Search
Now showing items 31-40 of 70
Evolving Gaussian process kernels from elementary mathematical expressions for time series extrapolation
(Elsevier, 2021-10-28)
[EN]Choosing the best kernel is crucial in many Machine Learning applications. Gaussian Processes are a state-of-the-art technique for regression and classification that heavily relies on a kernel function. However, in the ...
A Hierarchical Machine Learning Solution for the Non-Invasive Diagnostic of Autonomic Dysreflexia
(MDPI, 2022-02-15)
More than half of patients with high spinal cord injury (SCI) suffer from episodes of autonomic dysreflexia (AD), a condition that can lead to lethal situations, such as cerebral haemorrhage, if not treated correctly. ...
A web transconding framework base on user behaviour evaluation
(2017-05-17)
La Web está en constante crecimiento y cada vez son mas los servicios que se ofrecendesde la misma. Esto hace que la Web se esté convirtiendo en una herramienta básicapara la vida diaria [Wellman and Haythornthwaite, 2008]. ...
Towards a standard methodology to evaluate internal cluster validity indices
(Elsevier, 2011-02-01)
The evaluation and comparison of internal cluster validity indices is a critical problem in the clustering area. The methodology used in most of the evaluations assumes that the clustering algorithms work correctly. We ...
An update of the J48Consolidated WEKA’s class: CTC algorithm enhanced with the notion of coverage
(2016-02-12)
This document aims to describe an update of the implementation of the J48Consolidated class within WEKA platform. The J48Consolidated class implements the CTC algorithm [2][3] which builds a unique decision tree based on ...
Behaviour modelling with data obtained from the Internet and contributions to cluster validation
(2016-02-05)
[EN]This PhD thesis makes contributions in modelling behaviours found in different types of data acquired from the Internet and in the field of clustering evaluation. Two different types of Internet data were processed, ...
Generation of the database gurekddcup
(2017-02-10)
The database gureKDDCup has been generated within the UADI project (Unsupervised Anomaly Detection for Intrusion detection system) in which a classifier that detects intrusions or attacks in network based systems was ...
J48Consolidated: an implementation of CTC algorithm for WEKA
(2016-02-12)
The CTC algorithm, Consolidated Tree Construction algorithm, is a machine learning paradigm that was designed to solve a class imbalance problem, a fraud detection problem in the area of car insurance [1] where, besides, ...
Towards Autonomous Defense of SDN Networks Using MuZero Based Intelligent Agents
(IEEE, 2021)
The Software Defined Networking (SDN) paradigm enables the development of systems that centrally monitor and manage network traffic, providing support for the deployment of machine learning-based systems that automatically ...
Contributions to comprehensible classification
(2020-07-16)
La tesis doctoral descrita en esta memoria ha contribuido a la mejora de dos tipos de algoritmos declasificación comprensibles: algoritmos de \'arboles de decisión consolidados y algoritmos de inducciónde reglas tipo PART.En ...