• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Tian Meng, Wang Wenjian. Generalized Kernel Polarization Criterion for Optimizing Gaussian Kernel[J]. Journal of Computer Research and Development, 2015, 52(8): 1722-1734. DOI: 10.7544/issn1000-1239.2015.20150110
Citation: Tian Meng, Wang Wenjian. Generalized Kernel Polarization Criterion for Optimizing Gaussian Kernel[J]. Journal of Computer Research and Development, 2015, 52(8): 1722-1734. DOI: 10.7544/issn1000-1239.2015.20150110

Generalized Kernel Polarization Criterion for Optimizing Gaussian Kernel

More Information
  • Published Date: July 31, 2015
  • The choice of kernel function is a basic and challenging problem in researches on kernel methods. Gaussian kernel is a popular and widely used one in various kernel methods, and many universal kernel selection methods have been derived for Gaussian kernel. However, these methods may have some disadvantages, such as heavy computational complexity, the difficulty of algorithm implement, and the requirement of the classes generated from underlying multivariate normal distributions. To remedy these problems, generalized kernel polarization criterion has been proposed to tune the parameter of Gaussian kernel for classification tasks. By taking the within-class local structure into account and centering the kernel matrix, the criterion does better in maximizing the class separability in the feature space. And the final optimized kernel parameter leads to a substantial improvement in the performance. Furthermore, the criterion function can be proved to have a determined approximate global minimum point. This good characteristic, coupled with its independence of the actual learning machine, makes the optimal parameter easier to find by many algorithms. Besides this, local kernel polarization criterion function, a special case of generalized kernel polarization criterion function, can also be proved to have a determined approximate global minimum point. The extensions of generalized kernel polarization criterion and local kernel polarization criterion to the multiclass domain have been proposed. Experimental results show the effectiveness and efficiency of our proposed criteria.
  • Related Articles

    [1]Zhang Jing, Ju Jialiang, Ren Yonggong. Double-Generators Network for Data-Free Knowledge Distillation[J]. Journal of Computer Research and Development, 2023, 60(7): 1615-1627. DOI: 10.7544/issn1000-1239.202220024
    [2]Li Tao, Liu Yali. A Double PUF-Based RFID Authentication Protocol[J]. Journal of Computer Research and Development, 2021, 58(8): 1801-1810. DOI: 10.7544/issn1000-1239.2021.20200477
    [3]Ouyang Dantong, Zhi Huayun, Liu Bowen, Zhang Liming, Zhang Yonggang. A Method of Computing Minimal Diagnoses Based on Pseudo-Failure-Degree to Create New Enumeration Tree[J]. Journal of Computer Research and Development, 2018, 55(4): 782-790. DOI: 10.7544/issn1000-1239.2018.20170016
    [4]Gao Peng, Wang Dongsheng, Wang Haixia. Increasing PCM Lifetime by Using Pipelined Pseudo-Random Encoding Algorithm[J]. Journal of Computer Research and Development, 2017, 54(6): 1357-1366. DOI: 10.7544/issn1000-1239.2017.20170065
    [5]Gao Shujing, Qu Yingjie, Song Tingqiang. Pseudorandom Number Generators Based on One-Way Functions[J]. Journal of Computer Research and Development, 2015, 52(6): 1394-1399. DOI: 10.7544/issn1000-1239.2015.20131954
    [6]Jiang Jinsong, Yan Kun, Ni Guiqiang, He Ming, and Yang Bo. Generic GUI Generator Based on XML and XSD[J]. Journal of Computer Research and Development, 2012, 49(4): 826-832.
    [7]Zhu Hegui, Zhang Xiangde, Yang Lianping, and Tang Qingsong. Fingerprint-Based Random Sequence Generator[J]. Journal of Computer Research and Development, 2009, 46(11): 1862-1867.
    [8]Tian Junfeng, Jiao Hongqiang, Li Ning, and Liu Tao. Double Secret Keys and Double Random Numbers Authentication Scheme[J]. Journal of Computer Research and Development, 2008, 45(5): 779-785.
    [9]Shi Rui and Yang Xiaozong. Research on the Node Spatial Probabilistic Distribution of the Random Waypoint Mobility Model for Ad Hoc Network[J]. Journal of Computer Research and Development, 2005, 42(12): 2056-2062.
    [10]Lü Yanli, Li Xiaojian, Xia Chunhe, and Liu Shuzhi. Research on the Security of Initial Sequence Number Generation Arithmetic[J]. Journal of Computer Research and Development, 2005, 42(11): 1940-1945.
  • Cited by

    Periodical cited type(4)

    1. 丁艳,王娜,杜学绘. 基于区块链的大规模线性方程组外包计算方案. 信息安全学报. 2025(01): 91-104 .
    2. 郭煜. 改进粒子群优化算法的非线性方程组求解研究. 自动化技术与应用. 2022(07): 6-9 .
    3. 朱良杰,沈佳杰,周扬帆,王新. 云际存储系统性能优化研究现状与展望. 计算机工程与科学. 2021(05): 761-772 .
    4. 习宇兴,唐敏,庞健虎,张宇浩. 基于Gauss迭代法的线性方程组隐私保护外包计算. 现代信息科技. 2021(04): 149-152 .

    Other cited types(1)

Catalog

    Article views (1459) PDF downloads (716) Cited by(5)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return