Search results

1 – 10 of over 3000
Article
Publication date: 6 January 2022

Deepti Sisodia and Dilip Singh Sisodia

The problem of choosing the utmost useful features from hundreds of features from time-series user click data arises in online advertising toward fraudulent publisher's…

Abstract

Purpose

The problem of choosing the utmost useful features from hundreds of features from time-series user click data arises in online advertising toward fraudulent publisher's classification. Selecting feature subsets is a key issue in such classification tasks. Practically, the use of filter approaches is common; however, they neglect the correlations amid features. Conversely, wrapper approaches could not be applied due to their complexities. Moreover, in particular, existing feature selection methods could not handle such data, which is one of the major causes of instability of feature selection.

Design/methodology/approach

To overcome such issues, a majority voting-based hybrid feature selection method, namely feature distillation and accumulated selection (FDAS), is proposed to investigate the optimal subset of relevant features for analyzing the publisher's fraudulent conduct. FDAS works in two phases: (1) feature distillation, where significant features from standard filter and wrapper feature selection methods are obtained using majority voting; (2) accumulated selection, where we enumerated an accumulated evaluation of relevant feature subset to search for an optimal feature subset using effective machine learning (ML) models.

Findings

Empirical results prove enhanced classification performance with proposed features in average precision, recall, f1-score and AUC in publisher identification and classification.

Originality/value

The FDAS is evaluated on FDMA2012 user-click data and nine other benchmark datasets to gauge its generalizing characteristics, first, considering original features, second, with relevant feature subsets selected by feature selection (FS) methods, third, with optimal feature subset obtained by the proposed approach. ANOVA significance test is conducted to demonstrate significant differences between independent features.

Details

Data Technologies and Applications, vol. 56 no. 4
Type: Research Article
ISSN: 2514-9288

Keywords

Article
Publication date: 7 July 2020

Jiaming Liu, Liuan Wang, Linan Zhang, Zeming Zhang and Sicheng Zhang

The primary objective of this study was to recognize critical indicators in predicting blood glucose (BG) through data-driven methods and to compare the prediction performance of…

Abstract

Purpose

The primary objective of this study was to recognize critical indicators in predicting blood glucose (BG) through data-driven methods and to compare the prediction performance of four tree-based ensemble models, i.e. bagging with tree regressors (bagging-decision tree [Bagging-DT]), AdaBoost with tree regressors (Adaboost-DT), random forest (RF) and gradient boosting decision tree (GBDT).

Design/methodology/approach

This study proposed a majority voting feature selection method by combining lasso regression with the Akaike information criterion (AIC) (LR-AIC), lasso regression with the Bayesian information criterion (BIC) (LR-BIC) and RF to select indicators with excellent predictive performance from initial 38 indicators in 5,642 samples. The selected features were deployed to build the tree-based ensemble models. The 10-fold cross-validation (CV) method was used to evaluate the performance of each ensemble model.

Findings

The results of feature selection indicated that age, corpuscular hemoglobin concentration (CHC), red blood cell volume distribution width (RBCVDW), red blood cell volume and leucocyte count are five most important clinical/physical indicators in BG prediction. Furthermore, this study also found that the GBDT ensemble model combined with the proposed majority voting feature selection method is better than other three models with respect to prediction performance and stability.

Practical implications

This study proposed a novel BG prediction framework for better predictive analytics in health care.

Social implications

This study incorporated medical background and machine learning technology to reduce diabetes morbidity and formulate precise medical schemes.

Originality/value

The majority voting feature selection method combined with the GBDT ensemble model provides an effective decision-making tool for predicting BG and detecting diabetes risk in advance.

Article
Publication date: 5 November 2020

Dan Wu and Fei Yu

118

Abstract

Details

Library Hi Tech, vol. 38 no. 4
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 January 1983

R.G.B. Fyffe

This book is a policy proposal aimed at the democratic left. It is concerned with gradual but radical reform of the socio‐economic system. An integrated policy of industrial and…

11006

Abstract

This book is a policy proposal aimed at the democratic left. It is concerned with gradual but radical reform of the socio‐economic system. An integrated policy of industrial and economic democracy, which centres around the establishment of a new sector of employee‐controlled enterprises, is presented. The proposal would retain the mix‐ed economy, but transform it into a much better “mixture”, with increased employee‐power in all sectors. While there is much of enduring value in our liberal western way of life, gross inequalities of wealth and power persist in our society.

