Comparative Study of Feature Reduction Techniques in Software Change Prediction

Author(s):  
Ruchika Malhotra ◽  
Ritvik Kapoor ◽  
Deepti Aggarwal ◽  
Priya Garg
2018 ◽  
Vol 7 (1) ◽  
pp. 79
Author(s):  
R. Sujatha ◽  
E.P. Ephzibah ◽  
Sree Dharinya ◽  
G. Uma Maheswari ◽  
V. Mareeswari ◽  
...  

Machine learning is the worldwide recent research technique for various systems as they are intelligent enough to find the solution for classification and prediction problems. The proposed work is about a hybrid genetic fuzzy algorithm that performs an optimal search as well as classification upon uncertain data. The data which is uncertain is suitable for fuzzy classifiers to predict the disease. The hybrid genetic fuzzy system applied on the attributes selects relevant attributes. The selected attributes are fed into the fuzzy classifier. The fuzzy rules are again generated using genetic algorithms. This algorithm is applied on three of the important and bench marking data sets taken from the UCI machine learning repository. The heart disease, Wisconsin breast cancer and Pima Indian diabetes datasets produce classification accuracy as 89.65%, 99.5% and 88.93% respectively. In this article there is a comparative study on few of the feature selection and feature reduction techniques.


2021 ◽  
Vol 35 (1) ◽  
pp. 11-21
Author(s):  
Himani Tyagi ◽  
Rajendra Kumar

IoT is characterized by communication between things (devices) that constantly share data, analyze, and make decisions while connected to the internet. This interconnected architecture is attracting cyber criminals to expose the IoT system to failure. Therefore, it becomes imperative to develop a system that can accurately and automatically detect anomalies and attacks occurring in IoT networks. Therefore, in this paper, an Intrsuion Detection System (IDS) based on extracted novel feature set synthesizing BoT-IoT dataset is developed that can swiftly, accurately and automatically differentiate benign and malicious traffic. Instead of using available feature reduction techniques like PCA that can change the core meaning of variables, a unique feature set consisting of only seven lightweight features is developed that is also IoT specific and attack traffic independent. Also, the results shown in the study demonstrates the effectiveness of fabricated seven features in detecting four wide variety of attacks namely DDoS, DoS, Reconnaissance, and Information Theft. Furthermore, this study also proves the applicability and efficiency of supervised machine learning algorithms (KNN, LR, SVM, MLP, DT, RF) in IoT security. The performance of the proposed system is validated using performance Metrics like accuracy, precision, recall, F-Score and ROC. Though the accuracy of Decision Tree (99.9%) and Randon Forest (99.9%) Classifiers are same but other metrics like training and testing time shows Random Forest comparatively better.


Author(s):  
José E. Schutt-Aine ◽  
Patrick Goh ◽  
Yidnekachew Mekonnen ◽  
Jilin Tan ◽  
Feras Al-Hawari ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document