首页 > 最新文献

Data Analytics and Artificial Intelligence最新文献

英文 中文
Shilling Attack Detection in User Based Recommendation System 基于用户推荐系统中的先令攻击检测
Pub Date : 2023-02-01 DOI: 10.46632/daai/3/2/17
S. Poornima, M. Geethanjali
The majority of the existing unsupervised methods for detecting shilling attacks are based on user rating patterns, ignoring the differences in rating behavior between legitimate users and attack users. These methods have low accuracy in detecting different shilling attacks without having any prior knowledge of the attack types. We provide a novel unsupervised shilling assault detection technique based on an examination of user rating behavior in order to overcome these constraints. By first examining the deviation of rating tendencies on each item, we are able to determine the target item(s) and the accompanying goals of the attack users. Based on the results of this study, a group of suspicious users is then created. Second, we examine the users' rating behaviors in terms of their rating and interest preferences. Finally, using measurements of user rating behavior, we determine the suspicious degree and identify attack users within the collection of suspicious users. The Movie Lens 1M dataset, the sampled Amazon review dataset, and the Netflix dataset all show how good the suggested detection model.
现有的大多数检测先令攻击的无监督方法都是基于用户评级模式,忽略了合法用户和攻击用户之间评级行为的差异。这些方法在没有任何攻击类型的先验知识的情况下,检测不同的先令攻击的准确性较低。为了克服这些限制,我们提供了一种基于用户评级行为检查的新型无监督先令攻击检测技术。通过首先检查每个项目的评级倾向偏差,我们能够确定目标项目和攻击用户的伴随目标。根据这项研究的结果,一组可疑的用户被创建。其次,我们从用户的评分和兴趣偏好两方面考察了用户的评分行为。最后,通过对用户评价行为的度量,确定可疑程度,并在可疑用户集合中识别攻击用户。Movie Lens 1M数据集、亚马逊评论样本数据集和Netflix数据集都显示了建议的检测模型有多好。
{"title":"Shilling Attack Detection in User Based Recommendation System","authors":"S. Poornima, M. Geethanjali","doi":"10.46632/daai/3/2/17","DOIUrl":"https://doi.org/10.46632/daai/3/2/17","url":null,"abstract":"The majority of the existing unsupervised methods for detecting shilling attacks are based on user rating patterns, ignoring the differences in rating behavior between legitimate users and attack users. These methods have low accuracy in detecting different shilling attacks without having any prior knowledge of the attack types. We provide a novel unsupervised shilling assault detection technique based on an examination of user rating behavior in order to overcome these constraints. By first examining the deviation of rating tendencies on each item, we are able to determine the target item(s) and the accompanying goals of the attack users. Based on the results of this study, a group of suspicious users is then created. Second, we examine the users' rating behaviors in terms of their rating and interest preferences. Finally, using measurements of user rating behavior, we determine the suspicious degree and identify attack users within the collection of suspicious users. The Movie Lens 1M dataset, the sampled Amazon review dataset, and the Netflix dataset all show how good the suggested detection model.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124092279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review on Intrusion Detection System and its Techniques 入侵检测系统及其技术综述
Pub Date : 2023-02-01 DOI: 10.46632/daai/3/2/24
A. Kalaivani, R. Pugazendi
Technology development has brought so many threats and hazards at a very high rate in the recent years. The development of application, software tools and its usage in all the fields has brought the awareness about the security. Many mechanisms are used as the security tool such as firewalls, antivirus, spam filters and anti-malware for the security purposes to protect their system and network. Intrusion detection system is a very powerful security system to detect any abnormal or unauthorised access to the system and to the network. This paper is about the study of the importance of intrusion detection, classification of intrusion detection system (IDS), its datasets and usage in various applications. The intrusion detection system has got many developments through its datasets, new technologies and methods but as the technologies increases, the threats of attacking the system and data breaches also increases, so in order to overcome this problem a hybrid framework for the intrusion detection has to be developed to detect the intrusions from the intruder.
