A wide variety of predictive analytics techniques have been developed in statistics, machine learning and data mining; however, many of these algorithms take a black-box approach in which data is input and future pred...
详细信息
A wide variety of predictive analytics techniques have been developed in statistics, machine learning and data mining; however, many of these algorithms take a black-box approach in which data is input and future predictions are output with no insight into what goes on during the process. Unfortunately, such a closed system approach often leaves little room for injecting domain expertise and can result in frustration from analysts when results seem snurious or confusing. In order to allow for more human-centric approaches, the visualization community has begun developing methods to enable users to incorporate expert knowledge into the pre- diction process at all stages, including data cleaning, feature selection, model building and model validation. This paper surveys current progress and trends in predictive visual ana- lytics, identifies the common framework in which predictive visual analytics systems operate, and develops a summariza- tion of the predictive analytics workfiow.
The hippocampus is a small, yet intricate seahorse-shaped tiny structure located deep within the brain’s medial temporal lobe. It is a crucial component of the limbic system, which is responsible for regulating emoti...
详细信息
As a crucial data preprocessing method in data mining,feature selection(FS)can be regarded as a bi-objective optimization problem that aims to maximize classification accuracy and minimize the number of selected *** c...
详细信息
As a crucial data preprocessing method in data mining,feature selection(FS)can be regarded as a bi-objective optimization problem that aims to maximize classification accuracy and minimize the number of selected *** computing(EC)is promising for FS owing to its powerful search ***,in traditional EC-based methods,feature subsets are represented via a length-fixed individual *** is ineffective for high-dimensional data,because it results in a huge search space and prohibitive training *** work proposes a length-adaptive non-dominated sorting genetic algorithm(LA-NSGA)with a length-variable individual encoding and a length-adaptive evolution mechanism for bi-objective highdimensional *** LA-NSGA,an initialization method based on correlation and redundancy is devised to initialize individuals of diverse lengths,and a Pareto dominance-based length change operator is introduced to guide individuals to explore in promising search space ***,a dominance-based local search method is employed for further *** experimental results based on 12 high-dimensional gene datasets show that the Pareto front of feature subsets produced by LA-NSGA is superior to those of existing algorithms.
Learning network dynamics from the empirical structure and spatio-temporal observation data is crucial to revealing the interaction mechanisms of complex networks in a wide range of domains. However,most existing meth...
详细信息
Learning network dynamics from the empirical structure and spatio-temporal observation data is crucial to revealing the interaction mechanisms of complex networks in a wide range of domains. However,most existing methods only aim at learning network dynamic behaviors generated by a specific ordinary differential equation instance, resulting in ineffectiveness for new ones, and generally require dense *** observed data, especially from network emerging dynamics, are usually difficult to obtain, which brings trouble to model learning. Therefore, learning accurate network dynamics with sparse, irregularly-sampled,partial, and noisy observations remains a fundamental challenge. We introduce a new concept of the stochastic skeleton and its neural implementation, i.e., neural ODE processes for network dynamics(NDP4ND), a new class of stochastic processes governed by stochastic data-adaptive network dynamics, to overcome the challenge and learn continuous network dynamics from scarce observations. Intensive experiments conducted on various network dynamics in ecological population evolution, phototaxis movement, brain activity, epidemic spreading, and real-world empirical systems, demonstrate that the proposed method has excellent data adaptability and computational efficiency, and can adapt to unseen network emerging dynamics, producing accurate interpolation and extrapolation with reducing the ratio of required observation data to only about 6% and improving the learning speed for new dynamics by three orders of magnitude.
Untraceability is an important aspect of RFID security. A BRS-based approach for modeling RFID untraceability is provided in this paper. Elements in a RFID protocol can be represented as bigraphs, communications betwe...
详细信息
Untraceability is an important aspect of RFID security. A BRS-based approach for modeling RFID untraceability is provided in this paper. Elements in a RFID protocol can be represented as bigraphs, communications between elements can be represented as reaction rules. RFID untraceability can be represented as behavioral congruences. We take a RFID air interface protocol as a case study and show the usability of this approach.
Autism spectrum disorder(ASD)can be defined as a neurodevelopmental condition or illness that can disturb kids who have heterogeneous characteristics,like changes in behavior,social disabilities,and difficulty communi...
