Name of the lecturer Doç. Dr. Selma Ayşe ÖZEL

Size: px
Start display at page:

Download "Name of the lecturer Doç. Dr. Selma Ayşe ÖZEL"

Transcription

1 Y.L. CENG-541 Information Retrieval Systems MASTER Doç. Dr. Selma Ayşe ÖZEL Information retrieval strategies: vector space model, probabilistic retrieval, language models, inference networks, extended Boolean retrieval, latent semantic indexing. Methods used for retrieval performance improvement: relevance feedback, clustering, passage based retrieval, n- grams, regression analysis, thesauri, semantic networks, parsing, inverted index, query processing techniques, signature files, duplicate document detection. Cross language information retrieval. Parallel and distributed information retrieval. Image and multimedia retrieval. 1

2 Y.L. CENG-552 Data Mining MASTER Doç. Dr. Selma Ayşe ÖZEL Introduction to Data Mining. Data preprocessing techniques including data summarization, data cleaning, data integration and transformation, data reduction and data discretization. Mining frequent patterns, associations and correlations. Classification: decision trees, naïve bayes classifier, rule-based classification, neural networks, support vector machines, associative classification, lazy learners. Prediction. Accuracy and error measures. Ensemble methods. Clustering: partitioning methods, hierarchical methods, density based methods, grid based methods, model based methods, outlier analysis. 2

3 Y.L. CENG-708 Advanced Topics in Data Mining Doç. Dr. Selma Ayşe ÖZEL Supervised, unsupervised and partially supervised learning. Web mining: social network analysis, web crawling, wrapper generation, information integration, opinion and sentiment analysis, web usage mining, text and document clustering, automated recommender systems. It is assumed that every student is familiar with the basic data mining topics (clustering, classification, and association rules) and has some experience with programming and one or more data mining tools (R, RapidMiner, Weka, XLMiner, etc.). 3

4 CENG-0001 Soft Computing Yrd. Doç. Dr. Çiğdem İnan ACI Fuzzy Logic: Crisp set and Fuzzy set, Basic concepts of fuzzy sets, membership functions. Basic operations on fuzzy sets, Properties of fuzzy sets, Fuzzy relations. Propositional logic and Predicate logic, fuzzy If Then rules, fuzzy mapping rules and fuzzy implication functions, Applications. Neural Networks: Basic concepts of neural networks, Neural network architectures, Learning methods, Architecture of a back propagation network, Applications. Genetic Algorithms: Basic concepts of genetic algorithms, encoding, genetic modeling. Hybrid Systems: Integration of neural networks, fuzzy logic and genetic algorithms. 4

5 CENG-0002 Principles of artificial intelligence MASTER Yrd. Doç. Dr. Çiğdem İnan ACI Problem Solving, Solving Problems by Searching, Beyond Classical Search, Adversarial Search, Constraint Satisfaction Problems, Knowledge and Reasoning, Logical Agents, First-Order Logic, Inference in First-Order Logic, Classical Planning, Planning and Acting in the Real World, Knowledge Representation, Uncertain Knowledge and Reasoning, Quantifying Uncertainty, Probabilistic Reasoning, Probabilistic Reasoning over Time, Making Simple Decisions, Making Complex Decisions, Learning from Examples, Knowledge in Learning, Learning Probabilistic Models, Reinforcement Learning, Communicating, Perceiving, and Acting, Natural Language Processing, Natural Language for Communication, Perception. 5

6 CENG-0004 Multi-Agent Systems Yrd. Doç. Dr. Çiğdem İnan ACI Fundamentals Of Agents And Multi-Agent Systems, Intelligent Agents, Basic Coordination, Distributed Cognitive Abilities, Decision Theory; Making Simple Decisions Under Uncertainty; Risk; Risk Averseness, Risk Neutrality; Sequential Decisions Under Uncertainty, Markov Decision Problems, Agent- Agent And Agent-Human Interactions, Multi- Agent Learning. 6

7 CENG-568 Intelligent Optimization Techniques MASTER Yrd. Doç. Dr. Umut ORHAN K-Means, K-NN, Decision trees, ID3, C4.5, Bayessian and Naïve Bayes, Least squares and linear regression, perceptron, adaline, least mean squares, levenberg-marquartd and artificial neural networks, Reinforcement Learning, Q-Learning, TD-Learning, Learning Vector Quantization Network, Radial Basis Function Network, Lagrange Method and support vector machine, Principal component Analysis, Linear Discriminant Analysis. 7

8 CENG-559 Fuzzy Logic MASTER Yrd. Doç. Dr. Umut ORHAN The concept of fuzzy, fuzzy sets, fuzzy membership functions, the feature of fuzzy sets, theoretical operations in fuzzy set, fuzzy relations, uncertainly model fuzziness, fuzzy rule based systems and fuzzy decision making, fuzzy system modelling, fuzzy clustering, neural network approach to fuzzy inference systems, Matlab FIS and ANFIS applications and samples. 8

9 CENG-0006 Crytography and Data Security Yrd. Doç. Dr. Umut ORHAN Classical cryptography, abstract algebra, information theory and Shannon, Block Ciphers and the AES, hash functions, RSA crypto system, Public-key crypto, signature schemes, pseudorandom number generators, identification schemes and entity authentication, key distribution, key agreement and secret sharing schemes, computational complexity. 9

