570 research outputs found
Efficient Data Representation by Selecting Prototypes with Importance Weights
Prototypical examples that best summarizes and compactly represents an
underlying complex data distribution communicate meaningful insights to humans
in domains where simple explanations are hard to extract. In this paper we
present algorithms with strong theoretical guarantees to mine these data sets
and select prototypes a.k.a. representatives that optimally describes them. Our
work notably generalizes the recent work by Kim et al. (2016) where in addition
to selecting prototypes, we also associate non-negative weights which are
indicative of their importance. This extension provides a single coherent
framework under which both prototypes and criticisms (i.e. outliers) can be
found. Furthermore, our framework works for any symmetric positive definite
kernel thus addressing one of the key open questions laid out in Kim et al.
(2016). By establishing that our objective function enjoys a key property of
that of weak submodularity, we present a fast ProtoDash algorithm and also
derive approximation guarantees for the same. We demonstrate the efficacy of
our method on diverse domains such as retail, digit recognition (MNIST) and on
publicly available 40 health questionnaires obtained from the Center for
Disease Control (CDC) website maintained by the US Dept. of Health. We validate
the results quantitatively as well as qualitatively based on expert feedback
and recently published scientific studies on public health, thus showcasing the
power of our technique in providing actionability (for retail), utility (for
MNIST) and insight (on CDC datasets) which arguably are the hallmarks of an
effective data mining method.Comment: Accepted for publication in International Conference on Data Mining
(ICDM) 201
Duplex Moiety Kidney With Ureteral Ectopia; A Case Series
Ureteral ectopia is a common condition presenting as incontinence in females and incidentally detected in males. The diagnosis requires thorough radiological investigations to delineate the anatomy and formulate the treatment. The prognosis is generally excellent. We presented a series of three cases of ureteral ectopia and discussion regarding their management.Keywords: Female; Urinary Incontinence; Ectopic Ureter; Duplex Moiety Kidney
Jamming Attack Detection and Evaluating Using Wireless Application
When data is transferred from one host to another host,attacker may try to attack the packet or data which is in transit.Inorder to avoid such kind of attack in time critical wireless application and delivery message securely in wireless application. In this paper, we aim at modeling and detecting jamming attacks against time-critical wireless networks.To measure network performance ,packet loss and throughput metrics are used . To quantify the performance of time-critical applications,message invalidation ratio metric are used. This approach is inspired by the similarity between the behavior of a jammer who attempts to disrupt the delivery of a message and the behavior of a gambler who intends to win a gambling game. By gambling-based modeling and real-time modules, we can successful delivery time-critical message under a variety of jamming attacks.
DOI: 10.17762/ijritcc2321-8169.15038
- …