Spelling suggestions: "subject:"banking"" "subject:"anking""
311 |
Advancing Bechhofer's Ranking Procedures to High-dimensional Variable SelectionGu, Chao 01 September 2021 (has links)
No description available.
|
312 |
Object Ranking for Mobile 3D Visual SearchWu, Hanwei January 2015 (has links)
In this thesis, we study object ranking in mobile 3D visual search. The conventional methods of object ranking achieve ranking results based on the appearance of objects in images captured by mobile devices while ignoring the underlying 3D geometric information. Thus, we propose to use the method of mobile 3D visual search to improve the ranking by using the underlying 3D geometry of the objects. We develop an algorithm of fast 3D geometric verication to re-rank the objects at low computational complexity. In that scene, the geometry of the objects such as round corners, sharp edges, or planar surfaces as well as the appearance of objects will be considered for 3D object ranking. On the other hand, we also investigate flaws of conventional vocabulary trees and improve the ranking results by introducing a credibility value to the TF-IDF scheme. By combining novel vocabulary trees and fast 3D geometric verification, we can improve the recall-datarate performance as well as the subjective ranking results for mobile 3D visual search.
|
313 |
Detection of IoT Botnets using Decision TreesMeghana Raghavendra (10723905) 29 April 2021 (has links)
<p>International Data Corporation<sup>[3]</sup> (IDC) data estimates that 152,200 Internet of things (IoT) devices will be connected to the Internet every minute by the year 2025. This rapid expansion in the utilization of IoT devices in everyday life leads to an increase in the attack surface for cybercriminals. IoT devices are frequently compromised and used for the creation of botnets. However, it is difficult to apply the traditional methods to counteract IoT botnets and thus calls for finding effective and efficient methods to mitigate such threats. In this work, the network snapshots of IoT traffic infected with two botnets, i.e., Mirai and Bashlite, are studied. Specifically, the collected datasets include network traffic from 9 different IoT devices such as baby monitor, doorbells, thermostat, web cameras, and security cameras. Each dataset consists of 115 stream aggregation feature statistics like weight, mean, covariance, correlation coefficient, standard deviation, radius, and magnitude with a timeframe decay factor, along with a class label defining the traffic as benign or anomalous.</p><p>The goal of the research is to identify a proper machine learning method that can detect IoT botnet traffic accurately and in real-time on IoT edge devices with low computation power, in order to form the first line of defense in an IoT network. The initial step is to identify the most important features that distinguish between benign and anomalous traffic for IoT devices. Specifically, the Input Perturbation Ranking algorithm<sup>[12]</sup> with XGBoost<sup>[26]</sup>is applied to find the 9 most important features among the 115 features. These 9 features can be collected in real time and be applied as inputs to any detection method. Next, a supervised predictive machine learning method, i.e., Decision Trees, is proposed for faster and accurate detection of botnet traffic. The advantage of using decision trees over other machine learning methodologies, is that it achieves accurate results with low computation time and power. Unlike deep learning methodologies, decision trees can provide visual representation of the decision making and detection process. This can be easily translated into explicit security policies in the IoT environment. In the experiments conducted, it can be clearly seen that decision trees can detect anomalous traffic with an accuracy of 99.997% and takes 59 seconds for training and 0.068 seconds for prediction, which is much faster than the state-of-art deep-learning based detector, i.e., Kitsune<sup>[4]</sup>. Moreover, our results show that decision trees have an extremely low false positive rate of 0.019%. Using the 9 most important features, decision trees can further reduce the processing time while maintaining the accuracy. Hence, decision trees with important features are able to accurately and efficiently detect IoT botnets in real time and on a low performance edge device such as Raspberry Pi<sup>[9]</sup>.</p>
|
314 |
Essays in Social Choice and Econometrics:Zhou, Zhuzhu January 2021 (has links)
Thesis advisor: Uzi Segal / The dissertation studies the property of transitivity in the social choice theory. I explain why we should care about transitivity in decision theory. I propose two social decision theories: redistribution regret and ranking regret, study their properties of transitivity, and discuss the possibility to find a best choice for the social planner. Additionally, in the joint work, we propose a general method to construct a consistent estimator given two parametric models, one of which could be incorrectly specified. In “Why Transitivity”, to explain behaviors violating transitivity, e.g., preference reversals, some models, like regret theory, salience theory were developed. However, these models naturally violate transitivity, which may not lead to a best choice for the decision maker. This paper discusses the consequences and the possible