scholarly journals A Modified XG Boost Classifier Model for Detection of Seizures and Non-Seizures

2022 ◽  
Vol 19 ◽  
pp. 14-21
Author(s):  
T. H. Raveendra Kumar ◽  
C. K. Narayanappa ◽  
S. Raghavendra ◽  
G. R. Poornima

Diagnosis of Epilepsy is immensely important but challenging process, especially while using traditional manual seizure detection methods with the help of neurologists or brain experts’ guidance which are time consuming. Thus, an automated classification method is require to quickly detect seizures and non-seizures. Therefore, a machine learning algorithm based on a modified XGboost classifier model is employed to detect seizures quickly and improve classification accuracy. A focal loss function is employed with traditional XGboost classifier model to minimize mismatch of training and testing samples and enhance efficiency of the classification model. Here, CHB-MIT SCALP Electroencephalography (EEG) dataset is utilized to test the proposed classification model. Here, data gathered for all 24 patients from CHB-MIT Database is used to analyze the performance of proposed classification model. Here, 2-class-seizure experimental results of proposed classification model are compared against several state-of-art-seizure classification models. Here, cross validation experiments determine nature of 2-class-seizure as the prediction is seizure or non-seizure. The metrics results for average sensitivity and average specificity are nearly 100%. The proposed model achieves improvement in terms of average sensitivity against the best traditional method as 0.05% and for average specificity as 1%. The proposed modified XGBoost classifier model outperforms all the state-of-art-seizure detection techniques in terms of average sensitivity, average specificity.

2018 ◽  
Vol 7 (2.4) ◽  
pp. 10
Author(s):  
V Mala ◽  
K Meena

Traditional signature based approach fails in detecting advanced malwares like stuxnet, flame, duqu etc. Signature based comparison and correlation are not up to the mark in detecting such attacks. Hence, there is crucial to detect these kinds of attacks as early as possible. In this research, a novel data mining based approach were applied to detect such attacks. The main innovation lies on Misuse signature detection systems based on supervised learning algorithm. In learning phase, labeled examples of network packets systems calls are (gave) provided, on or after which algorithm can learn about the attack which is fast and reliable to known. In order to detect advanced attacks, unsupervised learning methodologies were employed to detect the presence of zero day/ new attacks. The main objective is to review, different intruder detection methods. To study the role of Data Mining techniques used in intruder detection system. Hybrid –classification model is utilized to detect advanced attacks.


2020 ◽  
Vol 54 (3) ◽  
pp. 383-405
Author(s):  
Balachandra Kumaraswamy ◽  
Poonacha P G

PurposeIn general, Indian Classical Music (ICM) is classified into two: Carnatic and Hindustani. Even though, both the music formats have a similar foundation, the way of presentation is varied in many manners. The fundamental components of ICM are raga and taala. Taala basically represents the rhythmic patterns or beats (Dandawate et al., 2015; Kirthika and Chattamvelli, 2012). Raga is determined from the flow of swaras (notes), which is denoted as the wider terminology. The raga is defined based on some vital factors such as swaras, aarohana-avarohna and typical phrases. Technically, the fundamental frequency is swara, which is definite through duration. Moreover, there are many other problems for automatic raga recognition model. Thus, in this work, raga is recognized without utilizing explicit note series information and necessary to adopt an efficient classification model.Design/methodology/approachThis paper proposes an efficient raga identification system through which music of Carnatic genre can be effectively recognized. This paper also proposes an adaptive classifier based on NN in which the feature set is used for learning. The adaptive classifier exploits advanced metaheuristic-based learning algorithm to get the knowledge of the extracted feature set. Since the learning algorithm plays a crucial role in defining the precision of the raga recognition, this model prefers to use the GWO.FindingsThrough the performance analysis, it is witnessed that the accuracy of proposed model is 16.6% better than NN with LM, NN with GD and NN with FF respectively, 14.7% better than NN with PSO. Specificity measure of the proposed model is 19.6, 24.0, 13.5 and 17.5% superior to NN with LM, NN with GD, NN with FF and NN with PSO, respectively. NPV of the proposed model is 19.6, 24, 13.5 and 17.5% better than NN with LM, NN with GD, NN with FF and NN with PSO, respectively. Thus it has proven that the proposed model has provided the best result than other conventional classification methods.Originality/valueThis paper intends to propose an efficient raga identification system through which music of Carnatic genre can be effectively recognized. This paper also proposes an adaptive classifier based on NN.


