scholarly journals Collective Mind: Towards Practical and Collaborative Auto-Tuning

2014 ◽  
Vol 22 (4) ◽  
pp. 309-329 ◽  
Author(s):  
Grigori Fursin ◽  
Renato Miceli ◽  
Anton Lokhmotov ◽  
Michael Gerndt ◽  
Marc Baboulin ◽  
...  

Empirical auto-tuning and machine learning techniques have been showing high potential to improve execution time, power consumption, code size, reliability and other important metrics of various applications for more than two decades. However, they are still far from widespread production use due to lack of native support for auto-tuning in an ever changing and complex software and hardware stack, large and multi-dimensional optimization spaces, excessively long exploration times, and lack of unified mechanisms for preserving and sharing of optimization knowledge and research material. We present a possible collaborative approach to solve above problems using Collective Mind knowledge management system. In contrast with previous cTuning framework, this modular infrastructure allows to preserve and share through the Internet the whole auto-tuning setups with all related artifacts and their software and hardware dependencies besides just performance data. It also allows to gradually structure, systematize and describe all available research material including tools, benchmarks, data sets, search strategies and machine learning models. Researchers can take advantage of shared components and data with extensible meta-description to quickly and collaboratively validate and improve existing auto-tuning and benchmarking techniques or prototype new ones. The community can now gradually learn and improve complex behavior of all existing computer systems while exposing behavior anomalies or model mispredictions to an interdisciplinary community in a reproducible way for further analysis. We present several practical, collaborative and model-driven auto-tuning scenarios. We also decided to release all material atc-mind.org/repoto set up an example for a collaborative and reproducible research as well as our new publication model in computer engineering where experimental results are continuously shared and validated by the community.

Author(s):  
Terry Gao ◽  
Grace Ying Wang

It is essential to increase the accuracy and robustness of classification of brain data, including EEG, in order to facilitate a direct communication between the human brain and computerized devices. Different machine learning approaches, such as support vector machine (SVM), neural network, and linear discrimination analysis (LDA), have been applied to set up automatic subjective-classifier, and the findings for their capacities in this regard have been inconclusive. The present study developed an effective classifier for human mental status using deep learning in a convolutional neural network. In contrast to most previous studies commonly using EEG waveform or numeric value of brain signals for classification, the authors utilised imaging features generated from EEG data at alpha frequency band. A new model proposed in this study provides a simple and computationally efficient approach to distinguish mental status during resting. With training, this model could predict new 2D EEG images with above 90% accuracy, while traditional machine learning techniques failed to achieve this accuracy.


Author(s):  
Sofia Benbelkacem ◽  
Farid Kadri ◽  
Baghdad Atmani ◽  
Sondès Chaabane

Nowadays, emergency department services are confronted to an increasing demand. This situation causes emergency department overcrowding which often increases the length of stay of patients and leads to strain situations. To overcome this issue, emergency department managers must predict the length of stay. In this work, the researchers propose to use machine learning techniques to set up a methodology that supports the management of emergency departments (EDs). The target of this work is to predict the length of stay of patients in the ED in order to prevent strain situations. The experiments were carried out on a real database collected from the pediatric emergency department (PED) in Lille regional hospital center, France. Different machine learning techniques have been used to build the best prediction models. The results seem better with Naive Bayes, C4.5 and SVM methods. In addition, the models based on a subset of attributes proved to be more efficient than models based on the set of attributes.


2019 ◽  
Vol 11 (10) ◽  
pp. 2833 ◽  
Author(s):  
Diego Buenaño-Fernández ◽  
David Gil ◽  
Sergio Luján-Mora

The present work proposes the application of machine learning techniques to predict the final grades (FGs) of students based on their historical performance of grades. The proposal was applied to the historical academic information available for students enrolled in the computer engineering degree at an Ecuadorian university. One of the aims of the university’s strategic plan is the development of a quality education that is intimately linked with sustainable development goals (SDGs). The application of technology in teaching–learning processes (Technology-enhanced learning) must become a key element to achieve the objective of academic quality and, as a consequence, enhance or benefit the common good. Today, both virtual and face-to-face educational models promote the application of information and communication technologies (ICT) in both teaching–learning processes and academic management processes. This implementation has generated an overload of data that needs to be processed properly in order to transform it into valuable information useful for all those involved in the field of education. Predicting a student’s performance from their historical grades is one of the most popular applications of educational data mining and, therefore, it has become a valuable source of information that has been used for different purposes. Nevertheless, several studies related to the prediction of academic grades have been developed exclusively for the benefit of teachers and educational administrators. Little or nothing has been done to show the results of the prediction of the grades to the students. Consequently, there is very little research related to solutions that help students make decisions based on their own historical grades. This paper proposes a methodology in which the process of data collection and pre-processing is initially carried out, and then in a second stage, the grouping of students with similar patterns of academic performance was carried out. In the next phase, based on the identified patterns, the most appropriate supervised learning algorithm was selected, and then the experimental process was carried out. Finally, the results were presented and analyzed. The results showed the effectiveness of machine learning techniques to predict the performance of students.


2021 ◽  
Vol 13 (8) ◽  
pp. 186
Author(s):  
Nisha Rawindaran ◽  
Ambikesh Jayal ◽  
Edmond Prakash ◽  
Chaminda Hewage

Cyber security has made an impact and has challenged Small and Medium Enterprises (SMEs) in their approaches towards how they protect and secure data. With an increase in more wired and wireless connections and devices on SME networks, unpredictable malicious activities and interruptions have risen. Finding the harmony between the advancement of technology and costs has always been a balancing act particularly in convincing the finance directors of these SMEs to invest in capital towards their IT infrastructure. This paper looks at various devices that currently are in the market to detect intrusions and look at how these devices handle prevention strategies for SMEs in their working environment both at home and in the office, in terms of their credibility in handling zero-day attacks against the costs of achieving so. The experiment was set up during the 2020 pandemic referred to as COVID-19 when the world experienced an unprecedented event of large scale. The operational working environment of SMEs reflected the context when the UK went into lockdown. Pre-pandemic would have seen this experiment take full control within an operational office environment; however, COVID-19 times has pushed us into a corner to evaluate every aspect of cybersecurity from the office and keeping the data safe within the home environment. The devices chosen for this experiment were OpenSource such as SNORT and pfSense to detect activities within the home environment, and Cisco, a commercial device, set up within an SME network. All three devices operated in a live environment within the SME network structure with employees being both at home and in the office. All three devices were observed from the rules they displayed, their costs and machine learning techniques integrated within them. The results revealed these aspects to be important in how they identified zero-day attacks. The findings showed that OpenSource devices whilst free to download, required a high level of expertise in personnel to implement and embed machine learning rules into the business solution even for staff working from home. However, when using Cisco, the price reflected the buy-in into this expertise and Cisco’s mainframe network, to give up-to-date information on cyber-attacks. The requirements of the UK General Data Protection Regulations Act (GDPR) were also acknowledged as part of the broader framework of the study. Machine learning techniques such as anomaly-based intrusions did show better detection through a commercially subscription-based model for support from Cisco compared to that of the OpenSource model which required internal expertise in machine learning. A cost model was used to compare the outcome of SMEs’ decision making, in getting the right framework in place in securing their data. In conclusion, finding a balance between IT expertise and costs of products that are able to help SMEs protect and secure their data will benefit the SMEs from using a more intelligent controlled environment with applied machine learning techniques, and not compromising on costs.