extensions to deal with it. In “Redistribution Regret and Transitivity”, a social planner wants to allocate resources, e.g., the government allocates fiscal revenue or parents distribute toys to children. The social planner cares about individuals' feelings, which depend both on their assigned resources, and on the alternatives they might have been assigned. As a result, there could be intransitive cycles. This paper shows that the preference orders are generally non-transitive but there are two exceptions: fixed total resource and one extremely sensitive individual, or only two individuals with the same non-linear individual regret function. In “Ranking Regret”, a social planner wants to rank people, e.g., assign airline passengers a boarding order. A natural ranking is to order people from most to least sensitive to their rank. But people's feelings can depend both on their assigned rank, and on the alternatives they might have been assigned. As a result, there may be no best ranking, due to intransitive cycles. This paper shows how to tell when a best ranking exists, and that when it exists, it is indeed the natural ranking. When this best does not exist, an alternative second-best group ranking strategy is proposed, which resembles actual airline boarding policies. In “Over-Identified Doubly Robust Identification and Estimation”, joint with Arthur Lewbel and Jinyoung Choi, we consider two parametric models. At least one is correctly specified, but we don't know which. Both models include a common vector of parameters. An estimator for this common parameter vector is called Doubly Robust (DR) if it's consistent no matter which model is correct. We provide a general technique for constructing DR estimators (assuming the models are over identified). Our Over-identified Doubly Robust (ODR) technique is a simple extension of the Generalized Method of Moments. We illustrate our ODR with a variety of models. Our empirical application is instrumental variables estimation, where either one of two instrument vectors might be invalid. / Thesis (PhD) — Boston College, 2021. / Submitted to: Boston College. Graduate School of Arts and Sciences. / Discipline: Economics.
|
315 |
Revisiting Empirical Bayes Methods and Applications to Special Types of DataDuan, Xiuwen 29 June 2021 (has links)
Empirical Bayes methods have been around for a long time and have a wide range of
applications. These methods provide a way in which historical data can be aggregated
to provide estimates of the posterior mean. This thesis revisits some of the empirical
Bayesian methods and develops new applications. We first look at a linear empirical Bayes estimator and apply it on ranking and symbolic data. Next, we consider
Tweedie’s formula and show how it can be applied to analyze a microarray dataset.
The application of the formula is simplified with the Pearson system of distributions.
Saddlepoint approximations enable us to generalize several results in this direction.
The results show that the proposed methods perform well in applications to real data
sets.
|
316 |
ETH-LEACH: An Energy Enhanced Threshold Routing Protocol for WSNsChithaluru, Prem K., Khan, Mohammad S., Kumar, Manoj, Stephan, Thompson 01 January 2021 (has links)
Many wireless sensor-based applications use LEACH as a preferred routing protocol owing to its unique features such as optimal sleeping time, minimum packet collisions, dynamic channel selection, and least power consumption. The traditional LEACH protocol wastes the transmission opportunities as it processes data only in an event occurring, leading to wastage of resources. To resolve this issue, this paper proposes a more robust Energy Enhanced Threshold Routing Protocol (ETH-LEACH) for WSNs. The working of ETH-LEACH is conceptualized in two parts. In the first part, TDMA is implemented to estimate the opportunistic paths to remove network overhead. Furthermore, in the second part, a threshold value is calculated for choosing the forwarder nodes. The proposed technique minimizes the energy usage of the sensor nodes and consequently enhances the network's lifetime by extending the duration of node death. The ETH-LEACH protocol is contrasted with the different variants of LEACH to verify its effectiveness. The experimental results show that the proposed ETH-LEACH protocol outperforms the traditional routing protocols. In this paper, the ETH-LEACH protocol performs nearly 54.6% efficient than LEACH, 47.6% efficient than Q-LEACH, 41.3% efficient than NR-LEACH, 33.6% efficient than LEACH-GA, and 29.7% efficient than LEACH-POS in reducing the usage of energy in the overall simulation.
|
317 |
Ranking of Bulk Transmission Assets for Maintenance DecisionsJanuary 2019 (has links)
abstract: Reliable and secure operation of bulk power transmission system components is an important aspect of electric power engineering. Component failures in a transmission network can lead to serious consequences and impact system reliability. The operational health of the transmission assets plays a crucial role in determining the reliability of an electric grid. To achieve this goal, scheduled maintenance of bulk power system components is an important activity to secure the transmission system against unanticipated events. This thesis identifies critical transmission elements in a 500 kV transmission network utilizing a ranking strategy.
