10,308 research outputs found

    Practical Evaluation of Lempel-Ziv-78 and Lempel-Ziv-Welch Tries

    Full text link
    We present the first thorough practical study of the Lempel-Ziv-78 and the Lempel-Ziv-Welch computation based on trie data structures. With a careful selection of trie representations we can beat well-tuned popular trie data structures like Judy, m-Bonsai or Cedar

    Direct-to-Patient Survey for Diagnosis of Benign Paroxysmal Positional Vertigo

    Get PDF
    Given the high incidence of dizziness and its frequent misdiagnosis, we aim to create a clinical support system to classify the presence or absence of benign paroxysmal positional vertigo with high accuracy and specificity. This paper describes a three-phase study currently underway for classification of benign paroxysmal positional vertigo, which includes diagnosis by a specialist in a clinical setting. Patient background information is collected by a survey on an Android tablet and machine learning techniques are applied for classification. Decision trees and wrappers are employed for their ability to provide information about the question set. One goal of the study is to attain an optimal question set. Each phase of the study presents a unique set and style of questions. Results achieved in the first two phases of the survey indicate that our approach using decision trees with filters or wrappers does a good job of identifying benign paroxysmal positional vertigo

    Learning-based Analysis on the Exploitability of Security Vulnerabilities

    Get PDF
    The purpose of this thesis is to develop a tool that uses machine learning techniques to make predictions about whether or not a given vulnerability will be exploited. Such a tool could help organizations such as electric utilities to prioritize their security patching operations. Three different models, based on a deep neural network, a random forest, and a support vector machine respectively, are designed and implemented. Training data for these models is compiled from a variety of sources, including the National Vulnerability Database published by NIST and the Exploit Database published by Offensive Security. Extensive experiments are conducted, including testing the accuracy of each model, dynamically training the models on a rolling window of training data, and filtering the training data by various features. Of the chosen models, the deep neural network and the support vector machine show the highest accuracy (approximately 94% and 93%, respectively), and could be developed by future researchers into an effective tool for vulnerability analysis
    corecore