In the following paper the process of knowledge generation from the Visiting Nurse Association database for elderly care is explored This inquiry is concerned with predicting falls. Predicting which patients are likel...
详细信息
ISBN:
(纸本)0780388232
In the following paper the process of knowledge generation from the Visiting Nurse Association database for elderly care is explored This inquiry is concerned with predicting falls. Predicting which patients are likely to fall can assist the clinician in the identification of high-risk patients and suggest the need for early falls prevention programs. The entire datamining process is described beginning with data gathering followed by cleaning, aggregation, and integration. Issues faced while conducting the research are discussed. Results of decision trees and decision rules, and artificial neural networks used to predict falls are presented.
One of the main tasks of machinelearning and datamining is feature selection. Depending on the task different methods applied to find optimal balance between speed and feature selection quality. MeLiF algorithm effe...
详细信息
ISBN:
(纸本)9781509036967
One of the main tasks of machinelearning and datamining is feature selection. Depending on the task different methods applied to find optimal balance between speed and feature selection quality. MeLiF algorithm effectively solves feature selection problem by building ensemble of feature ranking filters. It reduces filters aggregation problem to linear form optimization problem and works as a wrapper, but not on feature space as classical wrappers do, but on linear form coefficients space, which is much smaller. In this paper we tried to apply meta-learning to provide good starting optimization points for MeLiF method and as a result we increased not only speed but in some cases feature selection quality of this method.
This study addresses the crucial task of architectural decorative image patternrecognition in the context of iconography, with an emphasis on efficient information mining. The proposed research work presents a novel ...
详细信息
datamining is the procedure to separate concealed prescient data from database and change it into a reasonable structure for sometime later. The varying areas in information mining are Web mining, Text mining, Sequen...
详细信息
An attractor-lock-in Poincare section is formed through three space points of the minimum, mean and maximum of the attractor under test, with parameter needless manual selection. The key algorithm steps of automatic P...
详细信息
data augmentation is a technique to improve the generalization ability of machinelearning methods by increasing the size of the dataset. However, since every augmentation method is not equally effective for every dat...
详细信息
ISBN:
(数字)9781665490627
ISBN:
(纸本)9781665490627
data augmentation is a technique to improve the generalization ability of machinelearning methods by increasing the size of the dataset. However, since every augmentation method is not equally effective for every dataset, you need to select an appropriate method carefully. We propose a neural network that dynamically selects the best combination of data augmentation methods using a Gating Network and a mutually beneficial feature consistency loss. The Gating Network is able to control how much of each data augmentation is used for the representation within the network. The feature consistency loss gives a constraint that augmented features from the same input pattern should be in similar. In the experiments, we demonstrate the effectiveness of the proposed method on the 12 largest time-series datasets from 2018 UCR Time Series Archive and reveal the relationships between the data augmentation methods through analysis of the proposed method.
Big data analytics are very fruitful for solving problems in cybersecurity. We have analyzed modern trends in intelligent security systems research and practice and worked out a syllabus for a new university course in...
详细信息
ISBN:
(纸本)9781467393799
Big data analytics are very fruitful for solving problems in cybersecurity. We have analyzed modern trends in intelligent security systems research and practice and worked out a syllabus for a new university course in the area of datamining and machinelearning with applications to cybersecurity. The course is for undergraduate and graduate students studying the cybersecurity. The main objective of the course is to provide students with fundamental concepts in datamining (in particular, mining frequent patterns, associations and correlations, classification, cluster analysis, outlier detection), machinelearning (including neural networks, support vector machines etc.) and related issues, e.g. the basics of multidimensional statistics. Contrary to the traditional datamining and machinelearning courses we illustrate course topics by cases from the area of cybersecurity including botnet detection, intrusion detection, deep packet inspection, fraud monitoring, malware detection, phishing detection, active authentication. We note that our course has great potential for development.
During the past number of years, machinelearning and datamining techniques have received considerable attention among the intrusion detection researchers to address the weaknesses of knowledgebase detection techniqu...
详细信息
ISBN:
(数字)9783540734994
ISBN:
(纸本)9783540734987
During the past number of years, machinelearning and datamining techniques have received considerable attention among the intrusion detection researchers to address the weaknesses of knowledgebase detection techniques. This has led to the application of various supervised and unsupervised techniques for the purpose of intrusion detection. In this paper, we conduct a set of experiments to analyze the performance of unsupervised techniques considering their main design choices. These include the heuristics proposed for distinguishing abnormal data from normal data and the distribution of dataset used for training. We evaluate the performance of the techniques with various distributions of training and test datasets, which are constructed from KDD99 dataset, a widely accepted resource for IDS evaluations. This comparative study is not only a blind comparison between unsupervised techniques, but also gives some guidelines to researchers and practitioners on applying these techniques to the area of intrusion detection.
machinelearning is a part of Artificial Intelligence. A branch of artificial Intelligence(AI), that offers the capability to the system by learning on their own and work better from experience without human intervent...
详细信息
Finding stolen cars is becoming increasingly important in many urban regions. An automated system for scanning license plates can recognize vehicle numbers without the need for human interaction. This work proposes a ...
详细信息
暂无评论