Comparing Support Vector Machines, Recurrent Networks and Finite State Transducers for Classifying Spoken Utterances
|
|
|
- Marvin Goodman
- 10 years ago
- Views:
Transcription
1 Comparing Support Vector Machines, Recurrent Networks and Finite State Transducers for Classifying Spoken Utterances Sheila Garfield and Stefan Wermter University of Sunderland, School of Computing and Technology, Centre for Hybrid Intelligent Systems, Sunderland, SR6 0DD, United Kingdom 1 Abstract This paper describes new experiments for the classification of recorded operator assistance telephone utterances. The experimental work focused on three techniques: support vector machines (SVM), simple recurrent networks (SRN) and finite-state transducers (FST) using a large, unique telecommunication corpus of spontaneous spoken language. A comparison is made of the performance of these classification techniques which indicates that a simple recurrent network performed best for learning classification of spontaneous spoken language in a robust manner which should lead to their use in helpdesk call routing. 2 Introduction Spontaneous spoken language is disfluent [1] and as a result errors in recognition of speech input can arise due to background noise, speaking style, disfluencies, out-of-vocabulary words, parsing coverage or understanding gaps [2]. Spontaneous speech also includes filled pauses and partial words. Spoken dialogue systems must be able to deal with these as well as other discourse phenomena such as anaphora and ellipsis, and ungrammatical queries [2, 3]. A general research question arises whether certain symbolic, statistical or neural network methods can be used effectively to classify faulty telephone utterances. In order to address this question we have chosen symbolic finite state transducers, statistical support vector machines and simple recurrent neural networks. So far there has been little work on comparing and evaluating such techniques on substantial real world corpora although we believe that such a study is crucial to suggest more effective techniques and architectures for the future. In this paper we describe an approach to the classification of recorded operator assistance telephone utterances. We describe experiments in a real-world scenario utilising a large, unique corpus with utterances of spontaneous spoken This research has been partially supported under grant ML to Professor S. Wermter. The authors thank Mark Farrell and David Attwater of BTexact Technologies for their helpful discussions.
2 language. The paper is structured as follows: Section 3 provides an overview of the corpus used; Sections 4 and 5 outline the experimental work using SVMs and FSTs and Section 6 is an evaluation and comparison of these techniques with the SRN; and finally Section 7 draws together conclusions. 3 Description of the Helpdesk Corpus Our task is to learn to classify real incoming telephone utterances into a set of service level classes. For this task a corpus from transcriptions of recorded operator assistance telephone calls was used [4]. Examination of the utterances reveals that the callers use a wide range of language to express their problem, enquiry or to request assistance [5]. 1. could I book a wake up call please 2. could you check for conversation please 3. I m in on my own and I ve just got a phone call and I picked it up and it was just gone and it happened yesterday as well at the same time 3.1 Call Transcription A corpus based on transcriptions of the first utterances of callers to the operator service is the focus of the investigation. A number of service levels or call classes, primary move types and request types [4] were identified after analysis of the utterances. As shown by the example in Table 1, the call class is the classification of the utterance and is associated with the service that the caller requires. The primary move is a subset of the first utterance, it is like a dialogue act and gives an indication of which dialogue act is likely to follow the current utterance. The request type identifies whether the request is explicit or not [6]. Table 1. Example call from the corpus Call Call Class Primary Move Type Request Type yeah could I book a wake up call alarm call action explicit please Four separate call sets of utterances each were used in this study. The call sets are split so that 80% of utterances are used for training and 20% of utterances used for testing. The average length of an utterance in the training set is words and in the test set the average length of an utterance is words. An illustrative example of the breakdown of utterances is given in Table 2, however for illustration not all call classes are shown. The part of the utterance identified as the primary move was used for both the training and test sets.
