Introduction and Implementation of Machine Learning Algorithms in R

Author(s):  
S. R. Mani Sekhar ◽  
G. M. Siddesh

Machine learning is one of the important areas in the field of computer science. It helps to provide an optimized solution for the real-world problems by using past knowledge or previous experience data. There are different types of machine learning algorithms present in computer science. This chapter provides the overview of some selected machine learning algorithms such as linear regression, linear discriminant analysis, support vector machine, naive Bayes classifier, neural networks, and decision trees. Each of these methods is illustrated in detail with an example and R code, which in turn assists the reader to generate their own solutions for the given problems.

Author(s):  
S. R. Mani Sekhar ◽  
G. M. Siddesh

Machine learning is one of the important areas in the field of computer science. It helps to provide an optimized solution for the real-world problems by using past knowledge or previous experience data. There are different types of machine learning algorithms present in computer science. This chapter provides the overview of some selected machine learning algorithms such as linear regression, linear discriminant analysis, support vector machine, naive Bayes classifier, neural networks, and decision trees. Each of these methods is illustrated in detail with an example and R code, which in turn assists the reader to generate their own solutions for the given problems.


2020 ◽  
Vol 32 (02) ◽  
pp. 2050010
Author(s):  
Fatma EL-Zahraa M. Labib ◽  
Islam A. Fouad ◽  
Mai S. Mabrouk ◽  
Amr A. Sharawy

A brain–computer interface (BCI) can be used for people with severe physical disabilities such as ALS or amyotrophic lateral sclerosis. BCI can allow these individuals to communicate again by creating a new communication channel directly from the brain to an output device. BCI technology can allow paralyzed people to share their intent with others, and thereby demonstrate that direct communication from the brain to the external world is possible and that it might serve useful functions. BCI systems include machine learning algorithms (MLAs). Their performance depends on the feature extraction and classification techniques employed. In this paper, we propose a system to exploit the P300 signal in the brain, a positive deflection in event-related potentials. The P300 signal can be incorporated into a spelling device. There are two benefits behind this kind of research. First of all, this work presents the research status and the advantages of communication via a BCI system, especially the P300 BCI system for disordered people, and the related literature review is presented. Secondly, the paper discusses the performance of different machine learning algorithms. Two different datasets are presented: the first dataset 2004 and the second dataset 2019. A preprocessing step is introduced to the subjects in both datasets first to extract the important features before applying the proposed machine learning methods: linear discriminant analysis (LDA I and LDA II), support vector machine (SVM I, SVM II, SVM III, and SVM IV), linear regression (LREG), Bayesian linear discriminant analysis (BLDA), and twin support vector machine (TSVM). By comparing the performance of the different machine learning systems, in the first dataset it is found that BLDA and SVMIV classifiers yield the highest performance for both subjects “A” and “B”. BLDA yields 98% and 66% for 15th and 5th sequences, respectively, whereas SVMIV yields 98% and 54.4% for 15th and 5th sequences, respectively. While in the second dataset, it is obvious that BLDA classifier yields the highest performance for both subjects “1” and “2”, it achieves 90.115%. The paper summarizes the P300 BCI system for the two introduced datasets. It discusses the proposed system, compares the classification methods performances, and considers some aspects for the future work to be handled. The results show high accuracy and less computational time which makes the system more applicable for online applications.


Author(s):  
Angana Saikia ◽  
Vinayak Majhi ◽  
Masaraf Hussain ◽  
Sudip Paul ◽  
Amitava Datta

Tremor is an involuntary quivering movement or shake. Characteristically occurring at rest, the classic slow, rhythmic tremor of Parkinson's disease (PD) typically starts in one hand, foot, or leg and can eventually affect both sides of the body. The resting tremor of PD can also occur in the jaw, chin, mouth, or tongue. Loss of dopamine leads to the symptoms of Parkinson's disease and may include a tremor. For some people, a tremor might be the first symptom of PD. Various studies have proposed measurable technologies and the analysis of the characteristics of Parkinsonian tremors using different techniques. Various machine-learning algorithms such as a support vector machine (SVM) with three kernels, a discriminant analysis, a random forest, and a kNN algorithm are also used to classify and identify various kinds of tremors. This chapter focuses on an in-depth review on identification and classification of various Parkinsonian tremors using machine learning algorithms.


Author(s):  
Angana Saikia ◽  
Vinayak Majhi ◽  
Masaraf Hussain ◽  
Sudip Paul ◽  
Amitava Datta

Tremor is an involuntary quivering movement or shake. Characteristically occurring at rest, the classic slow, rhythmic tremor of Parkinson's disease (PD) typically starts in one hand, foot, or leg and can eventually affect both sides of the body. The resting tremor of PD can also occur in the jaw, chin, mouth, or tongue. Loss of dopamine leads to the symptoms of Parkinson's disease and may include a tremor. For some people, a tremor might be the first symptom of PD. Various studies have proposed measurable technologies and the analysis of the characteristics of Parkinsonian tremors using different techniques. Various machine-learning algorithms such as a support vector machine (SVM) with three kernels, a discriminant analysis, a random forest, and a kNN algorithm are also used to classify and identify various kinds of tremors. This chapter focuses on an in-depth review on identification and classification of various Parkinsonian tremors using machine learning algorithms.


