[图书][B] Ripple-down rules: the alternative to machine learning

P Compton, BH Kang - 2021 - taylorfrancis.com
Machine learning algorithms hold extraordinary promise, but the reality is that their success
depends entirely on the suitability of the data available. This book is about Ripple-Down …

Detection of CAN by ensemble classifiers based on ripple down rules

A Kelarev, R Dazeley, A Stranieri, J Yearwood… - … and Acquisition for …, 2012 - Springer
It is well known that classification models produced by the Ripple Down Rules are easier to
maintain and update. They are compact and can provide an explanation of their reasoning …

[PDF][PDF] Internet banking fraud detection using prudent analysis

O Maruatona - 2013 - core.ac.uk
The threat posed by cybercrime to individuals, banks and other online financial service
providers is real and serious. Through phishing, unsuspecting victims' Internet banking …

Prudent fraud detection in Internet banking

OO Maruatona, P Vamplew… - 2012 Third Cybercrime …, 2012 - ieeexplore.ieee.org
Most commercial Fraud Detection components of Internet banking systems use some kind of
hybrid setup usually comprising a Rule-Base and an Artificial Neural Network. Such rule …

Run-time validation of knowledge-based systems

A Finlayson, P Compton - … of the seventh international conference on …, 2013 - dl.acm.org
As knowledge bases become more complex it is increasingly unlikely that they will have
been validated against all possible data and therefore an increasing risk of making errors …

Using a Domain Expert in Semi-supervised Learning

A Finlayson, P Compton - … Management and Acquisition for Smart Systems …, 2014 - Springer
Semi-supervised learning requires some data to be labeled but then uses this in conjunction
with a large amount of unlabeled data to learn a model for a domain. Since the labeled data …

Optimizing query routing trees in wireless sensor networks

G Chatzimilioudis, A Cuzzocrea… - 2010 22nd IEEE …, 2010 - ieeexplore.ieee.org
The focus of this work is to adaptively optimize continuous queries in a wireless sensor
network. Therefore, we analyze and categorize the different types of queries used by …