Extreme Learning Machine with Sigmoid Activation Function on Large Data

Total Page:16

File Type:pdf, Size:1020Kb

Extreme Learning Machine with Sigmoid Activation Function on Large Data International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8, Issue-2S11, September 2019 Extreme Learning Machine with sigmoid activation function on large data R. R. S. Ravi kumar, G. Apparao procedure and the current structures are not appropriate for Abstract: This paper describes an efficient algorithm for iterative algorithms classification in large data set. While many algorithms exist for In this paper, we introduce a SVM, ELM-S algorithms on classification, they are not suitable for larger contents and large data set.To summarize following contributions: different data sets. For working with large data sets various ELM algorithms are available in literature. However the existing 1.We explore ELM-S framework to support classification algorithms using fixed activation function and it may lead tasks in large data sets. deficiency in working with large data. In this paper, we proposed 2.We develop a general method, and accordingly present novel ELM comply with sigmoid activation function. The the ELM-S method. experimental evaluations demonstrate the our ELM-S algorithm 3.Finally we conduct extensive experiments to demonstrate is performing better than ELM,SVM and other state of art the our ELM-S in classification algorithms on large data sets. Index Terms: MachineLearning, Activation function,Sigmoid, II. RELATED WORK Classification All the algorithms discussed by wang et al[2],kuang et al[4],Aburomman[5],Fernaaz and Jabbar[8],to improve the I. INTRODUCTION performance of intrusion detection systems. These intrusion Machine Learning is a subset of AI is discovery calculations (for example SVM,ELM) which are the scientific investigate of algorithms and statistical executed utilizing appropriated structures like Jupyter to models turn this way systems use to automatically learn and process bigger informational collections.The algorithms is improve from experience without being explicitly executed dependent on wang.et.al[1] proposed an interruption programmed. identification structure dependent on SVM and approve their ELM is a neural network model used for knowledge strategy on the NSL-KDD informational dataset. They discovery and knowledge representation. It was used and claimed that their method, which has 99.92% effeciveness designed by Guang-Bin-Huang. Extreme Learning machines rate was superior to other approaches; but,they do not are timber move forward neural networks mention used data sets statistics, number of training and for grouping, fading, clustering, sparse approximation, testing samples. Furthermore, the SVM show performance compression and feature Sophistication with a single layer or decrease when large data are involved and it is not an ultimate multiple layers of guarded nodes, where the parameters choice for analyzing huge network traffic for intrusion of adjacent to nodes (not just the weights connecting inputs to detection. Second algorithm for intrusion detection is hidden nodes) need not be tuned[1][2]. These hidden nodes proposed by kuang et.al. which applied a hybrid model of can be assigned randomly and not at all updated (i.e. they SVM and KPCA with GA to intrusion detection,and their are projected random but with nonlinear transforms), or can system showed 96% detection rate .Intrusion detection be inherited from their ancestors without being changed. systems provide assistance in detecting, preventing and In most outstanding cases, the collect weights of hidden resulting unauthorized access. Thus Aburomman and Reaz nodes are usually learned in a single step, which essentially [5] proposed an ensemble classifier method which is a amounts to learning a linear model. combination of PSO and SVM. This order classification Machine Learning algorithms are adjusted for identifying performed superior to different methodologies with 92.90% these intrusions in a given input,these algorithms can be precision. categorized into batch and incremental algorithms. The above algorithms utilized the learning advancement The factual algorithms are computatioanally weak and not and information mining of intrusion informational dataset.. easily scalable to unstinting datasets for knowledge extraction The above algorithms utilized the learning advancement and and representation. information mining of intrusion informational data. Which Several distributed algorithms exist for extracting has number of disadvantages, for example, the SVM isn't intrusions in large data sets, these algorithms have a suitable for substantial information, for example, observing disadvantage with their implementation method or execution the high transmission capacity of the network [6][7]. environment on which they are running. The explanation Moreover the Support Vector Machine is anything but a behind this is the detection of intrusions is an iterative decent decision for huge information investigation since its presentation debases as Revised Version Manuscript Received on 16 September, 2019. R.R.S.Ravikumar,CSE, GITAM , Visakhapatnam, India. Dr.G.Apparao,CSE, GITAM, Visakhapatnam, India. Published By: Retrieval Number: B14330982S1119/2019©BEIESP Blue Eyes Intelligence Engineering DOI: 10.35940/ijrte.B1433.0982S1119 3523 & Sciences Publication Extreme Learning Machine with sigmoid activation function on large data information size increments. SVM'S also not preferred for advances are then delegated the yield classes, into their heavy data sets because of the high computation cost and poor separate attack classes. performance[10][11].So to overcome all these challenges, we 3.3. Extreme Learning Machine: The extreme learning introduced ELM to decrease false alarms and to increase the machine (ELM) has attracted much attention over the past detection rate.ELM learns faster and attain higher decade due to its fast learning speed and convincing generalization capability as compared with other feed forward generalization performance[1][3]. In this section, we discuss hidden layer biases to minimize the training time .Hence we a detailed analysis of the Extreme Learning Machine named all algorithm as the Multi Layer Perceptron -Extreme Classifier technique algorithm.ELM is used to solve various Learning machine in short ELM-S. classification, clustering, regression, -and feature engineering problems[12][13].ELM is another name for single or multiple III. PROPOSED MODEL hidden layer and output layer. The Learning algorithm 3.1. Data Set Description: involves input layer, one or multiple layers and the output The Performance of the system is based on the correctness layer.. ELM with K hidden neurons described as follows: of the data set.The more accurate the data the greater the K ∑a=1 βa g(wa.xb+ba)= Ob,b=1,2,3,..........N effectiveness of the system.The data sets used are KDDcup, N Mushroom, Iris, Wine and Adult. The information about the Using training data set {( xa,tb)}a=1 with Xb data sets is depicted in UCI machine learning repository. 3.2. Support Vector Machine(SVM) 3.4 Deficiencies in ELM: In this section, we discuss a detailed an analysis of the The activation function is one of the crucial factors in support vector machine classifier method. SVMs were at first neural networks. While using random hidden node parameters proposed by Vapnik(1995) for taking care of issues of in ELM brings a fast training speed and easy implementation grouping and relapse analysis.SVM is a managed learning advantages, using fixed activation function also leads to a system that is prepared to order various classifications of deficiency in the ELM[15]. In the ELM, the hidden node information from different disciplines[1]. These have been parameters are independent of input data and the activation utilized for two-class characterization issues and are material function fixed during learning. Relying merely on solving the on both direct and non straight information classification. output weights through linear equations could lead to poor Algorithm: generalization performance for irregular distributions in the Step1: SVM makes hyperplane or numerous hyperplanes in large data scaling[16]. a high-dimensional space, and the best hyperplane in them is 3.5 Extreme Learning Machine with sigmoid(ELM-S): the one that ideally isolates information into various classes In this, we proposed ELM-S to overcome the deficiencies with the biggest detachment between classes. A non-Linear of ELM [3]listed above. We presented activation function in classifier utilizes different bit capacities to boost edges ELM-S. Output from every neuron is generated after applying between hyperplanes. activation function to the values being calculated with set of Step2: The kernel function uses squared Euclidian inputs and their weights. Here we are utilizing sigmoid separation between two numeric vectors and maps input activation function. The sigmoid activation[17][3] capacity is composed as underneath. information to a high dimensional space to ideally isolate the T -z given information into their individual assault classes. In this y = σ(w +b) where σ(z)=1/1+e If z is very large then e-z is close to zero and σ(z)=1/1+0 =1 classifier method, every one of the recreations have been -z directed utilizing the openly accessible library package. If z is very small then e is large and σ(z)=1/1+large Step3:Given that the chosen problem is a multi class number =0 classification problem, the algorithm uses the notion of one The algorithm of Extreme learning machine with sigmod versus all for attack classification. In this notion, the activation function as below. multiclass problem is divided into a two-class problem. The Algorithm : radial basis function(RBF) bit is utilized in this calculation. Input: Training data set,Hidden node number,Set of Which is spoken to as follows regularization parameters,Activation function K(a,b)=e-x||a-b||2,x>0 Output:Accuracy 1.Generate hidden node weight vector and bias randomly. For the given training samples (ai,bi),i=1,2,,3,.....n,Where i is the maximum number of samples in the training data, a ∑Rn 2.Calculate net input matrix (V) of hidden layer. i 3.Estimate Sigmoid parameter for zero-near gaussian and yi∑{1,-1},where 1 shows samples from a positive class and -1 represents sequences from the negative class.