近年来,技术的发展以非常高的速度带来了许多威胁和危害。应用程序、软件工具的发展及其在各个领域的应用,带来了人们对安全的认识。许多机制被用作安全工具,如防火墙、防病毒、垃圾邮件过滤器和反恶意软件,以达到保护系统和网络的安全目的。入侵检测系统是一种非常强大的安全系统,可以检测任何对系统和网络的异常或未经授权的访问。本文主要研究了入侵检测的重要性、入侵检测系统的分类、入侵检测系统的数据集及其在各种应用中的应用。入侵检测系统通过其数据集、新技术和新方法得到了许多发展,但随着技术的发展,攻击系统和数据泄露的威胁也在增加,因此为了克服这一问题,必须开发一种混合入侵检测框架来检测入侵者的入侵。
{"title":"A Review on Intrusion Detection System and its Techniques","authors":"A. Kalaivani, R. Pugazendi","doi":"10.46632/daai/3/2/24","DOIUrl":"https://doi.org/10.46632/daai/3/2/24","url":null,"abstract":"Technology development has brought so many threats and hazards at a very high rate in the recent years. The development of application, software tools and its usage in all the fields has brought the awareness about the security. Many mechanisms are used as the security tool such as firewalls, antivirus, spam filters and anti-malware for the security purposes to protect their system and network. Intrusion detection system is a very powerful security system to detect any abnormal or unauthorised access to the system and to the network. This paper is about the study of the importance of intrusion detection, classification of intrusion detection system (IDS), its datasets and usage in various applications. The intrusion detection system has got many developments through its datasets, new technologies and methods but as the technologies increases, the threats of attacking the system and data breaches also increases, so in order to overcome this problem a hybrid framework for the intrusion detection has to be developed to detect the intrusions from the intruder.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130363443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Defect Prediction Using Machine Learning Techniques 使用机器学习技术进行软件缺陷预测
Pub Date : 2023-01-01 DOI: 10.46632/daai/3/2/7
G. Cauvery, D. DhinaSuresh
Software defect prediction provides development groups with observable outcomes while contributing to industrial results and development faults predicting defective code areas can help developers identify bugs and organize their test activities. The percentage of classification providing the proper prediction is essential for early identification. Moreover, software- defected data sets are supported and at least partially recognized due to their enormous dimension.
软件缺陷预测为开发团队提供了可观察的结果,同时对工业结果和开发错误做出贡献,预测有缺陷的代码区域可以帮助开发人员识别错误并组织他们的测试活动。提供正确预测的分类百分比对于早期识别至关重要。此外,由于其巨大的维度,软件缺陷数据集得到支持,并且至少部分被识别。
{"title":"Software Defect Prediction Using Machine Learning Techniques","authors":"G. Cauvery, D. DhinaSuresh","doi":"10.46632/daai/3/2/7","DOIUrl":"https://doi.org/10.46632/daai/3/2/7","url":null,"abstract":"Software defect prediction provides development groups with observable outcomes while contributing to industrial results and development faults predicting defective code areas can help developers identify bugs and organize their test activities. The percentage of classification providing the proper prediction is essential for early identification. Moreover, software- defected data sets are supported and at least partially recognized due to their enormous dimension.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125861494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Emotion Analysis for Online Learning Based on Students' Feedback via Social Networks 基于学生社交网络反馈的在线学习情绪分析研究
Pub Date : 2023-01-01 DOI: 10.46632/daai/3/2/2
Educational Data mining (EDM) in e-Learning systems is a rapidly growing phenomenon. It’s used to improve education by monitoring student performance and trying to understand the students’ learning. Past two decades the teachers collecting the feedback from their students through a written words. This method is very time consuming. Now a dayse-Learning system familiar for the virtual class room environment and learners free to learn at their own pace and to define personal learning path based on their individual needs and interests. This system provides the learning support through explanation, examples, interactive and feedback. The data of feedback is an essential part of effective learning. It helps students understood the subject being studied and gives us idea to give how to improve their learning. The data of feedback can be collected in different ways, such as chart window, SMS, e-Mail, Voice mail and Social Media like twitter, whatsapp. This kind of data should be collected from student in the mode of audio, video and text through social media. This data should be realised the positive and negative or emotion of the students. This paper presents a survey on the analyse of the students feedback by using sentiment analysis methodologies.