3 Table 2. Breakdown of utterances in training and test sets from call set 1. Note: For illustration purposes not all classes are shown utterances Total of 712 utterances in Training set Total of 205 utterances in Test set Total of 83 utterances not used since they did not contain a primary move Classes: class 1 class 2 class 3 class 4 class 5 class 6 class 7 class 8 class 9 class n in train set: in test set: Semantic Vector Representation The experiments use a semantic vector representation of the words in a lexicon [7]. These vectors represent the frequency of a particular word occurring in a call class and are independent of the number of examples observed in each class. The number of calls in a class can vary substantially. Therefore we normalise the frequency of a word w in class c i according to the number of calls in c i (2). A value v(w, c i ) is computed for each element of the semantic vector as the normalised frequency of occurrences of word w in semantic class c i, divided by the normalised frequency of occurrences of word w in all classes. That is: where: Normalised frequency of w in c i = F requency of w in c i Number of calls in c i (1) v(w, c i ) = Normalised frequency of w in c i, j {1, n}. (2) Normalised frequency for w in c j j 4 Support Vector Machines A support vector machine is a binary classifier which divides the problem space into two regions via a dividing line or hyperplane. This hyperplane separates positive examples from negative examples with a maximum margin [8, 9, 10] between it and the nearest data point of each class. SVMs can deal with non-linearly separable classes and can handle noisy data. SVMs can learn or generalise from labelled training data and consequently can be automatically constructed. Classifiers were constructed [11] with different kernel functions: polynomial, RBF and sigmoid [9, 12]. For each of these kernel functions we performed two series of experiments. In the first series the value of tuning parameter C, the error penalty, was chosen randomly; in the second series this parameter was selected automatically. Several values for C were determined empirically; the aim was to select a value that reduced the test error to a minimum while at
4 the same time constructing a classifier that was able to perform successfully on individual classes. Other parameters were kept constant, that is, the classifiers were constructed using the same values except the error penalty C. The input sequences generated are composed of feature-value pairs, for example, 1: , where the feature, in this case 1, is the position of the word in the utterance and the value, , is the frequency of occurrence of that word for the particular class under investigation, (see also Section 3.2). A classifier was constructed [11] for each class in a one-versus-all approach, that is, the training and test sets used positive examples for the particular class in question and negative examples of all the other classes. The classifier in each case was trained and then tested on the utterance sequences generated from four call sets used in [13]. Table 3 shows the overall F-score performance (combined recall and precision [14]) of each of the trained classifiers on the four call sets. We will later analyse and compare this performance in Section 6. Table 3. Training and test set. F-score results of SVM on utterances Training Set Test Set RBF Sigmoid Polynomial RBF Sigmoid Polynomial Call set Call set Call set Call set Finite-State Machines A finite-state machine is a formal machine that consists of states, transitions, one start state, any number of final states and an alphabet [15, 16]. While their representation and their output is both easily understood and interpreted the foundation of a finite-state machine is the regular expression and these must be manually pre-specified to encode an utterance classification. In order to create the regular expressions, the utterances in the call set are symbolically tagged to enable identification of possible patterns or strings and substrings in the utterances. This means that each word in the utterance is tagged with a symbolic representation of the class associated with that word based on the highest frequency of occurrence as shown by the example utterance how do I cancel it or can t I in Table 4. Thus in the lexicon, the word how is most frequently associated with the class 4 class based on the frequency of occurrence. These symbolic tags represent the sequence for a specific utterance. The higher frequency of class 4 would indicate that this utterance is classified as class 4. The same utterances were used as in the previous experiment and transducers were constructed for each class. Transducers were constructed for
5 Table 4. Example sequence how do I cancel it or can t I class 4 class 4 class 8 class 4 class 1 class 4 class 4 class 8 each class using regular expressions which were hand-crafted. The tagged training sets were used as reference sets whilst creating the regular expressions based on sequences of classes identified in the symbolic representation of the utterances. Once the transducers were constructed each was tested against the data sets for the other classes. The transducer produces an output for each sequence in the input file. A successful output is the semantic label of the class for which the transducer has been constructed while an unsuccessful output is 0. The overall F-score performance of the transducers on each of the four call sets is shown in Table 5. Table 5. Training and test set. F-score results of FST on utterances Training Set Test Set Call set Call set Call set Call set Evaluation and Comparison with Simple Recurrent Network The overall test recall and precision rates for each of the SVM classifiers and the FST are shown in Figure 1 for each of the four call sets. In an initial comparison of the three techniques SRN, SVM and FST the average recall and precision performance on the test set across three classes for each technique is shown in Figure 2. The SRN network and its performance has been described in more detail in [13] which is why we concentrated here on the description of SVM and FST in this paper. The performance of the SRN, SVM and the FST on individual call classes for recall and precision on the unseen test data for call set 1 is shown in Figure 3. From the results on the test set, shown in Figure 3, the performance is varied across each technique and it is evident that no one technique performs well on every class and, in some cases, both the SRN and the SVM produce exactly the same recall result, for example, class 3 recall percentage. Generally, the performance of the SRN is better than that of the SVM and the FST. One possible reason why the performance of the SRN is better than that of the other
6 90.00% 80.00% 70.00% 60.00% 50.00% 40.00% 30.00% Call set 1 Call set 2 Call set 3 Call set % 10.00% 0.00% R ecall Precision R ecall Precision R ecall Precision R ecall Precision RBF Sigmoid Polynomial FST Fig. 1. Test results of SVM and FST 90.00% 80.00% 70.00% 60.00% 50.00% 40.00% Recall Precision 30.00% 20.00% 10.00% 0.00% SRN RBF Sigmoid Polynomial FST Fig. 2. Test set. Comparison of average performance on three classes for the SRN, SVM and FST techniques is that the SRN is able to make use of sequential memory in the form of its context layer. That is, the information stored in the context layer does assist the network in assigning the correct class to an utterance. However, in the case of class 3 the precision rate for both the SVM and the FST is below 50%. This is a possible indication that the method of representation of the semantic content of the utterances in this particular class is inadequate and does not allow either technique to consistently classify the utterances. On the other hand the recall performance of the FST on this class is significantly better than that of the SVM. It can be concluded that the means by which the semantic content is presented to the FST generally enables this technique to perform more effectively with regard to recall than the SVM but in most cases not as well with regard to precision performance. It is evident that the hand-crafted regular expressions do not capture a fine enough level of granularity in the semantics of this type of utterance for the FST to accurately classify the utterances consistently when precision performance is considered.
7 110.00% % 90.00% 80.00% 70.00% 60.00% 50.00% 40.00% Class 1 Class 2 Class % 20.00% 10.00% RBF Sigmoid Polynomial FST 0.00% Recall Precision Recall Precision Recall Precision Recall Precision Recall Precision S R N R B F S igm oid P olynom ial FS T Fig. 3. Test set. Comparison of SRN, SVM and FST. Note: For illustration purposes three classes are shown One factor to consider is the number of examples in each of the classes. The number of examples in class 1 is over 5 times greater than that of class 3. Consequently, if one or two examples are misclassified or not classified in a small number of examples the impact on the result is much greater and produces a greater difference to the result but the same is not true for a larger set of examples. SVMs are a promising method for learning classification from examples. Classifiers can be automatically constructed and, depending on the task, achieve a smooth trade-off between recall and precision [17]. Finite-state machines can handle strings of any length and this is of particular significance in this task because the length of the caller s utterance is variable. However, the SRN overall outperformed both the SVM and FST and provided better overall results due to its context layer. 7 Conclusion The SRN network was compared to the other approaches identified and the main result from this work is that the performance of the simple recurrent network is better when factors such as noise in the utterance and the number of classes are taken into consideration. However, a combination of techniques might yield even improved performance. The SVM allows a trade-off between recall and precision and as a result for classes that are problematic to the SRN the SVM might be a better alternative. Whilst the FST does not allow a trade-off between recall and precision again it could be used for those classes with very few and problematic
8 examples because it can achieve almost perfect performance, that is 100%, on both recall and precision for very few examples. The drawback to this approach is that it requires hand-crafted regular expressions which are time-consuming to construct. One additional factor that must be considered is the number of examples available for training and testing as this does influence performance. Based on this detailed study of utterances we conclude that an SRN-based architecture combined with SVM models is the most promising candidate to improve classification performance even further. References [1] Abney, S.: Statistical Methods and Linguistics. In: Klavans, J. and P. (eds): The Balancing Act. MIT Press, Cambridge, MA (1996) [2] Glass, J.R.: Challenges for Spoken Dialogue Systems. Proceedings of IEEE ASRU Workshop. Keystone, CO (1999) [3] Clark, H.: Speaking in Time. Speech Communication 36 (2002) 5 13 [4] Durston, P.J. and Kuo, J.J.K. et al.: OASIS Natural Language Call Steering Trial. Proceedings of Eurospeech, Vol2 (2001) [5] Edgington, M., Attwater, D. and Durston, P.: OASIS - A Framework for Spoken Language Call Steering. Proceedings of Eurospeech 99 (1999) [6] Attwater, D.: OASIS First Utterance Version 2.10 Release Note, 100CS:QUAL:REL:005 Version. (2000) [7] Wermter, S., Panchev, C., Arevian, G.: Hybrid Neural Plausibility Networks for News Agents. Proceedings of the National Conference on Artificial Intelligence. Orlando, USA (1999) [8] Chapelle, O. and Vapnik, V.: Model Selection for Support Vector Machines. In: Solla, S., Leen, T. and Muller, K-R. (eds): Advances in Neural Information Processing Systems 12. MIT Press, Cambridge, MA (2000) [9] Opper, M. and Urbanczik, R.: Universal Learning Curves of Support Vector Machines. Physical Review Letters 86,19 (2001) [10] Feng, J. and Williams, P.: The Generalization Error of the Symmetric and Scaled Support Vector Machines. IEEE Transactions on Neural Networks 12, 5 (2001) [11] Joachims, T.: Making Large-Scale SVM Learning Practical. In: Schölkopf, B., Burges, C. and Smola, A. (eds): Advances in Kernel Methods: Support Vector Learning. MIT Press, Cambridge, MA (1999) [12] Moghaddam, B. and Yang, M-H.: Sex with Support Vector Machines. In: Leen, T.K., Dietterich, T.G. and Tresp, V. (eds): Advances in Neural Information Processing Systems 13. MIT Press, Cambridge, MA (2001) [13] Garfield, S. and Wermter, S.: Recurrent Neural Learning for Helpdesk Call Routing. Proceedings of the International Conference on Artificial Neural Networks (2002) [14] Van Rijsbergen, C.J.: Information Retrieval. 2nd edition. Butterworths, London. (1979) [15] Roche, E. and Schabes, Y.: Finite-state Language Processing. MIT, London (1997) [16] Jurafsky, D. and Martin, J.H.: Speech and Language Processing. Prentice Hall, New Jersey (2000) [17] Dumais, S.: Using SVMs for text categorization. IEEE Intelligent Systems (1998) 21 23
Knowledge Discovery from patents using KMX Text Analytics
Knowledge Discovery from patents using KMX Text Analytics Dr. Anton Heijs [email protected] Treparel Abstract In this white paper we discuss how the KMX technology of Treparel can help searchers
Comparing the Results of Support Vector Machines with Traditional Data Mining Algorithms
Comparing the Results of Support Vector Machines with Traditional Data Mining Algorithms Scott Pion and Lutz Hamel Abstract This paper presents the results of a series of analyses performed on direct mail
Feature Selection using Integer and Binary coded Genetic Algorithm to improve the performance of SVM Classifier
Feature Selection using Integer and Binary coded Genetic Algorithm to improve the performance of SVM Classifier D.Nithya a, *, V.Suganya b,1, R.Saranya Irudaya Mary c,1 Abstract - This paper presents,
Ensemble Methods. Knowledge Discovery and Data Mining 2 (VU) (707.004) Roman Kern. KTI, TU Graz 2015-03-05
Ensemble Methods Knowledge Discovery and Data Mining 2 (VU) (707004) Roman Kern KTI, TU Graz 2015-03-05 Roman Kern (KTI, TU Graz) Ensemble Methods 2015-03-05 1 / 38 Outline 1 Introduction 2 Classification
Search Taxonomy. Web Search. Search Engine Optimization. Information Retrieval
Information Retrieval INFO 4300 / CS 4300! Retrieval models Older models» Boolean retrieval» Vector Space model Probabilistic Models» BM25» Language models Web search» Learning to Rank Search Taxonomy!
SURVIVABILITY OF COMPLEX SYSTEM SUPPORT VECTOR MACHINE BASED APPROACH
1 SURVIVABILITY OF COMPLEX SYSTEM SUPPORT VECTOR MACHINE BASED APPROACH Y, HONG, N. GAUTAM, S. R. T. KUMARA, A. SURANA, H. GUPTA, S. LEE, V. NARAYANAN, H. THADAKAMALLA The Dept. of Industrial Engineering,
Artificial Neural Networks and Support Vector Machines. CS 486/686: Introduction to Artificial Intelligence
Artificial Neural Networks and Support Vector Machines CS 486/686: Introduction to Artificial Intelligence 1 Outline What is a Neural Network? - Perceptron learners - Multi-layer networks What is a Support
Large Margin DAGs for Multiclass Classification
S.A. Solla, T.K. Leen and K.-R. Müller (eds.), 57 55, MIT Press (000) Large Margin DAGs for Multiclass Classification John C. Platt Microsoft Research Microsoft Way Redmond, WA 9805 [email protected]
Support Vector Machines with Clustering for Training with Very Large Datasets
Support Vector Machines with Clustering for Training with Very Large Datasets Theodoros Evgeniou Technology Management INSEAD Bd de Constance, Fontainebleau 77300, France [email protected] Massimiliano
Support Vector Machines Explained
March 1, 2009 Support Vector Machines Explained Tristan Fletcher www.cs.ucl.ac.uk/staff/t.fletcher/ Introduction This document has been written in an attempt to make the Support Vector Machines (SVM),
A MACHINE LEARNING APPROACH TO SERVER-SIDE ANTI-SPAM E-MAIL FILTERING 1 2
UDC 004.75 A MACHINE LEARNING APPROACH TO SERVER-SIDE ANTI-SPAM E-MAIL FILTERING 1 2 I. Mashechkin, M. Petrovskiy, A. Rozinkin, S. Gerasimov Computer Science Department, Lomonosov Moscow State University,
Support Vector Machine (SVM)
Support Vector Machine (SVM) CE-725: Statistical Pattern Recognition Sharif University of Technology Spring 2013 Soleymani Outline Margin concept Hard-Margin SVM Soft-Margin SVM Dual Problems of Hard-Margin
How To Use Neural Networks In Data Mining
International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and
Investigation of Support Vector Machines for Email Classification
Investigation of Support Vector Machines for Email Classification by Andrew Farrugia Thesis Submitted by Andrew Farrugia in partial fulfillment of the Requirements for the Degree of Bachelor of Software
Artificial Neural Network for Speech Recognition
Artificial Neural Network for Speech Recognition Austin Marshall March 3, 2005 2nd Annual Student Research Showcase Overview Presenting an Artificial Neural Network to recognize and classify speech Spoken
Sentiment analysis for news articles
Prashant Raina Sentiment analysis for news articles Wide range of applications in business and public policy Especially relevant given the popularity of online media Previous work Machine learning based
SUPPORT VECTOR MACHINE (SVM) is the optimal
130 IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 19, NO. 1, JANUARY 2008 Multiclass Posterior Probability Support Vector Machines Mehmet Gönen, Ayşe Gönül Tanuğur, and Ethem Alpaydın, Senior Member, IEEE
WE DEFINE spam as an e-mail message that is unwanted basically
1048 IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 10, NO. 5, SEPTEMBER 1999 Support Vector Machines for Spam Categorization Harris Drucker, Senior Member, IEEE, Donghui Wu, Student Member, IEEE, and Vladimir
HYBRID PROBABILITY BASED ENSEMBLES FOR BANKRUPTCY PREDICTION
HYBRID PROBABILITY BASED ENSEMBLES FOR BANKRUPTCY PREDICTION Chihli Hung 1, Jing Hong Chen 2, Stefan Wermter 3, 1,2 Department of Management Information Systems, Chung Yuan Christian University, Taiwan
Blog Post Extraction Using Title Finding
Blog Post Extraction Using Title Finding Linhai Song 1, 2, Xueqi Cheng 1, Yan Guo 1, Bo Wu 1, 2, Yu Wang 1, 2 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing 2 Graduate School
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,
MIRACLE at VideoCLEF 2008: Classification of Multilingual Speech Transcripts