Recommended publications
  • Incorporating Automated Feature Engineering Routines Into Automated Machine Learning Pipelines by Wesley Runnels
    Incorporating Automated Feature Engineering Routines into Automated Machine Learning Pipelines by Wesley Runnels Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree of Master of Engineering in Electrical Engineering and Computer Science at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY May 2020 c Massachusetts Institute of Technology 2020. All rights reserved. Author . Wesley Runnels Department of Electrical Engineering and Computer Science May 12th, 2020 Certified by . Tim Kraska Department of Electrical Engineering and Computer Science Thesis Supervisor Accepted by . Katrina LaCurts Chair, Master of Engineering Thesis Committee 2 Incorporating Automated Feature Engineering Routines into Automated Machine Learning Pipelines by Wesley Runnels Submitted to the Department of Electrical Engineering and Computer Science on May 12, 2020, in partial fulfillment of the requirements for the degree of Master of Engineering in Electrical Engineering and Computer Science Abstract Automating the construction of consistently high-performing machine learning pipelines has remained difficult for researchers, especially given the domain knowl- edge and expertise often necessary for achieving optimal performance on a given dataset. In particular, the task of feature engineering, a key step in achieving high performance for machine learning tasks, is still mostly performed manually by ex- perienced data scientists. In this thesis, building upon the results of prior work in this domain, we present a tool, rl feature eng, which automatically generates promising features for an arbitrary dataset. In particular, this tool is specifically adapted to the requirements of augmenting a more general auto-ML framework. We discuss the performance of this tool in a series of experiments highlighting the various options available for use, and finally discuss its performance when used in conjunction with Alpine Meadow, a general auto-ML package.
    [Show full text]
  • Learning from Few Subjects with Large Amounts of Voice Monitoring Data
    Learning from Few Subjects with Large Amounts of Voice Monitoring Data Jose Javier Gonzalez Ortiz John V. Guttag Robert E. Hillman Daryush D. Mehta Jarrad H. Van Stan Marzyeh Ghassemi Challenges of Many Medical Time Series • Few subjects and large amounts of data → Overfitting to subjects • No obvious mapping from signal to features → Feature engineering is labor intensive • Subject-level labels → In many cases, no good way of getting sample specific annotations 1 Jose Javier Gonzalez Ortiz Challenges of Many Medical Time Series • Few subjects and large amounts of data → Overfitting to subjects Unsupervised feature • No obvious mapping from signal to features extraction → Feature engineering is labor intensive • Subject-level labels Multiple → In many cases, no good way of getting sample Instance specific annotations Learning 2 Jose Javier Gonzalez Ortiz Learning Features • Segment signal into windows • Compute time-frequency representation • Unsupervised feature extraction Conv + BatchNorm + ReLU 128 x 64 Pooling Dense 128 x 64 Upsampling Sigmoid 3 Jose Javier Gonzalez Ortiz Classification Using Multiple Instance Learning • Logistic regression on learned features with subject labels RawRaw LogisticLogistic WaveformWaveform SpectrogramSpectrogram EncoderEncoder RegressionRegression PredictionPrediction •• %% Positive Positive Ours PerPer Window Window PerPer Subject Subject • Aggregate prediction using % positive windows per subject 4 Jose Javier Gonzalez Ortiz Application: Voice Monitoring Data • Voice disorders affect 7% of the US population • Data collected through neck placed accelerometer 1 week = ~4 billion samples ~100 5 Jose Javier Gonzalez Ortiz Results Previous work relied on expert designed features[1] AUC Accuracy Comparable performance Train 0.70 ± 0.05 0.71 ± 0.04 Expert LR without Test 0.68 ± 0.05 0.69 ± 0.04 task-specific feature Train 0.73 ± 0.06 0.72 ± 0.04 engineering! Ours Test 0.69 ± 0.07 0.70 ± 0.05 [1] Marzyeh Ghassemi et al.
