Search results for: Bayes’ rule
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 910

Search results for: Bayes’ rule

850 A Supervised Approach for Detection of Singleton Spam Reviews

Authors: Atefeh Heydari, Mohammadali Tavakoli, Naomie Salim

Abstract:

In recent years, we have witnessed that online reviews are the most important source of customers’ opinion. They are progressively more used by individuals and organisations to make purchase and business decisions. Unfortunately, for the reason of profit or fame, frauds produce deceptive reviews to hoodwink potential customers. Their activities mislead not only potential customers to make appropriate purchasing decisions and organisations to reshape their business, but also opinion mining techniques by preventing them from reaching accurate results. Spam reviews could be divided into two main groups, i.e. multiple and singleton spam reviews. Detecting a singleton spam review that is the only review written by a user ID is extremely challenging due to lack of clue for detection purposes. Singleton spam reviews are very harmful and various features and proofs used in multiple spam reviews detection are not applicable in this case. Current research aims to propose a novel supervised technique to detect singleton spam reviews. To achieve this, various features are proposed in this study and are to be combined with the most appropriate features extracted from literature and employed in a classifier. In order to compare the performance of different classifiers, SVM and naive Bayes classification algorithms were used for model building. The results revealed that SVM was more accurate than naive Bayes and our proposed technique is capable to detect singleton spam reviews effectively.

Keywords: classification algorithms, Naïve Bayes, opinion review spam detection, singleton review spam detection, support vector machine

Procedia PDF Downloads 309
849 A Modelling Analysis of Monetary Policy Rule

Authors: Wael Bakhit, Salma Bakhit

Abstract:

This paper employs a quarterly time series to determine the timing of structural breaks for interest rates in USA over the last 60 years. The Chow test is used for investigating the non-stationary, where the date of the potential break is assumed to be known. Moreover, an empirical examination of the financial sector was made to check if it is positively related to deviations from an assumed interest rate as given in a standard Taylor rule. The empirical analysis is strengthened by analysing the rule from a historical perspective and a look at the effect of setting the interest rate by the central bank on financial imbalances. The empirical evidence indicates that deviation in monetary policy has a potential causal factor in the build-up of financial imbalances and the subsequent crisis where macro prudential intervention could have beneficial effect. Thus, our findings tend to support the view which states that the probable existence of central banks has been a source of global financial crisis since the past decade.

Keywords: Taylor rule, financial imbalances, central banks, econometrics

Procedia PDF Downloads 389
848 Credit Risk Assessment Using Rule Based Classifiers: A Comparative Study

Authors: Salima Smiti, Ines Gasmi, Makram Soui

Abstract:

Credit risk is the most important issue for financial institutions. Its assessment becomes an important task used to predict defaulter customers and classify customers as good or bad payers. To this objective, numerous techniques have been applied for credit risk assessment. However, to our knowledge, several evaluation techniques are black-box models such as neural networks, SVM, etc. They generate applicants’ classes without any explanation. In this paper, we propose to assess credit risk using rules classification method. Our output is a set of rules which describe and explain the decision. To this end, we will compare seven classification algorithms (JRip, Decision Table, OneR, ZeroR, Fuzzy Rule, PART and Genetic programming (GP)) where the goal is to find the best rules satisfying many criteria: accuracy, sensitivity, and specificity. The obtained results confirm the efficiency of the GP algorithm for German and Australian datasets compared to other rule-based techniques to predict the credit risk.

Keywords: credit risk assessment, classification algorithms, data mining, rule extraction

Procedia PDF Downloads 181
847 Emergence and Manifestation of Ismaili Shiite Beliefs and Rituals in the Fatimid Rule

Authors: Hosein Rahmati

Abstract:

The Fatimid government was one of the powerful Shiite governments that was formed in 297 AH in the Islamic Maghreb based on Ismaili ideas and played an important role in promoting the culture and civilization of the Islamic world. Ismaili is one of the Shiite sects that has its own beliefs and teachings. This research seeks to find out which of the Ismaili beliefs and teachings were considered by the Fatimid political government and which the Fatimid government paid serious attention to highlighting. The present study, based on library sources and descriptive-analytical method, has concluded that the Ismaili doctrinal foundations, especially the doctrine of Imamate, are essential elements in the formation and continuation of the Fatimid rule. Their goals were approaching.