10 CENG-0003 Advanced Theory of Computation Yrd. Doç. Dr. Umut ORHAN Finite automata and regular languages, contextfree languages and pushdown automata, turing machines, and the crurch-turing thesis, decidability, reducibility, P and NP, randomized algorithms, cryptography, zero-knowledge, quantum computing. 10

11 CENG-0005 Advanced Data Compression MASTER Doç. Dr. Mustafa ORAL Introduction to Data Compression: Background, Images, Videos, Information Theory, Quality, Metrics, Lossless Compression: Huffman, Arithmetic, Run-Length, Bit-Plane, DPCM, Lempel-Ziv, BWT, and Multiresolution Compression Techniques, Lossy Compressions: Transform Coding (Fourier, DCT, Haar, Welsh, and Hadamard). Scalar Quantization: Uniform, Optimal and Hybrids. Video compression: Inter- Frame Compression, and motion compensation. Compression standarts: JPEG, MPEG, and others. Other Applications of Compression Techniques. 11

12 CENG-0007 Advanced Swarm Intelligence Doç. Dr. Mustafa ORAL Models and concepts of life and intelligence: The mechanics of life and thought, artificial life in computer programs. Symbols, Connections, and optimization by trial and error: Problem solving and optimization, High-Dimensional cognitive space and word meanings, binary optimization, optimizing with real numbers. The social organisms: Views of evolution, flocks, Herds, schools, and swarms, social behaviour as optimization. Evolutionary computation theory and Paradigms: Genetic algorithms, evolution strategies, finite state machine evolution, function optimization, humans: social psychology, simulating social influence, culture in theory and practice. Applications. 12

13 CENG-0011 Wireless Networks and Security Doç. Dr. Fatih AKAY Wireless links and network characteristics, wifi: Wireless LANs, Cellular Internet Access, Mobility Management: Principles, Mobile IP, Managing Mobility in Cellular networks, What is network security?, Principles of cryptography, message integrity, end-point authentication, securing s, securing tcp connections: SSL, Network-Layer Security: IPsec, Securing Wireless LANs. 13

14 CENG-0010 Advanced Topics in Computer Networks Doç. Dr. Fatih AKAY Multimedia networking applications, streaming stored audio and video, making the best of the Best-Effort service, protocols for real-time interactive Applications, providing multiple classes of service, providing quality of service guarantees, what is network management? The infrastructure for network management, the internet-standart management framework, ASN.1 14

15 CENG-0009 Advanced Project Work Academic staff A theoretical and/or experimental investigation of variances advanced topics in computer engineering. 15

16 CENG-0008 Advanced Project Work Academic staff A theoretical and/or experimental investigation of variances advanced topics in computer engineering. 16

Ajloun National University

Ajloun National University Study Plan Guide for the Bachelor Degree in Computer Information System First Year hr. 101101 Arabic Language Skills (1) 101099-01110 Introduction to Information Technology - - 01111 Programming Language

More information

CS 335 Graphics and Multimedia. Image Compression

CS 335 Graphics and Multimedia. Image Compression CS 335 Graphics and Multimedia Image Compression CCITT Image Storage and Compression Group 3: Huffman-type encoding for binary (bilevel) data: FAX Group 4: Entropy encoding without error checks of group

More information

Introduction p. 1 What is the World Wide Web? p. 1 A Brief History of the Web and the Internet p. 2 Web Data Mining p. 4 What is Data Mining? p.

Introduction p. 1 What is the World Wide Web? p. 1 A Brief History of the Web and the Internet p. 2 Web Data Mining p. 4 What is Data Mining? p. Introduction p. 1 What is the World Wide Web? p. 1 A Brief History of the Web and the Internet p. 2 Web Data Mining p. 4 What is Data Mining? p. 6 What is Web Mining? p. 6 Summary of Chapters p. 8 How

More information

SIR C R REDDY COLLEGE OF ENGINEERING

SIR C R REDDY COLLEGE OF ENGINEERING SIR C R REDDY COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY Course Outcomes II YEAR 1 st SEMESTER Subject: Data Structures (CSE 2.1.1) 1. Describe how arrays, records, linked structures,

More information

Table Of Contents: xix Foreword to Second Edition

Table Of Contents: xix Foreword to Second Edition Data Mining : Concepts and Techniques Table Of Contents: Foreword xix Foreword to Second Edition xxi Preface xxiii Acknowledgments xxxi About the Authors xxxv Chapter 1 Introduction 1 (38) 1.1 Why Data

More information

The University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Doctorate Degree

The University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Doctorate Degree Accreditation & Quality Assurance Center Curriculum for Doctorate Degree 1. Faculty King Abdullah II School for Information Technology 2. Department Computer Science الدكتوراة في علم الحاسوب (Arabic).3

More information

Part I: Data Mining Foundations

Part I: Data Mining Foundations Table of Contents 1. Introduction 1 1.1. What is the World Wide Web? 1 1.2. A Brief History of the Web and the Internet 2 1.3. Web Data Mining 4 1.3.1. What is Data Mining? 6 1.3.2. What is Web Mining?