    [Show full text]
  • Expert Feature-Engineering Vs. Deep Neural Networks: Which Is Better for Sensor-Free Affect Detection?
    Expert Feature-Engineering vs. Deep Neural Networks: Which is Better for Sensor-Free Affect Detection? Yang Jiang1, Nigel Bosch2, Ryan S. Baker3, Luc Paquette2, Jaclyn Ocumpaugh3, Juliana Ma. Alexandra L. Andres3, Allison L. Moore4, Gautam Biswas4 1 Teachers College, Columbia University, New York, NY, United States [email protected] 2 University of Illinois at Urbana-Champaign, Champaign, IL, United States {pnb, lpaq}@illinois.edu 3 University of Pennsylvania, Philadelphia, PA, United States {rybaker, ojaclyn}@upenn.edu [email protected] 4 Vanderbilt University, Nashville, TN, United States {allison.l.moore, gautam.biswas}@vanderbilt.edu Abstract. The past few years have seen a surge of interest in deep neural net- works. The wide application of deep learning in other domains such as image classification has driven considerable recent interest and efforts in applying these methods in educational domains. However, there is still limited research compar- ing the predictive power of the deep learning approach with the traditional feature engineering approach for common student modeling problems such as sensor- free affect detection. This paper aims to address this gap by presenting a thorough comparison of several deep neural network approaches with a traditional feature engineering approach in the context of affect and behavior modeling. We built detectors of student affective states and behaviors as middle school students learned science in an open-ended learning environment called Betty’s Brain, us- ing both approaches. Overall, we observed a tradeoff where the feature engineer- ing models were better when considering a single optimized threshold (for inter- vention), whereas the deep learning models were better when taking model con- fidence fully into account (for discovery with models analyses).
    [Show full text]
  • Deep Learning Feature Extraction Approach for Hematopoietic Cancer Subtype Classification
    International Journal of Environmental Research and Public Health Article Deep Learning Feature Extraction Approach for Hematopoietic Cancer Subtype Classification Kwang Ho Park 1 , Erdenebileg Batbaatar 1 , Yongjun Piao 2, Nipon Theera-Umpon 3,4,* and Keun Ho Ryu 4,5,6,* 1 Database and Bioinformatics Laboratory, College of Electrical and Computer Engineering, Chungbuk National University, Cheongju 28644, Korea; [email protected] (K.H.P.); [email protected] (E.B.) 2 School of Medicine, Nankai University, Tianjin 300071, China; [email protected] 3 Department of Electrical Engineering, Faculty of Engineering, Chiang Mai University, Chiang Mai 50200, Thailand 4 Biomedical Engineering Institute, Chiang Mai University, Chiang Mai 50200, Thailand 5 Data Science Laboratory, Faculty of Information Technology, Ton Duc Thang University, Ho Chi Minh 700000, Vietnam 6 Department of Computer Science, College of Electrical and Computer Engineering, Chungbuk National University, Cheongju 28644, Korea * Correspondence: [email protected] (N.T.-U.); [email protected] or [email protected] (K.H.R.) Abstract: Hematopoietic cancer is a malignant transformation in immune system cells. Hematopoi- etic cancer is characterized by the cells that are expressed, so it is usually difficult to distinguish its heterogeneities in the hematopoiesis process. Traditional approaches for cancer subtyping use statistical techniques. Furthermore, due to the overfitting problem of small samples, in case of a minor cancer, it does not have enough sample material for building a classification model. Therefore, Citation: Park, K.H.; Batbaatar, E.; we propose not only to build a classification model for five major subtypes using two kinds of losses, Piao, Y.; Theera-Umpon, N.; Ryu, K.H.