Keywords: Fatimid rule, The Ismaili, The Islamic Maghreb, Imamate

Procedia PDF Downloads 130
846 An intelligent Troubleshooting System and Performance Evaluator for Computer Network

Authors: Iliya Musa Adamu

Abstract:

This paper seeks to develop an expert system that would troubleshoot computer network and evaluate the network system performance so as to reduce the workload on technicians and increase the efficiency and effectiveness of solutions proffered to computer network problems. The platform of the system was developed using ASP.NET, whereas the codes are implemented in Visual Basic and integrated with SQL Server 2005. The knowledge base was represented using production rule, whereas the searching method that was used in developing the network troubleshooting expert system is the forward-chaining-rule-based-system. This software tool offers the advantage of providing an immediate solution to most computer network problems encountered by computer users.

Keywords: expert system, forward chaining rule based system, network, troubleshooting

Procedia PDF Downloads 647
845 Electricity Market Categorization for Smart Grid Market Testing

Authors: Rebeca Ramirez Acosta, Sebastian Lenhoff

Abstract:

Decision makers worldwide need to determine if the implementation of a new market mechanism will contribute to the sustainability and resilience of the power system. Due to smart grid technologies, new products in the distribution and transmission system can be traded; however, the impact of changing a market rule will differ between several regions. To test systematically those impacts, a market categorization has been compiled and organized in a smart grid market testing toolbox. This toolbox maps all actual energy products and sets the basis for running a co-simulation test with the new rule to be implemented. It will help to measure the impact of the new rule, based on the sustainable and resilience indicators.

Keywords: co-simulation, electricity market, smart grid market, market testing

Procedia PDF Downloads 190
844 Confirmatory Analysis of Externalizing Issue Validity from an Adolescent Sample

Authors: Zhidong Zhang, Zhi-Chao Zhang

Abstract:

This study investigated the structural validity of externalizing issues of Achenbach System of Empirically Based Assessment (ASEBA) via a Chinese sample. The externalizing problems consist of two sub-problems: rule-breaking behavior and aggressive behavior. The rule-breaking behavior consists of 17 items, and aggressive behavior consists of 18 items. The factor analysis model was used to examine the structure validity. For the rule breaking behavior, at the first step, the most items weighted with component 2. After the rotation, there was a clear weight on both component 1 and 2. For the aggressive behavior, at the first step, there was no clear picture about the components. After the rotation, two clusters of items were closer to component 1 and 2 respectively. It seemed that both rule breaking behavior issue and aggressive behavior issue suggested two components. Further studies should be done to examine both samples and structures of externalizing problems.

Keywords: confirmatory analysis, externalizing issue, structural validity, varimax rotations

Procedia PDF Downloads 434
843 Roof Material Detection Based on Object-Based Approach Using WorldView-2 Satellite Imagery

Authors: Ebrahim Taherzadeh, Helmi Z. M. Shafri, Kaveh Shahi

Abstract:

One of the most important tasks in urban area remote sensing is detection of impervious surface (IS), such as building roof and roads. However, detection of IS in heterogeneous areas still remains as one of the most challenging works. In this study, detection of concrete roof using an object-oriented approach was proposed. A new rule-based classification was developed to detect concrete roof tile. The proposed rule-based classification was applied to WorldView-2 image. Results showed that the proposed rule has good potential to predict concrete roof material from WorldView-2 images with 85% accuracy.

Keywords: object-based, roof material, concrete tile, WorldView-2

Procedia PDF Downloads 424
842 Local Interpretable Model-agnostic Explanations (LIME) Approach to Email Spam Detection

Authors: Rohini Hariharan, Yazhini R., Blessy Maria Mathew

Abstract:

The task of detecting email spam is a very important one in the era of digital technology that needs effective ways of curbing unwanted messages. This paper presents an approach aimed at making email spam categorization algorithms transparent, reliable and more trustworthy by incorporating Local Interpretable Model-agnostic Explanations (LIME). Our technique assists in providing interpretable explanations for specific classifications of emails to help users understand the decision-making process by the model. In this study, we developed a complete pipeline that incorporates LIME into the spam classification framework and allows creating simplified, interpretable models tailored to individual emails. LIME identifies influential terms, pointing out key elements that drive classification results, thus reducing opacity inherent in conventional machine learning models. Additionally, we suggest a visualization scheme for displaying keywords that will improve understanding of categorization decisions by users. We test our method on a diverse email dataset and compare its performance with various baseline models, such as Gaussian Naive Bayes, Multinomial Naive Bayes, Bernoulli Naive Bayes, Support Vector Classifier, K-Nearest Neighbors, Decision Tree, and Logistic Regression. Our testing results show that our model surpasses all other models, achieving an accuracy of 96.59% and a precision of 99.12%.

Keywords: text classification, LIME (local interpretable model-agnostic explanations), stemming, tokenization, logistic regression.

Procedia PDF Downloads 47
841 Early Stage Suicide Ideation Detection Using Supervised Machine Learning and Neural Network Classifier

Authors: Devendra Kr Tayal, Vrinda Gupta, Aastha Bansal, Khushi Singh, Sristi Sharma, Hunny Gaur

Abstract:

In today's world, suicide is a serious problem. In order to save lives, early suicide attempt detection and prevention should be addressed. A good number of at-risk people utilize social media platforms to talk about their issues or find knowledge on related chores. Twitter and Reddit are two of the most common platforms that are used for expressing oneself. Extensive research has already been done in this field. Through supervised classification techniques like Nave Bayes, Bernoulli Nave Bayes, and Multiple Layer Perceptron on a Reddit dataset, we demonstrate the early recognition of suicidal ideation. We also performed comparative analysis on these approaches and used accuracy, recall score, F1 score, and precision score for analysis.

Keywords: machine learning, suicide ideation detection, supervised classification, natural language processing

Procedia PDF Downloads 90
840 Application of Association Rule Using Apriori Algorithm for Analysis of Industrial Accidents in 2013-2014 in Indonesia

Authors: Triano Nurhikmat

Abstract:

Along with the progress of science and technology, the development of the industrialized world in Indonesia took place very rapidly. This leads to a process of industrialization of society Indonesia faster with the establishment of the company and the workplace are diverse. Development of the industry relates to the activity of the worker. Where in these work activities do not cover the possibility of an impending crash on either the workers or on a construction project. The cause of the occurrence of industrial accidents was the fault of electrical damage, work procedures, and error technique. The method of an association rule is one of the main techniques in data mining and is the most common form used in finding the patterns of data collection. In this research would like to know how relations of the association between the incidence of any industrial accidents. Therefore, by using methods of analysis association rule patterns associated with combination obtained two iterations item set (2 large item set) when every factor of industrial accidents with a West Jakarta so industrial accidents caused by the occurrence of an electrical value damage = 0.2 support and confidence value = 1, and the reverse pattern with value = 0.2 support and confidence = 0.75.

Keywords: association rule, data mining, industrial accidents, rules

Procedia PDF Downloads 299
839 Estimation of Stress-Strength Parameter for Burr Type XII Distribution Based on Progressive Type-II Censoring

Authors: A. M. Abd-Elfattah, M. H. Abu-Moussa

Abstract:

In this paper, the estimation of stress-strength parameter R = P(Y < X) is considered when X; Y the strength and stress respectively are two independent random variables of Burr Type XII distribution. The samples taken for X and Y are progressively censoring of type II. The maximum likelihood estimator (MLE) of R is obtained when the common parameter is unknown. But when the common parameter is known the MLE, uniformly minimum variance unbiased estimator (UMVUE) and the Bayes estimator of R = P(Y < X) are obtained. The exact con dence interval of R based on MLE is obtained. The performance of the proposed estimators is compared using the computer simulation.

Keywords: Burr Type XII distribution, progressive type-II censoring, stress-strength model, unbiased estimator, maximum-likelihood estimator, uniformly minimum variance unbiased estimator, confidence intervals, Bayes estimator

Procedia PDF Downloads 457
838 Analysis of Causality between Defect Causes Using Association Rule Mining

Authors: Sangdeok Lee, Sangwon Han, Changtaek Hyun

Abstract:

Construction defects are major components that result in negative impacts on project performance including schedule delays and cost overruns. Since construction defects generally occur when a few associated causes combine, a thorough understanding of defect causality is required in order to more systematically prevent construction defects. To address this issue, this paper uses association rule mining (ARM) to quantify the causality between defect causes, and social network analysis (SNA) to find indirect causality among them. The suggested approach is validated with 350 defect instances from concrete works in 32 projects in Korea. The results show that the interrelationships revealed by the approach reflect the characteristics of the concrete task and the important causes that should be prevented.