2021 ◽  
pp. 1-14
Author(s):  
Wenbo Guo ◽  
Cheng Huang ◽  
Weina Niu ◽  
Yong Fang

In the software development process, many developers learn from code snippets in the open-source community to implement specific functions. However, few people think about whether these code have vulnerabilities, which provides channels for developing unsafe programs. To this end, this paper constructs a source code snippets vulnerability mining system named PyVul based on deep learning to automatically detect the security of code snippets in the open source community. PyVul builds abstract syntax tree (AST) for the source code to extract its code feature, and then introduces the bidirectional long-term short-term memory (BiLSTM) neural network algorithm to detect vulnerability codes. If it is unsafe code, the further constructed a multi-classification model could analyze the context discussion contents in associated threads, to classify the code vulnerability type based the content description. Compared with traditional detection methods, this method can identify unsafe code and classify vulnerability type. The accuracy of the proposed model can reach 85%. PyVul also found 138 vulnerable code snippets in the real public open-source community. In the future, it can be used in the open-source community for vulnerable code auditing to assist users in safe development.


2021 ◽  
Vol 11 (17) ◽  
pp. 8226
Author(s):  
Shyang-Jye Chang ◽  
Chien-Yu Huang

The detection of coffee bean defects is the most crucial step prior to bean roasting. Existing defect detection methods used in the specialty coffee bean industry entail manual screening and sorting, require substantial human resources, and are not standardized. To solve these problems, this study developed a deep learning algorithm to detect defects in coffee beans. The results reveal that when the pooling layer was used to enhance features and reduce neural dimensionality, some of the coffee been features were lost or misclassified. Therefore, a novel dimensionality reduction method was adopted to increase the ability of feature extraction. The developed model also overcame the drawbacks of padding causing blurred image boundaries and the dead neurons causing impeding feature propagation. Images of eight types of coffee beans were used to train and test the proposed detection model. The proposed method was verified to reduce the bias when classifying defects in coffee beans. The detection accuracy rate of the proposed model was 95.2%. When the model was only used to detect the presence of defects, the accuracy rate increased to 100%. Thus, the proposed model is highly accurate in coffee bean defect detection in the classification of eight types of coffee beans.


Author(s):  
. Anika ◽  
Navpreet Kaur

The paper exhibits a formal audit on early detection of heart disease which are the major cause of death. Computational science has potential to detect disease in prior stages automatically. With this review paper we describe machine learning for disease detection. Machine learning is a method of data analysis that automates analytical model building.Various techniques develop to predict cardiac disease based on cases through MRI was developed. Automated classification using machine learning. Feature extraction method using Cell Profiler and GLCM. Cell Profiler a public domain software, freely available is flourished by the Broad Institute's Imaging Platform and Glcm is a statistical method of examining texture .Various techniques to detect cardio vascular diseases.


2020 ◽  
Vol 23 (4) ◽  
pp. 274-284 ◽  
Author(s):  
Jingang Che ◽  
Lei Chen ◽  
Zi-Han Guo ◽  
Shuaiqun Wang ◽  
Aorigele

Background: Identification of drug-target interaction is essential in drug discovery. It is beneficial to predict unexpected therapeutic or adverse side effects of drugs. To date, several computational methods have been proposed to predict drug-target interactions because they are prompt and low-cost compared with traditional wet experiments. Methods: In this study, we investigated this problem in a different way. According to KEGG, drugs were classified into several groups based on their target proteins. A multi-label classification model was presented to assign drugs into correct target groups. To make full use of the known drug properties, five networks were constructed, each of which represented drug associations in one property. A powerful network embedding method, Mashup, was adopted to extract drug features from above-mentioned networks, based on which several machine learning algorithms, including RAndom k-labELsets (RAKEL) algorithm, Label Powerset (LP) algorithm and Support Vector Machine (SVM), were used to build the classification model. Results and Conclusion: Tenfold cross-validation yielded the accuracy of 0.839, exact match of 0.816 and hamming loss of 0.037, indicating good performance of the model. The contribution of each network was also analyzed. Furthermore, the network model with multiple networks was found to be superior to the one with a single network and classic model, indicating the superiority of the proposed model.