电子学习系统中的教育数据挖掘(EDM)是一个迅速发展的现象。它被用来通过监控学生的表现和试图了解学生的学习来改善教育。在过去的二十年里,教师通过书面文字收集学生的反馈。这种方法非常耗时。现在是一个熟悉的虚拟教室环境的日制学习系统,学习者可以按照自己的节奏自由学习,并根据自己的个人需求和兴趣定义个人学习路径。该系统通过讲解、举例、互动和反馈等方式提供学习支持。反馈数据是有效学习的重要组成部分。它帮助学生理解正在学习的科目,并给我们提供如何提高他们学习的想法。反馈的数据可以通过不同的方式收集,如图表窗口,短信,电子邮件,语音邮件和社交媒体,如twitter, whatsapp。这种数据应该通过社交媒体以音频、视频和文字的方式从学生身上收集。这些数据应该意识到学生的积极和消极情绪。本文对运用情感分析方法分析学生反馈进行了调查。
{"title":"A Study on Emotion Analysis for Online Learning Based on Students' Feedback via Social Networks","authors":"","doi":"10.46632/daai/3/2/2","DOIUrl":"https://doi.org/10.46632/daai/3/2/2","url":null,"abstract":"Educational Data mining (EDM) in e-Learning systems is a rapidly growing phenomenon. It’s used to improve education by monitoring student performance and trying to understand the students’ learning. Past two decades the teachers collecting the feedback from their students through a written words. This method is very time consuming. Now a dayse-Learning system familiar for the virtual class room environment and learners free to learn at their own pace and to define personal learning path based on their individual needs and interests. This system provides the learning support through explanation, examples, interactive and feedback. The data of feedback is an essential part of effective learning. It helps students understood the subject being studied and gives us idea to give how to improve their learning. The data of feedback can be collected in different ways, such as chart window, SMS, e-Mail, Voice mail and Social Media like twitter, whatsapp. This kind of data should be collected from student in the mode of audio, video and text through social media. This data should be realised the positive and negative or emotion of the students. This paper presents a survey on the analyse of the students feedback by using sentiment analysis methodologies.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125346061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Method for Identification and Classification of Indian Vegetables Using Random Forest Algorithm 一种基于随机森林算法的印度蔬菜识别分类新方法
Pub Date : 2023-01-01 DOI: 10.46632/daai/3/2/1
Arun K Talawar, N. K. Honnagoudar, Prabhu Y Avaradi
It is only the farmer who faithfully plants seeds in the spring, who reaps a harvest in the autumn. The goal of this study is to create a useful classification method using the Random Forest (RF) algorithm. Different crops, namely brinjal, carrot, and onion, were examined, and many features have been derived dependent on the design, color, and texture. A preparation stage is described that uses image analysis to enhance the vegetables images dataset in order to minimize their color index. The features of the vegetable images are then retrieved. Finally, Random Forests (RF), a newly generated pattern recognition method, used in the vegetable’s classification process. The proposed method achieved higher accuracy in terms of identification and classification of the vegetables
只有在春天忠实地播种的农民,才会在秋天收获丰收。本研究的目的是使用随机森林(RF)算法创建一个有用的分类方法。对不同的作物,即茄子、胡萝卜和洋葱进行了研究,得出了许多依赖于设计、颜色和质地的特征。描述了一个准备阶段,使用图像分析来增强蔬菜图像数据集,以最小化其颜色指数。然后提取蔬菜图像的特征。最后,将随机森林(Random Forests, RF)这一新兴的模式识别方法应用到蔬菜的分类过程中。该方法在蔬菜的识别和分类方面取得了较高的准确性
{"title":"A Novel Method for Identification and Classification of Indian Vegetables Using Random Forest Algorithm","authors":"Arun K Talawar, N. K. Honnagoudar, Prabhu Y Avaradi","doi":"10.46632/daai/3/2/1","DOIUrl":"https://doi.org/10.46632/daai/3/2/1","url":null,"abstract":"It is only the farmer who faithfully plants seeds in the spring, who reaps a harvest in the autumn. The goal of this study is to create a useful classification method using the Random Forest (RF) algorithm. Different crops, namely brinjal, carrot, and onion, were examined, and many features have been derived dependent on the design, color, and texture. A preparation stage is described that uses image analysis to enhance the vegetables images dataset in order to minimize their color index. The features of the vegetable images are then retrieved. Finally, Random Forests (RF), a newly generated pattern recognition method, used in the vegetable’s classification process. The proposed method achieved higher accuracy in terms of identification and classification of the vegetables","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124015710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Quick Review of Data Security, Privacy in Cloud Computing 云计算中的数据安全、隐私快速回顾
