In this paper, we explored approaches that improve the performance of ensemble bagging classifiers for identifying the state of a computer system. The following algorithms are considered: Ensemble pruning, Advanced Vo...
In this paper, we explored approaches that improve the performance of ensemble bagging classifiers for identifying the state of a computer system. The following algorithms are considered: Ensemble pruning, Advanced Voting Algorithms, Dynamic Voting Strategies, Confidence Calibration, Adaptation through Meta-Features and Meta-Learning, which allow improving the voting procedure of the bagging meta-algorithm. Artificial data was generated as initial data, which complicates the classification task and contains an increased amount of noise. In the Google Collab environment, software models of algorithms have been developed, and their quality has been assessed. It was found that the use of the Ensemble pruning and Adaptation through Meta-Features algorithm is the most qualitative. In addition, the Ensemble pruning algorithm reduces the number of basic ensemble classifiers, and, as a result, increases the efficiency of computer system identification. Based on the results of the study, a method for identifying a computer system was proposed through the integrated use of a bagging classifier and an optimization procedure based on the Ensemble pruning algorithm.
Fasttext is a powerful word representation method that creates word representations based on vectors of character n-grams. In this work, we propose a method that utilizes fasttext features for a novel feature engineer...
详细信息
ISBN:
(数字)9798350379433
ISBN:
(纸本)9798350379440
Fasttext is a powerful word representation method that creates word representations based on vectors of character n-grams. In this work, we propose a method that utilizes fasttext features for a novel feature engineering model for the spam detection problem. In the feature engineering method, the combination of average, mean of second derivative; mean peak and standard deviation of fasttext features are computed. Finally, tf-idf features are also considered for the modeling process. The success of each feature engineering technique is measured and reported. The combination of the five feature extraction methods, tested on two spam detection datasets, yielded promising results with an accuracy of 0.978 on e-mail spam detection and an accuracy of 0.986 on sms spam classification.
The widespread integration of robotic technology across diverse sector’s necessitates solutions that embody both adaptability and speed. However, existing systems often exhibit a trade-off between these attributes, l...
详细信息
ISBN:
(数字)9798350387803
ISBN:
(纸本)9798350387810
The widespread integration of robotic technology across diverse sector’s necessitates solutions that embody both adaptability and speed. However, existing systems often exhibit a trade-off between these attributes, lacking swift adaptability. This paper introduces a novel self-reconfiguration system that addresses this challenge. Employing a scissor mechanism for rapid adjustment and an intelligent binocular vision driven by computer vision and reinforcement learning algorithms, the proposed system facilitates swift reconfiguration while effectively managing workload. Real-time perception and understanding of the surroundings enable the robot to promptly identify optimal dimensions and adjust its configuration accordingly. This capability empowers the robot to rapidly respond to new tasks without manual intervention, thereby augmenting its versatility and agility. Experimental validation demonstrates the system’s adeptness in navigating passages of varying widths in under a second, underscoring the efficacy of our approach in training the robot to adeptly adapt to diverse environmental conditions.
The paper focuses on the problem of technical social engineering attacks that encompass the manipulation of individuals to reveal sensitive information, execute actions, or breach security systems. These exploits freq...
详细信息
A continuous dynamic model for the development of a gas field is studied. Two mathematical problems are posed, solved and analyzed. In the direct problem, we are looking for the maximum accumulated profit on a set of ...
详细信息
Easy access to time series forecasting provides a strong competitive advantage for any company or organization. As automated forecasting environments become more prevalent in the market, it is crucial to explore their...
详细信息
Applications of internet-of-things(IoT)are increasingly being used in many facets of our daily life,which results in an enormous volume of *** computing and fog computing,two of the most common technologies used in Io...
详细信息
Applications of internet-of-things(IoT)are increasingly being used in many facets of our daily life,which results in an enormous volume of *** computing and fog computing,two of the most common technologies used in IoT applications,have led to major security *** are on the rise as a result of the usage of these technologies since present security measures are *** artificial intelligence(AI)based security solutions,such as intrusion detection systems(IDS),have been proposed in recent *** technologies that require data preprocessing and machine learning algorithm-performance augmentation require the use of feature selection(FS)techniques to increase classification accuracy by minimizing the number of features *** the other hand,metaheuristic optimization algorithms have been widely used in feature selection in recent *** this paper,we proposed a hybrid optimization algorithm for feature selection in *** proposed algorithm is based on grey wolf(GW),and dipper throated optimization(DTO)algorithms and is referred to as *** proposed algorithm has a better balance between the exploration and exploitation steps of the optimization process and thus could achieve better *** the employed IoT-IDS dataset,the performance of the proposed GWDTO algorithm was assessed using a set of evaluation metrics and compared to other optimization approaches in 2678 CMC,2023,vol.74,no.2 the literature to validate its *** addition,a statistical analysis is performed to assess the stability and effectiveness of the proposed *** results confirmed the superiority of the proposed approach in boosting the classification accuracy of the intrusion in IoT-based networks.
Multimodal learning analytics have become increasingly important in enabling a deeper understanding of teaching and learning in educational research. However, in comparison to other multimodal learning data, there is ...
详细信息
Detailed forecasting of time series is one of the fields where the latest advancements in information technology make significant contributions. Operating with financial data poses noteworthy challenges owing to its i...
详细信息
ISBN:
(数字)9798350358100
ISBN:
(纸本)9798350358117
Detailed forecasting of time series is one of the fields where the latest advancements in information technology make significant contributions. Operating with financial data poses noteworthy challenges owing to its inherent nature and substantial impact on economic dynamics within society. This study explores the utilization of automated tools as a set of resources for both unifactorial and multifactorial forecasting, drawing conclusions and providing recommendations.
It has great importance to provide the highest accuracy from fingerprint identification and verification systems, which have a large number of biometric features. Fingerprint recognition systems are more widely utiliz...
详细信息
暂无评论