Skip to main content

Target Recognition Method Based on Multi-class SVM and Evidence Theory

  • Conference paper
  • First Online:
Advances in Internetworking, Data & Web Technologies (EIDWT 2017)

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 6))

Abstract

In order to conquer the hard outputs defect of Support Vector Machine (SVM) and extend its application, an improved target recognition method based on Multi-class Support Vector Machine (MSVM) is proposed. Firstly, the typical Probability Modeling methodologies of MSVM were deeply analyzed. Secondly, the structure of one-against-one multi-class method which matches with Basic Probability Assignment (BPA) outputs of evidence theory by coincide, so a special Multi-class BPA output method is derived, and multi-sensor target recognition model based on MSVM and two-layer evidence theory is constructed. Finally, the results of experiments show that the proposed approach can not only conquer the overlap area of one-against-one multi-class method, but also improve classification accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Pllana, S., Benkner, S., Xhafa, F., Barolli, L.: A novel approach for hybrid performance modeling and prediction of large-scale computing systems. Int. J. Grid Util. Comput. 1, 316–327 (2009)

    Article  MATH  Google Scholar 

  2. Bouaziz, R., Krichen, F., Coulette, B.: C-SCRIP: collaborative security pattern integration process. Int. J. Inform. Technol. Web Eng. 10, 31–46 (2015)

    Google Scholar 

  3. Qu, D.C., Meng, X.W., Huang, J., He, Y.: Research of artificial neural network intelligent recognition technology assisted by Dempster Shafer evidence combination theory. In: 7th International Conference on Signal Processing, vol. 1, pp. 46–49 (2004)

    Google Scholar 

  4. Wang, M., Li, S., Mao, S.: Method of using neural network combined with D-S theory to carry out HRR target recognition, vol. 4. Beijing University of Aeronautics and Astronautics (2001)

    Google Scholar 

  5. Guo, H.: Approach to evidence combination based on fuzzy theory and its applications. Control Decis. 2 (2008)

    Google Scholar 

  6. Wang, G.-Y., Yao, Y.-Y., Yu, H.: A survey on rough set theory and applications. Chin. J. Comput. 32, 1229–1240 (2009)

    Article  MathSciNet  Google Scholar 

  7. Bssis, N., Asimakopoulou, E., Xhafa, F.: A next generation emerging technologies roadmap for enabling collective computational intelligence in disaster management. Int. J. Space-Based Situated Comput. 1, 76–85 (2011)

    Article  Google Scholar 

  8. Mu, S., Tian, S., Yin, C.: Multiple kernel learning based on cooperative clustering. J. Beijing Jiaotong Univ. 32, 10–13 (2008)

    Google Scholar 

  9. Kun, W., Kang, J., Chi, K.: Research on fault diagnosis method using improved multi-class classification algorithm and relevance vector machine. Int. J. Inf. Technol. Web. Eng. 10, 1–16 (2015)

    Google Scholar 

  10. Lin, H.-C.K., Su, S.-H., Wang, S.-C.: Influence of cognitive style and cooperative learning on application of augmented reality to natural science learning. Int. J. Technol. Human Interact. 11, 41–66 (2015)

    Google Scholar 

  11. Bernardo, D.V., Hoang, D.B., Bernardo, D.V.: Multi-layer Security analysis and experimentation of high speed protocol data transfer for GRID. Int. J. Grid Util. Comput. 3, 81–88 (2012)

    Article  Google Scholar 

  12. Xu, L., Krzyzak, C., Suen, C.Y.: Methods of combining multiple classifiers and their applications to handwriting recognition. Trans. Syst. Man Cybern. 22, 418–435 (1992)

    Article  Google Scholar 

  13. Srihari, S.N.: Reliability analysis of majority vote systems. Inf. Sci. 26, 243–256 (1982)

    Article  MathSciNet  MATH  Google Scholar 

  14. Sugeno, M.: Theory of Fuzzy Integrals and its Applications. Tokyo Institute of Technology, Tokyo, Japan (1974)

    Google Scholar 

  15. Hinton, G.E.: Products of experts. In: Proceedings of the Ninth International Conference on Artificial Neural Networks, Edinburgh, Scotland, pp. 1–6 (1999)