详细信息
Autism spectrum disorder(ASD)can be defined as a neurodevelopmental condition or illness that can disturb kids who have heterogeneous characteristics,like changes in behavior,social disabilities,and difficulty communicating with *** tracking(ET)has become a useful method to detect *** vital aspect of moral erudition is the aptitude to have common visual *** eye-tracking approach offers valuable data regarding the visual behavior of children for accurate and early ***-tracking data can offer insightful information about the behavior and thought processes of people with ASD,but it is important to be aware of its limitations and to combine it with other types of data and assessment techniques to increase the precision of ASD *** operates by scanning the paths of eyes for extracting a series of eye projection points on images for examining the behavior of children with *** purpose of this research is to use deep learning to identify autistic disorders based on eye *** Chaotic Butterfly Optimization technique is used to identify this specific ***,this study develops an ET-based Autism Spectrum Disorder Diagnosis using Chaotic Butterfly Optimization with Deep Learning(ETASD-CBODL)*** presented ETASDCBODL technique mainly focuses on the recognition of ASD via the ET and DL *** accomplish this,the ETASD-CBODL technique exploits the U-Net segmentation technique to recognize interested *** addition,the ETASD-CBODL technique employs Inception v3 feature extraction with CBO algorithm-based hyperparameter ***,the long-shorttermmemory(LSTM)model is exploited for the recognition and classification of *** assess the performance of the ETASD-CBODL technique,a series of simulations were performed on datasets from the figure-shared data *** experimental values of accuracy(99.29%),precision(98.78%),sensitivity(99.29%)and specificity(99.29%)showed a better perfo
Indian agriculture is striving to achieve sustainable intensification,the system aiming to increase agricultural yield per unit area without harming natural resources and the *** farming employs technology to improve ...
详细信息
Indian agriculture is striving to achieve sustainable intensification,the system aiming to increase agricultural yield per unit area without harming natural resources and the *** farming employs technology to improve *** and accurate analysis and diagnosis of plant disease is very helpful in reducing plant diseases and improving plant health and food crop *** disease experts are not available in remote areas thus there is a requirement of automatic low-cost,approachable and reliable solutions to identify the plant diseases without the laboratory inspection and expert’s *** learning-based computer vision techniques like Convolutional Neural Network(CNN)and traditional machine learning-based image classification approaches are being applied to identify plant *** this paper,the CNN model is proposed for the classification of rice and potato plant leaf *** leaves are diagnosed with bacterial blight,blast,brown spot and tungro *** leaf images are classified into three classes:healthy leaves,early blight and late blight *** leaf dataset with 5932 images and 1500 potato leaf images are used in the *** proposed CNN model was able to learn hidden patterns from the raw images and classify rice images with 99.58%accuracy and potato leaves with 97.66%*** results demonstrate that the proposed CNN model performed better when compared with other machine learning image classifiers such as Support Vector Machine(SVM),K-Nearest Neighbors(KNN),Decision Tree and Random Forest.
Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern *** detection systems often struggle to mitigate such attacks in convention...
详细信息
Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern *** detection systems often struggle to mitigate such attacks in conventional and software-defined networking(SDN)*** Machine Learning(ML)models can distinguish between benign and malicious traffic,their limited feature scope hinders the detection of new zero-day or low-rate DDoS attacks requiring frequent *** this paper,we propose a novel DDoS detection framework that combines Machine Learning(ML)and Ensemble Learning(EL)techniques to improve DDoS attack detection and mitigation in SDN *** model leverages the“DDoS SDN”dataset for training and evaluation and employs a dynamic feature selection mechanism that enhances detection accuracy by focusing on the most relevant *** adaptive approach addresses the limitations of conventional ML models and provides more accurate detection of various DDoS attack *** proposed ensemble model introduces an additional layer of detection,increasing reliability through the innovative application of ensemble *** proposed solution significantly enhances the model’s ability to identify and respond to dynamic threats in *** provides a strong foundation for proactive DDoS detection and mitigation,enhancing network defenses against evolving *** comprehensive runtime analysis of Simultaneous Multi-Threading(SMT)on identical configurations shows superior accuracy and efficiency,with significantly reduced computational time,making it ideal for real-time DDoS detection in dynamic,rapidly changing *** results demonstrate that our model achieves outstanding performance,outperforming traditional algorithms with 99%accuracy using Random Forest(RF)and K-Nearest Neighbors(KNN)and 98%accuracy using XGBoost.
In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud ***,when the model is not completely trusted,the data owners face several security-rel...
详细信息
In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud ***,when the model is not completely trusted,the data owners face several security-related problems,such as user privacy breaches,data disclosure,data corruption,and so on,during the process of data *** addressing and handling the security-related issues on Cloud,several models were *** that concern,this paper develops a Privacy-Preserved Data Security Approach(PP-DSA)to provide the data security and data integrity for the out-sourcing data in Cloud *** preservation is ensured in this work with the Efficient Authentication Technique(EAT)using the Group Signature method that is applied with Third-Party Auditor(TPA).The role of the auditor is to secure the data and guarantee shared data ***,the Cloud Service Provider(CSP)and Data User(DU)can also be the attackers that are to be handled with the ***,the major objective of the work is to enhance cloud security and thereby,increase Quality of Service(QoS).The results are evaluated based on the model effectiveness,security,and reliability and show that the proposed model provides better results than existing works.
暂无评论