$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Classification method and apparatus based on boosting and pruning of multiple classifiers 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06N-003/02
출원번호 US-0388858 (1999-09-01)
발명자 / 주소
  • Narayan Srinivasa
  • Yuri Owechko
출원인 / 주소
  • HRL Laboratories, LLC
대리인 / 주소
    Tope-McKay & Associates
인용정보 피인용 횟수 : 45  인용 특허 : 10

초록

A boosting and pruning system and method for utilizing a plurality of neural networks, preferably those based on adaptive resonance theory (ART), in order to increase pattern classification accuracy is presented. The method utilizes a plurality of N randomly ordered copies of the input data, which i

대표청구항

1. A neural network classifier boosting and pruning method including the steps of:(a) providing a set of training data having inputs with correct classifications corresponding to the inputs; (b) ordering the set of training data into a plurality Y of differently ordered data sets, where Y is the tot

이 특허에 인용된 특허 (10)

  1. Freund Yoav ; Schapire Robert Elias, Apparatus and methods for machine learning hypotheses.
  2. Yaeger Larry S. ; Webb Brandyn, Classifying system having a single neural network architecture for multiple input representations.
  3. LaGrange George W. ; Gerpheide George E. ; Woolley Richard D. ; Donohue Tom ; Layton Mike, Computer input stylus method and apparatus.
  4. de Vries Aalbert, Method and system for training a neural network with adaptive weight updating and adaptive pruning in principal componen.
  5. Apte Chidanand ; Damerau Frederick J. ; Weiss Sholom M., Method for improvement accuracy of decision tree based text categorization.
  6. Stork David G. (Stanford CA) Hassibi Babak (Stanford CA), Method for operating an optimal weight pruning apparatus for designing artificial neural networks.
  7. Khan Emdadur R. (San Jose CA), Neural network apparatus and method for pattern recognition.
  8. Loris Keith (Brooklyn NY) Euchner James (Bedford NY), Neural network model in pattern recognition using probabilistic contextual information.
  9. Fischthal Scott, Neural network/conceptual clustering fraud detection architecture.
  10. Carpenter Gail A. (Newton Highlands MA) Grossberg Stephen (Newton Highlands MA), System for self-organization of stable category recognition codes for analog input patterns.

이 특허를 인용한 특허 (45)

  1. Owechko, Yuri; Medasani, Swarup; Srinivasa, Narayan, Active learning system for object fingerprinting.
  2. Sobel,William; McCorkendale,Bruce, Antivirus scanning in a hard-linked environment.
  3. Anderson, W. Kyle; Bonhaus, Daryl, Automated identification and clean-up of malicious computer code.
  4. Elad,Joseph B.; Johnson,Apperson H.; Cowart,Julia E.; Cleaver,David S., Automated method and system for generating models from data.
  5. Cooley, Shaun, Automatic generation of disposable e-mail addresses.
  6. Kennedy,Mark; Sobel,William E.; McCorkendale,Bruce; Nachenberg,Carey, Blocking e-mail propagation of suspected malicious computer code.
  7. Hartman, Al; Nachenberg, Carey, Bulk electronic message detection by header similarity analysis.
  8. Penev, Kamen; Marshall, Stuart H., Classifying knowledge aging in emails using Naïve Bayes Classifier.
  9. Szor,Peter; Nachenberg,Carey, Countering malicious code infections to computer files that have been infected more than once.
  10. Sallam,Ahmed, Detecting computer worms as they arrive at local computers through open network shares.
  11. Sobel, William E; McCorkendale, Bruce, Detecting spam e-mail with backup e-mail server traps.
  12. Sobel,William, Detection of malicious computer code.
  13. Szor,Peter, Dynamic detection of computer worms.
  14. Millard, John, Efficient file scanning using input-output hints.
  15. Kissel,Timo S., Efficient scanning of stream based data.
  16. Satish, Sourabh; Hernacki, Brian, Endpoint management using trust rating data.
  17. Sobel,William E; Vogel,Greg; McCorkendale,Bruce, Enforcement of compliance with network security policies.
  18. Rubin, Stuart H, Geodesic search and retrieval system and method of semi-structured databases.
  19. Pi,Xiaobo; Jia,Ying, High-order entropy error functions for neural classifiers.
  20. Chu, Min; Chen, Yi Ning; Kuo, Shiun-Zu; He, Xiaodong; Riley, Megan; Feige, Kevin E.; Gong, Yifan, Identifying language origin of words.
  21. Cobb, Wesley Kenneth; Seow, Ming-Jung, Mapper component for multiple art networks in a video analysis system.
  22. Prigogin, Sergey A.; Adar, Michel, Method and apparatus for automatically and continuously updating prediction models in real time based on data mining.
  23. Vincent, Robert K.; Sridhar, B. B. Maruthi, Method and apparatus for detecting organic materials and objects from multispectral reflected light.
  24. Vincent, Robert; Sridhar, B. B. Maruthi, Method and apparatus for detecting organic materials and objects from multispectral reflected light.
  25. Zhang, Cha; Zhang, Zhengyou, Multiple category learning for training classifiers.
  26. Mukerjee, Kunal; Koishida, Kazuhito; Regunathan, Shankar, Noise robust speech classifier ensemble.
  27. Millard,John; Spiegel,Mark, Opening computer files quickly and safely over a network.
  28. Yerramalla, Sampath K.; Donat, William; Rajamani, Ravi, Partitioning of turbomachine faults.
  29. Nachenberg, Carey; Weinstein, Alex, Pattern matching using embedded functions.
  30. McCorkendale, Bruce; Sobel, William E., Presentation of network source and executable characteristics.
  31. Sobel, William E.; Kennedy, Mark, Preventing unauthorized loading of late binding code into a process.
  32. Kissel,Timo S., Proactive protection against e-mail worms and spam.
  33. Millard,John, Protecting a computer coupled to a network from malicious code infections.
  34. Bregman, Mark; Sobel, William E., Security threat reporting in light of local security tools.
  35. Nachenberg,Carey; Szor,Peter, Selective detection of malicious computer code.
  36. Nachenberg,Carey, Signature driven cache extension for stream based scanning.
  37. Graf,Hans Peter; Durdanovic,Igor; Cosatto,Eric; Vapnik,Vladimir, Spread kernel support vector machine.
  38. Nachenberg,Carey S.; Guy,Elias E., Stream scanning through network proxy servers.
  39. Cooley, Shaun P., Suppressing spam using a machine learning based spam filter.
  40. Guralnik,Valerie; Mylaraswamy,Dinkar; Voges,Harold C., System and method for combining diagnostic evidences for turbine engine fault detection.
  41. Acero, Alejandro; Chelba, Ciprian; Wang, Ye-Yi; Wong, Leon; Frey, Brendan, System for using statistical classifiers for spoken language understanding.
  42. Sobel,William E, System utilizing updated spam signatures for performing secondary signature-based analysis of a held e-mail to improve spam email detection.
  43. Pelossof, Raphael A.; Jones, Michael, Systems, methods, and media for performing classification using a boosted classifier.
  44. Nachenberg,Carey S.; Sobel,William E., Temporal access control for computer virus prevention.
  45. Sobel,William E; McCorkendale,Bruce, Use of geo-location data for spam detection.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로