MIRACLE at VideoCLEF 2008: Classification of Multilingual Speech Transcripts Julio Villena-Román 1,3, Sara Lana-Serrano 2,3 1 Universidad Carlos III de Madrid 2 Universidad Politécnica de Madrid 3 DAEDALUS
POSBIOTM-NER: A Machine Learning Approach for. Bio-Named Entity Recognition
POSBIOTM-NER: A Machine Learning Approach for Bio-Named Entity Recognition Yu Song, Eunji Yi, Eunju Kim, Gary Geunbae Lee, Department of CSE, POSTECH, Pohang, Korea 790-784 Soo-Jun Park Bioinformatics
Spam detection with data mining method:
Spam detection with data mining method: Ensemble learning with multiple SVM based classifiers to optimize generalization ability of email spam classification Keywords: ensemble learning, SVM classifier,
Predicting the Stock Market with News Articles
Predicting the Stock Market with News Articles Kari Lee and Ryan Timmons CS224N Final Project Introduction Stock market prediction is an area of extreme importance to an entire industry. Stock price is
Which Is the Best Multiclass SVM Method? An Empirical Study
Which Is the Best Multiclass SVM Method? An Empirical Study Kai-Bo Duan 1 and S. Sathiya Keerthi 2 1 BioInformatics Research Centre, Nanyang Technological University, Nanyang Avenue, Singapore 639798 [email protected]
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
Scalable Developments for Big Data Analytics in Remote Sensing
Scalable Developments for Big Data Analytics in Remote Sensing Federated Systems and Data Division Research Group High Productivity Data Processing Dr.-Ing. Morris Riedel et al. Research Group Leader,
Introduction to Machine Learning and Data Mining. Prof. Dr. Igor Trajkovski [email protected]
Introduction to Machine Learning and Data Mining Prof. Dr. Igor Trakovski [email protected] Neural Networks 2 Neural Networks Analogy to biological neural systems, the most robust learning systems
Towards better accuracy for Spam predictions
Towards better accuracy for Spam predictions Chengyan Zhao Department of Computer Science University of Toronto Toronto, Ontario, Canada M5S 2E4 [email protected] Abstract Spam identification is crucial
A Simple Introduction to Support Vector Machines
A Simple Introduction to Support Vector Machines Martin Law Lecture for CSE 802 Department of Computer Science and Engineering Michigan State University Outline A brief history of SVM Large-margin linear
Development of a Network Configuration Management System Using Artificial Neural Networks
Development of a Network Configuration Management System Using Artificial Neural Networks R. Ramiah*, E. Gemikonakli, and O. Gemikonakli** *MSc Computer Network Management, **Tutor and Head of Department
CHARACTERISTICS IN FLIGHT DATA ESTIMATION WITH LOGISTIC REGRESSION AND SUPPORT VECTOR MACHINES
CHARACTERISTICS IN FLIGHT DATA ESTIMATION WITH LOGISTIC REGRESSION AND SUPPORT VECTOR MACHINES Claus Gwiggner, Ecole Polytechnique, LIX, Palaiseau, France Gert Lanckriet, University of Berkeley, EECS,
A Feature Selection Methodology for Steganalysis
A Feature Selection Methodology for Steganalysis Yoan Miche 1, Benoit Roue 2, Amaury Lendasse 1, Patrick Bas 12 1 Laboratory of Computer and Information Science Helsinki University of Technology P.O. Box
Domain Classification of Technical Terms Using the Web
Systems and Computers in Japan, Vol. 38, No. 14, 2007 Translated from Denshi Joho Tsushin Gakkai Ronbunshi, Vol. J89-D, No. 11, November 2006, pp. 2470 2482 Domain Classification of Technical Terms Using
AUTOMATIC CLASSIFICATION OF QUESTIONS INTO BLOOM'S COGNITIVE LEVELS USING SUPPORT VECTOR MACHINES
AUTOMATIC CLASSIFICATION OF QUESTIONS INTO BLOOM'S COGNITIVE LEVELS USING SUPPORT VECTOR MACHINES Anwar Ali Yahya *, Addin Osman * * Faculty of Computer Science and Information Systems, Najran University,
Introduction to Support Vector Machines. Colin Campbell, Bristol University
Introduction to Support Vector Machines Colin Campbell, Bristol University 1 Outline of talk. Part 1. An Introduction to SVMs 1.1. SVMs for binary classification. 1.2. Soft margins and multi-class classification.
