Error Back-propagation in Multi-valued Logic Systems

Size: px
Start display at page:

Download "Error Back-propagation in Multi-valued Logic Systems"

Transcription

1 Error Back-propagation in Multi-valued Logic Systems Georgios Apostolikas Stasinos Konstantopoulos Institute of Informatics and Telecommunications NCSR Demokritos, Ag. Paraskevi , Athens, Greece Abstract Error back-propagation and its many variations has been used extensively to train neural networks. A multi-layer system cannot be trained in a supervised learning scheme because data are usually provided only as end-to-end input-output pairs for the global system. The central idea of error back-propagation is to derive target input-output pairs for each layer in the system from the global input-output data. We propose a new method for error-back propagation in a fuzzy Description Logic reasoning system. This permits us to derive inputoutput data pairs in a two-layer setup for training the lower-layer classifiers. To the best of our knowledge, this is the first error back-propagation method for a logic reasoning system. 1. Introduction Supervised learning is the predominant training methodology in artificial intelligence systems. The main concept of supervised learning is the presence of a teacher who provides the correct action (or output) for a given situation (or input). Therefore, the general target of supervised learning is identifying the function that correctly maps input to output. In multi-layer systems, each layer has intermediate output, which is piped to the next layer as input. In the majority of supervised learning scenarios, these intermediate datasets are not provided, but can be extracted by error-back propagation, i.e., by computing for each intermediate layer the difference between the current and the desired output [7]. An example is multi-layer perceptrons, the most common neural networks found in the literature [4]. Error back-propagation actually computes the derivatives of the system parameters (i.e., the desired change) rather than the actual target output for each layer. In that sense, it can be considered as part of the general framework of Automatic Differentiation Algorithms [2]. There are many variations of back-propagation that have been proposed for decentralized computational models and especially multi-layer perceptrons [8]. Error back-propagation has been extensively used in various statistical supervised learning setups, but has not been explored at all with systems where the modelling formalism is based on symbolic logic. In this paper, we propose a new method for error back-propagation through a fuzzy logic system. These latter systems, and, more particularly, systems based on a family of logics called Description Logics (DLs), have been steadily gaining importance as they are one of the core technologies of the Semantic Web. The proposed method 1

2 Figure 1. The two-layer architecture. is implemented on a two-layer classifier, in the context of an automatic video annotation system for categorizing news broadcasts. The paper is organized as follows: Section 2 describes the application and the video annotation system, making references to related existing work, and then Section 3 describes the proposed methodology and our implementation. Finally, Section 4 comprises some concluding remarks and and outlook on future research. 2. Problem Statement At the core of the video annotation system is a two-layer classifier of TV news broadcasts (Figure 1). The first layer is an array of Support Vector Machines (SVMs) that map lowlevel video features (like colour, texture, position, etc) to high-level video features that represent the recognition of concrete objects in the video (e.g., human figure, football pitch, fire, etc.). The second layer is a conceptual model of the domain, that assigns abstract features (e.g., interview, sports item, and so on) based on the concrete-object recognition features. The inference engine behind this second layer is a Fuzzy DL Reasoner, a multi-valued logic reasoner, described in more detail in Section 3.1 below. The fuzzy reasoner places multimedia document in a category hierarchy based on the high-level video features and the axioms of the conceptual model. These axioms are hand-crafted by domain experts and are fixed (not trained by machine learning) in our setup. Therefore, in the twolayer classifier only the SVM array is trained with machine learning methods Inclusion of Human Knowledge in Computational Models Moving away from the specific video annotation scenario we can generalize the problem to the domains of system modelling and classification. Going back to Figure 1, what we are actually facing is the challenge of learning a highly complex input-output mapping from lowlevel video features (overall system input) to categories (overall system output). The domain has a very high complexity and, thus, is considered intractable to learn the desired mapping from scratch using machine learning methods. The most prominent approach for handling such challenging learning tasks is to incorporate prior human knowledge in the system. 2

3 We do this by employing a two-layer architecture with the second layer integrating human expertise, while the first layer is trainable for improving and fine-tuning the overall system performance. Consequently, we have reduced the learning task down to a manageable complexity, since the strong non-linearities of the mapping have been absorbed by the hand-crafted fuzzy reasoning system. The above approach lies in the more general framework of the methods of injection of human knowledge in computational models. Computational models, such as neural networks or SVMs in our case, have a high learning capacity and, given enough data and time, can approximate any non-linear function in a supervised training setup. However, this universal approximation potential comes at a cost; the model parameters cannot be interpreted by human logic and, vice versa, human experience cannot be directly mapped to the model s parameters. Although local approximators (e.g. centroid-based or basisfunction computational models) can easily include human knowledge (i.e. in the form of fuzzy rules for neuro-fuzzy systems), they lack the generalization capabilities of global approximators such as multi-layer perceptrons. Moreover, local approximators are known to suffer significant performance loss with the increase of input-space and domain complexity. Last but not least, the human knowledge that can be entered in those models is in very basic form (i.e. simple if-then rules in the neuro-fuzzy system), lacking the expression capacity and input-output mapping potential of high-level symbolic systems such as description logics. The DL fuzzy reasoner (actually working on a subset of first-order logic), if seen from the computational theory perspective, can form highly non-linear global approximation functions, can easily cope with complex, compound and sparse mappings, has no problem scaling to multidimensional input and can achieve excellent generalization over the whole input space User Feedback Exploitation and Error Back-Propagation User feedback consists of the correct category of the video, and the user is never burdened with checking lists of recognized objects, their relative positions, or any other internal details of the classification process. This approach makes the system more user-friendly, and the users more likely to actually provide feedback, but, on the other hand, deprives the system of any information about the intermediate output (high-level features) of the two-layer setup. The essential target of our approach is to maintain the supervised-learning capability of the overall system, even after the human knowledge (second layer subsystem) has been incorporated in the classifier. To achieve this, we need to derive a meaningful first layer target output from the user feedback that consists only of the global (second layer) system output. Therefore, we must back-propagate the output error of the fuzzy system to its inputs. This is no trivial task since the input-output function of the fuzzy reasoner cannot be analytically represented and, therefore, the classic approach of automatic differentiation or similar methods cannot be applied to derive the error in the input layer. The developed method is analyzed in the next section. Following the fuzzy semantics, all inputs and outputs (including intermediate ones) are scalars in the range [0, 1]. A value closer to 1 indicates the presence of a feature while a value closer to 0 indicates absence of the feature. The output layer consists of one output per category. The intermediate inputs (high-level video features) and their corresponding fuzzy truth values are used to populate the reasoner knowledge-base. The outputs are computed 3