More information

Ph.D. in Computer Science (

Ph.D. in Computer Science ( Computer Science 1 COMPUTER SCIENCE http://www.cs.miami.edu Dept. Code: CSC Introduction The Department of Computer Science offers undergraduate and graduate education in Computer Science, and performs

More information

( It will be applied from Fall)

( It will be applied from Fall) İZMİR INSTITUTE OF TECHNOLOGY GRADUATE SCHOOL OF ENGINEERING AND SCIENCES DEPARTMENT OF COMPUTER ENGINEERING MASTER OF SCIENCE PROGRAM IN COMPUTER ENGINEERING Core Courses ECTS *CENG 590 Seminar (0-2)

More information

Bing Liu. Web Data Mining. Exploring Hyperlinks, Contents, and Usage Data. With 177 Figures. Springer

Bing Liu. Web Data Mining. Exploring Hyperlinks, Contents, and Usage Data. With 177 Figures. Springer Bing Liu Web Data Mining Exploring Hyperlinks, Contents, and Usage Data With 177 Figures Springer Table of Contents 1. Introduction 1 1.1. What is the World Wide Web? 1 1.2. A Brief History of the Web

More information

Faculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track)

Faculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track) Faculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track) Plan Number Serial # Degree First: General Rules Conditions:.

More information

Contents. Foreword to Second Edition. Acknowledgments About the Authors

Contents. Foreword to Second Edition. Acknowledgments About the Authors Contents Foreword xix Foreword to Second Edition xxi Preface xxiii Acknowledgments About the Authors xxxi xxxv Chapter 1 Introduction 1 1.1 Why Data Mining? 1 1.1.1 Moving toward the Information Age 1

More information

1) Write the characteristics of a problem with suitable example. 2) Explain Hill climbing and its variant Steepest-ascent hill climbing step by step.

1) Write the characteristics of a problem with suitable example. 2) Explain Hill climbing and its variant Steepest-ascent hill climbing step by step. (DMCA 301) ASSIGNMENT - 1, MAY - 2016. PAPER- I : ARTIFICIAL INTELLIGENCE 1) Write the characteristics of a problem with suitable example. 2) Explain Hill climbing and its variant Steepest-ascent hill

More information

Contents. Preface to the Second Edition

Contents. Preface to the Second Edition Preface to the Second Edition v 1 Introduction 1 1.1 What Is Data Mining?....................... 4 1.2 Motivating Challenges....................... 5 1.3 The Origins of Data Mining....................

More information

Course Curriculum for Master Degree in Network Engineering and Security

Course Curriculum for Master Degree in Network Engineering and Security Course Curriculum for Master Degree in Network Engineering and Security The Master Degree in Network Engineering and Security is awarded by the Faculty of Graduate Studies at Jordan University of Science

More information

Programme Outcome COURSE OUTCOMES MCA

Programme Outcome COURSE OUTCOMES MCA Programme Outcome PO1: To provide trained human resource for the IT industry. COURSE OUTCOMES MCA MCA 101 : Object Oriented Programming CO1 The students develops a sound approach to problem solving using

More information

VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Year & Semester : III & VI Section : CSE - 2 Subject Code : IT6702 Subject Name : Data warehousing

More information

Last update: July 17, 2018

Last update: July 17, 2018 COMPUTER SCIENCE Last update: July 17, 2018 CMP SCI 4010 Advanced Web Development with Java: 3 semester hours Prerequisites: CMP SCI 2261 and CMP SCI 3010; or graduate standing. This course covers more

More information

Department of Computer Science & Engineering University of Kalyani. Syllabus for Ph.D. Coursework

Department of Computer Science & Engineering University of Kalyani. Syllabus for Ph.D. Coursework Department of Computer Science & Engineering University of Kalyani Syllabus for Ph.D. Coursework Paper 1: A) Literature Review: (Marks - 25) B) Research Methodology: (Marks - 25) Paper 2: Computer Applications:

More information

Multimedia Communications. Transform Coding

Multimedia Communications. Transform Coding Multimedia Communications Transform Coding Transform coding Transform coding: source output is transformed into components that are coded according to their characteristics If a sequence of inputs is transformed

More information

Chapter 1, Introduction

Chapter 1, Introduction CSI 4352, Introduction to Data Mining Chapter 1, Introduction Young-Rae Cho Associate Professor Department of Computer Science Baylor University What is Data Mining? Definition Knowledge Discovery from

More information

AN INTRODUCTION TO FUZZY SETS Analysis and Design. Witold Pedrycz and Fernando Gomide

AN INTRODUCTION TO FUZZY SETS Analysis and Design. Witold Pedrycz and Fernando Gomide AN INTRODUCTION TO FUZZY SETS Analysis and Design Witold Pedrycz and Fernando Gomide A Bradford Book The MIT Press Cambridge, Massachusetts London, England Foreword - Preface Introduction xiii xxv xxi

More information

MASTER OF ENGINEERING PROGRAM IN INFORMATION

MASTER OF ENGINEERING PROGRAM IN INFORMATION MASTER OF ENGINEERING PROGRAM IN INFORMATION AND COMMUNICATION TECHNOLOGY FOR EMBEDDED SYSTEMS (INTERNATIONAL PROGRAM) Curriculum Title Master of Engineering in Information and Communication Technology

More information

School of Computer Engineering. B.Eng. (Computer Science) Content of Subjects Applicable to Students Matriculating in 2011 or later

School of Computer Engineering. B.Eng. (Computer Science) Content of Subjects Applicable to Students Matriculating in 2011 or later B.Eng. (Computer Science) Content of Subjects Applicable to Students Matriculating in 2011 or later FIRST YEAR CZ1001 DISCRETE MATHEMATICS Elementary number theory; Sets; Predicate logic; Linear recurrence

More information

Computer Science. Courses. Computer Science 1

Computer Science. Courses. Computer Science 1 Computer Science 1 Computer Science Courses CMP SCI 1011 Introduction to the Internet and World Wide Web: 3 semester Intended for any student wishing to utilize the Internet and World Wide Web more effectively.