Support Vector Machine. Tutorial. (and Statistical Learning Theory)
Support Vector Machine (and Statistical Learning Theory) Tutorial Jason Weston NEC Labs America 4 Independence Way, Princeton, USA. [email protected] 1 Support Vector Machines: history SVMs introduced
THE THIRD DIALOG STATE TRACKING CHALLENGE
THE THIRD DIALOG STATE TRACKING CHALLENGE Matthew Henderson 1, Blaise Thomson 2 and Jason D. Williams 3 1 Department of Engineering, University of Cambridge, UK 2 VocalIQ Ltd., Cambridge, UK 3 Microsoft
Author Gender Identification of English Novels
Author Gender Identification of English Novels Joseph Baena and Catherine Chen December 13, 2013 1 Introduction Machine learning algorithms have long been used in studies of authorship, particularly in
Classification of Bad Accounts in Credit Card Industry
Classification of Bad Accounts in Credit Card Industry Chengwei Yuan December 12, 2014 Introduction Risk management is critical for a credit card company to survive in such competing industry. In addition
How to Win at the Track
How to Win at the Track Cary Kempston [email protected] Friday, December 14, 2007 1 Introduction Gambling on horse races is done according to a pari-mutuel betting system. All of the money is pooled,
B-bleaching: Agile Overtraining Avoidance in the WiSARD Weightless Neural Classifier
B-bleaching: Agile Overtraining Avoidance in the WiSARD Weightless Neural Classifier Danilo S. Carvalho 1,HugoC.C.Carneiro 1,FelipeM.G.França 1, Priscila M. V. Lima 2 1- Universidade Federal do Rio de
A Health Degree Evaluation Algorithm for Equipment Based on Fuzzy Sets and the Improved SVM
Journal of Computational Information Systems 10: 17 (2014) 7629 7635 Available at http://www.jofcis.com A Health Degree Evaluation Algorithm for Equipment Based on Fuzzy Sets and the Improved SVM Tian
E-commerce Transaction Anomaly Classification
E-commerce Transaction Anomaly Classification Minyong Lee [email protected] Seunghee Ham [email protected] Qiyi Jiang [email protected] I. INTRODUCTION Due to the increasing popularity of e-commerce
A fast multi-class SVM learning method for huge databases
www.ijcsi.org 544 A fast multi-class SVM learning method for huge databases Djeffal Abdelhamid 1, Babahenini Mohamed Chaouki 2 and Taleb-Ahmed Abdelmalik 3 1,2 Computer science department, LESIA Laboratory,
Recognizing Informed Option Trading
Recognizing Informed Option Trading Alex Bain, Prabal Tiwaree, Kari Okamoto 1 Abstract While equity (stock) markets are generally efficient in discounting public information into stock prices, we believe
Programming Exercise 3: Multi-class Classification and Neural Networks
Programming Exercise 3: Multi-class Classification and Neural Networks Machine Learning November 4, 2011 Introduction In this exercise, you will implement one-vs-all logistic regression and neural networks
Analysis and Synthesis of Help-desk Responses
Analysis and Synthesis of Help-desk s Yuval Marom and Ingrid Zukerman School of Computer Science and Software Engineering Monash University Clayton, VICTORIA 3800, AUSTRALIA {yuvalm,ingrid}@csse.monash.edu.au
Term extraction for user profiling: evaluation by the user
Term extraction for user profiling: evaluation by the user Suzan Verberne 1, Maya Sappelli 1,2, Wessel Kraaij 1,2 1 Institute for Computing and Information Sciences, Radboud University Nijmegen 2 TNO,
SVM Based Learning System For Information Extraction
SVM Based Learning System For Information Extraction Yaoyong Li, Kalina Bontcheva, and Hamish Cunningham Department of Computer Science, The University of Sheffield, Sheffield, S1 4DP, UK {yaoyong,kalina,hamish}@dcs.shef.ac.uk
Data Mining Techniques for Prognosis in Pancreatic Cancer
Data Mining Techniques for Prognosis in Pancreatic Cancer by Stuart Floyd A Thesis Submitted to the Faculty of the WORCESTER POLYTECHNIC INSTITUE In partial fulfillment of the requirements for the Degree
Learning to Process Natural Language in Big Data Environment
CCF ADL 2015 Nanchang Oct 11, 2015 Learning to Process Natural Language in Big Data Environment Hang Li Noah s Ark Lab Huawei Technologies Part 1: Deep Learning - Present and Future Talk Outline Overview
Facilitating Business Process Discovery using Email Analysis
Facilitating Business Process Discovery using Email Analysis Matin Mavaddat [email protected] Stewart Green Stewart.Green Ian Beeson Ian.Beeson Jin Sa Jin.Sa Abstract Extracting business process
Comparing Tag Clouds, Term Histograms, and Term Lists for Enhancing Personalized Web Search
Comparing Tag Clouds, Term Histograms, and Term Lists for Enhancing Personalized Web Search Orland Hoeber and Hanze Liu Department of Computer Science, Memorial University St. John s, NL, Canada A1B 3X5
Search Result Optimization using Annotators