4 by the fuzzy reasoner as follows: each output is defined as a separate concept in the knowledge base. For each video that is classified, the reasoner computes the video s fuzzy degree of membership in each and every of the output category concepts. These degrees of membership are, effectively, the outputs of the second layer. The concept definitions that populate the knowledge base are provided by human domain experts, and reflect highlevel, conceptual knowledge about the domain. For our purpose, this hand-crafted fuzzy DL model is treated as a fixed mapping from its inputs to outputs. 3. Methodology and Implementation To support the back-propagation method, a new fuzzy DL reasoner has been developed. The fuzzy reasoner satisfies the need for construction of proof trees that contain inputs as free variables. The error back-propagation algorithm then uses those proof trees to calculate admissible values for the input of the fuzzy system, and afterwards compute the actual target values for the input Multi-valued DL Reasoning Logical formalisms like Description Logics are typically interpreted with set-theoretic semantics which define logical connectives and operators in terms of set theory. We shall not here re-iterate these formal foundations, but refer the interested reader to handbooks of Description Logics [1, Chapter 2]. Informally, unary predicates (concepts) are interpreted as sets of individuals, binary predicates (relations) as sets of pairs of individuals, and the logical connectives as set operations; for example, concept disjunction is interpreted as set union, and so on. Multi-valued logics, on the other hand, base their interpretations on fuzzy set-theoretic semantics. In fuzzy set theory [9], set membership does not have a binary yes-no valuation but a numerical one, denoting the degree to which an individual is a member of the set. Fuzzy interpretations are based on algebraic norms that provide multi-valued semantics for the logical connectives. The most common approach to implementing multi-valued reasoners is to combine proof algorithms, like resolution or tableaux, with numerical methods [5, 6]. Existing reasoning algorithms and implementations, however, demand that the degrees of all assertions in the knowledge base are known numerical constants. As mentioned before, this makes them unsuitable for our purpose, as our back-propagation method (see following section) relies on the ability to provide unbound variables as degrees for some assertions, and algebraically calculate these variables values (or rather, admissible value ranges) given the degrees of the rest of the knowledge base. In order to satisfy this requirement, we have developed a new DL reasoner that can handle unbound-variable degrees by calculating results as systems of restrictions over these variables. We shall here only briefly introduce the reasoner, as it is discussed in detail elsewhere [3]. The structural part of the reasoning process implements the resolution proof method, which builds a proof tree by re-writing logical formulae based on the assertions (rules and facts) in the knowledge base into logically equivalent, but more elementary formulae; each time a disjunction is encountered, the tree branches. As the proof tree gets built, the degree of each node gets calculated using the algebraic norm. Occasionally, assertions with unbound fuzziness degrees (as opposed to bound 4

5 numerical values) will be encountered. The admissible values for these variables get restricted within the range that would yield the required valuation for the overall expression, which builds up to a system of linear constraints that is solved using a constraint linear programming implementation. At the end of this process, one can collect at the leaves of the open branches a system of inequations. This system specifies the admissible values for the unbound degrees, so that the original formula at the root of the tree is satisfiable Error back-propagation through a multi-valued DL reasoner Error back-propagation is traditionally based on the computation of the partial derivatives that correspond to the desired direction and magnitude of the displacement for each system parameter. A simple algorithm is afterwards used to actually change the value of the parameter towards the specified direction. This change is usually a small fraction of the full change needed for the parameter in order to drive the output to the given supervised value. Many small changes will eventually lead the system parameters towards values that model the physical system from which supervised training data were drawn. That s the central idea for statistical learning. The error-back propagation method proposed does not depend on the computation of derivatives for the direction of change of system parameters. Instead it directly calculates the desired changes in the input layer (high-level features) in order to correctly map the given input-output training pair. Note that in this subsection, since we are only interested in the fuzzy reasoner, we will denote the fuzzy reasoner input (high-level features) as simply input and its output as output. The problem can be stated as: Given the current state of the system (current system parameters) and a new inputoutput training pair that is incorrectly mapped by the current system, find the input that: 1. When fed to the current system yields acceptable output (this will be defined later). 2. Is as close as possible to the input of the training pair with respect to some distance measure. In the context of the algorithm s intended application, the hybrid classifier-reasoner system is expected to classify inputs in a number of predefined categories. For the categories the instance belongs to, the reasoner output should be a fuzzy value above a certain threshold. Accordingly, for the same input, the outputs for the rest of the categories should be below another selected threshold. It is clear that since we deal with a fuzzy system, an exact match of the system output with the training pair output is neither required nor desired. In our platform, which represents the most common scenario, the training data output is a truth value that indicates membership in the specific category. Therefore, we define the acceptable output of point 1 above, as a value that satisfies either the lower accepted threshold for category membership or the higher accepted threshold for non-membership. For point 2 above, we use the Euclidean distance. The implementation of the reasoning algorithm analyzed in the previous paragraph permits the extraction of the unbound proof tree for each category and high-level feature. For the purpose of propagating the error back through the fuzzy reasoner, we, therefore, build a separate proof tree for each pair of category and high level feature. Note that the proof tree is generally different for each training data pair since, in each case, different high-level features (non-zero inputs) will populate the reasoner knowledge- 5