    [Show full text]
  • Feature Engineering for Predictive Modeling Using Reinforcement Learning
    The Thirty-Second AAAI Conference on Artificial Intelligence (AAAI-18) Feature Engineering for Predictive Modeling Using Reinforcement Learning Udayan Khurana Horst Samulowitz Deepak Turaga [email protected] [email protected] [email protected] IBM Research AI IBM Research AI IBM Research AI Abstract Feature engineering is a crucial step in the process of pre- dictive modeling. It involves the transformation of given fea- ture space, typically using mathematical functions, with the objective of reducing the modeling error for a given target. However, there is no well-defined basis for performing effec- tive feature engineering. It involves domain knowledge, in- tuition, and most of all, a lengthy process of trial and error. The human attention involved in overseeing this process sig- nificantly influences the cost of model generation. We present (a) Original data (b) Engineered data. a new framework to automate feature engineering. It is based on performance driven exploration of a transformation graph, Figure 1: Illustration of different representation choices. which systematically and compactly captures the space of given options. A highly efficient exploration strategy is de- rived through reinforcement learning on past examples. rental demand (kaggle.com/c/bike-sharing-demand) in Fig- ure 2(a). Deriving several features (Figure 2(b)) dramatically Introduction reduces the modeling error. For instance, extracting the hour of the day from the given timestamp feature helps to capture Predictive analytics are widely used in support for decision certain trends such as peak versus non-peak demand. Note making across a variety of domains including fraud detec- that certain valuable features are derived through a compo- tion, marketing, drug discovery, advertising, risk manage- sition of multiple simpler functions.
    [Show full text]
  • Explicit Document Modeling Through Weighted Multiple-Instance Learning
    Journal of Artificial Intelligence Research 58 (2017) Submitted 6/16; published 2/17 Explicit Document Modeling through Weighted Multiple-Instance Learning Nikolaos Pappas [email protected] Andrei Popescu-Belis [email protected] Idiap Research Institute, Rue Marconi 19 CH-1920 Martigny, Switzerland Abstract Representing documents is a crucial component in many NLP tasks, for instance pre- dicting aspect ratings in reviews. Previous methods for this task treat documents globally, and do not acknowledge that target categories are often assigned by their authors with gen- erally no indication of the specific sentences that motivate them. To address this issue, we adopt a weakly supervised learning model, which jointly learns to focus on relevant parts of a document according to the context along with a classifier for the target categories. Originated from the weighted multiple-instance regression (MIR) framework, the model learns decomposable document vectors for each individual category and thus overcomes the representational bottleneck in previous methods due to a fixed-length document vec- tor. During prediction, the estimated relevance or saliency weights explicitly capture the contribution of each sentence to the predicted rating, thus offering an explanation of the rating. Our model achieves state-of-the-art performance on multi-aspect sentiment analy- sis, improving over several baselines. Moreover, the predicted saliency weights are close to human estimates obtained by crowdsourcing, and increase the performance of lexical and topical features for review segmentation and summarization. 1. Introduction Many NLP tasks such as document classification, question answering, and summarization heavily rely on how well the contents of the document are represented in a given model.
    [Show full text]
  • Miforests: Multiple-Instance Learning with Randomized Trees⋆
    MIForests: Multiple-Instance Learning with Randomized Trees? Christian Leistner, Amir Saffari, and Horst Bischof Institute for Computer Graphics and Vision, Graz University of Technology, Inffeldgasse 16, 8010 Graz, Austria {leistner,saffari,bischof}@icg.tugraz.at http://www.icg.tugraz.at Abstract. Multiple-instance learning (MIL) allows for training classi- fiers from ambiguously labeled data. In computer vision, this learning paradigm has been recently used in many applications such as object clas- sification, detection and tracking. This paper presents a novel multiple- instance learning algorithm for randomized trees called MIForests. Ran- domized trees are fast, inherently parallel and multi-class and are thus increasingly popular in computer vision. MIForest combine the advan- tages of these classifiers with the flexibility of multiple instance learning. In order to leverage the randomized trees for MIL, we define the hidden class labels inside target bags as random variables. These random vari- ables are optimized by training random forests and using a fast iterative homotopy method for solving the non-convex optimization problem. Ad- ditionally, most previously proposed MIL approaches operate in batch or off-line mode and thus assume access to the entire training set. This limits their applicability in scenarios where the data arrives sequentially and in dynamic environments. We show that MIForests are not limited to off-line problems and present an on-line extension of our approach. In the experiments, we evaluate MIForests on standard visual MIL bench- mark datasets where we achieve state-of-the-art results while being faster than previous approaches and being able to inherently solve multi-class problems.
