Machine Learning Reading: Chapter 18, 20. 2 Agenda and Announcements Machine Learning assignment will go out on Thursday. Tutorial in class on tool for.

Slides:



Advertisements
Similar presentations
Last lesson... what did we look at?. Today we will be looking at Creating a professional presentation to discuss ICT both inside and outside of school.
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
 Tournament brackets  Multistage events  Seeding  Schedules  Printing  Reports  Export to Internet
Ladder & Pyramid Tournaments. Ladder Structured like a step ladder Structured like a step ladder A player is placed on each rung of the ladder A player.
CIS101 Introduction to Computing Week 11 Spring 2004.
Machine Learning Bob Durrant School of Computer Science
Bibliographic Resources Fredj Tekaia Institut Pasteur EMBO Bioinformatics and Comparative Genome Analyses Course Institut Pasteur Paris.
Lecture Inference for a population mean when the stdev is unknown; one more example 12.3 Testing a population variance 12.4 Testing a population.
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Machine Learning as Applied to Intrusion Detection By Christine Fossaceca.
Testing Intrusion Detection Systems: A Critic for the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory By.
1 Efficient Management of Data Center Resources for Massively Multiplayer Online Games V. Nae, A. Iosup, S. Podlipnig, R. Prodan, D. Epema, T. Fahringer,
Knowledge Discovery and Data Mining (COMP 5318) S1, 2013.
Get the DL on DL* in Business Studies Kari Peters, Borden BTI Michael A. Goldberg, Martingrove CI #GD2B, 2013 (*Down-Low on Digital Literacy!)
Using Bayesian Networks for Detecting Network Anomalies Lane Thames ECE 8833 Intelligent Systems.
Cyber Intrusion Detection Algorithm Based on Bayes’ Theorem
{ Science Starter #1 Take out a piece of paper, write the title, copy the question, today’s date, and begin 1) Which track had the faster speed, 40cm or.
COMP Introduction to Programming Yi Hong May 13, 2015.
1 Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Benchmark H. Güneş Kayacık Nur Zincir-Heywood Malcolm I. Heywood.
 I The game  II Gameplay  III Champions  IV A game… Not only !
Network Security CS nd Term Course Syllabus Cairo University Faculty of Computers and Information.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
An Overview of Intrusion Detection Using Soft Computing Archana Sapkota Palden Lama CS591 Fall 2009.
CompSci 6 Introduction to Computer Science October 20, 2011 Prof. Rodger.
University of Colorado - Intro to Aerospace Structures (ASEN 3112) - Fall 2015 HW 2-3 and Midterm Exam HW assignments posted on public web site and D2L.
COP3502: Introduction to Computer Science Yashas Shankar.
The Internet and Politics Agenda for Today  Lab scheduling  Comparative Politics methodology  Web guide assignment  Web site and bulletin board overview.
Please get out your completed 8.2B Graphing Worksheet 2 and pass it to the center aisle to be collected by the TA.
Mastering’s Powerful Diagnostics: Analyze Student Performance and Use Results to Improve Learning with Scott Hildreth.
Welcome To MOODLE Getting Started. Introductions Christa McLaughlin – High School math teacher and high school lead teacher of technology Jason Grubbs.
Chapter 7.1 Posting Accounting data in this journal entry has not yet been transferred to the ledger Journal.
Psychology 120 Course Syllabus Mr. Hudson Course Syllabus Mr. Hudson.
Use of Computers Study vs. Recreation Done by Nishat Naoushin Presentation version 2 My (rubaiyat) version was little bit outdated with 0ffice 2003.
FAFSA STEP-BY-STEP 1. STUDENTS WILL LEARN BASIC INFORMATION ABOUT THE FAFSA INCLUDING KEY DEADLINES, MATERIALS NEEDED, AND THE SIGNIFICANCE OF BOTH APPLICATIONS.