    Google Scholar 

  16. Li, Y., Cai, Y., Yin, R., Xu, X.: Support vector machine ensemble based on evidence theory for multi-class classification. J. Comput. Res. Dev., 45, 571–578 (2008)

    Google Scholar 

  17. Li, Z., O’Brien, L., Zhang, H.: Circumstantial-evidence-based effort judgement for web service composition-based SOA implementations. Int. J. Space-Based Situated Comput. 2, 31–44 (2012)

    Article  Google Scholar 

  18. Yang, K., Liu, S., Li, X., Wang, X.A.: D-S evidence theory based trust detection scheme in wireless sensor networks. Int. J. Technol. Hum. Interact. 12, 48–59 (2016)

    Article  Google Scholar 

  19. Zhang, X., Xiao, X., Xu, G.-Y.: Probabilistic outputs for support vector machines based on the maximum entropy estimation. Control Decis. 7, 767–770 (2006)

    Google Scholar 

  20. Sollich, P.: Bayesian methods for support vector machines, evidence and predictive class probabilities. Mach. Learn. 46, 21–52 (2002)

    Article  MATH  Google Scholar 

  21. Kwok, J.T.Y.: Moderating the outputs of support vector machine classifiers. IEEE Trans. Neural Netw. 10, 1018–1031 (1999)

    Article  Google Scholar 

  22. Hastie, T., Tibshirani, R.: Classification by pairwise coupling. Ann. Stat. 26, 451–471 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  23. Vapnik, V.: Statistical Learning Theory. Wiley, New York (1998)

    MATH  Google Scholar 

  24. Platt John, C.: Probabilistic output for support vector machine and comparisons to regularized likelihood methods. In: Advances in Large Margin Classifier, pp. 1–11. MIT Press, Cambridge (1999)

    Google Scholar 

  25. Lin, H.T, Lin, C.J., Weng, R.C.: A Note on Platt’s Probabilistic Outputs for Support Vector Machines. National Taiwan University, Taipei (2003)

    Google Scholar 

  26. Madevska-Bogdanova, A., Nikolik, D., Curfs, L.: Probabilistic SVM outputs for pattern recognition using analytical geometry. Neurocomputing 62, 293–303 (2004)

    Article  Google Scholar 

  27. Wang, Z., Zhao, Z., Weng, S., Zhang, C.: Solving one-class problem with outlier examples by SVM. Neurocomputing 149, 100–105 (2015)

    Article  Google Scholar 

  28. Zhou, H., Li, S.: Combination of support vector machine and evidence theory in information fusion. Chinese J. Sens. Actuators 21, 1566–1570 (2008)

    Google Scholar 

  29. Liu, W.: Analyzing the degree of conflict among belief functions. Artif. Intell. 170, 909–924 (2006)

    Google Scholar 

  30. Murphy, C.K.: Combining belief functions when evidence conflicts. Decis. Support Syst. 29, 1–9 (2000). Elsevier Publisher

    Article  Google Scholar 

  31. Hansen, L.K., Salamon, P.: Neural network ensembles. IEEE Trans. Pattern Anal. Mach. Intell. 12, 993–1001 (1990)

    Article  Google Scholar 

Download references

Acknowledgement

This work is supported by National Natural Science Foundation of China, Grant Nos 61273275, 60975026, 61503407.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wen Quan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Quan, W., Wang, J., Lei, L., Gao, M. (2018). Target Recognition Method Based on Multi-class SVM and Evidence Theory. In: Barolli, L., Zhang, M., Wang, X. (eds) Advances in Internetworking, Data & Web Technologies. EIDWT 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 6. Springer, Cham. https://doi.org/10.1007/978-3-319-59463-7_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-59463-7_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-59462-0

  • Online ISBN: 978-3-319-59463-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics