24 research outputs found

    Optimization of approximate inhibitory rules relative to number of misclassifications

    Get PDF
    In this work, we consider so-called nonredundant inhibitory rules, containing an expression "attribute≠ value" on the right-hand side, for which the number of misclassifications is at most a threshold y. We study a dynamic programming approach for description of the considered set of rules. This approach allows also the optimization of nonredundant inhibitory rules relative to the length and coverage [1, 2]. The aim of this paper is to investigate an additional possibility of optimization relative to the number of misclassifications. The results of experiments with decision tables from the UCI Machine Learning Repository [3] show this additional optimization achieves a fewer misclassifications. Thus, the proposed optimization procedure is promising

    Decision rules, trees and tests for tables with many-valued decisions : comparative study

    Get PDF
    In this paper, we present three approaches for construction of decision rules for decision tables with many-valued decisions. We construct decision rules directly for rows of decision table, based on paths in decision tree, and based on attributes contained in a test (super-reduct). Experimental results for the data sets taken from UCI Machine Learning Repository, contain comparison of the maximum and the average length of rules for the mentioned approaches

    A Machine-Synesthetic Approach To DDoS Network Attack Detection

    Full text link
    In the authors' opinion, anomaly detection systems, or ADS, seem to be the most perspective direction in the subject of attack detection, because these systems can detect, among others, the unknown (zero-day) attacks. To detect anomalies, the authors propose to use machine synesthesia. In this case, machine synesthesia is understood as an interface that allows using image classification algorithms in the problem of detecting network anomalies, making it possible to use non-specialized image detection methods that have recently been widely and actively developed. The proposed approach is that the network traffic data is "projected" into the image. It can be seen from the experimental results that the proposed method for detecting anomalies shows high results in the detection of attacks. On a large sample, the value of the complex efficiency indicator reaches 97%.Comment: 12 pages, 2 figures, 5 tables. Accepted to the Intelligent Systems Conference (IntelliSys) 201

    Generalized action principle and extrinsic geometry for N=1 superparticle

    Get PDF
    It is proposed the generalized action functional for N=1 superparticle in D=3,4,6 and 10 space-time dimensions. The superfield geometric approach equations describing superparticle motion in terms of extrinsic geometry of the worldline superspace are obtained on the base of the generalized action. The off-shell superdiffeomorphism invariance (in the rheonomic sense) of the superparticle generalized action is proved. It was demonstrated that the half of the fermionic and one bosonic (super)fields disappear from the generalized action in the analytical basis. Superparticle interaction with Abelian gauge theory is considered in the framework of this formulation. The geometric approach equations describing superparticle motion in Abelian background are obtained.Comment: 31 pages. Late

    New Superembeddings for Type II Superstrings

    Get PDF
    Possible ways of generalization of the superembedding approach for the supersurfaces with the number of Grassmann directions being less than the half of that for the target superspace are considered on example of Type II superstrings. Focus is on n=(1,1) superworldsheet embedded into D=10 Type II superspace that is of the interest for establishing a relation with the NSR string.Comment: 26 pages, LaTeX, JHEP.cls and JHEP.bst style files are used; v2: misprints corrected, comments, acknowledgments, references adde

    Tensionless String in the Notoph Background

    Full text link
    We study the interaction between a tensionless (null) string and an antisymmetric background field B_{ab} using a 2-component spinor formalism. A geometric condition for the absence of such an interaction is formulated. We show that only one gauge-invariant degree of freedom of the field B_{ab} does not satisfy this condition. Identification of this degree of freedom with the notoph field \phi of Ogievetskii-Polubarinov-Kalb-Ramond is suggested. Application of a two-component spinor formalism allows us a reduction of the complete system of non-linear partial differential equations and constraints governing the interacting null string dynamics to a system of linear differential equations for the basis spinors of the spin-frame. We find that total effect of the interaction is contained in a single derivation coefficient which is identified with the notoph field.Comment: 15 pages, no figures, RevTeX 3.

    Relationships between Number of Nodes and Number of Misclassifications for Decision Trees

    No full text

    A Tool for Study of Optimal Decision Trees

    No full text
    corecore