Pub Date : 2023-01-01 DOI: 10.46632/daai/3/2/8
J. Sathya
Data security has been the major issue in information technology. People from all over the world put all kinds of information like public, private and confidential information in the cloud. Also data in the cloud are from various storage devices like servers, PC, mobile devices, smart phones and wireless sensor networks. So data security becomes a serious issue in the cloud environment. Protecting the data from unauthorized access is tedious. There are a lot of issues related to data security and privacy in cloud computing technology. This paper focuses on understanding the security and privacy issues in the cloud environment and comprehending compliance management in cloud computing
数据安全一直是信息技术的主要问题。世界各地的人们把各种各样的信息,如公共信息、私人信息和机密信息放在云上。此外,云中的数据来自各种存储设备,如服务器、个人电脑、移动设备、智能手机和无线传感器网络。因此,数据安全成为云环境中的一个严重问题。保护数据不受未经授权的访问是件乏味的事。在云计算技术中存在着许多与数据安全和隐私相关的问题。本文的重点是理解云环境中的安全和隐私问题,理解云计算中的合规性管理
{"title":"A Quick Review of Data Security, Privacy in Cloud Computing","authors":"J. Sathya","doi":"10.46632/daai/3/2/8","DOIUrl":"https://doi.org/10.46632/daai/3/2/8","url":null,"abstract":"Data security has been the major issue in information technology. People from all over the world put all kinds of information like public, private and confidential information in the cloud. Also data in the cloud are from various storage devices like servers, PC, mobile devices, smart phones and wireless sensor networks. So data security becomes a serious issue in the cloud environment. Protecting the data from unauthorized access is tedious. There are a lot of issues related to data security and privacy in cloud computing technology. This paper focuses on understanding the security and privacy issues in the cloud environment and comprehending compliance management in cloud computing","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127334324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study On Decentralized Web Hosting Using Peer-To-Peer Architecture 基于点对点架构的去中心化Web托管研究
Pub Date : 2023-01-01 DOI: 10.46632/daai/3/2/6
D. Santhi Jeslet, M. Shanmugam
Traditionally, websites are hosted viacentralized network, where the web servers distribute the website files to the clients. However a server failure can prevent the web applications from being used until the server goes live again. Due to the fact that websites rely entirely on the integrity of a single organization, it enables larger companies or government to decide what content is shown, this put into question the freedom that the internet originally brought. The block chain hosting service, also known as decentralized web hosting, is not controlled by a single organization or a third party organization. The architecture relies on peer-to-peer communication rather than client-to-server communication. Due to the decentralized nature of this system, all clients do not rely on a single server for their data, but instead data is sent directly between the clients across the network. It is possible to achieve this with the help of IPFS and Block chain. IPFS is a protocol for distributed file storage that allows computers to store and serve files in a peer-to-peer network by distributing them across computers and with the block chain technology, it is possible to ensure both authenticity as well as confidentiality.