1 Network Simulation and Testing Polly Huang EE NTU
Open Notebook Science using Blogs and Wikis: Implications for Chemical Education Jean-Claude Bradley E-Learning Coordinator College of Arts and Sciences.
IENG 248 D. H. Jensen 2/12/2016Engineering Graphics & 3-D Modeling1 Lecture 6 Midterm Review.
MAKE IT A GREAT DAY!! 12/14/2015 – “The best way out is always through.” – Robert Frost Teaching Point(s): – We will analyze Chapters 4-5 in Of Mice and.
Lecture 1 Page 1 CS 236 Online Introduction CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
TOK 1 September 14, 2015 Bell work: How can we justify logic? (10 min.) 9 (10 min.) 9 Agenda:- -Review TOK essay rubric -Read & annotate exemplar TOK essay.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
ICS 151 Digital Logic Design Spring 2004 Administrative Issues.
1 Web Search How do the various components of the internet work together in order to give you the information you search for each day? 2 Thinking.
The Houston Army-Navy Scramble Army Alumni; West Point Society of Greater Houston vs. Navy Alumni; USNAAA Gulf Coast Chapter Golf Tournament / October.
Introduction1-1 CS 494/594 Internetworking Protocols.
4/30/12. Explain what gene frequency is. Measure gene frequency in a model population. Make and test predictions about whether and how gene frequency.
Learning Management System
SCE 4310 U04 Class #5, Week#5 Thursday, Feb. 11, 2016 Agenda Slide & Photos, Notes, Resource Info In today’s class, we were able to complete the first.
Homework Tutorials Help HSA 520 ASSIGNMENT 1
BUS 591 Week 1 Homework Problems (Ash) Week One Homework Problems. Complete the following Workbook Template Week One or you may complete the Problem 1-3B.
BUS 591 Week 2 Homework Problems (Ash) Week Two Homework Problems. Complete Workbook Template Week Two or you may find the problems 3-2B on page 150 and.
Answer the prompt that is under the document camera
Spring 2003 Dr. Susan Bridges
Welcome to Science with Mrs. Keyfel!
An Enhanced Support Vector Machine Model for Intrusion Detection
CSEC 640 Innovative Education--snaptutorial.com
SEC 340 Education for Service/tutorialrank.com
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
Exploring Computer Science Lesson 4-11
Driver Education Syllabus
Inside a PMI Online Course
The review session is after class today.
Electronic Communication and the Internet
Daily PPT Jan 2, 2018 Mrs. Bly Eng 4
Daily PPT 1/3/18 (Wed) & 1/4/18 (thurs) Mrs. Bly Eng 4
Objective 1: Use Weka’s WrapperSubsetEval (Naïve Bayes
Modeling IDS using hybrid intelligent systems
Citation databases and social networks for researchers: measuring research impact and disseminating results - exercise Elisavet Koutzamani
Presentation transcript:

Machine Learning Reading: Chapter 18, 20

2 Agenda and Announcements Machine Learning assignment will go out on Thursday. Tutorial in class on tool for homework Today: –Tournament –Application in machine learning –Midterm results –HW 1 results

3 Tournament Structure 1 st round randomly seeded –Who plays who –Starter rank random After each game, players who have won same number of games play against each other –5-6 rounds Prediction of length of time: 100 min per round, 10 hours Will post a web site that tracks Lab date not yet confirmed Extra credit 1.5 points for passing entrance test 1.5 points for top 50% 1.5 points for top points for top 1

4 KDD Cup Knowledge Dissemination and Discovery 2003 – Predicting interest in journal papers –SVMs a winner 2002 – Bioinformatics - e.g., given a set of bioinformatics papers and a list of genes mentioned in each paper, determine for each gene whether the paper has full experimental evidence 2001 – Bioinformatics – prediction of biomolecular activity for drug design; prediction of gene/protein function and localization 2000 – Predicting user activity in online product web site (legwear) 1999 – Network intrusion detection. Given 5 million connection records, predict normal vs. attack (denial of service, remote unauthorized access, local unauthorized access, probing) 1998 – Predict who will give how much to a specific charity based on a variety of demographics Two of the 3 winners used Naïve Bayes classifiers

5

6

7

8

9

10

11

12

13

14

15 Task 3

16