Author(s):  
Pratyush Kaware

In this paper a cost-effective sensor has been implemented to read finger bend signals, by attaching the sensor to a finger, so as to classify them based on the degree of bent as well as the joint about which the finger was being bent. This was done by testing with various machine learning algorithms to get the most accurate and consistent classifier. Finally, we found that Support Vector Machine was the best algorithm suited to classify our data, using we were able predict live state of a finger, i.e., the degree of bent and the joints involved. The live voltage values from the sensor were transmitted using a NodeMCU micro-controller which were converted to digital and uploaded on a database for analysis.


2020 ◽  
pp. 147592172096715
Author(s):  
Mengyue He ◽  
Yishou Wang ◽  
Karthik Ram Ramakrishnan ◽  
Zhifang Zhang

Structural health monitoring techniques based on vibration parameters have been used to assess the internal delamination damage of fiber-reinforced polymer composites. Recently, machine learning algorithms have been adopted to solve the inverse problem of predicting delamination parameters of the delamination from natural frequency shifts. In this article, a delamination detection methodology is proposed based on the changes in multiple modes of frequencies to assess the interface, location, and size of delamination in fiber-reinforced polymer composites. Three types of machine learning algorithms including back propagation neural network, extreme learning machine, and support vector machine algorithm were adopted as inverse algorithms for assessment of the delamination parameters, with a special focus on the interface prediction. A theoretical model of fiber-reinforced polymer beam with delamination under vibration was constructed to learn how the frequencies are affected by the delaminations (“forward problem”) and to generate a database of “frequency shifts versus delamination parameters” to be used in machine learning algorithms for delamination prediction (“inverse problem”). Multiple carbon/epoxy fiber-reinforced polymer beam specimens were manufactured and measured by a laser scanning Doppler vibrometer to extract the modal frequencies. Numerical and experimental verification results have shown that support vector machine has the best prediction performance among the three machine learning algorithms, with high prediction accuracy and only requiring a small number of samples. For predicting the interface of delamination which is a discrete variable, support vector machine classification has observed better prediction accuracy and requiring less running time than regression. This study is one of the first to prove the applicability of support vector machine for structural health monitoring of delamination damage in fiber-reinforced polymer composites and has the potential to improve the prediction capability of machine learning algorithms. Another significant outcome of the study is that the interface of delamination has been predicted accurately with support vector machine.


2019 ◽  
Vol 1 (1) ◽  
pp. 384-399 ◽  
Author(s):  
Thais de Toledo ◽  
Nunzio Torrisi

The Distributed Network Protocol (DNP3) is predominately used by the electric utility industry and, consequently, in smart grids. The Peekaboo attack was created to compromise DNP3 traffic, in which a man-in-the-middle on a communication link can capture and drop selected encrypted DNP3 messages by using support vector machine learning algorithms. The communication networks of smart grids are a important part of their infrastructure, so it is of critical importance to keep this communication secure and reliable. The main contribution of this paper is to compare the use of machine learning techniques to classify messages of the same protocol exchanged in encrypted tunnels. The study considers four simulated cases of encrypted DNP3 traffic scenarios and four different supervised machine learning algorithms: Decision tree, nearest-neighbor, support vector machine, and naive Bayes. The results obtained show that it is possible to extend a Peekaboo attack over multiple substations, using a decision tree learning algorithm, and to gather significant information from a system that communicates using encrypted DNP3 traffic.


Witheverypassingsecondsocialnetworkcommunityisgrowingrapidly,becauseofthat,attackershaveshownkeeninterestinthesekindsofplatformsandwanttodistributemischievouscontentsontheseplatforms.Withthefocus on introducing new set of characteristics and features forcounteractivemeasures,agreatdealofstudieshasresearchedthe possibility of lessening the malicious activities on social medianetworks. This research was to highlight features for identifyingspammers on Instagram and additional features were presentedto improve the performance of different machine learning algorithms. Performance of different machine learning algorithmsnamely, Multilayer Perceptron (MLP), Random Forest (RF), K-Nearest Neighbor (KNN) and Support Vector Machine (SVM)were evaluated on machine learning tools named, RapidMinerand WEKA. The results from this research tells us that RandomForest (RF) outperformed all other selected machine learningalgorithmsonbothselectedmachinelearningtools.OverallRandom Forest (RF) provided best results on RapidMiner. Theseresultsareusefulfortheresearcherswhoarekeentobuildmachine learning models to find out the spamming activities onsocialnetworkcommunities.


The advancement in cyber-attack technologies have ushered in various new attacks which are difficult to detect using traditional intrusion detection systems (IDS).Existing IDS are trained to detect known patterns because of which newer attacks bypass the current IDS and go undetected. In this paper, a two level framework is proposed which can be used to detect unknown new attacks using machine learning techniques. In the first level the known types of classes for attacks are determined using supervised machine learning algorithms such as Support Vector Machine (SVM) and Neural networks (NN). The second level uses unsupervised machine learning algorithms such as K-means. The experimentation is carried out with four models with NSL- KDD dataset in Openstack cloud environment. The Model with Support Vector Machine for supervised machine learning, Gradual Feature Reduction (GFR) for feature selection and K-means for unsupervised algorithm provided the optimum efficiency of 94.56 %.


Sign in / Sign up

Export Citation Format

Share Document