传统上,网站是通过集中式网络托管的,网络服务器将网站文件分发给客户端。但是,服务器故障会导致web应用程序无法使用,直到服务器恢复正常。由于网站完全依赖于单一组织的完整性,它使大公司或政府能够决定显示什么内容,这使互联网最初带来的自由受到质疑。区块链托管服务,也被称为去中心化网络托管,不受单一组织或第三方组织的控制。该体系结构依赖于点对点通信,而不是客户机到服务器通信。由于该系统的分散性,所有客户端都不依赖于单个服务器来获取数据,而是通过网络直接在客户端之间发送数据。在IPFS和区块链的帮助下,这是可能实现的。IPFS是一种用于分布式文件存储的协议,它允许计算机通过跨计算机分发文件在点对点网络中存储和服务文件,并且使用区块链技术,可以确保真实性和机密性。
{"title":"A Study On Decentralized Web Hosting Using Peer-To-Peer Architecture","authors":"D. Santhi Jeslet, M. Shanmugam","doi":"10.46632/daai/3/2/6","DOIUrl":"https://doi.org/10.46632/daai/3/2/6","url":null,"abstract":"Traditionally, websites are hosted viacentralized network, where the web servers distribute the website files to the clients. However a server failure can prevent the web applications from being used until the server goes live again. Due to the fact that websites rely entirely on the integrity of a single organization, it enables larger companies or government to decide what content is shown, this put into question the freedom that the internet originally brought. The block chain hosting service, also known as decentralized web hosting, is not controlled by a single organization or a third party organization. The architecture relies on peer-to-peer communication rather than client-to-server communication. Due to the decentralized nature of this system, all clients do not rely on a single server for their data, but instead data is sent directly between the clients across the network. It is possible to achieve this with the help of IPFS and Block chain. IPFS is a protocol for distributed file storage that allows computers to store and serve files in a peer-to-peer network by distributing them across computers and with the block chain technology, it is possible to ensure both authenticity as well as confidentiality.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122299268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Empirical study on designing a security framework for legacy system evolution towards SOA 为遗留系统向SOA演进设计安全框架的实证研究
Pub Date : 2023-01-01 DOI: 10.46632/daai/3/2/3
T. Lavanya
{"title":"An Empirical study on designing a security framework for legacy system evolution towards SOA","authors":"T. Lavanya","doi":"10.46632/daai/3/2/3","DOIUrl":"https://doi.org/10.46632/daai/3/2/3","url":null,"abstract":"","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128290284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Certain Investigation on Perpetualistic Fuzzy Outlier Data for Efficiency Evaluation of Centroid Stability with Cluster Boundary Fitness 具有聚类边界适应度的质心稳定性有效评价的永续模糊离群值研究
Pub Date : 2023-01-01 DOI: 10.46632/daai/3/2/4
S. Rajalakshmi, P. Madhubala
This paper aims to investigate certain factors that hide outliers in two dimensions such as boundary partitioning and space angular parameters. In this proposed algorithm, boundary representation of clusters, the data points that lie on the cluster boundary is stored geometrically as coordinate values such as i_bound (inliers) and o_bound(outliers). Outliers that present in dataset are investigated by boundary fitness over centroid stability. In this paper we focus to examine whether the data point lie on the boundary is treated as inliers or outliers. Several iterations are manipulated to fix the outlier point deeply. Using fuzzy clustering, data points are clustered and boundary is fixed. If the space occupied by the cluster varies for every iteration, the distance from inlier to outlier between the boundaries is calculated. After calculation, if the data point is below the threshold value, it is treated as outlier. Our proposed method shows efficiency over evaluation metrics of outlier detection performance.
本文旨在研究边界划分和空间角参数等在二维空间中隐藏离群点的因素。在本文提出的聚类边界表示算法中,位于聚类边界上的数据点以几何形式存储为i_bound (inliers)和o_bound(outliers)等坐标值。数据集中存在的异常值通过质心稳定性上的边界适应度来研究。在本文中,我们重点研究位于边界上的数据点是否被视为内线或离群点。通过多次迭代对离群点进行深度修正。利用模糊聚类,对数据点进行聚类,边界固定。如果集群占用的空间在每次迭代中都发生变化,则计算边界之间从内点到离群点的距离。计算后,如果数据点低于阈值,则视为离群值。我们提出的方法比异常点检测性能的评估指标更有效。