Author(s):  
Dr. Sultanuddin SJ ◽  
◽  
Dr. Md. Ali Hussain ◽  

Mobile ad hoc networks (MANETs) have evolved into a leading multi-hop infrastructure less wireless communication technology where every node performs the function of a router. Ad- hoc networks have been spontaneously and specifically designed for the nodes to communicate with each other in locations where it is either complex or impractical to set up an infrastructure. The overwhelming truth is that with IoT emergence, the number of devices being connected every single second keeps increasing tremendously on account of factors like scalability, cost factor and scalability which are beneficial to several sectors like education, disaster management, healthcare, espionage etc., where the identification and allocation of resources as well as services is a major constraint. Nevertheless, this infrastructure with dynamic mobile nodes makes it more susceptible to diverse attack scenarios especially in critical circumstances like combat zone communications where security is inevitable and vulnerabilities in the MANET could be an ideal choice to breach the security. Therefore, it is crucial to select a robust and reliable system that could filter malicious activities and safeguard the network. Network topology and mobility constraints poses difficulty in identifying malicious nodes that can infuse false routes or packets could be lost due to certain attacks like black hole or worm hole. Hence our objective is to propose a security solution to above mentioned issue through ML based anomaly detection and which detects and isolates the attacks in MANETs. Most of the existing technologies detect the anomalies by utilizing static behavior; this may not prove effective as MANET portrays dynamic behavior. Machine learning in MANETs helps in constructing an analytical model for predicting security threats that could pose enormous challenges in future. Machine learning techniques through its statistical and logical methods offers MANETs the learning potential and encourages towards adaptation to different environments. The major objective of our study is to identify the intricate patterns and construct a secure mobile ad-hoc network by focusing on security aspects by identifying malicious nodes and mitigate attacks. Simulation-oriented results establish that the proposed technique has better PDR and EED in comparison to the other existing techniques.


2018 ◽  
Vol 7 (1.9) ◽  
pp. 186
Author(s):  
D Venkata Siva Reddy ◽  
R Vasanth Kumar Mehta

Today there are many sources through which we can access information from internet and based on the dependency now there is an over flow of data either in refined form or unrefined form. Handling large information is a complicated task. It has to overcome many challenges. There are some challenges like drawing useful information from undefined patterns which we can overcome by using data mining techniques but certain challenges like scalability, easy accessing of large data, time, or cost areto be handled in better sense.Machine learning helps in learning patterns from data automatically and can be leverage this data in further predictions. Cloud computing has now turned out to be a big alternative while handling big data because cloud itself carry certain features which help in analyzing and accessing big data in proper manner.Before switching to Cloud based approaches it provides an ease of set up or testing and is economical.Thus there is a demand for cloud computing and machine learning techniques with Hadoop or Spark.Mainly we are focusing on various works that have been done in handling big data. Here the analysis of various algorithms that are used by various researches in handling big data as well as outcome that they obtained in overcoming the challenges in handling big data.


2019 ◽  
Vol 5 (1) ◽  
Author(s):  
Sandesh S. Kalantre ◽  
Justyna P. Zwolak ◽  
Stephen Ragole ◽  
Xingyao Wu ◽  
Neil M. Zimmerman ◽  
...  

2012 ◽  
Vol 38 (4) ◽  
pp. 827-865
Author(s):  
Aina Peris ◽  
Mariona Taulé ◽  
Horacio Rodríguez

This article deals with deverbal nominalizations in Spanish; concretely, we focus on the denotative distinction between event and result nominalizations. The goals of this work is twofold: first, to detect the most relevant features for this denotative distinction; and, second, to build an automatic classification system of deverbal nominalizations according to their denotation. We have based our study on theoretical hypotheses dealing with this semantic distinction and we have analyzed them empirically by means of Machine Learning techniques which are the basis of the ADN-Classifier. This is the first tool that aims to automatically classify deverbal nominalizations in event, result, or underspecified denotation types in Spanish. The ADN-Classifier has helped us to quantitatively evaluate the validity of our claims regarding deverbal nominalizations. We set up a series of experiments in order to test the ADN-Classifier with different models and in different realistic scenarios depending on the knowledge resources and natural language processors available. The ADN-Classifier achieved good results (87.20% accuracy).


2006 ◽  
Author(s):  
Christopher Schreiner ◽  
Kari Torkkola ◽  
Mike Gardner ◽  
Keshu Zhang

2020 ◽  
Vol 12 (2) ◽  
pp. 84-99
Author(s):  
Li-Pang Chen

In this paper, we investigate analysis and prediction of the time-dependent data. We focus our attention on four different stocks are selected from Yahoo Finance historical database. To build up models and predict the future stock price, we consider three different machine learning techniques including Long Short-Term Memory (LSTM), Convolutional Neural Networks (CNN) and Support Vector Regression (SVR). By treating close price, open price, daily low, daily high, adjusted close price, and volume of trades as predictors in machine learning methods, it can be shown that the prediction accuracy is improved.


Sign in / Sign up

Export Citation Format

Share Document