Search Result Optimization using Annotators Vishal A. Kamble 1, Amit B. Chougule 2 1 Department of Computer Science and Engineering, D Y Patil College of engineering, Kolhapur, Maharashtra, India 2 Professor,
Towards SoMEST Combining Social Media Monitoring with Event Extraction and Timeline Analysis
Towards SoMEST Combining Social Media Monitoring with Event Extraction and Timeline Analysis Yue Dai, Ernest Arendarenko, Tuomo Kakkonen, Ding Liao School of Computing University of Eastern Finland {yvedai,
Data Quality Mining: Employing Classifiers for Assuring consistent Datasets
Data Quality Mining: Employing Classifiers for Assuring consistent Datasets Fabian Grüning Carl von Ossietzky Universität Oldenburg, Germany, [email protected] Abstract: Independent
Search and Information Retrieval
Search and Information Retrieval Search on the Web 1 is a daily activity for many people throughout the world Search and communication are most popular uses of the computer Applications involving search
2014/02/13 Sphinx Lunch
2014/02/13 Sphinx Lunch Best Student Paper Award @ 2013 IEEE Workshop on Automatic Speech Recognition and Understanding Dec. 9-12, 2013 Unsupervised Induction and Filling of Semantic Slot for Spoken Dialogue
Bayesian Spam Filtering
Bayesian Spam Filtering Ahmed Obied Department of Computer Science University of Calgary [email protected] http://www.cpsc.ucalgary.ca/~amaobied Abstract. With the enormous amount of spam messages propagating
Sentiment analysis on tweets in a financial domain
Sentiment analysis on tweets in a financial domain Jasmina Smailović 1,2, Miha Grčar 1, Martin Žnidaršič 1 1 Dept of Knowledge Technologies, Jožef Stefan Institute, Ljubljana, Slovenia 2 Jožef Stefan International
How To Filter Spam Image From A Picture By Color Or Color
Image Content-Based Email Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, email has become one of the main methods of communication among
Equity forecast: Predicting long term stock price movement using machine learning
Equity forecast: Predicting long term stock price movement using machine learning Nikola Milosevic School of Computer Science, University of Manchester, UK [email protected] Abstract Long
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
Data Mining - Evaluation of Classifiers
Data Mining - Evaluation of Classifiers Lecturer: JERZY STEFANOWSKI Institute of Computing Sciences Poznan University of Technology Poznan, Poland Lecture 4 SE Master Course 2008/2009 revised for 2010
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree S.Florence 1, N.G.Bhuvaneswari Amma 2, G.Annapoorani 3, K.Malathi 4 PG Scholar, Indian Institute of Information Technology, Srirangam,
Data Mining Yelp Data - Predicting rating stars from review text
Data Mining Yelp Data - Predicting rating stars from review text Rakesh Chada Stony Brook University [email protected] Chetan Naik Stony Brook University [email protected] ABSTRACT The majority
Supply Chain Forecasting Model Using Computational Intelligence Techniques
CMU.J.Nat.Sci Special Issue on Manufacturing Technology (2011) Vol.10(1) 19 Supply Chain Forecasting Model Using Computational Intelligence Techniques Wimalin S. Laosiritaworn Department of Industrial
A Hybrid Forecasting Methodology using Feature Selection and Support Vector Regression
A Hybrid Forecasting Methodology using Feature Selection and Support Vector Regression José Guajardo, Jaime Miranda, and Richard Weber, Department of Industrial Engineering, University of Chile Abstract
Active Learning SVM for Blogs recommendation
Active Learning SVM for Blogs recommendation Xin Guan Computer Science, George Mason University Ⅰ.Introduction In the DH Now website, they try to review a big amount of blogs and articles and find the
A Method for Automatic De-identification of Medical Records
A Method for Automatic De-identification of Medical Records Arya Tafvizi MIT CSAIL Cambridge, MA 0239, USA [email protected] Maciej Pacula MIT CSAIL Cambridge, MA 0239, USA [email protected] Abstract
DATA MINING TECHNIQUES AND APPLICATIONS
DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,
Immune Support Vector Machine Approach for Credit Card Fraud Detection System. Isha Rajak 1, Dr. K. James Mathai 2
Immune Support Vector Machine Approach for Credit Card Fraud Detection System. Isha Rajak 1, Dr. K. James Mathai 2 1Department of Computer Engineering & Application, NITTTR, Shyamla Hills, Bhopal M.P.,
A Mixed Trigrams Approach for Context Sensitive Spell Checking
A Mixed Trigrams Approach for Context Sensitive Spell Checking Davide Fossati and Barbara Di Eugenio Department of Computer Science University of Illinois at Chicago Chicago, IL, USA [email protected], [email protected]
dm106 TEXT MINING FOR CUSTOMER RELATIONSHIP MANAGEMENT: AN APPROACH BASED ON LATENT SEMANTIC ANALYSIS AND FUZZY CLUSTERING