6 base. The proof tree is unbound in the sense that it includes one input parameter as a variable that can be entered in the tree to calculate the truth value for the output. The output can be derived by the unbound proof tree by binding the specific variable in the tree, i.e. by providing a numerical value for the input variable. It is clear that on a per category basis, system incorrect mapping could mean that the category has a high truth value (above some threshold) although the instance is not member of the category and vice versa. Therefore, for each category the method sets correspondingly an upper or lower value threshold. The goal is to find the fuzzy reasoner input (high-level feature) values that produces an output that satisfies the threshold and has the maximum proximity to the real high-level features (as the computed output of the first layer). The method for input error assignment works directly on the derived unbound proof tree. The method poses the requirement set by the defined threshold and computes constraints on the input variables for satisfying this requirement. Each leaf node in the proof tree corresponds to a conjunction of concepts that either have to be true (positive literal) or false (negative literal) for the concept this video is a member of this category to be true. Of course, intermediate values in the range of [0,1] are permitted and the fuzzy inference follows the Lukasziewicz t-norm. By taking all the leaf nodes of a proof tree, a disjunction of conjunctions is formed. This corresponds to the fuzzy truth value of a single category. Following the chosen fuzzy inference rule, the requirement set by the selected threshold is satisfied when: 1. If the threshold is a lower limit: The Lukasziewicz conjunction of all the disjunctive terms has an equal or higher value compared to the threshold. 2. If the threshold is an upper limit: The Lukasziewicz conjunction of all the disjunctive terms has an equal or lower value compared to the threshold. Applying the logic in 1 or 2, a set of correspondingly disjunctive or conjunctive constraints are derived. These constraints are in the form of inequalities that the input variable must satisfy. The above described procedure is repeated for all the categories needed. However, note that only few categories contribute to this global constraint set since only the categories that are incorrectly activated or incorrectly deactivated, produce constraints. To form the global constraint expression for one variable we take the conjunction of all the constraints derived from the above categories since these constraints must be satisfied simultaneously. This constitutes the method for calculating the constraints for one input variable. The above procedure is repeated for all input variables, but it should be noted that not all inputs contribute overall constraints since some proofs might not involve the unbound variable instance. The goal is now to find the input vector that yields an acceptable output and at the same time has the smallest Euclidean distance from the original input. This is achieved by employing an iterative method. An initial acceptable input vector is found using a coarse search in the input space. Afterwards, the algorithm iterates through the elements in the input vector searching for alternate input vectors with higher proximity to the original input. The procedure terminates when no more optimization is possible. 4. Conclusions and Future Work In this work we have proposed a novel method for error back-propagation in a fuzzy Description Logic system. The method can calculate the input that is most approximate 6

7 to the real input of the fuzzy reasoner and, when fed to the fuzzy system, produces the correct output. We consider this minimum perturbation logic to define the actual target input for the fuzzy reasoner. The derived target input is then used as supervised training data for adaptive learning of the first-level classifiers. The method developed essentially permits the inclusion of human knowledge in any computational model, by simply adding the fuzzy reasoning subsystem above the computational model and forming a two-layer setup. The human expertise can be entered with much more expressive terms compared to the classic approaches of, for example, addition of if-then rules. This increased expressiveness, when seen from the computational theory perspective, means the capacity for construction of highly-complex global approximation functions. At its current state of development, the system does not take into account the possibility that the logic model of the second layer can be wrong, as this is taken to represent current expertise over the domain. However, this assumption can be relaxed and in further research we are planning to investigate a method for blame assignment between the two layers. In the new approach, we plan to provide corrective feedback to the logic subsystem as well, when appropriate. Such feedback can then be either forwarded to the domain expert for further refinement of the model, or used by a Machine Learning algorithm that will construct a new model. 5. Acknowledgments The work described here was supported by DELTIO, 1 a project funded by the Greek General Secretariat of Research & Technology. DELTIO researches using evolving ontologies to analyse multimedia content, with an application to news broadcasts. References [1] Franz Baader, Diego Calvanese, Deborah McGuinness, Daniele Nardi, and Peter Patel-Schneider, editors. The Description Logic Handbook: Theory, Implementation and Applications. Cambridge University Press, [2] G. F. Corliss. Automatic Differentiation of Algorithms: From Simulation to Optimization. Springer, [3] Stasinos Konstantopoulos and Georgios Apostolikas. Fuzzy-dl reasoning over unknown fuzzy degrees. In Proc. International IFIP Workshop of Semantic Web and Web Semantics (IFIP-SWWS 07), Algarve, Nov. 2007, [4] James L. McClelland and David E. Rumelhart. Parallel Distributed Processing: Explorations in the Microstructure of Cognition. The MIT Press, Cambridge, Massachusetts, [5] Giorgos Stoilos, G. Stamou, V. Tzouvaras, J. Z. Pan, and Ian Horrocks. The fuzzy description logic f-shin. In Proc. of the International Workshop on Uncertainty Reasoning For the Semantic Web, [6] Umberto Straccia. Reasoning within fuzzy Description Logics. Journal of Artificial Intelligence Research, 14: , [7] Paul John Werbos. The Roots of Backpropagation: From Ordered Derivatives to Neural Networks and Political Forecasting. Wiley, New York, [8] X. Yu, M. O. Efee, and O. Kaynak. A general back-propagation algorithm for feed-forward neural networks learning. IEEE Trans. Neural Networks, 13(1): , [9] Lotfi A. Zadeh. Fuzzy sets. Information and Control, 8(3):338 53, See also 7

Fuzzy-DL Reasoning over Unknown Fuzzy Degrees

Fuzzy-DL Reasoning over Unknown Fuzzy Degrees Fuzzy-DL Reasoning over Unknown Fuzzy Degrees Stasinos Konstantopoulos and Georgios Apostolikas Institute of Informatics and Telecommunications NCSR Demokritos Ag. Paraskevi 153 10, Athens, Greece {konstant,apostolikas}@iit.demokritos.gr

More information

Knowledge Based Descriptive Neural Networks

Knowledge Based Descriptive Neural Networks Knowledge Based Descriptive Neural Networks J. T. Yao Department of Computer Science, University or Regina Regina, Saskachewan, CANADA S4S 0A2 Email: jtyao@cs.uregina.ca Abstract This paper presents a

More information

Predictive Dynamix Inc

Predictive Dynamix Inc Predictive Modeling Technology Predictive modeling is concerned with analyzing patterns and trends in historical and operational data in order to transform data into actionable decisions. This is accomplished

More information

Chapter 12 Discovering New Knowledge Data Mining

Chapter 12 Discovering New Knowledge Data Mining Chapter 12 Discovering New Knowledge Data Mining Becerra-Fernandez, et al. -- Knowledge Management 1/e -- 2004 Prentice Hall Additional material 2007 Dekai Wu Chapter Objectives Introduce the student to

