28 Hits in 9.0 sec

Boosting Accuracy of Classical Machine Learning Antispam Classifiers in Real Scenarios by Applying Rough Set Theory

N. Pérez-Díaz, D. Ruano-Ordás, F. Fdez-Riverola, J. R. Méndez
2016 Scientific Programming  
Nowadays, spam deliveries represent a major problem to benefit from the wide range of Internet-based communication forms.  ...  As long as some of these algorithms suffer from a large number of false positive errors, in this work we propose a rough set postprocessing approach able to significantly improve their accuracy.  ...  Acknowledgments This work has been partially funded by (i) the 14VI05 Contract-Programme from the University of Vigo, (ii) the INOU15-06 Project from the University of Vigo, and (iii) Agrupamento INBIOMED  ... 
doi:10.1155/2016/5945192 fatcat:chgfe6wyhfeyjixpyhwfnchcz4

BioDR: Semantic indexing networks for biomedical document retrieval

Anália Lourenço, Rafael Carreira, Daniel Glez-Peña, José R. Méndez, Sónia Carneiro, Luis M. Rocha, Fernando Díaz, Eugénio C. Ferreira, Isabel Rocha, Florentino Fdez-Riverola
2010 Expert systems with applications  
This work proposes BioDR, a novel approach that allows the semantic indexing of the results of a query, by identifying relevant terms in the documents.  ...  The system is based on a learning process that builds an Enhanced Instance Retrieval Network (EIRN) from a set of manually classified documents, regarding their relevance to a given problem.  ...  In , we presented a successful spam filtering model called SPAMHUNTING, a Case-Based Reasoning (CBR) system which implements a disjoint knowledge representation engine able to address concept drift and  ... 
doi:10.1016/j.eswa.2009.10.044 fatcat:f3mth5maujh7blsv7is2jptjra

A Knowledge-Light Approach to Regression Using Case-Based Reasoning [chapter]

Neil McDonnell, Pádraig Cunningham
2006 Lecture Notes in Computer Science  
During live operation, the 'revise' step would involve an assessment of the probable accuracy of each prediction.  ...  One domain subject to concept drift for which CBR is a natural fit is the filtering of spam email [Cunningham et al. 2003a ].  ...  The account contained in this thesis has been presented in four parts: 1. A description of the regression task and the CBR approach to problem solving; 2.  ... 
doi:10.1007/11805816_9 fatcat:w32csyxhofeedn2s3q6ymx4zz4

A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks

Vinayak T Patil
2013 IOSR Journal of Computer Engineering  
Thus, it is imperative to reduce the overhead of route discovery in the design of routing protocols of MANETs.  ...  This feature leads to frequent path failures and route reconstructions, which causes an increase in the routing control overhead. The overhead of a route discovery cannot be neglected.  ...  Sitendra Tamrakar in writing this paper and giving the valuable suggestion.  ... 
doi:10.9790/0661-1260109 fatcat:jundvgfvpjcdpmtloz2z2w6ige

Explainable Artificial Intelligence: a Systematic Review [article]

Giulia Vilone, Luca Longo
2020 arXiv   pre-print
This systematic review contributes to the body of knowledge by clustering these methods with a hierarchical classification system with four main clusters: review articles, theories and notions, methods  ...  It also summarises the state-of-the-art in XAI and recommends future research directions.  ...  A combination of a Neural Network and Case Base Reasoning (CBR) Twin-systems was proposed in [212] .  ... 
arXiv:2006.00093v4 fatcat:dr26wgxvqrg7diljklhmdjkj7i

Cost-to-Go Function Approximation [chapter]

2017 Encyclopedia of Machine Learning and Data Mining  
It maintains a set, S , of most specific hypotheses that are consistent with the training data and a set, G, of most general hypotheses consistent with the training data.  ...  Mitchell's, (1982; candidate-elimination algorithm performs a bidirectional search in the hypothesis space.  ...  In this case, the resulting theory is interpreted as a decision list. In the following, we will assume a two-class problem with a positive and a negative class.  ... 
doi:10.1007/978-1-4899-7687-1_100093 fatcat:vse7ncdqs5atlosjhz7fhlj3im

Bridging Socially Enhanced Virtual Communities

Venugopal Rao
2013 IOSR Journal of Computer Engineering  
The architecture of the proposed system is compromising of human activities and also automated activities and it is essentially a service oriented system.  ...  In this paper we propose concept of bridging socially enhanced virtual communities.  ...  First and foremost I would like to acknowledge the ongoing support of Dr. Sanjay Sharma and Prof. Akhilesh A. Waoo, Project Guide, BIST Bhopal in the design and implementation of the project.  ... 
doi:10.9790/0661-0940104 fatcat:zejgpenvqzb7rkchkznv5igfwm

