Filters








2,271 Hits in 19.0 sec

Explaining Diverse Application Domains Analyzed from Data Mining Perspective [chapter]

Alberto Ochoa, Lourdes Margain, Rubn Jaramillo, Javier Gonzlez, Daniel Azpeitia, Claudia Gmez, Jns Snchez, Julio Ponce, Sayuri Quezada, Francisco Ornelas, Arturo Elas, Edgar Conde (+4 others)
2012 Data Mining Applications in Engineering and Medicine  
Competitive learning for self organizing maps used in classification of partial discharge Competitive learning is an efficient tool for Self Organizing Maps, widely applied in variety of signal processing  ...  Self organizing map The Self Organizing Map developed by Kohonen, is the most popular neural network models (Kohonen, T., 2006 & Rubio-Sánchez, M., 2004 .  ... 
doi:10.5772/49947 fatcat:j3vkofhdtvgpdfp7oe73dvidzy

A/B Testing [chapter]

2017 Encyclopedia of Machine Learning and Data Mining  
Association rule mining is part of the larger field of frequent itemset or frequent pattern mining.  ...  both linear and angular path integration inputs that drive map learning; (2) the same self-organizing map mechanisms can learn grid cell and place cell receptive fields in a hierarchy of maps, and both  ...  In the presence of linear function approximation, the average-reward version of temporal difference learning, which learns a state-based value function for a fixed policy, is shown to converge in the limit  ... 
doi:10.1007/978-1-4899-7687-1_100507 fatcat:bg6sszljsrax5heho4glbcbicu

Average-Payoff Reinforcement Learning [chapter]

2017 Encyclopedia of Machine Learning and Data Mining  
Association rule mining is part of the larger field of frequent itemset or frequent pattern mining.  ...  both linear and angular path integration inputs that drive map learning; (2) the same self-organizing map mechanisms can learn grid cell and place cell receptive fields in a hierarchy of maps, and both  ...  In the presence of linear function approximation, the average-reward version of temporal difference learning, which learns a state-based value function for a fixed policy, is shown to converge in the limit  ... 
doi:10.1007/978-1-4899-7687-1_100029 fatcat:jub4ulyg45abnf4qgutimczie4

A Review on Various Methods of Intrusion Detection System

2020 Computer Engineering and Intelligent Systems  
This paper presents the survey on data mining techniques applied on intrusion detection systems for the effective identification of both known and unknown patterns of attacks, thereby helping the users  ...  Different Data Mining techniques such as clustering, classification and association rules are proving to be useful for analyzing network traffic.  ...  Applying on a firewall system alone is not enough to prevent a corporate network from all types of network attacks. Therefore more system should be complemented by intrusion detection system.  ... 
doi:10.7176/ceis/11-1-02 fatcat:ubcjgwamsrbzlovj5isaaeqpc4

Social Media Identity Deception Detection: A Survey [article]

Ahmed Alharbi, Hai Dong, Xun Yi, Zahir Tari, Ibrahim Khalil
2021 arXiv   pre-print
Many social media identity deception cases have arisen over the past few years. Recent studies have been conducted to prevent and detect identity deception.  ...  This survey provides a detailed review of social media identity deception detection techniques. It also identifies primary research challenges and issues in the existing detection techniques.  ...  As above Identity Cloning Single-site or cross-site To steal someone's personal information and to deceive or defame a person.  ... 
arXiv:2103.04673v1 fatcat:zf6xcn3pafcgfbxmoewc3yhhpi

Understanding Privacy Online: Development of a Social Contract Approach to Privacy

Kirsten Martin
2015 Journal of Business Ethics  
Based on this narrative, individuals within a given community discriminately share information with a particular set of obligations in mind as to who has access to the information and how it will be used  ...  While privacy as a social contract-a mutually beneficial agreement within a community about sharing and using information-has been introduced theoretically and empirically, the full impact on firms of  ...  I wish to thank Tom Donaldson and Gaston de los Reyes Jr. for their comments on the paper. The usual disclaimer applies.  ... 
doi:10.1007/s10551-015-2565-9 fatcat:ostm5k4brffqffjv6srz36jlfq

The development of effective geomonitoring for mining area with industrial review

E. N. Prokofeva, A. V. Vostrikov, G. N. Shapovalenko, A. Alvarez
2017 Eurasian Mining  
Remote phosphors can improve energy efficiency and are applied on to a separate component rather than directly on the LEDs.  ...  World Mine Production and Reserves: Slag is not a mined material and thus the concept of reserves does not apply to this mineral commodity.  ...  The term "geologic reserve" has been applied by others generally to the reserve-base category, but it also may include the inferred-reserve-base category; it is not a part of this classification system  ... 
doi:10.17580/em.2017.02.15 fatcat:vdakisbyirarniwknh5pie5nj4

