The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
At present, patients whose have suffered from stroke in Thailand are increasing every year. Stroke impairments relate to many functions such as sensory, motor function, communication, visual and emotional function which depend on brain's lesion. Physical examinations and assessments are important for planning the rehabilitation programs. For this reason, there are several information for medical decision...
Large amount of medical data leads to the need of intelligent data mining tools in order to extract useful knowledge. Researchers have been using several statistical analysis and data mining techniques to improve the disease diagnosis accuracy in medical healthcare. Heart disease is considered as the leading cause of deaths worldwide over the past 10 years. Several researchers have introduced different...
Today, big data is not only the data scenario with large volume, but also high-speed and changing all the time. Such data streams commonly exist in Smart Grid facilities. Decision tree as one of the most widely-used analysis methods, has been applied in the decision support system for smart grid. This paper proposes a two-level classifier combining cache-based classifier and incremental decision tree...
Decision tree, as one of the most widely used methods in data mining, has been used in many realistic application. Incremental decision tree handles streaming data scenario that is applicable for big data analysis. However, imperfect data are unavoidable in real-world applications. Studying the state-of-art incremental decision tree induction using Hoeffding bound, we investigated the influence of...
Using runtime execution artifacts to identify malware and its associated “family” is an established technique in the security domain. Many papers in the literature rely on explicit features derived from network, file system, or registry interaction. While effective, use of these fine-granularity data points makes these techniquse computationally expensive. Moreover, the signatures and heuristics this...
The task of reef restoration is very challenging for volunteer SCUBA divers, if it has to be carried out at deep sea, 200 meters, and low temperatures. This kind of task can be properly performed by an Autonomous Underwater Vehicle (AUV); able to detect the location of reef areas and approach them. The aim of this study is the development of a vision system for coral detections based on supervised...
Prediction of precipitation is a necessary tool in meteorology. To date, it is technologically and scientifically a challenging task for scientists and researchers around the globe. Rainfall is a liquid form of precipitation that depends primarily on humidity, temperature, pressure, wind speed, dew point, and so on. Because rainfall depends on several parameters, its prediction becomes very complex...
One way to predict the behavior of smart home lighting is by using machine learning. Currently many methods of supervised learning that used for this problem, one of them is decision tree method. Very Fast Decision Tree (VFDT) as one of the decision tree method that has advantages in online machine learning that may useful in smart home, but there are still some room of improvisation that can improve...
Indonesia has a large geographic area with large variance of quality service of education. This paper will analyze whether it has a correlation or not, between the quality level of school and its characteristic of geographic area. This paper describes performance of two kind of decision tree method in predicting level of accreditation for public junior high school in Bogor, West Java. With three scenarios...
Recent studies have suggested significant differences in motor performances of Parkinson's Disease (PD) patients who have L-dopa induced dyskinesias (LIDs), even when off of L-dopa medication. The pathophysiology of LIDs remains obscure, so applying data-mining techniques to the patients' motor performance may provide some heuristic insight. This paper investigated visually-guided tracking performance...
In this paper an application of evolutionary algorithm to oblique decision tree inference is presented. In the core of new decision tree inducing algorithm is the specific evolutionary algorithm called HereBoy. Performance of proposed HBDT algorithm is studied and compared with eight existing decision tree building algorithms using standard benchmark datasets obtained from the UCI Machine Learning...
In this paper, we propose Support Vector Machine classifiers utilizing binary decision tree to solve multiclass problems. In training process, we determine the hyperplane that separates the classes into two categories at the top node and this procedure is repeated until only one class remains. In order to obtain higher accuracy, easier separable class should be separated in the upper node. Hence a...
Feature selection is a key step in data mining. Unfortunately, there is no single feature selection method that is always the best and the data miner usually has to experiment with different methods using a trial and error approach, which can be time consuming and costly especially with very large datasets. Hence, this research aims to develop a meta learning framework that is able to learn about...
The development of data mining applications such as classification and clustering has shown the need for machine learning algorithms to be applied to large scale data. Cancer classification has improved over the past 20 years; there has been no general approach for identifying new cancer classes or for assigning tumors to known classes (class prediction). Most proposed cancer classification methods...
Coreference resolution is the process of determining whether two expressions refer to the same entity. We adopt machine learning approach to coreference resolution. Feature selection of entity is the key of coreference resolution. This paper presents analysis methods for features which are used commonly in coreference resolution, proposes two features, entity density and antecedent characteristics...
This paper presents a new algorithm to improve the speed of threshold searching process in C4.5 by using the technique of genetic algorithms. In the threshold searching process in C4.5, the values in a numerical attribute are sorted first and then the mid-point between every two consecutive values is calculated and designated as a candidate threshold. This process can be time consuming and it is not...
Finding patterns of interaction and predicting the future structure of networks has many important applications, such as recommendation systems and customer targeting. Community structure of social networks may undergo different temporal events and transitions. In this paper, we propose a framework to predict the occurrence of different events and transition for communities in dynamic social networks...
Traditional Network Intrusion Detection Systems (NIDSs) rely on either specialized signatures of previously seen attacks, or on expensive and difficult to produce labeled traffic datasets for profiling and training. Both approaches share a common downside: they require the knowledge provided by an external agent, either in terms of signatures or as normal-operation profiles. In this paper we describe...
Anomaly detection is one of the major areas of research with the tremendous development of computer networks. Any intrusion detection model designed should have the ability to visualize high dimensional data with high processing and accurate detection rate. Integrated Intrusion detection models combine the advantage of low false positive rate and shorter detection time. Hence this paper proposes an...
In this study we argue that the traditional approach of evaluating the information quality of an anonymized (or otherwise modified) dataset is questionable. We propose a novel and simple approach to evaluate the information quality of a modified dataset, and thereby the quality of techniques that modify data. We carry out experiments on eleven datasets and the empirical results strongly support our...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.