    [Show full text]
  • A New Modal Autoencoder for Functionally Independent Feature Extraction
    A New Modal Autoencoder for Functionally Independent Feature Extraction Yuzhu Guo Kang Pan Simeng Li Zongchang Han Kexin Wang Department of Automation Sciences and Electrical Engineering Beihang University Beijing, China {yuzhuguo, lkwxl, lsimeng, zchan, wkx933}@buaa.edu.cn Li Li Department of Automation Sciences and Electrical Engineering Beihang University Beijing, China [email protected] Abstract Autoencoders have been widely used for dimensional reduction and feature ex- traction. Various types of autoencoders have been proposed by introducing reg- ularization terms. Most of these regularizations improve representation learning by constraining the weights in the encoder part, which maps input into hidden nodes and affects the generation of features. In this study, we show that a con- straint to the decoder can also significantly improve its performance because the decoder determines how the latent variables contribute to the reconstruction of input. Inspired by the structural modal analysis method in mechanical engineering, a new modal autoencoder (MAE) is proposed by othogonalising the columns of the readout weight matrix. The new regularization helps to disentangle explanatory factors of variation and forces the MAE to extract fundamental modes in data. The learned representations are functionally independent in the reconstruction of input and perform better in consecutive classification tasks. The results were validated on the MNIST variations and USPS classification benchmark suite. Comparative experiments clearly show that the new algorithm has a surprising advantage. The new MAE introduces a very simple training principle for autoencoders and could be promising for the pre-training of deep neural networks. arXiv:2006.14390v1 [cs.LG] 25 Jun 2020 1 Introduction The success of machine learning heavily depends on data representation.
    [Show full text]
  • Feature Engineering for Machine Learning
    Feature Engineering for Machine Learning PRINCIPLES AND TECHNIQUES FOR DATA SCIENTISTS Alice Zheng & Amanda Casari Feature Engineering for Machine Learning Principles and Techniques for Data Scientists Alice Zheng and Amanda Casari Beijing Boston Farnham Sebastopol Tokyo Feature Engineering for Machine Learning by Alice Zheng and Amanda Casari Copyright © 2018 Alice Zheng, Amanda Casari. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://oreilly.com/safari). For more information, contact our corporate/insti‐ tutional sales department: 800-998-9938 or [email protected]. Editors: Rachel Roumeliotis and Jeff Bleiel Indexer: Ellen Troutman Production Editor: Kristen Brown Interior Designer: David Futato Copyeditor: Rachel Head Cover Designer: Karen Montgomery Proofreader: Sonia Saruba Illustrator: Rebecca Demarest April 2018: First Edition Revision History for the First Edition 2018-03-23: First Release See http://oreilly.com/catalog/errata.csp?isbn=9781491953242 for release details. The O’Reilly logo is a registered trademark of O’Reilly Media, Inc. Feature Engineering for Machine Learning, the cover image, and related trade dress are trademarks of O’Reilly Media, Inc. While the publisher and the authors have used good faith efforts to ensure that the information and instructions contained in this work are accurate, the publisher and the authors disclaim all responsibility for errors or omissions, including without limitation responsibility for damages resulting from the use of or reliance on this work. Use of the information and instructions contained in this work is at your own risk.