Keywords: causality, defect causes, social network analysis, association rule mining

Procedia PDF Downloads 367
837 Studies of Rule Induction by STRIM from the Decision Table with Contaminated Attribute Values from Missing Data and Noise — in the Case of Critical Dataset Size —

Authors: Tetsuro Saeki, Yuichi Kato, Shoutarou Mizuno

Abstract:

STRIM (Statistical Test Rule Induction Method) has been proposed as a method to effectively induct if-then rules from the decision table which is considered as a sample set obtained from the population of interest. Its usefulness has been confirmed by simulation experiments specifying rules in advance, and by comparison with conventional methods. However, scope for future development remains before STRIM can be applied to the analysis of real-world data sets. The first requirement is to determine the size of the dataset needed for inducting true rules, since finding statistically significant rules is the core of the method. The second is to examine the capacity of rule induction from datasets with contaminated attribute values created by missing data and noise, since real-world datasets usually contain such contaminated data. This paper examines the first problem theoretically, in connection with the rule length. The second problem is then examined in a simulation experiment, utilizing the critical size of dataset derived from the first step. The experimental results show that STRIM is highly robust in the analysis of datasets with contaminated attribute values, and hence is applicable to realworld data.

Keywords: rule induction, decision table, missing data, noise

Procedia PDF Downloads 396
836 New Segmentation of Piecewise Linear Regression Models Using Reversible Jump MCMC Algorithm

Authors: Suparman

Abstract:

Piecewise linear regression models are very flexible models for modeling the data. If the piecewise linear regression models are matched against the data, then the parameters are generally not known. This paper studies the problem of parameter estimation of piecewise linear regression models. The method used to estimate the parameters of picewise linear regression models is Bayesian method. But the Bayes estimator can not be found analytically. To overcome these problems, the reversible jump MCMC algorithm is proposed. Reversible jump MCMC algorithm generates the Markov chain converges to the limit distribution of the posterior distribution of the parameters of picewise linear regression models. The resulting Markov chain is used to calculate the Bayes estimator for the parameters of picewise linear regression models.

Keywords: regression, piecewise, Bayesian, reversible Jump MCMC

Procedia PDF Downloads 521
835 A Study of Permission-Based Malware Detection Using Machine Learning

Authors: Ratun Rahman, Rafid Islam, Akin Ahmed, Kamrul Hasan, Hasan Mahmud

Abstract:

Malware is becoming more prevalent, and several threat categories have risen dramatically in recent years. This paper provides a bird's-eye view of the world of malware analysis. The efficiency of five different machine learning methods (Naive Bayes, K-Nearest Neighbor, Decision Tree, Random Forest, and TensorFlow Decision Forest) combined with features picked from the retrieval of Android permissions to categorize applications as harmful or benign is investigated in this study. The test set consists of 1,168 samples (among these android applications, 602 are malware and 566 are benign applications), each consisting of 948 features (permissions). Using the permission-based dataset, the machine learning algorithms then produce accuracy rates above 80%, except the Naive Bayes Algorithm with 65% accuracy. Of the considered algorithms TensorFlow Decision Forest performed the best with an accuracy of 90%.

Keywords: android malware detection, machine learning, malware, malware analysis

Procedia PDF Downloads 169
834 Achieving Better Security by Using Nonlinear Cellular Automata as a Cryptographic Primitive

Authors: Swapan Maiti, Dipanwita Roy Chowdhury

Abstract:

Nonlinear functions are essential in different cryptoprimitives as they play an important role on the security of the cipher designs. Rule 30 was identified as a powerful nonlinear function for cryptographic applications. However, an attack (MS attack) was mounted against Rule 30 Cellular Automata (CA). Nonlinear rules as well as maximum period CA increase randomness property. In this work, nonlinear rules of maximum period nonlinear hybrid CA (M-NHCA) are studied and it is shown to be a better crypto-primitive than Rule 30 CA. It has also been analysed that the M-NHCA with single nonlinearity injection proposed in the literature is vulnerable against MS attack, whereas M-NHCA with multiple nonlinearity injections provide maximum length cycle as well as better cryptographic primitives and they are also secure against MS attack.