Sensors ◽  
2021 ◽  
Vol 21 (2) ◽  
pp. 656
Author(s):  
Xavier Larriva-Novo ◽  
Víctor A. Villagrá ◽  
Mario Vega-Barbas ◽  
Diego Rivera ◽  
Mario Sanz Rodrigo

Security in IoT networks is currently mandatory, due to the high amount of data that has to be handled. These systems are vulnerable to several cybersecurity attacks, which are increasing in number and sophistication. Due to this reason, new intrusion detection techniques have to be developed, being as accurate as possible for these scenarios. Intrusion detection systems based on machine learning algorithms have already shown a high performance in terms of accuracy. This research proposes the study and evaluation of several preprocessing techniques based on traffic categorization for a machine learning neural network algorithm. This research uses for its evaluation two benchmark datasets, namely UGR16 and the UNSW-NB15, and one of the most used datasets, KDD99. The preprocessing techniques were evaluated in accordance with scalar and normalization functions. All of these preprocessing models were applied through different sets of characteristics based on a categorization composed by four groups of features: basic connection features, content characteristics, statistical characteristics and finally, a group which is composed by traffic-based features and connection direction-based traffic characteristics. The objective of this research is to evaluate this categorization by using various data preprocessing techniques to obtain the most accurate model. Our proposal shows that, by applying the categorization of network traffic and several preprocessing techniques, the accuracy can be enhanced by up to 45%. The preprocessing of a specific group of characteristics allows for greater accuracy, allowing the machine learning algorithm to correctly classify these parameters related to possible attacks.


Energies ◽  
2021 ◽  
Vol 14 (11) ◽  
pp. 3117
Author(s):  
Junghwan Kim

Engine knock determination has been conducted in various ways for spark timing calibration. In the present study, a knock classification model was developed using a machine learning algorithm. Wavelet packet decomposition (WPD) and ensemble empirical mode decomposition (EEMD) were employed for the characterization of the in-cylinder pressure signals from the experimental engine. The WPD was used to calculate 255 features from seven decomposition levels. EEMD provided total 70 features from their intrinsic mode functions (IMF). The experimental engine was operated at advanced spark timings to induce knocking under various engine speeds and load conditions. Three knock intensity metrics were employed to determine that the dataset included 4158 knock cycles out of a total of 66,000 cycles. The classification model trained with 66,000 cycles achieved an accuracy of 99.26% accuracy in the knock cycle detection. The neighborhood component analysis revealed that seven features contributed significantly to the classification. The classification model retrained with the seven significant features achieved an accuracy of 99.02%. Although the misclassification rate increased in the normal cycle detection, the feature selection decreased the model size from 253 to 8.25 MB. Finally, the compact classification model achieved an accuracy of 99.95% with the second dataset obtained at the knock borderline (KBL) timings, which validates that the model is sufficient for the KBL timing determination.


Technologies ◽  
2021 ◽  
Vol 9 (1) ◽  
pp. 14
Author(s):  
James Dzisi Gadze ◽  
Akua Acheampomaa Bamfo-Asante ◽  
Justice Owusu Agyemang ◽  
Henry Nunoo-Mensah ◽  
Kwasi Adu-Boahen Opare

Software-Defined Networking (SDN) is a new paradigm that revolutionizes the idea of a software-driven network through the separation of control and data planes. It addresses the problems of traditional network architecture. Nevertheless, this brilliant architecture is exposed to several security threats, e.g., the distributed denial of service (DDoS) attack, which is hard to contain in such software-based networks. The concept of a centralized controller in SDN makes it a single point of attack as well as a single point of failure. In this paper, deep learning-based models, long-short term memory (LSTM) and convolutional neural network (CNN), are investigated. It illustrates their possibility and efficiency in being used in detecting and mitigating DDoS attack. The paper focuses on TCP, UDP, and ICMP flood attacks that target the controller. The performance of the models was evaluated based on the accuracy, recall, and true negative rate. We compared the performance of the deep learning models with classical machine learning models. We further provide details on the time taken to detect and mitigate the attack. Our results show that RNN LSTM is a viable deep learning algorithm that can be applied in the detection and mitigation of DDoS in the SDN controller. Our proposed model produced an accuracy of 89.63%, which outperformed linear-based models such as SVM (86.85%) and Naive Bayes (82.61%). Although KNN, which is a linear-based model, outperformed our proposed model (achieving an accuracy of 99.4%), our proposed model provides a good trade-off between precision and recall, which makes it suitable for DDoS classification. In addition, it was realized that the split ratio of the training and testing datasets can give different results in the performance of a deep learning algorithm used in a specific work. The model achieved the best performance when a split of 70/30 was used in comparison to 80/20 and 60/40 split ratios.


Sign in / Sign up

Export Citation Format

Share Document