Comparing the performance of different neural networks for binary classification problems

P Jeatrakul, KW Wong - 2009 Eighth International Symposium …, 2009 - ieeexplore.ieee.org
Classification problem is a decision making task where many researchers have been
working on. There are a number of techniques proposed to perform classification. Neural …

Research and application of the improved algorithm C4. 5 on decision tree

Z Xiaoliang, Y Hongcan, W Jian… - … Conference on Test …, 2009 - ieeexplore.ieee.org
The algorithm on Decision tree is the most widely used method of inductive inference, and it
is a simple method of knowledge representation, Different examples can be divided into …

Iterative bayesian model averaging: A method for the application of survival analysis to high-dimensional microarray data

A Annest, RE Bumgarner, AE Raftery, KY Yeung - BMC bioinformatics, 2009 - Springer
Background Microarray technology is increasingly used to identify potential biomarkers for
cancer prognostics and diagnostics. Previously, we have developed the iterative Bayesian …

A novel visualization approach for data-mining-related classification

C Seifert, E Lex - 2009 13th International Conference …, 2009 - ieeexplore.ieee.org
Classification and categorization are common tasks in data mining and knowledge
discovery. Visualizations of classification models can create understanding and trust in data …

Machine learning techniques for diagnosing and locating faults through the automated monitoring of power electronic components in shipboard power systems

AJ Mair, EM Davidson, SDJ McArthur… - 2009 IEEE Electric …, 2009 - ieeexplore.ieee.org
The management and control of shipboard medium voltage AC (MVAC) and medium
voltage DC (MVDC) power system architectures under fault conditions present a number of …

Semi-Naïve Bayesian method for network intrusion detection system

M Panda, MR Patra - … , ICONIP 2009, Bangkok, Thailand, December 1-5 …, 2009 - Springer
Intrusion detection can be considered as a classification task that attempts to classify a
request to access network services as safe or malicious. Data mining techniques are being …

A simple, efficient and near optimal algorithm for compressed sensing

T Blumensath, ME Davies - 2009 IEEE International …, 2009 - ieeexplore.ieee.org
When sampling signals below the Nyquist rate, efficient and accurate reconstruction is
nevertheless possible, whenever the sampling system is well behaved and the signal is well …

[PDF][PDF] Network intrusion detection by support vectors and ant colony

Q Zhang, W Feng - … on Information Security and Application (IWISA …, 2009 - researchgate.net
This paper presents a framework for a new approach in intrusion detection by combining two
existing machine learning methods (ie SVM and CSOACN). The IDS based on the new …

Evaluating the cancer detection and grading potential of prostatic-zinc imaging: a simulation study

M Cortesi, R Chechik, A Breskin… - Physics in Medicine …, 2009 - iopscience.iop.org
The present work deals with the analysis of prostatic-zinc-concentration images. The goal is
to evaluate potential clinically relevant information that can be extracted from such images …

Towards spatial awareness in recommender systems

C Stiller, F Roß, C Ament - 2009 International Conference for …, 2009 - ieeexplore.ieee.org
Recommender systems aggregate information about users and items to be recommended to
generate adequate recommendations. This paper proposes two approaches to include …