Keywords: cellular automata, maximum period nonlinear CA, Meier and Staffelbach attack, nonlinear functions

Procedia PDF Downloads 314
833 Impact of Environmental Rule of Law towards Positive Environmental Outcomes in Nigeria

Authors: Kate N. Okeke

Abstract:

The ever-growing needs of man requiring satisfaction have pushed him strongly towards industrialization which has and is still leaving environmental degradation and its attendant negative impacts in its wake. It is, therefore, not surprising that the enjoyment of fundamental rights like food supply, security of lives and property, freedom of worship, health and education have been drastically affected by such degradation. In recognition of the imperative need to protect the environment and human rights, many global instruments and constitutions have recognized the right to a healthy and sustainable environment. Some environmental advocates and quite a number of literatures on the subject matter call for the recognition of environmental rights via rule of law as a vital means of achieving positive outcomes on the subject matter. However, although there are numerous countries with constitutional environmental provisions, most of them such as Nigeria, have shown poor environmental performance. A notable problem is the fact that the constitution which recognizes environmental rights appears in its other provisions to contradict its provisions by making enforceability of the environmental rights unattainable. While adopting a descriptive, analytical, comparative and explanatory study design in reviewing a successful positive environmental outcome via the rule of law, this article argues that rule of law on a balance of scale, weighs more than just environmental rights recognition and therefore should receive more attention by environmental lawyers and advocates. This is because with rule of law, members of a society are sure of getting the most out of the environmental rights existing in their legal system. Members of Niger-Delta communities of Nigeria will benefit from the environmental rights existing in Nigeria. They are exposed to environmental degradation and pollution with effects such as acidic rainfall, pollution of farmlands and clean water sources. These and many more are consequences of oil and gas exploration. It will also pave way for solving the violence between cattle herdsmen and farmers in the Middle Belt and other regions of Nigeria. Their clashes are over natural resource control. Having seen that environmental rule of law is vital to sustainable development, this paper aims to contribute to discussions on how best the vehicle of rule law can be driven towards achieving positive environmental outcomes. This will be in reliance on other enforceable provisions in the Nigerian Constitution. Other domesticated international instruments will also be considered to attain sustainable environment and development.

Keywords: environment, rule of law, constitution, sustainability

Procedia PDF Downloads 156
832 Segmentation of Piecewise Polynomial Regression Model by Using Reversible Jump MCMC Algorithm

Authors: Suparman

Abstract:

Piecewise polynomial regression model is very flexible model for modeling the data. If the piecewise polynomial regression model is matched against the data, its parameters are not generally known. This paper studies the parameter estimation problem of piecewise polynomial regression model. The method which is used to estimate the parameters of the piecewise polynomial regression model is Bayesian method. Unfortunately, the Bayes estimator cannot be found analytically. Reversible jump MCMC algorithm is proposed to solve this problem. Reversible jump MCMC algorithm generates the Markov chain that converges to the limit distribution of the posterior distribution of piecewise polynomial regression model parameter. The resulting Markov chain is used to calculate the Bayes estimator for the parameters of piecewise polynomial regression model.

Keywords: piecewise regression, bayesian, reversible jump MCMC, segmentation

Procedia PDF Downloads 373
831 Arithmetic Operations in Deterministic P Systems Based on the Weak Rule Priority

Authors: Chinedu Peter, Dashrath Singh

Abstract:

Membrane computing is a computability model which abstracts its structures and functions from the biological cell. The main ingredient of membrane computing is the notion of a membrane structure, which consists of several cell-like membranes recurrently placed inside a unique skin membrane. The emergence of several variants of membrane computing gives rise to the notion of a P system. The paper presents a variant of P systems for arithmetic operations on non-negative integers based on the weak priorities for rule application. Consequently, we obtain deterministic P systems. Two membranes suffice. There are at most four objects for multiplication and five objects for division throughout the computation processes. The model is simple and has a potential for possible extension to non-negative integers and real numbers in general.

