24 research outputs found
Optimization of approximate inhibitory rules relative to number of misclassifications
In this work, we consider so-called nonredundant inhibitory rules, containing an expression "attribute≠ value" on the right-hand side, for which the number of misclassifications is at most a threshold y. We study a dynamic programming approach for description of the considered set of rules. This approach allows also the optimization of nonredundant inhibitory rules relative to the length and coverage [1, 2]. The aim of this paper is to investigate an additional possibility of optimization relative to the number of misclassifications. The results of experiments with decision tables from the UCI Machine Learning Repository [3] show this additional optimization achieves a fewer misclassifications. Thus, the proposed optimization procedure is promising
Decision rules, trees and tests for tables with many-valued decisions : comparative study
In this paper, we present three approaches for construction of decision rules for decision tables with many-valued decisions. We construct decision rules directly for rows of decision table, based on paths in decision tree, and based on attributes contained in a test (super-reduct). Experimental results for the data sets taken from UCI Machine Learning Repository, contain comparison of the maximum and the average length of rules for the mentioned approaches
A Machine-Synesthetic Approach To DDoS Network Attack Detection
In the authors' opinion, anomaly detection systems, or ADS, seem to be the
most perspective direction in the subject of attack detection, because these
systems can detect, among others, the unknown (zero-day) attacks. To detect
anomalies, the authors propose to use machine synesthesia. In this case,
machine synesthesia is understood as an interface that allows using image
classification algorithms in the problem of detecting network anomalies, making
it possible to use non-specialized image detection methods that have recently
been widely and actively developed. The proposed approach is that the network
traffic data is "projected" into the image. It can be seen from the
experimental results that the proposed method for detecting anomalies shows
high results in the detection of attacks. On a large sample, the value of the
complex efficiency indicator reaches 97%.Comment: 12 pages, 2 figures, 5 tables. Accepted to the Intelligent Systems
Conference (IntelliSys) 201
Generalized action principle and extrinsic geometry for N=1 superparticle
It is proposed the generalized action functional for N=1 superparticle in
D=3,4,6 and 10 space-time dimensions. The superfield geometric approach
equations describing superparticle motion in terms of extrinsic geometry of the
worldline superspace are obtained on the base of the generalized action. The
off-shell superdiffeomorphism invariance (in the rheonomic sense) of the
superparticle generalized action is proved. It was demonstrated that the half
of the fermionic and one bosonic (super)fields disappear from the generalized
action in the analytical basis. Superparticle interaction with Abelian gauge
theory is considered in the framework of this formulation. The geometric
approach equations describing superparticle motion in Abelian background are
obtained.Comment: 31 pages. Late
New Superembeddings for Type II Superstrings
Possible ways of generalization of the superembedding approach for the
supersurfaces with the number of Grassmann directions being less than the half
of that for the target superspace are considered on example of Type II
superstrings. Focus is on n=(1,1) superworldsheet embedded into D=10 Type II
superspace that is of the interest for establishing a relation with the NSR
string.Comment: 26 pages, LaTeX, JHEP.cls and JHEP.bst style files are used; v2:
misprints corrected, comments, acknowledgments, references adde
Tensionless String in the Notoph Background
We study the interaction between a tensionless (null) string and an
antisymmetric background field B_{ab} using a 2-component spinor formalism. A
geometric condition for the absence of such an interaction is formulated. We
show that only one gauge-invariant degree of freedom of the field B_{ab} does
not satisfy this condition. Identification of this degree of freedom with the
notoph field \phi of Ogievetskii-Polubarinov-Kalb-Ramond is suggested.
Application of a two-component spinor formalism allows us a reduction of the
complete system of non-linear partial differential equations and constraints
governing the interacting null string dynamics to a system of linear
differential equations for the basis spinors of the spin-frame. We find that
total effect of the interaction is contained in a single derivation coefficient
which is identified with the notoph field.Comment: 15 pages, no figures, RevTeX 3.