Details

International Journal of Sociology and Social Policy, vol. 3 no. 1/2
Type: Research Article
ISSN: 0144-333X

Keywords

Article
Publication date: 13 August 2020

Chandra Sekhar Kolli and Uma Devi Tatavarthi

Fraud transaction detection has become a significant factor in the communication technologies and electronic commerce systems, as it affects the usage of electronic payment. Even…

Abstract

Purpose

Fraud transaction detection has become a significant factor in the communication technologies and electronic commerce systems, as it affects the usage of electronic payment. Even though, various fraud detection methods are developed, enhancing the performance of electronic payment by detecting the fraudsters results in a great challenge in the bank transaction.

Design/methodology/approach

This paper aims to design the fraud detection mechanism using the proposed Harris water optimization-based deep recurrent neural network (HWO-based deep RNN). The proposed fraud detection strategy includes three different phases, namely, pre-processing, feature selection and fraud detection. Initially, the input transactional data is subjected to the pre-processing phase, where the data is pre-processed using the Box-Cox transformation to remove the redundant and noise values from data. The pre-processed data is passed to the feature selection phase, where the essential and the suitable features are selected using the wrapper model. The selected feature makes the classifier to perform better detection performance. Finally, the selected features are fed to the detection phase, where the deep recurrent neural network classifier is used to achieve the fraud detection process such that the training process of the classifier is done by the proposed Harris water optimization algorithm, which is the integration of water wave optimization and Harris hawks optimization.

Findings

Moreover, the proposed HWO-based deep RNN obtained better performance in terms of the metrics, such as accuracy, sensitivity and specificity with the values of 0.9192, 0.7642 and 0.9943.

Originality/value

An effective fraud detection method named HWO-based deep RNN is designed to detect the frauds in the bank transaction. The optimal features selected using the wrapper model enable the classifier to find fraudulent activities more efficiently. However, the accurate detection result is evaluated through the optimization model based on the fitness measure such that the function with the minimal error value is declared as the best solution, as it yields better detection results.

Article
Publication date: 16 February 2022

Fevzeddin Ülker and Ahmet Küçüker

The individual machine learning methods used for fault detection and classification have accuracy performance at a certain level. A combined learning model composed of different…

Abstract

Purpose

The individual machine learning methods used for fault detection and classification have accuracy performance at a certain level. A combined learning model composed of different base classifiers rather than an individual machine learning model is introduced to ensure diversity. In this way, this study aims to improve the generalization capability of fault detection and classification scheme.

Design/methodology/approach

This study presents a probabilistic weighted voting model (PWVM) with multiple learning models for fault detection and classification. The working principle of this study’s proposed model relies on weight selection and per-class possibilities corresponding to predictions of base classifiers. Moreover, it can improve the power of the prediction model and cope with imbalanced class distribution through validation metrics and F-score.

Findings

The performance of the proposed PWVM was better than the performance of the individual machine learning methods. Besides, the proposed voting model’s performance was compared with different voting mechanisms involving weighted and unweighted voting models. It can be seen from the results that the presented model is superior to voting mechanisms. The performance results revealed PWVM has a powerful predictive model even in noisy conditions. This study determines the optimal model from among voting models with the prioritization method on data sets partitioned different ratios. The obtained results with statistical analysis verified the validity of the proposed model. Besides, the comparative results from different benchmark data sets verified the effectiveness and robustness of this study’s proposed model.

Originality/value

The contribution of this study is that PWVM is an ensemble model with outstanding generalization capability. To the best of the authors’ knowledge, no study has been performed using a PWVM composed of multiple classifiers to detect no-faulted/faulted cases and classify faulted phases.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering , vol. 41 no. 5
Type: Research Article
ISSN: 0332-1649

Keywords

Article
Publication date: 4 April 2016

Markus Seyfried

The purpose of this paper is to provide evidence regarding the selection procedures for and characteristics of senior officials in supreme audit institutions (SIAs).

