1,803 research outputs found

    Network problems detection and classification by analyzing syslog data

    Get PDF
    Network troubleshooting is an important process which has a wide research field. The first step in troubleshooting procedures is to collect information in order to diagnose the problems. Syslog messages which are sent by almost all network devices contain a massive amount of data related to the network problems. It is found that in many studies conducted previously, analyzing syslog data which can be a guideline for network problems and their causes was used. Detecting network problems could be more efficient if the detected problems have been classified in terms of network layers. Classifying syslog data needs to identify the syslog messages that describe the network problems for each layer, taking into account the different formats of various syslog for vendors’ devices. This study provides a method to classify syslog messages that indicates the network problem in terms of network layers. The method used data mining tool to classify the syslog messages while the description part of the syslog message was used for classification process. Related syslog messages were identified; features were then selected to train the classifiers. Six classification algorithms were learned; LibSVM, SMO, KNN, Naïve Bayes, J48, and Random Forest. A real data set which was obtained from the Universiti Utara Malaysia’s (UUM) network devices is used for the prediction stage. Results indicate that SVM shows the best performance during the training and prediction stages. This study contributes to the field of network troubleshooting, and the field of text data classification

    Beyond Volume: The Impact of Complex Healthcare Data on the Machine Learning Pipeline

    Full text link
    From medical charts to national census, healthcare has traditionally operated under a paper-based paradigm. However, the past decade has marked a long and arduous transformation bringing healthcare into the digital age. Ranging from electronic health records, to digitized imaging and laboratory reports, to public health datasets, today, healthcare now generates an incredible amount of digital information. Such a wealth of data presents an exciting opportunity for integrated machine learning solutions to address problems across multiple facets of healthcare practice and administration. Unfortunately, the ability to derive accurate and informative insights requires more than the ability to execute machine learning models. Rather, a deeper understanding of the data on which the models are run is imperative for their success. While a significant effort has been undertaken to develop models able to process the volume of data obtained during the analysis of millions of digitalized patient records, it is important to remember that volume represents only one aspect of the data. In fact, drawing on data from an increasingly diverse set of sources, healthcare data presents an incredibly complex set of attributes that must be accounted for throughout the machine learning pipeline. This chapter focuses on highlighting such challenges, and is broken down into three distinct components, each representing a phase of the pipeline. We begin with attributes of the data accounted for during preprocessing, then move to considerations during model building, and end with challenges to the interpretation of model output. For each component, we present a discussion around data as it relates to the healthcare domain and offer insight into the challenges each may impose on the efficiency of machine learning techniques.Comment: Healthcare Informatics, Machine Learning, Knowledge Discovery: 20 Pages, 1 Figur

    Applications and Challenges of Task Mining: A Literature Review

    Get PDF
    Task mining is a technological innovation that combines current developments in process mining and data mining. Using task mining, the interactions of workers with their workstations can be recorded, processed, and linked with the business data of the organization. The approach can provide a holistic picture of the business processes and related tasks. Currently, there is no overview of application scenarios and the challenges of task mining. In our work, we reflect application scenarios as well as technological, legal, and organizational challenges of task mining using a structured literature review. The application areas include discovery of automation potentials, monitoring, as well as optimization of business processes. The challenges include the cleansing, collection, data protection, explainability, merging, organization, processing, and segmentation of task mining data

    Deploying a Model for Assessing Cognitive Automation Use Cases: Insights from Action Research with a Leading European Manufacturing Company

    Get PDF
    Cognitive automation moves beyond rule-based automation and thus imposes novel challenges on organizations when assessing the automation potential of use cases. Thus, we present an empirically grounded and conceptually operationalized model for assessing cognitive automation use cases, which consists of four assessment dimensions: data, cognition, relationship, and transparency requirements. We apply the model in a real-world organizational context in the course of an action research project at the customer service department of ManuFact AG, and present unique empirical insights as well as the impact the application of the model had on the organization. The model shall help practitioners to make more informed decisions on selecting use cases for cognitive automation and to plan respective endeavors. For research, the identified factors affecting the suitability of a use case for cognitive automation shall deepen our understanding of cognitive automation in particular, and AI as the driving force behind cognitive automation in general

    Radical agenda - settings? exploring informality and the spatial and economic practices of informal people within the ambit of suggestion, contestation and movement towards an alternative city

    Get PDF
    This research report examines the extent to which the economic and spatial practices of informal people can be classed as radical genda-setting towards an alternative city. In so doing the practices and perceptions of business owners, market traders and street traders in Yeoville are explored. To give greater context of what informal people are possibly pushing up against, state practice and policy are also considered. The discussion further draws on the nexus between politics and governance as well as between the state and capital on the making of contemporary cities. Social movement theory provides the initial basis to carry out the discussion. The interweaving theories of quiet encroachment (Bayat), insurgent citizenship (Holston) and subaltern urbanism (Roy) give the exploration greater depth

    Investigating channels of cash circulation adopted by unbanked (African) migrants in Pretoria Central Business District (CBD)

    Get PDF
    Research Report submitted in partial fulfilment of the requirements of a Master of Arts Degree in Development studies by Coursework and Research Report. Faculty of Humanities, University of Witwatersrand 2016This study explored cash circulation channels adopted by unbanked migrants in Pretoria Central Business District (CBD), South Africa. To understand the complex nature of cash circulation and the subjective practices of migrants, in-depth interviews were conducted with sixteen migrants selected through snowballing sampling. Collected primary data were analysed thematically, from particular to general themes depending on the responses provided by the informants. The study adopted the Sustainable Livelihoods Framework (SLF) as an analytical tool to show how in the face of structural and institutional barriers, unbanked migrants have the capability to adopt digital solutions and socially embedded channels which are more flexible and sustainable in their livelihoods. These include informal channels such as hawala, malaichas and digital solutions like Kawena and Mukuru. By using this framework, the report reveals what unbanked migrants are doing on the ground, what shapes adopted cash circulation processes and the resultant livelihood outcomes. The study aimed at contributing to previous research on money transfer mechanisms adopted by unbanked African migrants. The conclusion reached is that, by adopting various socially embedded cash circulation channels, unbanked migrants circumvent structural constraints and, by so doing, financially include more people who were previously excluded. Although the study was limited to a small sample, it raises strong implications for policy makers to look at the inherent strength of migrants as development actors. Findings from this exploratory study are critical in that they open new niches for research on migrants and financial exclusion in Africa and beyond.GR201
    corecore