More information

Multimedia Networking ECE 599

Multimedia Networking ECE 599 Multimedia Networking ECE 599 Prof. Thinh Nguyen School of Electrical Engineering and Computer Science Based on B. Lee s lecture notes. 1 Outline Compression basics Entropy and information theory basics

More information

( It will be applied from Fall)

( It will be applied from Fall) ( It will be applied from 2017-2018 Fall) IZMİR INSTITUTE OF TECHNOLOGY GRADUATE SCHOOL OF ENGINEERING AND SCIENCES DEPARTMENT OF COMPUTER ENGINEERING DOCTORAL PROGRAM IN COMPUTER ENGINEERING Core Courses

More information

TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT 5 LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS xxi

TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT 5 LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS xxi ix TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT 5 LIST OF TABLES xv LIST OF FIGURES xviii LIST OF SYMBOLS AND ABBREVIATIONS xxi 1 INTRODUCTION 1 1.1 INTRODUCTION 1 1.2 WEB CACHING 2 1.2.1 Classification

More information

Chapter 5: Summary and Conclusion CHAPTER 5 SUMMARY AND CONCLUSION. Chapter 1: Introduction

Chapter 5: Summary and Conclusion CHAPTER 5 SUMMARY AND CONCLUSION. Chapter 1: Introduction CHAPTER 5 SUMMARY AND CONCLUSION Chapter 1: Introduction Data mining is used to extract the hidden, potential, useful and valuable information from very large amount of data. Data mining tools can handle

More information

B.Eng. (Computer Science) Course Contents Applicable to Students Matriculating in 2016 onwards

B.Eng. (Computer Science) Course Contents Applicable to Students Matriculating in 2016 onwards FIRST YEAR B.Eng. (Computer Science) Course Contents Applicable to Students Matriculating in 2016 onwards CZ1003 INTRODUCTION TO COMPUTATIONAL THINKING Computing and Algorithms; Introduction to Python;

More information

College of Sciences. College of Sciences. Master s of Science in Computer Sciences Master s of Science in Biotechnology

College of Sciences. College of Sciences. Master s of Science in Computer Sciences Master s of Science in Biotechnology Master s of Science in Computer Sciences Master s of Science in Biotechnology Department of Computer Sciences 1. Introduction\Program Mission The Program mission is to prepare students to be fully abreast

More information

DATA WAREHOUING UNIT I

DATA WAREHOUING UNIT I BHARATHIDASAN ENGINEERING COLLEGE NATTRAMAPALLI DEPARTMENT OF COMPUTER SCIENCE SUB CODE & NAME: IT6702/DWDM DEPT: IT Staff Name : N.RAMESH DATA WAREHOUING UNIT I 1. Define data warehouse? NOV/DEC 2009

More information

What to come. There will be a few more topics we will cover on supervised learning

What to come. There will be a few more topics we will cover on supervised learning Summary so far Supervised learning learn to predict Continuous target regression; Categorical target classification Linear Regression Classification Discriminative models Perceptron (linear) Logistic regression

More information

Computer Science (CS)

Computer Science (CS) Computer Science (CS) 1 Computer Science (CS) Courses CS 401. Computer Algorithms I. 3 or 4 Design and analysis of computer algorithms. Divide-and-conquer, dynamic programming, greedy method, backtracking.

More information

COMPUTER SCIENCE (CSC)

COMPUTER SCIENCE (CSC) Computer Science (CSC) 1 COMPUTER SCIENCE (CSC) CSC 115. Social and Ethical Issues in Computing. 3 Credit Hours. History, social context and methods and tools of analysis. Professional and ethical responsibilities.

More information

CHAPTER II LITERATURE REVIEW

CHAPTER II LITERATURE REVIEW CHAPTER II LITERATURE REVIEW 2.1 BACKGROUND OF THE STUDY The purpose of this chapter is to study and analyze famous lossless data compression algorithm, called LZW. The main objective of the study is to

More information

Source Coding Techniques

Source Coding Techniques Source Coding Techniques Source coding is based on changing the content of the original signal. Also called semantic-based coding. Compression rates may be higher but at a price of loss of information.

More information

Summary of Last Chapter. Course Content. Chapter 3 Objectives. Chapter 3: Data Preprocessing. Dr. Osmar R. Zaïane. University of Alberta 4

Summary of Last Chapter. Course Content. Chapter 3 Objectives. Chapter 3: Data Preprocessing. Dr. Osmar R. Zaïane. University of Alberta 4 Principles of Knowledge Discovery in Data Fall 2004 Chapter 3: Data Preprocessing Dr. Osmar R. Zaïane University of Alberta Summary of Last Chapter What is a data warehouse and what is it for? What is

More information

Flow-based Anomaly Intrusion Detection System Using Neural Network

Flow-based Anomaly Intrusion Detection System Using Neural Network Flow-based Anomaly Intrusion Detection System Using Neural Network tational power to analyze only the basic characteristics of network flow, so as to Intrusion Detection systems (KBIDES) classify the data

