Semisupervised Learning via Axiomatic Fuzzy Set Theory and SVM

被引:15
作者
Jia, Wenjuan [1 ]
Liu, Xiaodong [1 ]
Wang, Yuangang [2 ]
Pedrycz, Witold [3 ]
Zhou, Juxiang [4 ,5 ]
机构
[1] Dalian Univ Technol, Sch Control Sci & Engn, Fac Elect Informat & Elect Engn, Dalian 116024, Peoples R China
[2] Dalian Minzu Univ, Sch Comp Sci & Engn, Dalian 116600, Peoples R China
[3] Univ Alberta, Dept Elect & Comp Engn, Edmonton, AB T6G 2G7, Canada
[4] Yunnan Normal Univ, Key Lab Educ Informatizat Nationalities, Minist Educ, Kunming 650500, Yunnan, Peoples R China
[5] Yunnan Normal Univ, Yunnan Key Lab Smart Educ, Kunming 650500, Yunnan, Peoples R China
基金
中国国家自然科学基金;
关键词
Semantics; Support vector machines; Algebra; Machine learning; Fuzzy sets; Fuzzy set theory; Distributed databases; Axiomatic fuzzy sets (AFS); machine learning; semisupervised learning (SSL); support vector machine (SVM); SOFTWARE TOOL; CLASSIFIER; KEEL; ALGORITHMS; FRAMEWORK;
D O I
10.1109/TCYB.2020.3032707
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we present a semantic semisupervised learning (Semantic SSL) approach targeted at unifying two machine-learning paradigms in a mutually beneficial way, where the classical support vector machine (SVM) learns to reveal primitive logic facts from data, while axiomatic fuzzy set (AFS) theory is utilized to exploit semantic knowledge and correct the wrongly perceived facts for improving the machine-learning model. This novel semisupervised method can easily produce interpretable semantic descriptions to outline different categories by forming a fuzzy set with semantic explanations realized on the basis of the AFS theory. Besides, it is known that disagreement-based semisupervised learning (SSL) can be viewed as an excellent schema so that a co-training approach with SVM and the AFS theory can be utilized to improve the resulting learning performance. Furthermore, an evaluation index is used to prune descriptions to deliver promising performance. Compared with other semisupervised approaches, the proposed approach can build a structure to reflect data-distributed information with unlabeled data and labeled data, so that the hidden information embedded in both labeled and unlabeled data can be sufficiently utilized and can potentially be applied to achieve good descriptions of each category. Experimental results demonstrate that this approach can offer a concise, comprehensible, and precise SSL frame, which strikes a balance between the interpretability and the accuracy.
引用
收藏
页码:4661 / 4674
页数:14
相关论文
共 56 条
[1]  
Abdiansah A., 2015, Int. J. Comput. Appl., V128, P28, DOI [10.5120/ijca2015906480, DOI 10.1109/ACCESS.2019.2953920]
[2]   KEEL: a software tool to assess evolutionary algorithms for data mining problems [J].
Alcala-Fdez, J. ;
Sanchez, L. ;
Garcia, S. ;
del Jesus, M. J. ;
Ventura, S. ;
Garrell, J. M. ;
Otero, J. ;
Romero, C. ;
Bacardit, J. ;
Rivas, V. M. ;
Fernandez, J. C. ;
Herrera, F. .
SOFT COMPUTING, 2009, 13 (03) :307-318
[3]  
Alcalá-Fdez J, 2011, J MULT-VALUED LOG S, V17, P255
[4]  
[Anonymous], 2006, Semi -Supervised Learning
[5]  
[Anonymous], 2017, ADV PURE MATH
[6]  
[Anonymous], 2011, ACM T INTEL SYST TEC, DOI DOI 10.1145/1961189.1961199
[7]  
Belkin M, 2006, J MACH LEARN RES, V7, P2399
[8]  
Bennett KP, 1999, ADV NEUR IN, V11, P368
[9]   A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn [J].
Bi, Wenjie ;
Cai, Meili ;
Liu, Mengqi ;
Li, Guo .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2016, 12 (03) :1270-1281
[10]  
Blum A., 1998, Proceedings of the Eleventh Annual Conference on Computational Learning Theory, P92, DOI 10.1145/279943.279962