Keywords: P system, binary operation, determinism, weak rule priority

Procedia PDF Downloads 445
830 Two Steady States and Two Movement Patterns under the Balanced Budget Rule: An Economy with Divisible Labor

Authors: Fujio Takata

Abstract:

When governments levy taxes on labor income on the basis of a balanced budget rule, two steady states in an economy exist, of which one can cause two movement patterns, namely, indeterminacy paths and a saddle path. However, in this paper, we assume an economy with divisible labor, in which labor adjustment is made by an intensive margin. We demonstrate that there indeed exist the two paths in the economy and that there exists a critical condition dividing them. This is proved by establishing the relationship between a finite elasticity of labor with regard to real wages and the share of capital in output. Consequently, we deduce the existence of an upper limit in the share of capital in output for indeterminacy to occur. The largest possible value of that share is less than 0.5698.

Keywords: balanced budget rule, divisible labor, labor income taxation, two movement patterns

Procedia PDF Downloads 163
829 Impact of Early Father Involvement on Middle Childhood Cognitive and Behavioral Outcomes

Authors: Jamel Slaughter

Abstract:

Father involvement across the development of a child has been linked to children’s psychological adjustment, fewer behavioral problems, and higher educational attainment. Conversely, there is much less research that highlights father involvement in relation to childhood development during early childhood period prior to preschool age (ages 1-3 years). Most research on fathers and child outcomes have been limited by its focus on the stages of adolescence, middle childhood, and infancy. This study examined the influence of father involvement, during the toddler stage, on 5th grade cognitive development, rule-breaking, and behavior outcomes measured by Child Behavior Checklist (CBCL) scores. Using data from the Early Head Start Research and Evaluation (EHSRE) Study, 1996-2010: United States, a total of 3,001 children and families were identified in 17 sites (cities), representing a diverse demographic sample. An independent samples t-test was run to compare cognitive development, aggressive, and rule-breaking behavior mean scores among children who had early continuous father involvement for the first 14 – 36 months to children who did not have early continuous father involvement for the first 14 – 36 months. Multiple linear regression was conducted to determine if continuous, or non-continuous father involvement (14 month-36 months), can be used to predict outcome scores on the Child Behavior Checklist in aggressive behavior, rule-breaking behavior, and cognitive development, at 5th grade. A statistically significant mean difference in cognitive development scores were found for children who had continuous father involvement (M=1.92, SD=2.41, t (1009) =2.81, p =.005, 95% CI=.146 to .828) compared to those who did not (M=2.60, SD=3.06, t (1009) =-2.38, p=.017, 95% CI= -1.08 to -.105). There was also a statistically significant mean difference in rule-breaking behavior scores between children who had early continuous father involvement (M=1.95, SD=2.33, t (1009) = 3.69, p <.001, 95% CI= .287 to .940), compared to those that did not (M=2.87, SD=2.93, t (1009) = -3.49, p =.001, 95% CI= -1.30 to -.364). No statistically significant difference was found in aggressive behavior scores. Multiple linear regression was performed using continuous father involvement to determine which has the largest relationship to rule-breaking behavior and cognitive development based on CBCL scores. Rule-breaking behavior was found to be significant (F (2, 1008) = 8.353, p<.001), with an R2 of .016. Cognitive development was also significant (F (2, 1008) = 4.44, p=.012), with an R2 of .009. Early continuous father involvement was a significant predictor of rule-breaking behavior and cognitive development at middle childhood. Findings suggest early continuous father involvement during the first 14 – 36 months of their children’s life, may lead to lower levels of rule-breaking behaviors and thought problems at 5th grade.

Keywords: cognitive development, early continuous father involvement, middle childhood, rule-breaking behavior

Procedia PDF Downloads 302
828 Safety Effect of Smart Right-Turn Design at Intersections

Authors: Upal Barua

Abstract:

The risk of severe crashes at high-speed right-turns at intersections is a major safety concern these days. The application of a smart right-turn at an intersection is increasing day by day to address is an issue. The design, ‘Smart Right-turn’ consists of a narrow-angle of channelization at approximately 70°. This design increases the cone of vision of the right-tuning drivers towards the crossing pedestrians as well as traffic on the cross-road. As part of the Safety Improvement Program in Austin Transportation Department, several smart right-turns were constructed at high crash intersections where high-speed right-turns were found to be a contributing factor. This paper features the state of the art techniques applied in planning, engineering, designing and construction of this smart right-turn, key factors driving the success, and lessons learned in the process. This paper also presents the significant crash reductions achieved from the application of this smart right-turn design using Empirical Bayes method. The result showed that smart right-turns can reduce overall right-turn crashes by 43% and severe right-turn crashes by 70%.

