Search results for "Mining"

showing 10 items of 1730 documents

Compression-based classification of biological sequences and structures via the Universal Similarity Metric: experimental assessment.

2007

Abstract Background Similarity of sequences is a key mathematical notion for Classification and Phylogenetic studies in Biology. It is currently primarily handled using alignments. However, the alignment methods seem inadequate for post-genomic studies since they do not scale well with data set size and they seem to be confined only to genomic and proteomic sequences. Therefore, alignment-free similarity measures are actively pursued. Among those, USM (Universal Similarity Metric) has gained prominence. It is based on the deep theory of Kolmogorov Complexity and universality is its most novel striking feature. Since it can only be approximated via data compression, USM is a methodology rath…

Computer scienceAlgorismesPrediction by partial matchingCompression dissimilaritycomputer.software_genreBiochemistryProtein Structure SecondaryPhylogenetic studiesStructural BiologySequence Analysis ProteinDatabases Proteinlcsh:QH301-705.5Biological dataNCDApplied MathematicsGenomicsClassificationCDComputer Science ApplicationsBenchmarking:Informàtica::Informàtica teòrica [Àrees temàtiques de la UPC]Universal compression dissimilarityArea Under CurveMetric (mathematics)lcsh:R858-859.7Data miningAlgorithmsData compressionResearch Article:Informàtica::Aplicacions de la informàtica::Bioinformàtica [Àrees temàtiques de la UPC]Normalization (statistics)lcsh:Computer applications to medicine. Medical informaticsBioinformatics Sequence Alignment AlgorithmsSet (abstract data type)Similarity (network science)Normalized compression sissimilarityData compression (Computer science)AnimalsHumansAmino Acid SequenceMolecular BiologyBiologyDades -- Compressió (Informàtica)USMUniversal similarity metricProteinsUCDProtein Structure TertiaryData setGenòmicaStatistical classificationlcsh:Biology (General)ROC CurvecomputerSequence AlignmentSoftwareBMC bioinformatics
researchProduct

Machine Learning Techniques for Intrusion Detection: A Comparative Analysis

2016

International audience; With the growth of internet world has transformed into a global market with all monetary and business exercises being carried online. Being the most imperative resource of the developing scene, it is the vulnerable object and hence needs to be secured from the users with dangerous personality set. Since the Internet does not have focal surveillance component, assailants once in a while, utilizing varied and advancing hacking topologies discover a path to bypass framework " s security and one such collection of assaults is Intrusion. An intrusion is a movement of breaking into the framework by compromising the security arrangements of the framework set up. The techniq…

Computer scienceAnomaly-based intrusion detection system02 engineering and technologyIntrusion detection systemIDSMachine learningcomputer.software_genre[ INFO.INFO-CV ] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV][INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]Machine LearningResource (project management)Component (UML)0202 electrical engineering electronic engineering information engineeringROCSet (psychology)[ INFO.INFO-AI ] Computer Science [cs]/Artificial Intelligence [cs.AI]False Positivebusiness.industryACM[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]020206 networking & telecommunicationsPrecisionObject (computer science)True PositiveOutlier020201 artificial intelligence & image processingThe InternetArtificial intelligenceData miningbusinesscomputer
researchProduct

Combining conjunctive rule extraction with diffusion maps for network intrusion detection

2013

Network security and intrusion detection are important in the modern world where communication happens via information networks. Traditional signature-based intrusion detection methods cannot find previously unknown attacks. On the other hand, algorithms used for anomaly detection often have black box qualities that are difficult to understand for people who are not algorithm experts. Rule extraction methods create interpretable rule sets that act as classifiers. They have mostly been combined with already labeled data sets. This paper aims to combine unsupervised anomaly detection with rule extraction techniques to create an online anomaly detection framework. Unsupervised anomaly detectio…

Computer scienceAnomaly-based intrusion detection systemNetwork securityintrusion detectiontunkeutumisen havaitseminenFeature extractionDiffusion mapdiffusion mapIntrusion detection systemMachine learningcomputer.software_genrepoikkeavuuden havaitseminenBlack boxtiedon louhintan-grammiCluster analysista113Training setrule extractionbusiness.industryn-gramanomaly detectiondiffuusiokarttakoneoppiminensääntöjen erottaminenAnomaly detectionArtificial intelligenceData miningtiedonlouhintabusinesscomputer2013 IEEE Symposium on Computers and Communications (ISCC)
researchProduct

Vibrational spectroscopy provides a green tool for multi-component analysis

2010

Abstract Based on the literature published in the past decade, we focus on the possibilities offered by vibrational-spectroscopy-based techniques to make multi-component analysis of samples independently of their physical state. We discuss the main chemometric tools proposed for developing calibration models and solving problems derived from spectroscopic non-idealities (e.g., highly overlapped spectral bands or the presence of spectral non-linearity), and the benefits provided by vibrational-spectroscopy-based multi-component analysis in industry. Our main objective is to show that vibrational spectroscopy provides fast analytical methods that enable non-destructive analysis and permits, i…

Computer scienceCalibration (statistics)Infrared spectroscopyMineralogySample (statistics)Spectral bandscomputer.software_genreAnalytical ChemistryChemometricsNonlinear systemComponent analysisData miningFocus (optics)computerSpectroscopyTrAC Trends in Analytical Chemistry
researchProduct