More information

NEURAL NETWORKS IN DATA MINING

NEURAL NETWORKS IN DATA MINING NEURAL NETWORKS IN DATA MINING 1 DR. YASHPAL SINGH, 2 ALOK SINGH CHAUHAN 1 Reader, Bundelkhand Institute of Engineering & Technology, Jhansi, India 2 Lecturer, United Institute of Management, Allahabad,

More information

Neural Networks and Support Vector Machines

Neural Networks and Support Vector Machines INF5390 - Kunstig intelligens Neural Networks and Support Vector Machines Roar Fjellheim INF5390-13 Neural Networks and SVM 1 Outline Neural networks Perceptrons Neural networks Support vector machines

More information

3 An Illustrative Example

3 An Illustrative Example Objectives An Illustrative Example Objectives - Theory and Examples -2 Problem Statement -2 Perceptron - Two-Input Case -4 Pattern Recognition Example -5 Hamming Network -8 Feedforward Layer -8 Recurrent

More information

SELECTING NEURAL NETWORK ARCHITECTURE FOR INVESTMENT PROFITABILITY PREDICTIONS

SELECTING NEURAL NETWORK ARCHITECTURE FOR INVESTMENT PROFITABILITY PREDICTIONS UDC: 004.8 Original scientific paper SELECTING NEURAL NETWORK ARCHITECTURE FOR INVESTMENT PROFITABILITY PREDICTIONS Tonimir Kišasondi, Alen Lovren i University of Zagreb, Faculty of Organization and Informatics,

More information

How To Use Neural Networks In Data Mining

How To Use Neural Networks In Data Mining International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and

More information

Introduction to Machine Learning and Data Mining. Prof. Dr. Igor Trajkovski trajkovski@nyus.edu.mk

Introduction to Machine Learning and Data Mining. Prof. Dr. Igor Trajkovski trajkovski@nyus.edu.mk Introduction to Machine Learning and Data Mining Prof. Dr. Igor Trakovski trakovski@nyus.edu.mk Neural Networks 2 Neural Networks Analogy to biological neural systems, the most robust learning systems

More information

Machine Learning: Overview

Machine Learning: Overview Machine Learning: Overview Why Learning? Learning is a core of property of being intelligent. Hence Machine learning is a core subarea of Artificial Intelligence. There is a need for programs to behave

More information

EFFICIENT DATA PRE-PROCESSING FOR DATA MINING

EFFICIENT DATA PRE-PROCESSING FOR DATA MINING EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College

More information

A Semantic Model for Multimodal Data Mining in Healthcare Information Systems

A Semantic Model for Multimodal Data Mining in Healthcare Information Systems A Semantic Model for Multimodal Data Mining in Healthcare Information Systems Dimitris IAKOVIDIS 1 and Christos SMAILIS Department of Informatics and Computer Technology, Technological Educational Institute

More information

Implementation of hybrid software architecture for Artificial Intelligence System

Implementation of hybrid software architecture for Artificial Intelligence System IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.1, January 2007 35 Implementation of hybrid software architecture for Artificial Intelligence System B.Vinayagasundaram and

More information

Artificial Neural Networks and Support Vector Machines. CS 486/686: Introduction to Artificial Intelligence

Artificial Neural Networks and Support Vector Machines. CS 486/686: Introduction to Artificial Intelligence Artificial Neural Networks and Support Vector Machines CS 486/686: Introduction to Artificial Intelligence 1 Outline What is a Neural Network? - Perceptron learners - Multi-layer networks What is a Support

More information

University of Ostrava. Reasoning in Description Logic with Semantic Tableau Binary Trees

University of Ostrava. Reasoning in Description Logic with Semantic Tableau Binary Trees University of Ostrava Institute for Research and Applications of Fuzzy Modeling Reasoning in Description Logic with Semantic Tableau Binary Trees Alena Lukasová Research report No. 63 2005 Submitted/to

More information

Recurrent Neural Networks

Recurrent Neural Networks Recurrent Neural Networks Neural Computation : Lecture 12 John A. Bullinaria, 2015 1. Recurrent Neural Network Architectures 2. State Space Models and Dynamical Systems 3. Backpropagation Through Time

More information

Artificial Neural Networks are bio-inspired mechanisms for intelligent decision support. Artificial Neural Networks. Research Article 2014

Artificial Neural Networks are bio-inspired mechanisms for intelligent decision support. Artificial Neural Networks. Research Article 2014 An Experiment to Signify Fuzzy Logic as an Effective User Interface Tool for Artificial Neural Network Nisha Macwan *, Priti Srinivas Sajja G.H. Patel Department of Computer Science India Abstract Artificial

More information

Data quality in Accounting Information Systems

Data quality in Accounting Information Systems Data quality in Accounting Information Systems Comparing Several Data Mining Techniques Erjon Zoto Department of Statistics and Applied Informatics Faculty of Economy, University of Tirana Tirana, Albania

More information

An Overview of Knowledge Discovery Database and Data mining Techniques

An Overview of Knowledge Discovery Database and Data mining Techniques An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,

More information

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT

More information

Pedestrian Detection with RCNN

Pedestrian Detection with RCNN Pedestrian Detection with RCNN Matthew Chen Department of Computer Science Stanford University mcc17@stanford.edu Abstract In this paper we evaluate the effectiveness of using a Region-based Convolutional

More information

Monotonicity Hints. Abstract

Monotonicity Hints. Abstract Monotonicity Hints Joseph Sill Computation and Neural Systems program California Institute of Technology email: joe@cs.caltech.edu Yaser S. Abu-Mostafa EE and CS Deptartments California Institute of Technology

More information

SURVIVABILITY ANALYSIS OF PEDIATRIC LEUKAEMIC PATIENTS USING NEURAL NETWORK APPROACH

SURVIVABILITY ANALYSIS OF PEDIATRIC LEUKAEMIC PATIENTS USING NEURAL NETWORK APPROACH 330 SURVIVABILITY ANALYSIS OF PEDIATRIC LEUKAEMIC PATIENTS USING NEURAL NETWORK APPROACH T. M. D.Saumya 1, T. Rupasinghe 2 and P. Abeysinghe 3 1 Department of Industrial Management, University of Kelaniya,

