Advanced Mathematics and Numerical Modeling of IoT

(lily) #1

[9]R.Pan,G.Xu,B.Fu,P.Dolog,Z.Wang,andM.Leginus,
“Improving recommendations by the clustering of tag neigh-
bours,”Journal of Convergence,vol.3,no.1,pp.13–20,2012.
[10] A. Bhattacharya, W. Wu, and Z. Yang, “Quality of experience
evaluation of voice communication: an affect-based approach,”
Human-Centric Computing and Information Sciences,vol.2,
article 7, 2012.
[11] J. R. Quinlan,C4.5: Programs for Machine Learning,TheMorgan
Kaufmann Series in Machine Learning, Morgan Kaufmann
Publishers, San Mateo, Calif, USA, 1993.
[12] T. S. Furey, N. Cristianini, N. Duffy, D. W. Bednarski, M.
Schummer, and D. Haussler, “Support vector machine classifi-
cation and validation of cancer tissue samples using microarray
expression data,”Bioinformatics,vol.16,no.10,pp.906–914,
2000.
[13] M. Abdel Fattah, “The use of MSVM and HMM for sentence
alignment,”Journal of Information Processing Systems,vol.8,no.
2, 2012.
[14] G. P. Zhang, “Neural networks for classification: a survey,”IEEE
Transactions on Systems, Man and Cybernetics C: Applications
and Reviews,vol.30,no.4,pp.451–462,2000.
[15] K. Sarkar, M. Nasipuri, and S. Ghose, “Machine learning based
keyphrase extraction: comparing decision trees, na ̈ıve Bayes,
andartificialneuralnetworks,”Journal of Information Processing
Systems,vol.8,no.4,pp.693–712,2012.
[16] M. Dash and H. Liu, “Feature selection for classification,”
Intelligent Data Analysis,vol.1,no.1–4,pp.131–156,1997.
[17] A. James and S. Dimitrijev, “Ranked selection of nearest
discriminating features,”Human-Centric Computing and Infor-
mation Sciences,vol.2,article12,2012.
[18] S. Farzi, “Efficient job scheduling in grid computing with
modified artificial fish swarm algorithm,”International Journal
of Computer Theory and Engineering,vol.1,no.1,pp.13–18,2009.
[19] C.-L. Huang and C.-J. Wang, “A GA-based feature selection and
parameters optimizationfor support vector machines,”Expert
Systems with Applications,vol.31,no.2,pp.231–240,2006.
[20] J. Kennedy and R. Eberhart, “Particle swarm optimization,”
inProceedings of the IEEE International Conference on Neural
Networks, pp. 1942–1948, Perth, Australia, December 1995.
[21] B. Singh and D. Lobiyal, “A novel energy-aware cluster head
selection based on particle swarm optimization for wireless
sensor networks,”Human-Centric Computing and Information
Sciences,vol.2,article13,2012.
[22] K.-C. Lin and H.-Y. Chien, “CSO-based feature selection and
parameter optimization for support vector machine,” inPro-
ceedings of the Joint Conferences on Pervasive Computing (JCPC
’09), pp. 783–788, December 2009.
[23] M. Dorigo, V. Maniezzo, and A. Colorni, “Ant system: optimiza-
tion by a colony of cooperating agents,”IEEE Transactions on
Systems, Man, and Cybernetics B: Cybernetics,vol.26,no.1,pp.
29–41, 1996.
[24] X.-L. Li, Z.-J. Shao, and J.-X. Qian, “Optimizing method
based on autonomous animats: fish-swarm Algorithm,”System
Engineering Theory and Practice, vol. 22, no. 11, pp. 32–38, 2002.
[25]H.Chen,S.Wang,J.Li,andY.Li,“Ahybridofartificial
fish swarm algorithm and particle swarm optimization for
feedforward neural network training,” inProceedings of the
International Conference on Intelligent Systems and Knowledge
Engineering,2007.
[26] J. L. Liao and K. C. Lin,A Study of Feature Selection Integrated
with Back-Propagation Network for Botnet Detection, National
Chung Hsing University, Taichung, Taiwan, 2013.


[27] C. Cortes and V. Vapnik, “Support-vector networks,”Machine
Learning,vol.20,no.3,pp.273–297,1995.
[28] V. N. Vapnik,The Nature of Statistical Learning Theory,Springer,
New York, NY, USA, 1995.
[29] R. Malhotra and A. Jain, “Fault prediction using statistical
and machine learning methods for improving software quality,”
Journal of Information Processing Systems,vol.8,no.2,pp.241–
262, 2012.
[30] C. Langin, H. Zhou, S. Rahimi, B. Gupta, M. Zargham, and
M. R. Sayeh, “A self-organizing map and its modeling for
discovering malignant network traffic,” inProceedings of the
IEEE Symposium on Computational Intelligence in Cyber Secu-
rity (CICS ’09), pp. 122–129, Nashville, Tenn, USA, April 2009.
[31]T.Liu,Y.-B.Hou,A.-L.Qi,andX.-T.Chang,“Featureopti-
mization based on Artificial Fish-swarm Algorithm in intrusion
detections,” inProceedings of the International Conference on
Networks Security, Wireless Communications and Trusted Com-
puting (NSWCTC ’09), pp. 542–545, April 2009.
[32] C. C. Chang and C. J. Lin, “LIBSVM: A Library for Support
Vector Machines,”http://www.csie.ntu.edu.tw/∼cjlin/libsvm/.
Free download pdf