![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
A Logarithmic Distance-Based Multi-Objective Genetic Programming Approach for Classification of Imbalanced Data
Standard classification algorithms give biased results when data sets are imbalanced. Genetic Programming, a machine learning algorithm based on the evolution of species in nature, also suffers from the same i...
-
Chapter and Conference Paper
A Review on Unbalanced Data Classification
Classification is a supervised machine learning technique to categorize data into a predefined and distinct number of classes. Again, in the real world, most of these data set are unbalanced. If one of its cla...
-
Chapter and Conference Paper
Predicting the Presence of Newt-Amphibian Using Genetic Programming
In nature, aquatic ecosystems play a very important aspect. River valleys, wetlands, and water reservoirs are territories for various species of vegetation and wildlife. The prediction of these species is very...
-
Chapter and Conference Paper
Coronavirus Visual Dashboard and Data Repository: COVID-19
This research paper talks about the site advancement and the most hazardous and pandemic infection COVID-19. We are additionally examining the Steps followed for making a site. We analyze diverse site advancem...
-
Chapter and Conference Paper
Assessment of Weight Factor in Genetic Programming Fitness Function for Imbalanced Data Classification
In real-world data classification, applications often have an imbalanced distribution of data over various classes. This imbalanced distribution imposes intense challenges, and because of this, traditional cla...
-
Chapter and Conference Paper
Realization of Security System Using Facial Recognition and Arduino Keypad Door Lock System
In today’s world which is full of technological and unseen errors security is one of the major issues that should not be over seen. The technological and modern perspective has to be used to resolve the modern...
-
Chapter and Conference Paper
Classification of Forest Cover Type Using Random Forests Algorithm
Natural resource planning important aspect for any society. Knowing forest cover type is one of them. Multiple statistical and machine learning approaches are already proposed in past for classification. I...
-
Article
Certain Observations on ACORN v3 and Grain v1—Implications Towards TMDTO Attacks
It is known that for a stream cipher with state size less than 2.5 times the key size, it is possible to mount a Time-Memory-Data Trade-Off attack with an online complexity lower than the exhaustive key search...
-
Article
Open Access26th Annual Computational Neuroscience Meeting (CNS*2017): Part 3
-
Chapter and Conference Paper
Quantum Algorithms Related to \(\textit{HN}\) -Transforms of Boolean Functions
\(\textit{HN}\) -transforms, which have been proposed as generalizations of Hadamard transforms, are construc...
-
Chapter and Conference Paper
An Executable Sequential Specification for Spark Aggregation
Spark is a new promising platform for scalable data-parallel computation. It provides several high-level application programming interfaces (APIs) to perform parallel data aggregation. Since execution of paral...
-
Chapter and Conference Paper
Certain Observations on ACORN v3 and the Implications to TMDTO Attacks
ACORN is a lightweight authenticated cipher which is one of the selected designs among the fifteen third round candidates. This is based on the underlying model of a stream cipher with 6 LFSRs of different len...
-
Article
Open AccessPredicting surgical outcome in intractable epilepsy using a computational model of seizure initiation
-
Chapter and Conference Paper
Commutativity of Reducers
In the Map-Reduce programming model for data parallel computation, a reducer computes an output from a list of input values associated with a key. The inputs however may not arrive at a reducer in a fixed orde...
-
Chapter and Conference Paper
What Gives? A Hybrid Algorithm for Error Trace Explanation
When a program fails, the cause of the failure is often buried in a long, hard-to-understand error trace. We present a new technique for automatic error localization, which formally unifies prior approaches ba...
-
Chapter and Conference Paper
Alternate and Learn: Finding Witnesses without Looking All over
Most symbolic bug detection techniques perform search over the program control flow graph based on either forward symbolic execution or backward weakest preconditions computation. The complexity of determining...
-
Chapter and Conference Paper
Object Model Construction for Inheritance in C++ and Its Applications to Program Analysis
Modern object-oriented programming languages such as C++ provide convenient abstractions and data encapsulation mechanisms for software developers. However, these features also complicate testing and static an...
-
Article
Verification of evolving software via component substitutability analysis
This paper presents an automated and compositional procedure to solve the substitutability problem in the context of evolving software systems. Our solution contributes two techniques for checking correctness of ...
-
Chapter and Conference Paper
SAT-Based Compositional Verification Using Lazy Learning
A recent approach to automated assume-guarantee reasoning (AGR) for concurrent systems relies on computing environment assumptions for components using the L * algorithm for learning regular langu...
-
Chapter and Conference Paper
Symbolic Model Checking of Concurrent Programs Using Partial Orders and On-the-Fly Transactions
The state explosion problem is one of the core bottlenecks in the model checking of concurrent software. We show how to ameliorate the problem by combining the ability of partial order techniques to reduce the...