    [Show full text]
  • A Brief Introduction to Deep Learning
    A Brief Introduction to Deep Learning --Yangyan Li How would you crack it? How to avoid being cracked? Seam Carving! Labradoodle or fried chicken Puppy or bagel Sheepdog or mop Chihuahua or muffin Barn owl or apple Parrot or guacamole Raw chicken or Donald Trump But, we human actually lose! • A demo that shows we, human, lose, on the classification task, we are proud of, we have been trained for millions of years! • If we want to make it hard for bots, it has to be hard for human as well. How would you crack it? We human lose on Go! We (will) lose on many specific tasks! • Speech recognition • Translation • Self-driving • … • BUT, they are not AI yet… • Don’t worry until it dates with your girl/boy friend… Deep learning is so cool for so many problems… A Brief Introduction to Deep Learning • Artificial Neural Network • Back-propagation • Fully Connected Layer • Convolutional Layer • Overfitting Artificial Neural Network 1. Activation function 2. Weights 3. Cost function 4. Learning algorithm Live Demo Neurons are functions Neurons are functions Back-propagation Now, serious stuff, a bit… Fully Connected Layers “When in doubt, use brute force.” --Ken Thompson “If brute force is possible...” --Yangyan Li Convolutional Layers Convolutional Layers Convolution Filters Feature Engineering vs. Learning • Feature engineering is the process of using domain knowledge of the data to create features that make machine learning algorithms work. • “When working on a machine learning problem, feature engineering is manually designing what the input x's should be.” -- Shayne Miel • “Coming up with features is difficult, time- consuming, requires expert knowledge.” --Andrew Ng How to detect it in training process? Dropout Sigmod ReLU Sigmod ReLU Compute, connect, evaluate, correct, train madly… Non-linearity, distributed representation, parallel computation, adaptive, self-organizing… A brief history • McCulloch, Warren S., and Walter Pitts.
    [Show full text]
  • Truncated SVD-Based Feature Engineering for Music Recommendation KKBOX’S Music Recommendation Challenge at ACM WSDM Cup 2018
    Truncated SVD-based Feature Engineering for Music Recommendation KKBOX’s Music Recommendation challenge at ACM WSDM Cup 2018 Nima Shahbazi Mohamed Chahhou Jarek Gryz York University Sidi Mohamed Ben Abdellah York University [email protected] University [email protected] [email protected] ABSTRACT to suggest relevant preference to a specific user. Many web ser- 1 This year’s ACM WSDM Cup asked the ML community to build an vices such as Netflix, Spotify, YouTube, KKBOX use CF to deliver improved music recommendation system using a dataset provided personalized recommendation to their customers. by KKBOX. The task was to predict the chances a user would listen The ACM WSDM Cup challenged the ML community to improve to a song repetitively after the first observable listening event within KKBOX model and build a better music recommendation system 2 a given time frame. We cast this problem as a binary classification using their dataset . KKBOX currently uses CF based algorithm problem and addressed it by using gradient boosted decision trees. with matrix factorization but expects that other techniques could To overcome the cold start problem, which is a notorious problem in lead to better music recommendations. recommender systems, we create truncated SVD-based embedding In this task, we want to predict songs which a user will truly like. features for users, songs and artists. Using the embedding features Intuitively, if a user much enjoys a song, s/he will repetitively listen with four different statistical based features (users, songs, artists to it. We are asked to predict the chances of a user listening to a song and time), our model won the ACM challenge, ranking second.
    [Show full text]
  • A Hybrid Method Based on Extreme Learning Machine and Wavelet Transform Denoising for Stock Prediction
    entropy Article A Hybrid Method Based on Extreme Learning Machine and Wavelet Transform Denoising for Stock Prediction Dingming Wu, Xiaolong Wang * and Shaocong Wu College of Computer Science and Technology, Harbin Institute of Technology, Shenzhen 518055, China; [email protected] (D.W.); [email protected] (S.W.) * Correspondence: [email protected] Abstract: The trend prediction of the stock is a main challenge. Accidental factors often lead to short-term sharp fluctuations in stock markets, deviating from the original normal trend. The short- term fluctuation of stock price has high noise, which is not conducive to the prediction of stock trends. Therefore, we used discrete wavelet transform (DWT)-based denoising to denoise stock data. Denoising the stock data assisted us to eliminate the influences of short-term random events on the continuous trend of the stock. The denoised data showed more stable trend characteris- tics and smoothness. Extreme learning machine (ELM) is one of the effective training algorithms for fully connected single-hidden-layer feedforward neural networks (SLFNs), which possesses the advantages of fast convergence, unique results, and it does not converge to a local minimum. Therefore, this paper proposed a combination of ELM- and DWT-based denoising to predict the trend of stocks. The proposed method was used to predict the trend of 400 stocks in China. The predic- tion results of the proposed method are a good proof of the efficacy of DWT-based denoising for stock trends, and showed an excellent performance compared to 12 machine learning algorithms (e.g., recurrent neural network (RNN) and long short-term memory (LSTM)).
    [Show full text]