More information

A Time Series ANN Approach for Weather Forecasting

A Time Series ANN Approach for Weather Forecasting A Time Series ANN Approach for Weather Forecasting Neeraj Kumar 1, Govind Kumar Jha 2 1 Associate Professor and Head Deptt. Of Computer Science,Nalanda College Of Engineering Chandi(Bihar) 2 Assistant

More information

Some Research Challenges for Big Data Analytics of Intelligent Security

Some Research Challenges for Big Data Analytics of Intelligent Security Some Research Challenges for Big Data Analytics of Intelligent Security Yuh-Jong Hu hu at cs.nccu.edu.tw Emerging Network Technology (ENT) Lab. Department of Computer Science National Chengchi University,

More information

Comparison of K-means and Backpropagation Data Mining Algorithms

Comparison of K-means and Backpropagation Data Mining Algorithms Comparison of K-means and Backpropagation Data Mining Algorithms Nitu Mathuriya, Dr. Ashish Bansal Abstract Data mining has got more and more mature as a field of basic research in computer science and

More information

The Data Mining Process

The Data Mining Process Sequence for Determining Necessary Data. Wrong: Catalog everything you have, and decide what data is important. Right: Work backward from the solution, define the problem explicitly, and map out the data

More information

Data Quality Mining: Employing Classifiers for Assuring consistent Datasets

Data Quality Mining: Employing Classifiers for Assuring consistent Datasets Data Quality Mining: Employing Classifiers for Assuring consistent Datasets Fabian Grüning Carl von Ossietzky Universität Oldenburg, Germany, fabian.gruening@informatik.uni-oldenburg.de Abstract: Independent

More information

Formal Verification Coverage: Computing the Coverage Gap between Temporal Specifications

Formal Verification Coverage: Computing the Coverage Gap between Temporal Specifications Formal Verification Coverage: Computing the Coverage Gap between Temporal Specifications Sayantan Das Prasenjit Basu Ansuman Banerjee Pallab Dasgupta P.P. Chakrabarti Department of Computer Science & Engineering

More information

6.2.8 Neural networks for data mining

6.2.8 Neural networks for data mining 6.2.8 Neural networks for data mining Walter Kosters 1 In many application areas neural networks are known to be valuable tools. This also holds for data mining. In this chapter we discuss the use of neural

More information

Follow links Class Use and other Permissions. For more information, send email to: permissions@pupress.princeton.edu

Follow links Class Use and other Permissions. For more information, send email to: permissions@pupress.princeton.edu COPYRIGHT NOTICE: David A. Kendrick, P. Ruben Mercado, and Hans M. Amman: Computational Economics is published by Princeton University Press and copyrighted, 2006, by Princeton University Press. All rights

More information

TRAINING A LIMITED-INTERCONNECT, SYNTHETIC NEURAL IC

TRAINING A LIMITED-INTERCONNECT, SYNTHETIC NEURAL IC 777 TRAINING A LIMITED-INTERCONNECT, SYNTHETIC NEURAL IC M.R. Walker. S. Haghighi. A. Afghan. and L.A. Akers Center for Solid State Electronics Research Arizona State University Tempe. AZ 85287-6206 mwalker@enuxha.eas.asu.edu

More information

DATA MINING TECHNIQUES AND APPLICATIONS

DATA MINING TECHNIQUES AND APPLICATIONS DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,

More information

Mining the Software Change Repository of a Legacy Telephony System

Mining the Software Change Repository of a Legacy Telephony System Mining the Software Change Repository of a Legacy Telephony System Jelber Sayyad Shirabad, Timothy C. Lethbridge, Stan Matwin School of Information Technology and Engineering University of Ottawa, Ottawa,

More information

Role of Neural network in data mining

Role of Neural network in data mining Role of Neural network in data mining Chitranjanjit kaur Associate Prof Guru Nanak College, Sukhchainana Phagwara,(GNDU) Punjab, India Pooja kapoor Associate Prof Swami Sarvanand Group Of Institutes Dinanagar(PTU)

More information

Performance Based Evaluation of New Software Testing Using Artificial Neural Network

Performance Based Evaluation of New Software Testing Using Artificial Neural Network Performance Based Evaluation of New Software Testing Using Artificial Neural Network Jogi John 1, Mangesh Wanjari 2 1 Priyadarshini College of Engineering, Nagpur, Maharashtra, India 2 Shri Ramdeobaba

More information

Feed-Forward mapping networks KAIST 바이오및뇌공학과 정재승

Feed-Forward mapping networks KAIST 바이오및뇌공학과 정재승 Feed-Forward mapping networks KAIST 바이오및뇌공학과 정재승 How much energy do we need for brain functions? Information processing: Trade-off between energy consumption and wiring cost Trade-off between energy consumption

More information

A Non-Linear Schema Theorem for Genetic Algorithms

A Non-Linear Schema Theorem for Genetic Algorithms A Non-Linear Schema Theorem for Genetic Algorithms William A Greene Computer Science Department University of New Orleans New Orleans, LA 70148 bill@csunoedu 504-280-6755 Abstract We generalize Holland

More information

ANALYTICS IN BIG DATA ERA

ANALYTICS IN BIG DATA ERA ANALYTICS IN BIG DATA ERA ANALYTICS TECHNOLOGY AND ARCHITECTURE TO MANAGE VELOCITY AND VARIETY, DISCOVER RELATIONSHIPS AND CLASSIFY HUGE AMOUNT OF DATA MAURIZIO SALUSTI SAS Copyr i g ht 2012, SAS Ins titut

More information

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

Novelty Detection in image recognition using IRF Neural Networks properties

Novelty Detection in image recognition using IRF Neural Networks properties Novelty Detection in image recognition using IRF Neural Networks properties Philippe Smagghe, Jean-Luc Buessler, Jean-Philippe Urban Université de Haute-Alsace MIPS 4, rue des Frères Lumière, 68093 Mulhouse,

More information

Problems often have a certain amount of uncertainty, possibly due to: Incompleteness of information about the environment,

Problems often have a certain amount of uncertainty, possibly due to: Incompleteness of information about the environment, Uncertainty Problems often have a certain amount of uncertainty, possibly due to: Incompleteness of information about the environment, E.g., loss of sensory information such as vision Incorrectness in