Languages of Games and Play

Riemer Van Rozen
2020 ACM Computing Surveys  
We explore what informs the design and construction of good games in order to learn how to speed-up game development.  ...  and improve the quality of games and play.  ...  ., fellowship, challenge, fantasy, narrative, discovery or self-expression [24] . However, opinions on a game's quality differ from person to person, e.g., with age, gender and beliefs.  ... 
doi:10.1145/3412843 fatcat:k25yj7aylbcg5k3ks4v5d5dueu

ijair-volume-6-issue-1-vii-january-march-2019 -HINDUSTAN BOOK.pdf

V. Thamilarasi
2022 figshare.com  
Self Organizing Map The self Organizing Map (SOM) is a classification of unsupervised learning from the type of Partitive clustering. It is used for visualization and high dimensional datasets.  ...  For offline rules and also for most online rules, the bank first gives provision to the transaction then, if a fraud is captured, the card is blocked to prevent any further frauds.  ...  **Association rule mining -(ARM) considers market basket or shopping-cart data, that is, the items purchased on a particular visit to the supermarket.  ... 
doi:10.6084/m9.figshare.20217722.v1 fatcat:l74ihuqhcvdtjomod3zdwzfniu

Computer and Information Science, Vol. 2, No. 1, February 2009, all in one file, Part A

Editor CIS
2009 Computer and Information Science  
If the answer to these questions based on all the above criteria is "yes", then the problem can be classified as a hard problem.  ...  This framework is theoretical in nature, and is build based on a review of related literature. 4 numerous, selecting appropriate methodology for applying in a specific system is a very important and difficult  ...  The occurrence of RIA offers a sort of effective mechanism about information display, organization, sharing and utilization for WEBVR.  ... 
doi:10.5539/cis.v2n1p0a fatcat:agwwsblogndrndjud27mkprjny

Understanding Human-Machine Networks: A Cross-Disciplinary Survey [article]

Milena Tsvetkova, Taha Yasseri, Eric T. Meyer, J. Brian Pickering, Vegard Engen, Paul Walland, Marika Lüders, Asbjørn Følstad, and George Bravos
2017 arXiv   pre-print
Such human-machine networks (HMNs) are embedded in the daily lives of people, both for personal and professional use. They can have a significant impact by producing synergy and innovations.  ...  We identify eight types of HMNs: public-resource computing, crowdsourcing, web search engines, crowdsensing, online markets, social media, multiplayer online games and virtual worlds, and mass collaboration  ...  Second, WSEs can mine the profiles of a user's online social network friends and return results based on their recommendations [Morris et al. 2010] .  ... 
arXiv:1511.05324v2 fatcat:ixawl5uo4rd5tbewgcpz3as4pm

International Research Conference on Smart Computing and Systems Engineering SCSE 2020 Proceedings [Full Conference Proceedings]

2020 2020 International Research Conference on Smart Computing and Systems Engineering (SCSE)  
ACKNOWLEDGMENT The authors would like to extend their heartfelt gratitude and acknowledgment to all the language experts, Sinhala teachers from different schools and especially, the Sinhala Department  ...  ACKNOWLEDGMENT The authors would like to thank the Department of Census and Department of Irrigation, Sri Lanka for providing the paddy yield and climate data for this study.  ...  To identify the gender of a given third-person noun, the rule-based approach was used in this study.  ... 
doi:10.1109/scse49731.2020.9313027 fatcat:gjk5az2mprgvrpallwh6uhvlfi

Security improvements Zone Routing Protocol in Mobile Ad Hoc Network

Mahsa Seyyedtaj, Mohammad Ali Jabraeil Jamali
2014 International Journal of Computer Applications Technology and Research  
there is a need of a path from any source to destination then a type of query reply dialog does the work.Therefore, the latency is high; however, no unnecessary control messages are required.  ...  However, these characteristics make ad-hoc networks vulnerable to different types of attacks and make implementing security in ad-hoc network a challenging task.  ...  In [15] the author researched personalized catalog service with one-to-one market by association rules and CART.  ... 
doi:10.7753/ijcatr0309.1001 fatcat:n7yb26a6zbgwnpvfmvka3cnpoq

FIRST INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND DATA SCIENCE (ICAIDS-2022) [article]

Dr. Agusthiyar . R
2022 Zenodo  
I would like to congratulate the staff, the students of the Department of Computer Applications (BCA) and all the others directly and indirectly associated in organizing the First International Conference  ...  on Artificial Intelligence and Data Science (ICAIDS-2022) in association with Object Automation Software Solutions Pvt ltd, IBM, OpenPower, Onstitute and X-Scale Solutions on 4th and 5th March 2022.  ...  In [9] , Xiaomin Chang et al. proposed extreme grading boosting and a self-organizing map to forecast Photovoltaic energy.  ... 
doi:10.5281/zenodo.7024997 fatcat:2v4vxqlfxbgn3dl43zr4y2d26y

Optimization of FCFS Based Resource Provisioning Algorithm for Cloud Computing

Aditya Marphatia Aditya Marphatia
2013 IOSR Journal of Computer Engineering  
Resource selection is done on the basis of task constraints using a greedy approach. The proposed model will be implemented and tested on simulation toolkit.  ...  We intend to create a module depicting the normal FCFS algorithm in comparison to our optimized version algorithm for resource provisioning in the cloud.  ...  Acknowledgments Acknowledgement We would like to express our greatest gratitude to Dr. Y.K. Jain , HOD Computer Science and Engineering Dept. S.A.T.I. Vidisha (M.P) for his great support .  ... 
doi:10.9790/0661-1050105 fatcat:73hohpcqezf3bo6snf6la5qr64
« Previous Showing results 1 — 15 out of 2,271 results