Two Stage Comparison of Classifier Performances for Highly Imbalanced Datasets
Journal Title: Journal of Information and Organizational Sciences - Year 2015, Vol 39, Issue 2
Abstract
During the process of knowledge discovery in data, imbalanced learning data often emerges and presents a significant challenge for data mining methods. In this paper, we investigate the influence of class imbalanced data on the classification results of artificial intelligence methods, i.e. neural networks and support vector machine, and on the classification results of classical classification methods represented by RIPPER and the Naïve Bayes classifier. All experiments are conducted on 30 different imbalanced datasets obtained from KEEL (Knowledge Extraction based on Evolutionary Learning) repository. With the purpose of measuring the quality of classification, the accuracy and the area under ROC curve (AUC) measures are used. The results of the research indicate that the neural network and support vector machine show improvement of the AUC measure when applied to balanced data, but at the same time, they show the deterioration of results from the aspect of classification accuracy. RIPPER results are also similar, but the changes are of a smaller magnitude, while the results of the Naïve Bayes classifier show overall deterioration of results on balanced distributions. The number of instances in the presented highly imbalanced datasets has significant additional impact on the classification performances of the SVM classifier. The results have shown the potential of the SVM classifier for the ensemble creation on imbalanced datasets.
Authors and Affiliations
Goran Oreški, Stjepan Oreški
The Use of Support Vector Machines When Designing a User-Defined Niche Search Engine
This study presents the construction of a niche search engine, whose search topic domain is to be user-defined. The specific focus of this study is the investigation of the role that a Support Vector Machine plays when c...
Merkle-Damgård Construction Method and Alternatives: A Review
Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by M...
The Current State and Future Perspectives of the Research Information Infrastructure in Croatia
The purpose of this paper is to analyze the existing Croatian research information infrastructure and to outline a new model of the Croatian Current Research Information System (CroRIS), required for the systematical mon...
Do You Walk the Talk in Quality Culture?
We present an action research project to foster quality culture in business processes. The client setting is in the food industry, a vital sector for our society and one of the most regulated in the world. Food productio...
The Investigation of TLC Model Checker Properties
This paper presents the investigation and comparison of TLC model checking method (TLA Checker) properties. There are two different approaches to method usage which are considered. The first one consists of a transition...