More information

VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK VII SEMESTER

VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK VII SEMESTER VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur 603 203 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK VII SEMESTER CS6007-INFORMATION RETRIEVAL Regulation 2013 Academic Year 2018

More information

Data Mining. Jeff M. Phillips. January 7, 2019 CS 5140 / CS 6140

Data Mining. Jeff M. Phillips. January 7, 2019 CS 5140 / CS 6140 Data Mining CS 5140 / CS 6140 Jeff M. Phillips January 7, 2019 What is Data Mining? What is Data Mining? Finding structure in data? Machine learning on large data? Unsupervised learning? Large scale computational

More information

15 Data Compression 2014/9/21. Objectives After studying this chapter, the student should be able to: 15-1 LOSSLESS COMPRESSION

15 Data Compression 2014/9/21. Objectives After studying this chapter, the student should be able to: 15-1 LOSSLESS COMPRESSION 15 Data Compression Data compression implies sending or storing a smaller number of bits. Although many methods are used for this purpose, in general these methods can be divided into two broad categories:

More information

Lecture notes. Com Page 1

Lecture notes. Com Page 1 Lecture notes Com Page 1 Contents Lectures 1. Introduction to Computational Intelligence 2. Traditional computation 2.1. Sorting algorithms 2.2. Graph search algorithms 3. Supervised neural computation

More information

COURSE OUTCOMES M.Sc (Computer Science)

COURSE OUTCOMES M.Sc (Computer Science) COURSE OUTCOMES M.Sc (Computer Science) CS-101 Advanced C++ Programming 1. Understand advanced concepts for handling runtime errors using stack unwinding, uncaught exception and automatic cleanup. 2. Study

More information

Data Mining Technology Based on Bayesian Network Structure Applied in Learning

Data Mining Technology Based on Bayesian Network Structure Applied in Learning , pp.67-71 http://dx.doi.org/10.14257/astl.2016.137.12 Data Mining Technology Based on Bayesian Network Structure Applied in Learning Chunhua Wang, Dong Han College of Information Engineering, Huanghuai

More information

Fundamentals of Video Compression. Video Compression

Fundamentals of Video Compression. Video Compression Fundamentals of Video Compression Introduction to Digital Video Basic Compression Techniques Still Image Compression Techniques - JPEG Video Compression Introduction to Digital Video Video is a stream

More information

Computational Intelligence Applied on Cryptology: a Brief Review

Computational Intelligence Applied on Cryptology: a Brief Review Computational Intelligence Applied on Cryptology: a Brief Review Moisés Danziger Marco Aurélio Amaral Henriques CIBSI 2011 Bucaramanga Colombia 03/11/2011 Outline Introduction Computational Intelligence

More information

Based on Raymond J. Mooney s slides

Based on Raymond J. Mooney s slides Instance Based Learning Based on Raymond J. Mooney s slides University of Texas at Austin 1 Example 2 Instance-Based Learning Unlike other learning algorithms, does not involve construction of an explicit

More information

Bioinformatics - Lecture 07

Bioinformatics - Lecture 07 Bioinformatics - Lecture 07 Bioinformatics Clusters and networks Martin Saturka http://www.bioplexity.org/lectures/ EBI version 0.4 Creative Commons Attribution-Share Alike 2.5 License Learning on profiles

More information

Search Engines. Information Retrieval in Practice

Search Engines. Information Retrieval in Practice Search Engines Information Retrieval in Practice All slides Addison Wesley, 2008 Classification and Clustering Classification and clustering are classical pattern recognition / machine learning problems

More information

COURSE PLAN. Computer Science & Engineering

COURSE PLAN. Computer Science & Engineering COURSE PLAN FACULTY DETAILS: Name of the Faculty:: Designation: Department:: Asst. Professor Computer Science & Engineering COURSE DETAILS Name Of The Programme:: Lesson Plan Batch:: 2011-2015 Designation::Assistant

More information

^ Springer. Computational Intelligence. A Methodological Introduction. Rudolf Kruse Christian Borgelt. Matthias Steinbrecher Pascal Held

^ Springer. Computational Intelligence. A Methodological Introduction. Rudolf Kruse Christian Borgelt. Matthias Steinbrecher Pascal Held Rudolf Kruse Christian Borgelt Frank Klawonn Christian Moewes Matthias Steinbrecher Pascal Held Computational Intelligence A Methodological Introduction ^ Springer Contents 1 Introduction 1 1.1 Intelligent

More information

MASTER OF SCIENCE IN COMPUTER AND INFORMATION SCIENCE

MASTER OF SCIENCE IN COMPUTER AND INFORMATION SCIENCE DEPARTMENT OF MATHEMATICS AND COMPUTER SCIENCE Ping Zhang, Ph.D., Interim Department Chairperson Math and Science Building, 1 st Floor 1000 ASU Drive #30 Phone: 601-877-6430 FAX: 601-877-6631 Degrees Offered

More information

60-538: Information Retrieval

60-538: Information Retrieval 60-538: Information Retrieval September 7, 2017 1 / 48 Outline 1 what is IR 2 3 2 / 48 Outline 1 what is IR 2 3 3 / 48 IR not long time ago 4 / 48 5 / 48 now IR is mostly about search engines there are

More information

CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS

CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS CHAPTER 4 CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS 4.1 Introduction Optical character recognition is one of

More information

Computer Science Courses

Computer Science Courses Computer Science Courses 1 Computer Science Courses Courses CS 1101. Intro to Computer Science Lab. Introduction to Computer Science Lab First course for students majoring in Computer Science. Introduction

