• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Ye Ning, Sun Ruixiang, Dong Yisheng. SVM Fast Training Algorithm Research Based on Multi-Lagrange Multiplier[J]. Journal of Computer Research and Development, 2006, 43(3): 442-448.
Citation: Ye Ning, Sun Ruixiang, Dong Yisheng. SVM Fast Training Algorithm Research Based on Multi-Lagrange Multiplier[J]. Journal of Computer Research and Development, 2006, 43(3): 442-448.

SVM Fast Training Algorithm Research Based on Multi-Lagrange Multiplier

More Information
  • Published Date: March 14, 2006
  • A multi-Lagrange multiplier support vector machine fast training method (MLSVM) based on the coordinated optimization of multi-Lagrange multipliers is proposed and the formula to define the feasible field of each multiplier is presented. The algorithm approaches to the most optimization more precisely and quickly due to the analytic expressions adopted in the optimization process of each multiplier. The SMO algorithm is proved to be an instance of MLSVM. Three individual lgorithms, i.e., MLSVM1, MLSVM2 and MLSVM3, are presented under the theoretical guidance of this method according to different learning strategies. The learning speed of MLSVM1 and MLSVM2 is about the same as that of SMO when the test data set is small (<5000). However, they will fail when the test data set becomes larger. MLSVM3 is an improved algorithm of the former two algorithms and the SMO algorithm. It not only overcomes the failure of MLSVM1 and MLSVM2, but also performs faster than the SMO algorithm with an improvement of 7.4% to 4130% on several test data sets.
  • Related Articles

    [1]Gao Wei, Chen Liqun, Tang Chunming, Zhang Guoyan, Li Fei. One-Time Chameleon Hash Function and Its Application in Redactable Blockchain[J]. Journal of Computer Research and Development, 2021, 58(10): 2310-2318. DOI: 10.7544/issn1000-1239.2021.20210653
    [2]Wu Linyang, Luo Rong, Guo Xueting, Guo Qi. Partitioning Acceleration Between CPU and DRAM: A Case Study on Accelerating Hash Joins in the Big Data Era[J]. Journal of Computer Research and Development, 2018, 55(2): 289-304. DOI: 10.7544/issn1000-1239.2018.20170842
    [3]Li Fei, Gao Wei, Wang Guilin, Xie Dongqing, Tang Chunming. Generic Tightly Secure Signature Schemes from Strong Chameleon Hash Functions[J]. Journal of Computer Research and Development, 2017, 54(10): 2244-2254. DOI: 10.7544/issn1000-1239.2017.20170422
    [4]WuTao, JinJianguo, WeiMingjun. A Hash Function Algorithm Based on Variable Parameter Cascade Chaos[J]. Journal of Computer Research and Development, 2016, 53(3): 674-681. DOI: 10.7544/issn1000-1239.2016.20148155
    [5]Gao Shujing, Qu Yingjie, Song Tingqiang. Pseudorandom Number Generators Based on One-Way Functions[J]. Journal of Computer Research and Development, 2015, 52(6): 1394-1399. DOI: 10.7544/issn1000-1239.2015.20131954
    [6]Yuan Xinpan, Long Jun, Zhang Zuping, Luo Yueyi, Zhang Hao, and Gui Weihua. Connected Bit Minwise Hashing[J]. Journal of Computer Research and Development, 2013, 50(4): 883-890.
    [7]Qin Chuan, Chang Chin Chen, Guo Cheng. Perceptual Robust Image Hashing Scheme Based on Secret Sharing[J]. Journal of Computer Research and Development, 2012, 49(8): 1690-1698.
    [8]Xu Jian, Zhou Fucai, Yang Muzhou, Li Fuxiang, Zhu Zhiliang. Hierarchical Hash List for Distributed Query Authentication[J]. Journal of Computer Research and Development, 2012, 49(7): 1533-1544.
    [9]Ding Zhenhua, Li Jintao, Feng Bo. Research on Hash-Based RFID Security Authentication Protocol[J]. Journal of Computer Research and Development, 2009, 46(4): 583-592.
    [10]Liu Ji. One-Way Hash Function based on Integer Coupled Tent Maps and Its Performance Analysis[J]. Journal of Computer Research and Development, 2008, 45(3): 563-569.

Catalog

    Article views (706) PDF downloads (587) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return