More information

Chapter Managing Knowledge in the Digital Firm

Chapter Managing Knowledge in the Digital Firm Chapter Managing Knowledge in the Digital Firm Essay Questions: 1. What is knowledge management? Briefly outline the knowledge management chain. 2. Identify the three major types of knowledge management

More information

American International Journal of Research in Science, Technology, Engineering & Mathematics

American International Journal of Research in Science, Technology, Engineering & Mathematics American International Journal of Research in Science, Technology, Engineering & Mathematics Available online at http://www.iasir.net ISSN (Print): 2328-349, ISSN (Online): 2328-3580, ISSN (CD-ROM): 2328-3629

More information

Comparison of machine learning methods for intelligent tutoring systems

Comparison of machine learning methods for intelligent tutoring systems Comparison of machine learning methods for intelligent tutoring systems Wilhelmiina Hämäläinen 1 and Mikko Vinni 1 Department of Computer Science, University of Joensuu, P.O. Box 111, FI-80101 Joensuu

More information

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING AZRUDDIN AHMAD, GOBITHASAN RUDRUSAMY, RAHMAT BUDIARTO, AZMAN SAMSUDIN, SURESRAWAN RAMADASS. Network Research Group School of

More information

Neural network software tool development: exploring programming language options

Neural network software tool development: exploring programming language options INEB- PSI Technical Report 2006-1 Neural network software tool development: exploring programming language options Alexandra Oliveira aao@fe.up.pt Supervisor: Professor Joaquim Marques de Sá June 2006

More information

Completing Description Logic Knowledge Bases using Formal Concept Analysis

Completing Description Logic Knowledge Bases using Formal Concept Analysis Completing Description Logic Knowledge Bases using Formal Concept Analysis Franz Baader, 1 Bernhard Ganter, 1 Barış Sertkaya, 1 and Ulrike Sattler 2 1 TU Dresden, Germany and 2 The University of Manchester,

More information

TRAINING A 3-NODE NEURAL NETWORK IS NP-COMPLETE

TRAINING A 3-NODE NEURAL NETWORK IS NP-COMPLETE 494 TRAINING A 3-NODE NEURAL NETWORK IS NP-COMPLETE Avrim Blum'" MIT Lab. for Computer Science Cambridge, Mass. 02139 USA Ronald L. Rivest t MIT Lab. for Computer Science Cambridge, Mass. 02139 USA ABSTRACT

More information

SUCCESSFUL PREDICTION OF HORSE RACING RESULTS USING A NEURAL NETWORK

SUCCESSFUL PREDICTION OF HORSE RACING RESULTS USING A NEURAL NETWORK SUCCESSFUL PREDICTION OF HORSE RACING RESULTS USING A NEURAL NETWORK N M Allinson and D Merritt 1 Introduction This contribution has two main sections. The first discusses some aspects of multilayer perceptrons,

More information

Distributed forests for MapReduce-based machine learning

Distributed forests for MapReduce-based machine learning Distributed forests for MapReduce-based machine learning Ryoji Wakayama, Ryuei Murata, Akisato Kimura, Takayoshi Yamashita, Yuji Yamauchi, Hironobu Fujiyoshi Chubu University, Japan. NTT Communication

More information

Neural Networks for Machine Learning. Lecture 13a The ups and downs of backpropagation

Neural Networks for Machine Learning. Lecture 13a The ups and downs of backpropagation Neural Networks for Machine Learning Lecture 13a The ups and downs of backpropagation Geoffrey Hinton Nitish Srivastava, Kevin Swersky Tijmen Tieleman Abdel-rahman Mohamed A brief history of backpropagation

More information

Data Mining Algorithms Part 1. Dejan Sarka

Data Mining Algorithms Part 1. Dejan Sarka Data Mining Algorithms Part 1 Dejan Sarka Join the conversation on Twitter: @DevWeek #DW2015 Instructor Bio Dejan Sarka (dsarka@solidq.com) 30 years of experience SQL Server MVP, MCT, 13 books 7+ courses

More information

Building a Question Classifier for a TREC-Style Question Answering System

Building a Question Classifier for a TREC-Style Question Answering System Building a Question Classifier for a TREC-Style Question Answering System Richard May & Ari Steinberg Topic: Question Classification We define Question Classification (QC) here to be the task that, given

More information

Neural Network Predictor for Fraud Detection: A Study Case for the Federal Patrimony Department

Neural Network Predictor for Fraud Detection: A Study Case for the Federal Patrimony Department DOI: 10.5769/C2012010 or http://dx.doi.org/10.5769/c2012010 Neural Network Predictor for Fraud Detection: A Study Case for the Federal Patrimony Department Antonio Manuel Rubio Serrano (1,2), João Paulo

More information

Numerical Analysis Lecture Notes

Numerical Analysis Lecture Notes Numerical Analysis Lecture Notes Peter J. Olver 5. Inner Products and Norms The norm of a vector is a measure of its size. Besides the familiar Euclidean norm based on the dot product, there are a number

More information

1. Classification problems

1. Classification problems Neural and Evolutionary Computing. Lab 1: Classification problems Machine Learning test data repository Weka data mining platform Introduction Scilab 1. Classification problems The main aim of a classification

More information

Social Media Mining. Data Mining Essentials

Social Media Mining. Data Mining Essentials Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers

More information

Forecasting Stock Prices using a Weightless Neural Network. Nontokozo Mpofu

Forecasting Stock Prices using a Weightless Neural Network. Nontokozo Mpofu Forecasting Stock Prices using a Weightless Neural Network Nontokozo Mpofu Abstract In this research work, we propose forecasting stock prices in the stock market industry in Zimbabwe using a Weightless

More information

AUTOMATION OF ENERGY DEMAND FORECASTING. Sanzad Siddique, B.S.