Power estimation for non-standardized multisite studies

2016

A concern for researchers planning multisite studies is that scanner and T1-weighted sequence-related biases on regional volumes could overshadow true effects, especially for studies with a heterogeneous set of scanners and sequences. Current approaches attempt to harmonize data by standardizing hardware, pulse sequences, and protocols, or by calibrating across sites using phantom-based corrections to ensure the same raw image intensities. We propose to avoid harmonization and phantom-based correction entirely. We hypothesized that the bias of estimated regional volumes is scaled between sites due to the contrast and gradient distortion differences between scanners and sequences. Given this…

Computer scienceCognitive Neurosciencecomputer.software_genreSensitivity and Specificity050105 experimental psychologyImaging phantomArticleSet (abstract data type)03 medical and health sciences0302 clinical medicineDistortionImage Interpretation Computer-AssistedCalibrationmedicine[INFO.INFO-IM]Computer Science [cs]/Medical ImagingHumans0501 psychology and cognitive sciencesSegmentationComputer Simulation10. No inequalityScalingModels Statisticalmedicine.diagnostic_test05 social sciencesContrast (statistics)BrainReproducibility of ResultsMagnetic resonance imagingEquipment DesignScale factorImage EnhancementMagnetic Resonance ImagingUnited StatesEquipment Failure AnalysisEuropeNeurologyOrdinary least squaresData miningFunction and Dysfunction of the Nervous SystemArtifactscomputer030217 neurology & neurosurgeryAlgorithms
researchProduct

Computation of Psycho-Acoustic Annoyance Using Deep Neural Networks

2019

Psycho-acoustic parameters have been extensively used to evaluate the discomfort or pleasure produced by the sounds in our environment. In this context, wireless acoustic sensor networks (WASNs) can be an interesting solution for monitoring subjective annoyance in certain soundscapes, since they can be used to register the evolution of such parameters in time and space. Unfortunately, the calculation of the psycho-acoustic parameters involved in common annoyance models implies a significant computational cost, and makes difficult the acquisition and transmission of these parameters at the nodes. As a result, monitoring psycho-acoustic annoyance becomes an expensive and inefficient task. Thi…

Computer scienceComputationsubjective annoyanceContext (language use)Annoyance02 engineering and technologycomputer.software_genre01 natural sciencesConvolutional neural networklcsh:TechnologyReduction (complexity)lcsh:Chemistryconvolutional neural networks0202 electrical engineering electronic engineering information engineeringWirelessGeneral Materials Sciencewireless acoustic sensor networksInstrumentationlcsh:QH301-705.5Fluid Flow and Transfer Processesbusiness.industrylcsh:TProcess Chemistry and Technology010401 analytical chemistryGeneral EngineeringRegression analysislcsh:QC1-9990104 chemical sciencesComputer Science Applicationspsycho-acoustic parametersTransmission (telecommunications)lcsh:Biology (General)lcsh:QD1-999lcsh:TA1-2040020201 artificial intelligence & image processingData miningbusinesslcsh:Engineering (General). Civil engineering (General)Zwicker modelcomputerlcsh:PhysicsApplied Sciences
researchProduct

Classification of reference models: a methodology and its application

2003

Classification is an important tool for perception and can be found in numerous scientific disciplines. Several application areas of classification are described in the context of information modeling. The usefulness of classification for reuse resp. selection of reference models is emphasized. A methodology to systematically create classification systems will be introduced. Furthermore, a classification system for reference models will be developed with the aid of the proposed methodology. This classification system gives a comprehensive, but abstract survey of 26 reference models found in the literature.

Computer scienceContext (language use)Reusecomputer.software_genreComputingMethodologies_PATTERNRECOGNITIONApplication areasInformation modelTaxonomy (general)Selection (linguistics)Data miningReference modelcomputerScientific disciplinesInformation SystemsInformation Systems and e-Business Management
researchProduct

Querying and reasoning over large scale building data sets

2016

International audience; The architectural design and construction domains work on a daily basis with massive amounts of data. Properly managing, exchanging and exploiting these data is an ever ongoing challenge in this domain. This has resulted in large semantic RDF graphs that are to be combined with a significant number of other data sets (building product catalogues, regulation data, geometric point cloud data, simulation data, sensor data), thus making an already huge dataset even larger. Making these big data available at high performance rates and speeds and into the correct (intuitive) formats is therefore an incredibly high challenge in this domain. Yet, hardly any benchmark is avai…

Computer scienceData managementBig data[ INFO.INFO-WB ] Computer Science [cs]/Web0211 other engineering and technologiesifcOWL02 engineering and technologySemantic data modelcomputer.software_genreDomain (software engineering)[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]Set (abstract data type)benchmarksemantic webbig data021105 building & construction0202 electrical engineering electronic engineering information engineering[ INFO.INFO-AI ] Computer Science [cs]/Artificial Intelligence [cs.AI]Semantic Web[INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]business.industry[INFO.INFO-WB]Computer Science [cs]/WebData set[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB]Building information modelingBenchmark (computing)reasoning020201 artificial intelligence & image processingData miningbusinesscomputer
researchProduct

Basic Sampling Techniques

2004

Computer scienceData miningcomputer.software_genrecomputer
researchProduct

Data mining and information retrieval

2007

Computer scienceData miningcomputer.software_genrecomputer
researchProduct