Detecting Intruders and Packet Modifiers in Wireless Sensor Networks

S. Navaneethan
2013 IOSR Journal of Computer Engineering  
This paper deals with the enhanced scheme (MABS-E) which combines the basic scheme with a packet filtering mechanism to alleviate DOS impact.  ...  The file list is displayed in both sender and the receiver but the file content is present in the sender only.  ...  Finally, the authors would like to thank everybody who were important and helped them out in every process to the successful realization of the thesis.  ... 
doi:10.9790/0661-0850103 fatcat:ju24fypkjvgdzcg3ajc6hkto4u

Computer and Information Science, Vol. 1, No. 2, May 2008, all in one file

Editor CIS
2008 Computer and Information Science  
as VASDE) for manually disabled programmers for whom the use of a keyboard and/or mouse is problematic.  ...  This suggests that, while a voice-activated expression editor based on VEE might not be attractive to the general population of programmers, it might very nicely fit into a voice-activated editor (such  ...  For several decades now, document classification in the form of text classification systems have been widely implemented in numerous applications such as spam filtering.  ... 
doi:10.5539/cis.v1n2p0 fatcat:plvvknmc2jel3m3tzfz7bs2mdu

Say Anything

Reid Swanson, Andrew S. Gordon
2012 ACM transactions on interactive intelligent systems (TiiS)  
In this article, we describe the three main components of our case-based reasoning approach: a million-item corpus of personal stories mined from internet weblogs, a case retrieval strategy that is optimized  ...  Unlike previous attempts, this interactive storytelling system places no restrictions on the content or direction of the user's contribution to the emerging storyline.  ...  We used Cohen's κ to assess the level of agreement between the raters, which was found to be 0.68 at this stage.  ... 
doi:10.1145/2362394.2362398 fatcat:d3aw4kthnvcfdixyj7zio4d4hy

Intelligent Computing Research Studies in Life Science

Dr. Thilagamani S
2019 International Journal of Pharma and Bio Sciences  
This present task comprises two stages, which is to be a specific enrolment stage and the investigation stage. At the first stage, the accompanying occasions happen.  ...  Cloud security is nowadays a vital part in healthcare system as the health information is highly sensitive.  ...  For the higher accuracy, HIS method is involved in the color co-occurrence acquire 90% percent of the accuracy. The square distance classifier is used in the image classification part.  ... 
doi:10.22376/ijpbs/10.sp01/oct/2019.1-142 fatcat:6fc5ghwmjbgrphetiablavajxm

Pattern Matching Techniques for Replacing Missing Sections of Audio Streamed across Wireless Networks

Jonathan Doherty, Kevin Curran, Paul McKevitt
2015 ACM Transactions on Intelligent Systems and Technology  
Many existing systems exist based on packet loss and replacement on a network level, but none attempt repairs of large dropouts of 5 seconds or more.  ...  Whenever dropouts occur, SoFI swaps audio presented to the listener between a live stream and previous sections of the audio stored locally.  ...  In a typical MIR system, similarity assessment is performed in three stages: data reduction, feature extraction, and similarity comparisons.  ... 
doi:10.1145/2663358 fatcat:yhwlzsmfkrek3evv7iqcbyvfuy

Visualizing and Evaluating Complexity of Textual Case Bases [chapter]

Sutanu Chakraborti, Ulises Cerviño Beresi, Nirmalie Wiratunga, Stewart Massie, Robert Lothian, Deepak Khemani
Lecture Notes in Computer Science  
GAME class , a counterpart of GAME in classification domains, shows a strong correspondence with accuracies reported by standard classifiers over classification tasks of varying complexity.  ...  The first is useful in case base maintenance, the second in making informed choices regarding case base representation and tuning of parameters for the TCBR system, and also for explaining the behaviour  ...  Acknowledgements The authors are grateful to Dr. Derek Bridge for his interesting insights on various aspects of this work.  ... 
doi:10.1007/978-3-540-85502-6_7 fatcat:co4rvk6azjdgxmega7yv7zv6km

Preferences in Case-Based Reasoning

Amira Abdel-Aziz, Hüllermeier, Eyke (Prof. Dr.)
The absence of such a framework inspired the motivation for the work developed in this thesis.  ...  Case-based reasoning (CBR) is a well-established problem solving paradigm that has been used in a wide range of real-world applications.  ...  the overall performance of a CBR system.  ... 
doi:10.17192/z2016.0800 fatcat:ziiiitbfq5drvnmrbt4kjr24um

A Framework for Web Science

Tim Berners-Lee, Daniel J. Weitzner, Wendy Hall, Kieron O'Hara, Nigel Shadbolt, James A. Hendler
2006 Foundations and Trends® in Web Science  
These questions and approaches together set out an agenda for Web Science, the science of decentralised information systems.  ...  A comprehensive set of research questions is outlined, together with a sub-disciplinary breakdown, emphasising the multi-faceted nature of the Web, and the multi-disciplinary nature of its study and development  ...  helped shape our ideas of what the science of the Web consists in.  ... 
doi:10.1561/1800000001 fatcat:ref26ejozzhsxbaw32xckem2ca
« Previous Showing results 1 — 15 out of 28 results