AUTOMATION OF ENERGY DEMAND FORECASTING. Sanzad Siddique, B.S. AUTOMATION OF ENERGY DEMAND FORECASTING by Sanzad Siddique, B.S. A Thesis submitted to the Faculty of the Graduate School, Marquette University, in Partial Fulfillment of the Requirements for the Degree

More information

Intrusion Detection via Machine Learning for SCADA System Protection

Intrusion Detection via Machine Learning for SCADA System Protection Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. s.l.yasakethu@surrey.ac.uk J. Jiang Department

More information

GOAL-BASED INTELLIGENT AGENTS

GOAL-BASED INTELLIGENT AGENTS International Journal of Information Technology, Vol. 9 No. 1 GOAL-BASED INTELLIGENT AGENTS Zhiqi Shen, Robert Gay and Xuehong Tao ICIS, School of EEE, Nanyang Technological University, Singapore 639798

More information

SPECIAL PERTURBATIONS UNCORRELATED TRACK PROCESSING

SPECIAL PERTURBATIONS UNCORRELATED TRACK PROCESSING AAS 07-228 SPECIAL PERTURBATIONS UNCORRELATED TRACK PROCESSING INTRODUCTION James G. Miller * Two historical uncorrelated track (UCT) processing approaches have been employed using general perturbations

More information

CI6227: Data Mining. Lesson 11b: Ensemble Learning. Data Analytics Department, Institute for Infocomm Research, A*STAR, Singapore.

CI6227: Data Mining. Lesson 11b: Ensemble Learning. Data Analytics Department, Institute for Infocomm Research, A*STAR, Singapore. CI6227: Data Mining Lesson 11b: Ensemble Learning Sinno Jialin PAN Data Analytics Department, Institute for Infocomm Research, A*STAR, Singapore Acknowledgements: slides are adapted from the lecture notes

More information

From Workflow Design Patterns to Logical Specifications

From Workflow Design Patterns to Logical Specifications AUTOMATYKA/ AUTOMATICS 2013 Vol. 17 No. 1 http://dx.doi.org/10.7494/automat.2013.17.1.59 Rados³aw Klimek* From Workflow Design Patterns to Logical Specifications 1. Introduction Formal methods in software

More information

Properties of Stabilizing Computations

Properties of Stabilizing Computations Theory and Applications of Mathematics & Computer Science 5 (1) (2015) 71 93 Properties of Stabilizing Computations Mark Burgin a a University of California, Los Angeles 405 Hilgard Ave. Los Angeles, CA

More information

Event driven trading new studies on innovative way. of trading in Forex market. Michał Osmoła INIME live 23 February 2016

Event driven trading new studies on innovative way. of trading in Forex market. Michał Osmoła INIME live 23 February 2016 Event driven trading new studies on innovative way of trading in Forex market Michał Osmoła INIME live 23 February 2016 Forex market From Wikipedia: The foreign exchange market (Forex, FX, or currency

More information

A Meta-model of Business Interaction for Assisting Intelligent Workflow Systems

A Meta-model of Business Interaction for Assisting Intelligent Workflow Systems A Meta-model of Business Interaction for Assisting Intelligent Workflow Systems Areti Manataki and Yun-Heh Chen-Burger Centre for Intelligent Systems and their Applications, School of Informatics, The

More information

Comparison of Supervised and Unsupervised Learning Classifiers for Travel Recommendations

Comparison of Supervised and Unsupervised Learning Classifiers for Travel Recommendations Volume 3, No. 8, August 2012 Journal of Global Research in Computer Science REVIEW ARTICLE Available Online at www.jgrcs.info Comparison of Supervised and Unsupervised Learning Classifiers for Travel Recommendations

More information

Classifying Manipulation Primitives from Visual Data

Classifying Manipulation Primitives from Visual Data Classifying Manipulation Primitives from Visual Data Sandy Huang and Dylan Hadfield-Menell Abstract One approach to learning from demonstrations in robotics is to make use of a classifier to predict if

More information

Neural Network Design in Cloud Computing

Neural Network Design in Cloud Computing International Journal of Computer Trends and Technology- volume4issue2-2013 ABSTRACT: Neural Network Design in Cloud Computing B.Rajkumar #1,T.Gopikiran #2,S.Satyanarayana *3 #1,#2Department of Computer

More information

Random Forest Based Imbalanced Data Cleaning and Classification

Random Forest Based Imbalanced Data Cleaning and Classification Random Forest Based Imbalanced Data Cleaning and Classification Jie Gu Software School of Tsinghua University, China Abstract. The given task of PAKDD 2007 data mining competition is a typical problem

More information

The Scientific Data Mining Process

The Scientific Data Mining Process Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In

More information

Impelling Heart Attack Prediction System using Data Mining and Artificial Neural Network

Impelling Heart Attack Prediction System using Data Mining and Artificial Neural Network General Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Impelling

More information

npsolver A SAT Based Solver for Optimization Problems

npsolver A SAT Based Solver for Optimization Problems npsolver A SAT Based Solver for Optimization Problems Norbert Manthey and Peter Steinke Knowledge Representation and Reasoning Group Technische Universität Dresden, 01062 Dresden, Germany peter@janeway.inf.tu-dresden.de

More information

Journal of Industrial Engineering Research. Adaptive sequence of Key Pose Detection for Human Action Recognition

Journal of Industrial Engineering Research. Adaptive sequence of Key Pose Detection for Human Action Recognition IWNEST PUBLISHER Journal of Industrial Engineering Research (ISSN: 2077-4559) Journal home page: http://www.iwnest.com/aace/ Adaptive sequence of Key Pose Detection for Human Action Recognition 1 T. Sindhu

More information

degrees of freedom and are able to adapt to the task they are supposed to do [Gupta].

degrees of freedom and are able to adapt to the task they are supposed to do [Gupta]. 1.3 Neural Networks 19 Neural Networks are large structured systems of equations. These systems have many degrees of freedom and are able to adapt to the task they are supposed to do [Gupta]. Two very

More information

CHAPTER 3. Methods of Proofs. 1. Logical Arguments and Formal Proofs

CHAPTER 3. Methods of Proofs. 1. Logical Arguments and Formal Proofs CHAPTER 3 Methods of Proofs 1. Logical Arguments and Formal Proofs 1.1. Basic Terminology. An axiom is a statement that is given to be true. A rule of inference is a logical rule that is used to deduce

More information

Stock Portfolio Selection using Data Mining Approach

Stock Portfolio Selection using Data Mining Approach IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 11 (November. 2013), V1 PP 42-48 Stock Portfolio Selection using Data Mining Approach Carol Anne Hargreaves, Prateek

More information

Slow Intelligence System Framework to Network Management Problems for Attaining Feasible Solution