Abstract

Purpose

The purpose of this paper is to provide evidence regarding the selection procedures for and characteristics of senior officials in supreme audit institutions (SIAs).

Design/methodology/approach

This study follows a quantitative approach using original data collected for presidential elections of SIAs in the 16 federal states in Germany. A fractional logit model is calculated to test different theoretical assumptions in relation to structural, political and individual factors.

Findings

The descriptive results confirm the findings of prior research that presidential candidates are elected with very high approval rates. The main determinants are the vote share of the ruling coalition and the executive experience of the presidential candidate.

Research limitations/implications

This study focuses on 16 federal states in Germany, but an international comparative perspective covering subnational levels would further augment analysis through the variance of selection procedures and electoral outcomes.

Social implications

Independence of auditors is a fundamental issue for the control of the executive, but it seems that there are inevitable trade-offs therein, such as between knowledge of the auditing objects or the politicization of the election process and the independence of the auditor.

Originality/value

This study provides novel empirical insights into the election and selection procedures for senior SIA officials at the subnational level, and shows that the executive exerts strong, but functionally reasonable, influence on candidate selection.

Details

Managerial Auditing Journal, vol. 31 no. 4/5
Type: Research Article
ISSN: 0268-6902

Keywords

Article
Publication date: 3 January 2023

Saleem Raja A., Sundaravadivazhagan Balasubaramanian, Pradeepa Ganesan, Justin Rajasekaran and Karthikeyan R.

The internet has completely merged into contemporary life. People are addicted to using internet services for everyday activities. Consequently, an abundance of information about…

Abstract

Purpose

The internet has completely merged into contemporary life. People are addicted to using internet services for everyday activities. Consequently, an abundance of information about people and organizations is available online, which encourages the proliferation of cybercrimes. Cybercriminals often use malicious links for large-scale cyberattacks, which are disseminated via email, SMS and social media. Recognizing malicious links online can be exceedingly challenging. The purpose of this paper is to present a strong security system that can detect malicious links in the cyberspace using natural language processing technique.

Design/methodology/approach

The researcher recommends a variety of approaches, including blacklisting and rules-based machine/deep learning, for automatically recognizing malicious links. But the approaches generally necessitate the generation of a set of features to generalize the detection process. Most of the features are generated by processing URLs and content of the web page, as well as some external features such as the ranking of the web page and domain name system information. This process of feature extraction and selection typically takes more time and demands a high level of expertise in the domain. Sometimes the generated features may not leverage the full potentials of the data set. In addition, the majority of the currently deployed systems make use of a single classifier for the classification of malicious links. However, prediction accuracy may vary widely depending on the data set and the classifier used.

Findings

To address the issue of generating feature sets, the proposed method uses natural language processing techniques (term frequency and inverse document frequency) that vectorize URLs. To build a robust system for the classification of malicious links, the proposed system implements weighted soft voting classifier, an ensemble classifier that combines predictions of base classifiers. The ability or skill of each classifier serves as the base for the weight that is assigned to it.

Originality/value

The proposed method performs better when the optimal weights are assigned. The performance of the proposed method was assessed by using two different data sets (D1 and D2) and compared performance against base machine learning classifiers and previous research results. The outcome accuracy shows that the proposed method is superior to the existing methods, offering 91.4% and 98.8% accuracy for data sets D1 and D2, respectively.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Abstract

Details

Responsible Investment Around the World: Finance after the Great Reset
Type: Book
ISBN: 978-1-80382-851-0

Book part
Publication date: 29 October 2003

Johannes Bergh and Tor Bjørklund

This chapter is about non-western immigrants’ representation in elected assemblies in Norway and Denmark. Non-western immigrants are a small minority in these countries. That may…

Abstract

This chapter is about non-western immigrants’ representation in elected assemblies in Norway and Denmark. Non-western immigrants are a small minority in these countries. That may be a difficult position since democracy is based on different forms of majority rule. Every democracy faces the dilemma of how to treat minorities. The checks on direct power from the majority vary from one country to another. One aspect is the electoral system, which may or may not have built-in mechanisms that defend minorities.

Details

Multicultural Challenge
Type: Book
ISBN: 978-0-76231-064-7

1 – 10 of over 3000