More information

SCALABLE KNOWLEDGE BASED AGGREGATION OF COLLECTIVE BEHAVIOR

SCALABLE KNOWLEDGE BASED AGGREGATION OF COLLECTIVE BEHAVIOR SCALABLE KNOWLEDGE BASED AGGREGATION OF COLLECTIVE BEHAVIOR P.SHENBAGAVALLI M.E., Research Scholar, Assistant professor/cse MPNMJ Engineering college Sspshenba2@gmail.com J.SARAVANAKUMAR B.Tech(IT)., PG

More information

Machine Learning Techniques for Data Mining

Machine Learning Techniques for Data Mining Machine Learning Techniques for Data Mining Eibe Frank University of Waikato New Zealand 10/25/2000 1 PART VII Moving on: Engineering the input and output 10/25/2000 2 Applying a learner is not all Already

More information

A Content Based Image Retrieval System Based on Color Features

A Content Based Image Retrieval System Based on Color Features A Content Based Image Retrieval System Based on Features Irena Valova, University of Rousse Angel Kanchev, Department of Computer Systems and Technologies, Rousse, Bulgaria, Irena@ecs.ru.acad.bg Boris

More information

Basic Data Mining Technique

Basic Data Mining Technique Basic Data Mining Technique What is classification? What is prediction? Supervised and Unsupervised Learning Decision trees Association rule K-nearest neighbor classifier Case-based reasoning Genetic algorithm

More information

Topic 5 Image Compression

Topic 5 Image Compression Topic 5 Image Compression Introduction Data Compression: The process of reducing the amount of data required to represent a given quantity of information. Purpose of Image Compression: the reduction of

More information

CSE 158. Web Mining and Recommender Systems. Midterm recap

CSE 158. Web Mining and Recommender Systems. Midterm recap CSE 158 Web Mining and Recommender Systems Midterm recap Midterm on Wednesday! 5:10 pm 6:10 pm Closed book but I ll provide a similar level of basic info as in the last page of previous midterms CSE 158

More information

Slides for Data Mining by I. H. Witten and E. Frank

Slides for Data Mining by I. H. Witten and E. Frank Slides for Data Mining by I. H. Witten and E. Frank 7 Engineering the input and output Attribute selection Scheme-independent, scheme-specific Attribute discretization Unsupervised, supervised, error-

More information

Information Management (IM)

Information Management (IM) 1 2 3 4 5 6 7 8 9 Information Management (IM) Information Management (IM) is primarily concerned with the capture, digitization, representation, organization, transformation, and presentation of information;

More information

Data Preprocessing. S1 Teknik Informatika Fakultas Teknologi Informasi Universitas Kristen Maranatha

Data Preprocessing. S1 Teknik Informatika Fakultas Teknologi Informasi Universitas Kristen Maranatha Data Preprocessing S1 Teknik Informatika Fakultas Teknologi Informasi Universitas Kristen Maranatha 1 Why Data Preprocessing? Data in the real world is dirty incomplete: lacking attribute values, lacking

More information

9. Conclusions. 9.1 Definition KDD

9. Conclusions. 9.1 Definition KDD 9. Conclusions Contents of this Chapter 9.1 Course review 9.2 State-of-the-art in KDD 9.3 KDD challenges SFU, CMPT 740, 03-3, Martin Ester 419 9.1 Definition KDD [Fayyad, Piatetsky-Shapiro & Smyth 96]

More information

Image Analysis, Classification and Change Detection in Remote Sensing

Image Analysis, Classification and Change Detection in Remote Sensing Image Analysis, Classification and Change Detection in Remote Sensing WITH ALGORITHMS FOR ENVI/IDL Morton J. Canty Taylor &. Francis Taylor & Francis Group Boca Raton London New York CRC is an imprint

More information

10/14/2017. Dejan Sarka. Anomaly Detection. Sponsors

10/14/2017. Dejan Sarka. Anomaly Detection. Sponsors Dejan Sarka Anomaly Detection Sponsors About me SQL Server MVP (17 years) and MCT (20 years) 25 years working with SQL Server Authoring 16 th book Authoring many courses, articles Agenda Introduction Simple

More information

Machine Learning using MapReduce

Machine Learning using MapReduce Machine Learning using MapReduce What is Machine Learning Machine learning is a subfield of artificial intelligence concerned with techniques that allow computers to improve their outputs based on previous

More information

SCHEME OF COURSE WORK. Data Warehousing and Data mining

SCHEME OF COURSE WORK. Data Warehousing and Data mining SCHEME OF COURSE WORK Course Details: Course Title Course Code Program: Specialization: Semester Prerequisites Department of Information Technology Data Warehousing and Data mining : 15CT1132 : B.TECH

More information

Signals, Information and Data

Signals, Information and Data The Fu Foundation School of Engineering and Applied Science Department of Electrical Engineering COLUMBIA UNIVERSITY IN THE CITY OF NEW YORK Signals, Information and Data Prof. Xiaodong Wang Signals, Information

More information

RGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata

RGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata RGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata Ahmad Pahlavan Tafti Mohammad V. Malakooti Department of Computer Engineering IAU, UAE Branch

More information

This tutorial has been prepared for computer science graduates to help them understand the basic-to-advanced concepts related to data mining.