The impact of the failure of transmission assets operated by a major utility company in the Southwest United States on its power system network is studied. A methodology is used to quantify the impact and subsequently rank transmission assets in decreasing order of their criticality. The analysis is carried out on the power system network using a node breaker model and steady state analysis. The light load case of spring 2019, peak load case of summer 2023 and two intermediate load cases have been considered for the ranking. The contingency simulations and power flow studies have been carried out using a commercial power flow study software package, Positive Sequence Load Flow (PSLF). The results obtained from PSLF are analyzed using Matlab to obtain the desired ranking. The ranked list of transmission assets will enable asset managers to identify the assets that have the most significant impact on the overall power system network performance. Therefore, investment and maintenance decisions can be made effectively. A conclusion along with a recommendation for future work is also provided in the thesis. / Dissertation/Thesis / Masters Thesis Electrical Engineering 2019
|
318 |
A framework for finding and summarizing product defects, and ranking helpful threads from online customer forums through machine learningJiao, Jian 05 June 2013 (has links)
The Internet has revolutionized the way users share and acquire knowledge. As important and popular Web-based applications, online discussion forums provide interactive platforms for users to exchange information and report problems. With the rapid growth of social networks and an ever increasing number of Internet users, online forums have accumulated a huge amount of valuable user-generated data and have accordingly become a major information source for business intelligence. This study focuses specifically on product defects, which are one of the central concerns of manufacturing companies and service providers, and proposes a machine learning method to automatically detect product defects in the context of online forums. To complement the detection of product defects , we also present a product feature extraction method to summarize defect threads and a thread ranking method to search for troubleshooting solutions. To this end, we collected different data sets to test these methods experimentally and the results of the tests show that our methods are very promising: in fact, in most cases, they outperformed the current state-of-the-art methods. / Ph. D.
|
319 |
Persistence and change in donations received by America's largest charitiesCleveland, William Suhs 07 June 2016 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / This dissertation explores growth among American charities by examining 25
years of the Philanthropy 400, an annual ranking published by The Chronicle of
Philanthropy of the 400 charities receiving the most donations. Data preparation for the
Philanthropy 400’s first analysis remedied publication deadline constraints by aligning
data by fiscal years and adding 310 charities omitted from the published rankings,
resulting in a study population of 1,101 charities. Most studies of charity finance examine
individual Forms 990. The Philanthropy 400 uses consolidated financial information
from entire organizational networks, creating the same basis for charities filing a single
Form 990, like the American Red Cross, and charities with affiliates filing more than
1,000 Forms 990, like Habitat for Humanity.
Organizational ecology theory frames examination of aggregate changes in the
Philanthropy 400. Two questions examine how age and dependence on donations as a
percentage of total income affect persistence in the rankings. A third question examines
the changing share of total U.S. giving received by ranked charities.
Despite stability resulting from the same charities occupying 189 of the 400
ranking positions every year, the median age of ranked charities decreased. Younger
charities generally climbed within the rankings, while older charities tended to decline or
exit the rankings. Younger new entrants often persisted in the rankings, suggesting some
donors embrace various new causes or solutions. Charities ranked only once or twice
decreased in number with each successive ranking. Most charities ranked only once entered the rankings by receiving two or more times their typical amount of donations,
suggesting that sustained fundraising programs regularly outperform charities that
periodically experience years of extraordinarily high donations.
The aggregate inflation-adjusted donations received by the Philanthropy 400
increased during the study period and increased as a percentage of total U.S. giving. As
predicted by organizational ecology, the increasing percentage of total U.S. giving
received by the Philanthropy 400 coincided with slowing growth in both the number of
U.S. charities and total U.S. giving. If the Philanthropy 400 continues to increase its
percentage of total U.S. giving, this could affect financing for smaller charities.
|
320 |
A Study on Image Retrieval in Social Image Hosting Websites / ソーシャル画像ホスティングウェブサイトにおける画像検索に関する研究Li, Jiyi 24 September 2013 (has links)
京都大学 / 0048 / 新制・課程博士 / 博士(情報学) / 甲第17927号 / 情博第509号 / 新制||情||90(附属図書館) / 30747 / 京都大学大学院情報学研究科社会情報学専攻 / (主査)教授 吉川 正俊, 教授 石田 亨, 教授 田中 克己 / 学位規則第4条第1項該当 / Doctor of Informatics / Kyoto University / DGAM
|
Page generated in 0.038 seconds