To improve classification of imbalanced datasets

P Shukla, K Bhowmick - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
The task of accurately predicting the target class for each case in the data is called
classification of data in data mining. Classification of balanced data set is fairly simple and …

Two class pruned log message anomaly detection

A Farzad, TA Gulliver - SN Computer Science, 2021 - Springer
Log messages are widely used in cloud servers and other systems. Millions of logs are
generated each day which makes them important for anomaly detection. However, they are …

Exploiting latent codes: Interactive fashion product generation, similar image retrieval, and cross-category recommendation using variational autoencoders

JA Sarmiento - arXiv preprint arXiv:2009.01053, 2020 - arxiv.org
The rise of deep learning applications in the fashion industry has fueled advances in
curating large-scale datasets to build applications for product design, image retrieval, and …

Statistical inference-based distributed blind estimation in wireless sensor networks

W Zhang, L Chen, M Qin, W Wang - IEEE Access, 2019 - ieeexplore.ieee.org
To realize the Internet of Things, one of the essential elements is wireless sensor networks
which can sense the physical conditions of the environment. The ubiquitous sensing is …

No More Than 6ft Apart: Robust K-Means via Radius Upper Bounds

AI Humayun, R Balestriero, A Kyrillidis… - ICASSP 2022-2022 …, 2022 - ieeexplore.ieee.org
Centroid based clustering methods such as k-means, k-medoids and k-centers are heavily
applied as a go-to tool in exploratory data analysis. In many cases, those methods are used …

[PDF][PDF] Behavior classification for turing machines

N Diaz - Complex Systems, 2017 - content.wolfram.com
A classification for Turing machines is described. Quantitative descriptors for Turing machine
behavior are used for measuring repetitiveness, periodicity, complexity and entropy. These …

Log message anomaly detection using machine learning

A Farzad - 2021 - dspace.library.uvic.ca
Log messages are one of the most valuable sources of information in the cloud and other
software systems. These logs can be used for audits and ensuring system security. Many …