This tutorial has been prepared for computer science graduates to help them understand the basic-to-advanced concepts related to data mining. About the Tutorial Data Mining is defined as the procedure of extracting information from huge sets of data. In other words, we can say that data mining is mining knowledge from data. The tutorial starts

More information

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012). JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An

More information

Fundamentals of Digital Image Processing

Fundamentals of Digital Image Processing \L\.6 Gw.i Fundamentals of Digital Image Processing A Practical Approach with Examples in Matlab Chris Solomon School of Physical Sciences, University of Kent, Canterbury, UK Toby Breckon School of Engineering,

More information

Multimedia Communications ECE 728 (Data Compression)

Multimedia Communications ECE 728 (Data Compression) Multimedia Communications ECE 728 (Data Compression) Multimedia Communications Course number: ECE 728 Instructor: Dr. S. Shirani E-mail: shirani@mcmaster.ca Office: ITB-A320 Web page of the course: http://www.ece.mcmaster.ca/~shirani/multi08/multi08.htm

More information

Semi-supervised Learning

Semi-supervised Learning Semi-supervised Learning Piyush Rai CS5350/6350: Machine Learning November 8, 2011 Semi-supervised Learning Supervised Learning models require labeled data Learning a reliable model usually requires plenty

More information

International Journal of Scientific Research & Engineering Trends Volume 4, Issue 6, Nov-Dec-2018, ISSN (Online): X

International Journal of Scientific Research & Engineering Trends Volume 4, Issue 6, Nov-Dec-2018, ISSN (Online): X Analysis about Classification Techniques on Categorical Data in Data Mining Assistant Professor P. Meena Department of Computer Science Adhiyaman Arts and Science College for Women Uthangarai, Krishnagiri,

More information

Machine Learning Methods in Visualisation for Big Data 2018

Machine Learning Methods in Visualisation for Big Data 2018 Machine Learning Methods in Visualisation for Big Data 2018 Daniel Archambault1 Ian Nabney2 Jaakko Peltonen3 1 Swansea University 2 University of Bristol 3 University of Tampere, Aalto University Evaluating

More information

Textbook Charles Petzold, Programming Windows, 5th edition, Microsoft Press. References - other textbooks or materials none

Textbook Charles Petzold, Programming Windows, 5th edition, Microsoft Press. References - other textbooks or materials none CS351 Systems Programming Last Updated - 03/01/02 Course Manager Dr. Phil Dickens, Assistant Professor 3 credit hours; required for CS & CPE; 100 min. lecture & 100 min. lab each week Current Catalog Description

More information

T chnology chnology Ma turity turity for fo Adaptiv Adaptiv Massively Massiv ely Pa P ra r llel llel Computing F rst rst Wo W rksho p 2009

T chnology chnology Ma turity turity for fo Adaptiv Adaptiv Massively Massiv ely Pa P ra r llel llel Computing F rst rst Wo W rksho p 2009 Technology Maturity for Adaptive Massively Parallel Computing First Workshop 2009 March h2 3, 2009 Portland, OR, USA AMP Computing Workshop 2009 Massive Data Computing Pradeep K. Dubey Senior Principal

More information

Introduction to Information Retrieval

Introduction to Information Retrieval Introduction to Information Retrieval Mohsen Kamyar چهارمین کارگاه ساالنه آزمایشگاه فناوری و وب بهمن ماه 1391 Outline Outline in classic categorization Information vs. Data Retrieval IR Models Evaluation

More information

Preface to the Second Edition. Preface to the First Edition. 1 Introduction 1

Preface to the Second Edition. Preface to the First Edition. 1 Introduction 1 Preface to the Second Edition Preface to the First Edition vii xi 1 Introduction 1 2 Overview of Supervised Learning 9 2.1 Introduction... 9 2.2 Variable Types and Terminology... 9 2.3 Two Simple Approaches

More information

Contents Metal Forming and Machining Processes Review of Stress, Linear Strain and Elastic Stress-Strain Relations 3 Classical Theory of Plasticity

Contents Metal Forming and Machining Processes Review of Stress, Linear Strain and Elastic Stress-Strain Relations 3 Classical Theory of Plasticity Contents 1 Metal Forming and Machining Processes... 1 1.1 Introduction.. 1 1.2 Metal Forming...... 2 1.2.1 Bulk Metal Forming.... 2 1.2.2 Sheet Metal Forming Processes... 17 1.3 Machining.. 23 1.3.1 Turning......

More information

A Soft-Computing Approach to Knowledge Flow Synthesis and Optimization

A Soft-Computing Approach to Knowledge Flow Synthesis and Optimization A Soft-Computing Approach to Knowledge Flow Synthesis and Optimization Tomáš Řehořek Pavel Kordík Computational Intelligence Group (CIG), Faculty of Information Technology (FIT), Czech Technical University

More information

KINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY ACADEMIC YEAR / ODD SEMESTER QUESTION BANK

KINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY ACADEMIC YEAR / ODD SEMESTER QUESTION BANK KINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY ACADEMIC YEAR 2011-2012 / ODD SEMESTER QUESTION BANK SUB.CODE / NAME YEAR / SEM : IT1301 INFORMATION CODING TECHNIQUES : III / V UNIT -

More information

Data Mining. Introduction. Hamid Beigy. Sharif University of Technology. Fall 1395

