer networks. We propose a distributed, scalable and robust classification algorithm based on k-nearest neighbor estimation. Our algorithm is asynchronous, considers data updates and imposes low communication overhead. The proposed method uses a content based overlay structure to organize data and moderate the number of query messages propagated in the network. Simulation results show that... 

    Associative cellular learning automata and its applications

    , Article Applied Soft Computing Journal ; Volume 53 , 2017 , Pages 1-18 ; 15684946 (ISSN) Ahangaran, M ; Taghizadeh, N ; Beigy, H ; Sharif University of Technology
    Elsevier Ltd  2017
    Abstract
    Cellular learning automata (CLA) is a distributed computational model which was introduced in the last decade. This model combines the computational power of the cellular automata with the learning power of the learning automata. Cellular learning automata is composed from a lattice of cells working together to accomplish their computational task; in which each cell is equipped with some learning automata. Wide range of applications utilizes CLA such as image processing, wireless networks, evolutionary computation and cellular networks. However, the only input to this model is a reinforcement signal and so it cannot receive another input such as the state of the environment. In this paper,... 

    Using a memristor crossbar structure to implement a novel adaptive real-time fuzzy modeling algorithm

    , Article Fuzzy Sets and Systems ; Volume 307 , 2017 , Pages 115-128 ; 01650114 (ISSN) Esmaili Paeen Afrakoti, I ; Bagheri Shouraki, S ; Merrikh Bayat, F ; Gholami, M ; Sharif University of Technology
    Elsevier B.V  2017
    Abstract
    Fuzzy techniques can be used for accurate and high-speed modeling as well as for the control of complex systems, but various challenging problems are usually encountered during their actual implementation. For example, the variable parameters need to be optimized iteratively during the training phase, where this process is inspired by crisp domain algorithms. However, in recent years, memristor-based structures have emerged as another promising method for implementing neural network structures and fuzzy algorithms. In this study, we propose a novel adaptive and real-time fuzzy modeling algorithm, which employs the active learning method concept to mimic the functionality of the brain's right... 

    Feature selection and intrusion detection in cloud environment based on machine learning algorithms

    , Article Proceedings - 15th IEEE International Symposium on Parallel and Distributed Processing with Applications and 16th IEEE International Conference on Ubiquitous Computing and Communications, ISPA/IUCC 2017 ; 25 May , 2018 , Pages 1417-1421 ; 9781538637906 (ISBN) Javadpour, A ; Kazemi Abharian, S ; Wang, G ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Characteristics and way of behavior of attacks and infiltrators on computer networks are usually very difficult and need an expert. In addition; the advancement of computer networks, the number of attacks and infiltrations is also increasing. In fact, the knowledge coming from expert will lose its value over time and must be updated and made available to the system and this makes the need for expert person always felt. In machine learning techniques, knowledge is extracted from the data itself which has diminished the role of the expert. Various methods used to detect intrusions, such as statistical models, safe system approach, neural networks, etc., all weaken the fact that it uses all the... 

    Kernel sparse representation based model for skin lesions segmentation and classification

    , Article Computer Methods and Programs in Biomedicine ; Volume 182 , 2019 ; 01692607 (ISSN) Moradi, N ; Mahdavi Amiri, N ; Sharif University of Technology
    Elsevier Ireland Ltd  2019
    Abstract
    Background and Objectives: Melanoma is a dangerous kind of skin disease with a high death rate, and its prevalence has increased rapidly in recent years. Diagnosis of melanoma in a primary phase can be helpful for its cure. Due to costs for dermatology, we need an automatic system to diagnose melanoma through lesion images. Methods: Here, we propose a sparse representation based method for segmentation and classification of lesion images. The main idea of our framework is based on a kernel sparse representation, which produces discriminative sparse codes to represent features in a high-dimensional feature space. Our novel formulation for discriminative kernel sparse coding jointly learns a...