dm106 TEXT MINING FOR CUSTOMER RELATIONSHIP MANAGEMENT: AN APPROACH BASED ON LATENT SEMANTIC ANALYSIS AND FUZZY CLUSTERING ABSTRACT In most CRM (Customer Relationship Management) systems, information on
Learning to Find Pre-Images
Learning to Find Pre-Images Gökhan H. Bakır, Jason Weston and Bernhard Schölkopf Max Planck Institute for Biological Cybernetics Spemannstraße 38, 72076 Tübingen, Germany {gb,weston,bs}@tuebingen.mpg.de
Classification of Fingerprints. Sarat C. Dass Department of Statistics & Probability
Classification of Fingerprints Sarat C. Dass Department of Statistics & Probability Fingerprint Classification Fingerprint classification is a coarse level partitioning of a fingerprint database into smaller
Web based English-Chinese OOV term translation using Adaptive rules and Recursive feature selection
Web based English-Chinese OOV term translation using Adaptive rules and Recursive feature selection Jian Qu, Nguyen Le Minh, Akira Shimazu School of Information Science, JAIST Ishikawa, Japan 923-1292
A Two-Pass Statistical Approach for Automatic Personalized Spam Filtering
A Two-Pass Statistical Approach for Automatic Personalized Spam Filtering Khurum Nazir Junejo, Mirza Muhammad Yousaf, and Asim Karim Dept. of Computer Science, Lahore University of Management Sciences
Machine Learning in Spam Filtering
Machine Learning in Spam Filtering A Crash Course in ML Konstantin Tretyakov [email protected] Institute of Computer Science, University of Tartu Overview Spam is Evil ML for Spam Filtering: General Idea, Problems.
Cross-Validation. Synonyms Rotation estimation
Comp. by: BVijayalakshmiGalleys0000875816 Date:6/11/08 Time:19:52:53 Stage:First Proof C PAYAM REFAEILZADEH, LEI TANG, HUAN LIU Arizona State University Synonyms Rotation estimation Definition is a statistical
Natural Language to Relational Query by Using Parsing Compiler
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
Supervised Learning (Big Data Analytics)
Supervised Learning (Big Data Analytics) Vibhav Gogate Department of Computer Science The University of Texas at Dallas Practical advice Goal of Big Data Analytics Uncover patterns in Data. Can be used
Data Mining Analytics for Business Intelligence and Decision Support
Data Mining Analytics for Business Intelligence and Decision Support Chid Apte, T.J. Watson Research Center, IBM Research Division Knowledge Discovery and Data Mining (KDD) techniques are used for analyzing
Neural Networks and Support Vector Machines
INF5390 - Kunstig intelligens Neural Networks and Support Vector Machines Roar Fjellheim INF5390-13 Neural Networks and SVM 1 Outline Neural networks Perceptrons Neural networks Support vector machines
Collecting Polish German Parallel Corpora in the Internet
Proceedings of the International Multiconference on ISSN 1896 7094 Computer Science and Information Technology, pp. 285 292 2007 PIPS Collecting Polish German Parallel Corpora in the Internet Monika Rosińska
ADVANCED MACHINE LEARNING. Introduction
1 1 Introduction Lecturer: Prof. Aude Billard ([email protected]) Teaching Assistants: Guillaume de Chambrier, Nadia Figueroa, Denys Lamotte, Nicola Sommer 2 2 Course Format Alternate between: Lectures
Operations Research and Knowledge Modeling in Data Mining
Operations Research and Knowledge Modeling in Data Mining Masato KODA Graduate School of Systems and Information Engineering University of Tsukuba, Tsukuba Science City, Japan 305-8573 [email protected]
A Survey on Product Aspect Ranking
A Survey on Product Aspect Ranking Charushila Patil 1, Prof. P. M. Chawan 2, Priyamvada Chauhan 3, Sonali Wankhede 4 M. Tech Student, Department of Computer Engineering and IT, VJTI College, Mumbai, Maharashtra,
Machine Learning Final Project Spam Email Filtering
Machine Learning Final Project Spam Email Filtering March 2013 Shahar Yifrah Guy Lev Table of Content 1. OVERVIEW... 3 2. DATASET... 3 2.1 SOURCE... 3 2.2 CREATION OF TRAINING AND TEST SETS... 4 2.3 FEATURE
Specialty Answering Service. All rights reserved.
0 Contents 1 Introduction... 2 1.1 Types of Dialog Systems... 2 2 Dialog Systems in Contact Centers... 4 2.1 Automated Call Centers... 4 3 History... 3 4 Designing Interactive Dialogs with Structured Data...
Simple Language Models for Spam Detection
Simple Language Models for Spam Detection Egidio Terra Faculty of Informatics PUC/RS - Brazil Abstract For this year s Spam track we used classifiers based on language models. These models are used to
Image Normalization for Illumination Compensation in Facial Images
Image Normalization for Illumination Compensation in Facial Images by Martin D. Levine, Maulin R. Gandhi, Jisnu Bhattacharyya Department of Electrical & Computer Engineering & Center for Intelligent Machines