Keywords: smart right-turn, intersection, cone of vision, empirical Bayes method

Procedia PDF Downloads 266
827 Rule Insertion Technique for Dynamic Cell Structure Neural Network

Authors: Osama Elsarrar, Marjorie Darrah, Richard Devin

Abstract:

This paper discusses the idea of capturing an expert’s knowledge in the form of human understandable rules and then inserting these rules into a dynamic cell structure (DCS) neural network. The DCS is a form of self-organizing map that can be used for many purposes, including classification and prediction. This particular neural network is considered to be a topology preserving network that starts with no pre-structure, but assumes a structure once trained. The DCS has been used in mission and safety-critical applications, including adaptive flight control and health-monitoring in aerial vehicles. The approach is to insert expert knowledge into the DCS before training. Rules are translated into a pre-structure and then training data are presented. This idea has been demonstrated using the well-known Iris data set and it has been shown that inserting the pre-structure results in better accuracy with the same training.

Keywords: neural network, self-organizing map, rule extraction, rule insertion

Procedia PDF Downloads 172
826 Privacy Preserving in Association Rule Mining on Horizontally Partitioned Database

Authors: Manvar Sagar, Nikul Virpariya

Abstract:

The advancement in data mining techniques plays an important role in many applications. In context of privacy and security issues, the problems caused by association rule mining technique are investigated by many research scholars. It is proved that the misuse of this technique may reveal the database owner’s sensitive and private information to others. Many researchers have put their effort to preserve privacy in Association Rule Mining. Amongst the two basic approaches for privacy preserving data mining, viz. Randomization based and Cryptography based, the later provides high level of privacy but incurs higher computational as well as communication overhead. Hence, it is necessary to explore alternative techniques that improve the over-heads. In this work, we propose an efficient, collusion-resistant cryptography based approach for distributed Association Rule mining using Shamir’s secret sharing scheme. As we show from theoretical and practical analysis, our approach is provably secure and require only one time a trusted third party. We use secret sharing for privately sharing the information and code based identification scheme to add support against malicious adversaries.

Keywords: Privacy, Privacy Preservation in Data Mining (PPDM), horizontally partitioned database, EMHS, MFI, shamir secret sharing

Procedia PDF Downloads 408
825 Sentiment Analysis of Ensemble-Based Classifiers for E-Mail Data

Authors: Muthukumarasamy Govindarajan

Abstract:

Detection of unwanted, unsolicited mails called spam from email is an interesting area of research. It is necessary to evaluate the performance of any new spam classifier using standard data sets. Recently, ensemble-based classifiers have gained popularity in this domain. In this research work, an efficient email filtering approach based on ensemble methods is addressed for developing an accurate and sensitive spam classifier. The proposed approach employs Naive Bayes (NB), Support Vector Machine (SVM) and Genetic Algorithm (GA) as base classifiers along with different ensemble methods. The experimental results show that the ensemble classifier was performing with accuracy greater than individual classifiers, and also hybrid model results are found to be better than the combined models for the e-mail dataset. The proposed ensemble-based classifiers turn out to be good in terms of classification accuracy, which is considered to be an important criterion for building a robust spam classifier.

Keywords: accuracy, arcing, bagging, genetic algorithm, Naive Bayes, sentiment mining, support vector machine

Procedia PDF Downloads 142
824 Classification Rule Discovery by Using Parallel Ant Colony Optimization

Authors: Waseem Shahzad, Ayesha Tahir Khan, Hamid Hussain Awan

Abstract:

Ant-Miner algorithm that lies under ACO algorithms is used to extract knowledge from data in the form of rules. A variant of Ant-Miner algorithm named as cAnt-MinerPB is used to generate list of rules using pittsburgh approach in order to maintain the rule interaction among the rules that are generated. In this paper, we propose a parallel Ant MinerPB in which Ant colony optimization algorithm runs parallel. In this technique, a data set is divided vertically (i-e attributes) into different subsets. These subsets are created based on the correlation among attributes using Mutual Information (MI). It generates rules in a parallel manner and then merged to form a final list of rules. The results have shown that the proposed technique achieved higher accuracy when compared with original cAnt-MinerPB and also the execution time has also reduced.

