Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Technological University Dublin

Support vector machine

Publication Year
Publication

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Identifying Online Sexual Predators Using Support Vector Machine, Yifan Li Jan 2020

Identifying Online Sexual Predators Using Support Vector Machine, Yifan Li

Dissertations

A two-stage classification model is built in the research for online sexual predator identification. The first stage identifies the suspicious conversations that have predator participants. The second stage identifies the predators in suspicious conversations. Support vector machines are used with word and character n-grams, combined with behavioural features of the authors to train the final classifier. The unbalanced dataset is downsampled to test the performance of re-balancing an unbalanced dataset. An age group classification model is also constructed to test the feasibility of extracting the age profile of the authors, which can be used as features for classifier training. The …


Performance Comparison Of Support Vector Machine, Random Forest, And Extreme Learning Machine For Intrusion Detection, Iftikhar Ahmad, Muhammad Javed Iqbal, Mohammad Basheri, Aneel Rahim Jul 2018

Performance Comparison Of Support Vector Machine, Random Forest, And Extreme Learning Machine For Intrusion Detection, Iftikhar Ahmad, Muhammad Javed Iqbal, Mohammad Basheri, Aneel Rahim

Articles

Intrusion detection is a fundamental part of security tools, such as adaptive security appliances, intrusion detection systems, intrusion prevention systems, and firewalls. Various intrusion detection techniques are used, but their performance is an issue. Intrusion detection performance depends on accuracy, which needs to improve to decrease false alarms and to increase the detection rate. To resolve concerns on performance, multilayer perceptron, support vector machine (SVM), and other techniques have been used in recent work. Such techniques indicate limitations and are not efficient for use in large data sets, such as system and network data. The intrusion detection system is used …