Data Mining. Introduction. Hamid Beigy. Sharif University of Technology. Fall 1395 Data Mining Introduction Hamid Beigy Sharif University of Technology Fall 1395 Hamid Beigy (Sharif University of Technology) Data Mining Fall 1395 1 / 21 Table of contents 1 Introduction 2 Data mining

More information

Elysium Technologies Private Limited::IEEE Final year Project

Elysium Technologies Private Limited::IEEE Final year Project Elysium Technologies Private Limited::IEEE Final year Project - o n t e n t s Data mining Transactions Rule Representation, Interchange, and Reasoning in Distributed, Heterogeneous Environments Defeasible

More information

Study Plan. 2nd Year - 3rd Semester Component code Name Scientific Area Field ECTS Duration Hours Group of Options

Study Plan. 2nd Year - 3rd Semester Component code Name Scientific Area Field ECTS Duration Hours Group of Options Study Plan School: School of Sciences and Technology Degree: Master Course: Informatics Engineering (São Tomé e Príncipe) (cód. 579) 2nd Year - 3rd Semester Group of Options INF7033 Text Based Information

More information

IMAGE ANALYSIS, CLASSIFICATION, and CHANGE DETECTION in REMOTE SENSING

IMAGE ANALYSIS, CLASSIFICATION, and CHANGE DETECTION in REMOTE SENSING SECOND EDITION IMAGE ANALYSIS, CLASSIFICATION, and CHANGE DETECTION in REMOTE SENSING ith Algorithms for ENVI/IDL Morton J. Canty с*' Q\ CRC Press Taylor &. Francis Group Boca Raton London New York CRC

More information

Course Syllabus. Website Multimedia Systems, Overview

Course Syllabus. Website   Multimedia Systems, Overview Course Syllabus Website http://ce.sharif.edu/courses/93-94/2/ce342-1/ Page 1 Course Syllabus Textbook Z-N. Li, M.S. Drew, Fundamentals of Multimedia, Pearson Prentice Hall Upper Saddle River, NJ, 2004.*

More information

Applying Supervised Learning

Applying Supervised Learning Applying Supervised Learning When to Consider Supervised Learning A supervised learning algorithm takes a known set of input data (the training set) and known responses to the data (output), and trains

More information

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING SHRI ANGALAMMAN COLLEGE OF ENGINEERING & TECHNOLOGY (An ISO 9001:2008 Certified Institution) SIRUGANOOR,TRICHY-621105. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Year / Semester: IV/VII CS1011-DATA

More information

SIDDHARTH GROUP OF INSTITUTIONS :: PUTTUR Siddharth Nagar, Narayanavanam Road QUESTION BANK (DESCRIPTIVE)

SIDDHARTH GROUP OF INSTITUTIONS :: PUTTUR Siddharth Nagar, Narayanavanam Road QUESTION BANK (DESCRIPTIVE) SIDDHARTH GROUP OF INSTITUTIONS :: PUTTUR Siddharth Nagar, Narayanavanam Road 517583 QUESTION BANK (DESCRIPTIVE) Subject with Code : Data Warehousing and Mining (16MC815) Year & Sem: II-MCA & I-Sem Course

More information

Lecture 11: Clustering Introduction and Projects Machine Learning

Lecture 11: Clustering Introduction and Projects Machine Learning Lecture 11: Clustering Introduction and Projects Machine Learning Andrew Rosenberg March 12, 2010 1/1 Last Time Junction Tree Algorithm Efficient Marginals in Graphical Models 2/1 Today Clustering Project

More information

Department of Computer Science and Engineering B.E/B.Tech/M.E/M.Tech : B.E. Regulation: 2013 PG Specialisation : _

Department of Computer Science and Engineering B.E/B.Tech/M.E/M.Tech : B.E. Regulation: 2013 PG Specialisation : _ COURSE DELIVERY PLAN - THEORY Page 1 of 6 Department of Computer Science and Engineering B.E/B.Tech/M.E/M.Tech : B.E. Regulation: 2013 PG Specialisation : _ LP: CS6007 Rev. No: 01 Date: 27/06/2017 Sub.

More information

An Introduction to Pattern Recognition

An Introduction to Pattern Recognition An Introduction to Pattern Recognition Speaker : Wei lun Chao Advisor : Prof. Jian-jiun Ding DISP Lab Graduate Institute of Communication Engineering 1 Abstract Not a new research field Wide range included

More information

Collective Intelligence in Action

Collective Intelligence in Action Collective Intelligence in Action SATNAM ALAG II MANNING Greenwich (74 w. long.) contents foreword xv preface xvii acknowledgments xix about this book xxi PART 1 GATHERING DATA FOR INTELLIGENCE 1 "1 Understanding

More information

DEPARTMENT OF COMPUTER SCIENCE

DEPARTMENT OF COMPUTER SCIENCE Department of Computer Science 1 DEPARTMENT OF COMPUTER SCIENCE Office in Computer Science Building, Room 279 (970) 491-5792 cs.colostate.edu (http://www.cs.colostate.edu) Professor L. Darrell Whitley,

More information

Data Mining. Introduction. Hamid Beigy. Sharif University of Technology. Fall 1394

Data Mining. Introduction. Hamid Beigy. Sharif University of Technology. Fall 1394 Data Mining Introduction Hamid Beigy Sharif University of Technology Fall 1394 Hamid Beigy (Sharif University of Technology) Data Mining Fall 1394 1 / 20 Table of contents 1 Introduction 2 Data mining

More information