{"title":"Certain Investigation on Perpetualistic Fuzzy Outlier Data for Efficiency Evaluation of Centroid Stability with Cluster Boundary Fitness","authors":"S. Rajalakshmi, P. Madhubala","doi":"10.46632/daai/3/2/4","DOIUrl":"https://doi.org/10.46632/daai/3/2/4","url":null,"abstract":"This paper aims to investigate certain factors that hide outliers in two dimensions such as boundary partitioning and space angular parameters. In this proposed algorithm, boundary representation of clusters, the data points that lie on the cluster boundary is stored geometrically as coordinate values such as i_bound (inliers) and o_bound(outliers). Outliers that present in dataset are investigated by boundary fitness over centroid stability. In this paper we focus to examine whether the data point lie on the boundary is treated as inliers or outliers. Several iterations are manipulated to fix the outlier point deeply. Using fuzzy clustering, data points are clustered and boundary is fixed. If the space occupied by the cluster varies for every iteration, the distance from inlier to outlier between the boundaries is calculated. After calculation, if the data point is below the threshold value, it is treated as outlier. Our proposed method shows efficiency over evaluation metrics of outlier detection performance.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134196776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance of Artificial Neural Network and Modified Gravitational Search Algorithm Models to Predict Vibration Response of Geocell Reinforced Based Weak Sand 人工神经网络和改进重力搜索算法模型在土工格室加筋弱砂振动响应预测中的性能
Pub Date : 2023-01-01 DOI: 10.46632/daai/2/3/38
The use of a fast evolving artificial intelligence technology (AIT) to forecast the vibration response of maritime soil based on geocells is explored in this research. The vibration response is represented by an indicator called peak particle velocity (PPV). For the purpose of predicting PPV, the artificial intelligence techniques Artificial Neural Network(ANN) and Modified Gravitational Search Algorithm (MGSA) are employed. To create the dataset for the model, a number of field vibration tests were first performed over the geocell-reinforced beds. PPV variation was investigated by varying the test variables—footing embedment, dynamic load, infill material modulus, width, and depth of geocell mattress placement—during the test performed. The various statistical indicators were determined in order to evaluate the prediction performance of a constructed model. Plate load results on geocell-reinforced foundation beds have been used to validate the proposed hybrid ANN-MGSA model. High accuracy and consistency were found when the findings of the ANN-EHO, JSA, MOA, and RNN method were compared, particularly at predicted and actual resolution levels. A parametric sensitivity has also been examined in order to better understand the behaviour of geocell-reinforced structures
本研究探讨了基于土工单元的快速发展的人工智能技术(AIT)在海洋土壤振动响应预测中的应用。振动响应由一个称为峰值粒子速度(PPV)的指标表示。为了预测PPV,采用了人工智能技术人工神经网络(ANN)和修正引力搜索算法(MGSA)。为了创建模型的数据集,首先在土工格室加固层上进行了一系列现场振动测试。在测试过程中,通过改变测试变量——基础嵌入、动载荷、填充材料模量、土工格室垫层放置的宽度和深度——来研究PPV的变化。确定各种统计指标,以评价所构建模型的预测性能。土工格室加筋基础床上的板荷载结果验证了所提出的ANN-MGSA混合模型。当比较ANN-EHO、JSA、MOA和RNN方法的结果时,发现具有较高的准确性和一致性,特别是在预测和实际分辨率水平上。为了更好地理解土工格室增强结构的行为,还研究了参数敏感性
{"title":"Performance of Artificial Neural Network and Modified Gravitational Search Algorithm Models to Predict Vibration Response of Geocell Reinforced Based Weak Sand","authors":"","doi":"10.46632/daai/2/3/38","DOIUrl":"https://doi.org/10.46632/daai/2/3/38","url":null,"abstract":"The use of a fast evolving artificial intelligence technology (AIT) to forecast the vibration response of maritime soil based on geocells is explored in this research. The vibration response is represented by an indicator called peak particle velocity (PPV). For the purpose of predicting PPV, the artificial intelligence techniques Artificial Neural Network\u0000(ANN) and Modified Gravitational Search Algorithm (MGSA) are employed. To create the dataset for the model, a number of field vibration tests were first performed over the geocell-reinforced beds. PPV variation was investigated by varying the test variables—footing embedment, dynamic load, infill material modulus, width, and depth of geocell mattress placement—during the test performed. The various statistical indicators were determined in order to evaluate the prediction performance of a constructed model. Plate load results on geocell-reinforced foundation beds have been used to validate the proposed hybrid ANN-MGSA model. High accuracy and consistency were found when the findings of the ANN-EHO, JSA, MOA, and RNN method were compared, particularly at predicted and actual resolution levels. A parametric sensitivity has also been examined in order to better understand the behaviour of geocell-reinforced structures","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121663244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Data Analytics and Artificial Intelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1