Feature Interaction Detection Technique Based on Feature Assumptions

نویسندگان

  • Yuan Peng
  • Ferhat Khendek
  • Peter Grogono
  • Gregory Butler
چکیده

We present an approach for the detection of feature interactions. It is based on two concepts: Call-Context Model (CCM) and Feature Context Assumptions (FCA). CCM specifies the possible call-connection(s) related to the feature and FCA summarizes the “important” assumptions about the feature environment. By analyzing the CCM-FCAs of two or more given features, we determine the existence or absence of Common Call-Context(s) (CCC). In the case where a CCC exists, we concretize the FCAs and detect possible interactions by searching for conflicting assumptions. In the case where a CCC does not exist, there is no interaction between the features. We tested our approach with the Benchmark from Bellcore. We also detected new interactions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Intelligent Fault Diagnosis Approach for Critical Rotating Machinery in the Time-frequency Domain

The rotating machinery is a common class of machinery in the industry. The root cause of faults in the rotating machinery is often faulty rolling element bearings. This paper presents a novel technique using artificial neural network learning for automated diagnosis of localized faults in rolling element bearings. The inputs of this technique are a number of features (harmmean and median), whic...

متن کامل

A Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems

Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...

متن کامل

A Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems

Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...

متن کامل

Newborn EEG Seizure Detection Based on Interspike Space Distribution in the Time-Frequency Domain

This paper presents a new time-frequency based EEG seizure detection method. This method uses the distribution of interspike intervals as a criterion for discriminating between seizure and nonseizure activities. To detect spikes in the EEG, the signal is mapped into the time-frequency domain. The high instantaneous energy of spikes is reflected as a localized energy in time-frequency domain. Hi...

متن کامل

Comparison Between Different Methods of Feature Extraction in BCI Systems Based on SSVEP

‎There are different feature extraction methods in brain-computer interfaces (BCI) based on Steady-State Visually Evoked Potentials (SSVEP) systems‎. ‎This paper presents a comparison of five methods for stimulation frequency detection in SSVEP-based BCI systems‎. ‎The techniques are based on Power Spectrum Density Analysis (PSDA)‎, ‎Fast Fourier Transform (FFT)‎, ‎Hilbert‎- ‎Huang Transform (H...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998