Keywords: ant colony optimization, parallel Ant-MinerPB, vertical partitioning, classification rule discovery

Procedia PDF Downloads 295
823 Balancing Rule of Law, Human Rights and Governance

Authors: Torkan Jabbariraad

Abstract:

This study explores the role of private regulation as a mode of governance that engages non-state actors in establishing and implementing rules or standards for public goods or services. It examines the various forms, functions, and effects of private regulation on the rule of law and human rights and considers the role and duties of public authorities in monitoring and supporting private regulation. It contends that private regulation should be regarded as a beneficial supplement to public regulation rather than a substitute or rival and that public authorities should find a balance between acknowledging the independence and variety of private actors and securing their accountability and legitimacy. It also recommends that applying the principles and values of good governance to private regulation can improve its quality and efficiency. The study relies on various sources and viewpoints from the literature on governance theory, public law, and human rights and suggests further research and discussion on the topic of private regulation and its consequences for society.

Keywords: private regulation, public authority, governance theory, rule of law, human rights

Procedia PDF Downloads 41
822 The Fallacy around Inserting Brackets to Evaluate Expressions Involving Multiplication and Division

Authors: Manduth Ramchander

Abstract:

Evaluating expressions involving multiplication and division can give rise to the fallacy that brackets can be arbitrarily inserted into expressions involving multiplication and division. The aim of this article was to draw upon mathematical theory to prove that brackets cannot be arbitrarily inserted into expressions involving multiplication and division and in particular in expressions where division precedes multiplication. In doing so, it demonstrates that the notion that two different answers are possible, when evaluating expressions involving multiplication and division, is indeed a false one. Searches conducted in a number of scholarly databases unearthed the rules to be applied when removing brackets from expressions, which revealed that consideration needs to be given to sign changes when brackets are removed. The rule pertaining to expressions involving multiplication and division was then extended upon, in its reverse format, to prove that brackets cannot be arbitrarily inserted into expressions involving multiplication and division. The application of the rule demonstrates that an expression involving multiplication and division can have only one correct answer. It is recommended that both the rule and its reverse be included in the curriculum, preferably at the juncture when manipulation with brackets is introduced.

Keywords: brackets, multiplications and division, operations, order

Procedia PDF Downloads 160
821 Research on the Effect of the System of General Counsel on the Efficiency of M&As in State-Owned Enterprises

Authors: Mao Ju

Abstract:

The system of general counsel (GC) is an important governance structure designed for the construction of state-owned enterprises (SOEs) under the rule of law. This article is based on the setting of mergers and acquisitions (M&As) and takes the efficiency of M&As to examine the implementation effect of the system of GC for SOEs. Research has found that: (1) companies implementing the system of GC for SOEs have higher efficiency in M&As, manifested in better operational and market performance, and this effect depends on the professional ability and power of the GC. This indicates that the GC of SOEs has played a positive role in the decision-making process of M&As, which helps to improve the efficiency of M&As. (2) The impact of the GC of SOEs on the efficiency of M&As is heterogeneous, and this positive effect is mainly reflected in local and commercial SOEs. (3) The path of this impact is that the GC of SOEs can help reduce ineffective M&As in advance, enhance the ability to integrate M&As after the fact and reduce the risk of goodwill impairment and bankruptcy. This article reveals the impact of the construction of SOEs under the rule of law with the system of GC as the core of M&As activities, providing intuitive evidence for the implementation effect of the GC of SOEs. The research conclusion has important practical guiding value for comprehensively deepening the construction of the rule of SOEs under the rule of law and writing a good chapter on the Chinese path to modernization of SOEs.

Keywords: the system of general counsel, merger and acquisition efficiency, state-owned enterprises, mergers and acquisitions

Procedia PDF Downloads 18