Slow Intelligence System Framework to Network Management Problems for Attaining Feasible Solution Slow Intelligence System Framework to Network Management Problems for Attaining Feasible Solution T.S.Baskaran 1 and R.Sivakumar 2 1 Department of Computer Science, A.V.V.M. Sri Pushpam College, Poondi,

More information

3. Mathematical Induction

3. Mathematical Induction 3. MATHEMATICAL INDUCTION 83 3. Mathematical Induction 3.1. First Principle of Mathematical Induction. Let P (n) be a predicate with domain of discourse (over) the natural numbers N = {0, 1,,...}. If (1)

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015 RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering

More information

Use of Artificial Neural Network in Data Mining For Weather Forecasting

Use of Artificial Neural Network in Data Mining For Weather Forecasting Use of Artificial Neural Network in Data Mining For Weather Forecasting Gaurav J. Sawale #, Dr. Sunil R. Gupta * # Department Computer Science & Engineering, P.R.M.I.T& R, Badnera. 1 gaurav.sawale@yahoo.co.in

More information

Data Mining Part 5. Prediction

Data Mining Part 5. Prediction Data Mining Part 5. Prediction 5.1 Spring 2010 Instructor: Dr. Masoud Yaghini Outline Classification vs. Numeric Prediction Prediction Process Data Preparation Comparing Prediction Methods References Classification

More information

SINGULAR SPECTRUM ANALYSIS HYBRID FORECASTING METHODS WITH APPLICATION TO AIR TRANSPORT DEMAND

SINGULAR SPECTRUM ANALYSIS HYBRID FORECASTING METHODS WITH APPLICATION TO AIR TRANSPORT DEMAND SINGULAR SPECTRUM ANALYSIS HYBRID FORECASTING METHODS WITH APPLICATION TO AIR TRANSPORT DEMAND K. Adjenughwure, Delft University of Technology, Transport Institute, Ph.D. candidate V. Balopoulos, Democritus

More information

Three Methods for ediscovery Document Prioritization:

Three Methods for ediscovery Document Prioritization: Three Methods for ediscovery Document Prioritization: Comparing and Contrasting Keyword Search with Concept Based and Support Vector Based "Technology Assisted Review-Predictive Coding" Platforms Tom Groom,

More information

InvGen: An Efficient Invariant Generator

InvGen: An Efficient Invariant Generator InvGen: An Efficient Invariant Generator Ashutosh Gupta and Andrey Rybalchenko Max Planck Institute for Software Systems (MPI-SWS) Abstract. In this paper we present InvGen, an automatic linear arithmetic

More information

Design call center management system of e-commerce based on BP neural network and multifractal

Design call center management system of e-commerce based on BP neural network and multifractal Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(6):951-956 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Design call center management system of e-commerce

More information

Improving Decision Making and Managing Knowledge

Improving Decision Making and Managing Knowledge Improving Decision Making and Managing Knowledge Decision Making and Information Systems Information Requirements of Key Decision-Making Groups in a Firm Senior managers, middle managers, operational managers,

More information

EHR CURATION FOR MEDICAL MINING

EHR CURATION FOR MEDICAL MINING EHR CURATION FOR MEDICAL MINING Ernestina Menasalvas Medical Mining Tutorial@KDD 2015 Sydney, AUSTRALIA 2 Ernestina Menasalvas "EHR Curation for Medical Mining" 08/2015 Agenda Motivation the potential

More information

CONFIOUS * : Managing the Electronic Submission and Reviewing Process of Scientific Conferences

CONFIOUS * : Managing the Electronic Submission and Reviewing Process of Scientific Conferences CONFIOUS * : Managing the Electronic Submission and Reviewing Process of Scientific Conferences Manos Papagelis 1, 2, Dimitris Plexousakis 1, 2 and Panagiotis N. Nikolaou 2 1 Institute of Computer Science,

More information

Neuro-Fuzzy Methods. Robert Fullér Eötvös Loránd University, Budapest. VACATION SCHOOL Neuro-Fuzzy Methods for Modelling & Fault Diagnosis

Neuro-Fuzzy Methods. Robert Fullér Eötvös Loránd University, Budapest. VACATION SCHOOL Neuro-Fuzzy Methods for Modelling & Fault Diagnosis Neuro-Fuzzy Methods Robert Fullér Eötvös Loránd University, Budapest VACATION SCHOOL Neuro-Fuzzy Methods for Modelling & Fault Diagnosis Lisbon, August 31 and September 1, 2001 1 Fuzzy logic and neural

More information

Cassandra. References:

Cassandra. References: Cassandra References: Becker, Moritz; Sewell, Peter. Cassandra: Flexible Trust Management, Applied to Electronic Health Records. 2004. Li, Ninghui; Mitchell, John. Datalog with Constraints: A Foundation

More information

Self Organizing Maps for Visualization of Categories

Self Organizing Maps for Visualization of Categories Self Organizing Maps for Visualization of Categories Julian Szymański 1 and Włodzisław Duch 2,3 1 Department of Computer Systems Architecture, Gdańsk University of Technology, Poland, julian.szymanski@eti.pg.gda.pl

More information

Probabilistic Relational Learning of Human Behavior Models

Probabilistic Relational Learning of Human Behavior Models Probabilistic Relational Learning of Human Behavior Models Negin Nejati and Tolga Könik Computational Learning Laboratory CSLI, Stanford University Stanford, California 94305 {negin, konik}@stanford.edu

More information

Prediction of DDoS Attack Scheme

Prediction of DDoS Attack Scheme Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and

More information

Neural Networks and Back Propagation Algorithm

Neural Networks and Back Propagation Algorithm Neural Networks and Back Propagation Algorithm Mirza Cilimkovic Institute of Technology Blanchardstown Blanchardstown Road North Dublin 15 Ireland mirzac@gmail.com Abstract Neural Networks (NN) are important

More information

AN APPLICATION OF TIME SERIES ANALYSIS FOR WEATHER FORECASTING

AN APPLICATION OF TIME SERIES ANALYSIS FOR WEATHER FORECASTING AN APPLICATION OF TIME SERIES ANALYSIS FOR WEATHER FORECASTING Abhishek Agrawal*, Vikas Kumar** 1,Ashish Pandey** 2,Imran Khan** 3 *(M. Tech Scholar, Department of Computer Science, Bhagwant University,

More information