Preview

Datasets by Weka

Powerful Essays
Open Document
Open Document
3263 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Datasets by Weka
A Comparative Evaluation Of Symbolic Learning Methods and Neural Learning Methods
Shravya Reddy Konda Department of Computer Science University of Maryland, College Park Email: shravyak@cs.umd.edu

Abstract
In this paper, performance of symbolic learning algorithms and neural learning algorithms on different kinds of datasets has been evaluated. Experimental results on the datasets indicate that in the absence of noise, the performances of symbolic and neural learning methods were comparable in most of the cases. For datasets containing only symbolic attributes, in the presence of noise, the performance of neural learning methods was superior to symbolic learning methods. But for datasets containing mixed attributes (few numeric and few nominal), the recent versions of the symbolic learning algorithms performed better when noise was introduced into the datasets.

1. Introduction The problem most often addressed by both neural network and symbolic learning systems is the inductive acquisition of concepts from examples [1]. This problem can be briefly defined as follows: given descriptions of a set of examples each labeled as belonging to a particular class, determine a procedure for correctly assigning new examples to these classes. In the neural network literature, this problem is frequently referred to as supervised or associative learning. For supervised learning, both the symbolic and neural learning methods require the same input data, which is a set of classified examples represented as feature vectors. The performance of both types of learning systems is evaluated by testing how well these systems can accurately classify new examples. Symbolic learning algorithms have been tested on problems ranging from soybean disease diagnosis [2] to classifying chess end games [3]. Neural learning algorithms have been tested on problems ranging from converting text to speech [4] to evaluating moves in backgammon [5]. In this paper, the current problem is to do a



References: 1.Mooney, R., Shalvik, J., and Towell, G. (1991): Symbolic and Neural Learning Algorithms - An experimental comparison, in Machine Learning 6, pp. 111-143. 2. Michalski, R.S., & Chilausky, R.L. (1980): Learning by being told and learning from examples - An experimental comparison of two methods of knowledge acquisition in the context of developing an expert system for soybean disease diagnosis, in Policy Analysis and Information Systems, 4, pp. 125-160. 3. Quinlan, J.R. (1983): Learning efficient classification procedures and their application to chess end games in R.S. Michalski, J.G. Carbonell, & T.M. Mitchell (Eds.), in Machine learning: An artificial intelligence approach (Vol. 1). Palo Alto, CA: Tioga. 4. Sejnowski, T.J., & Rosenberg, C. (1987): Parallel networks that learn to pronounce English text, in Complex Systems, 1, pp. 145-168. 5. Tesauro, G., & Sejnowski, T.J. (1989): A parallel network that learns to play backgammon, in Artificial Intelligence, 39, pp. 357-390. 6. Quinlan, J.R. (1986): Induction on Decision Trees, in Machine Learning 1, 1 7. Quinlan, J.R. (1993): C4.5 – Programs for Machine Learning. San Mateo: Morgan Kaufmann. 8. Rumelhart, D., Hinton, G., & Williams, J. (1986): Learning Internal Representations by Error Propagation, in Parallel Distributed Processing, Vol. 1 (D. Rumelhart k J. McClelland, eds.). MIT Press. 9. Fisher, D.H. and McKusick, K.B. (1989): An empirical comparison of ID3 and backpropagation, in Proc. of the Eleventh International Joint Conference on Artificia1 Intelligence (IJCAI-89), Detroit, MI, August 20-25, pp. 788-793. 10. Mooney, R., Shavlik, J., Towell, G., and Gove, A.(1989): An experimental comparison of symbolic and connectionist learning algorithms, in Proc. of the Eleventh International Joint Conference on Artificial Intelligence (IJCAI-89), Detroit, MI, August 20-25, pp. 775-780. 11. McClelland, J. k Rumelhart, D. (1988). Explorations in Parallel Distributed Processing, MIT Press, Cambridge, MA. .

You May Also Find These Documents Helpful

  • Good Essays

    Apfelbaum, E. P., Pauker, K., Ambady, N., Sommers, S. R., & Norton, M. I. (2008). Learning…

    • 638 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cs229

    • 9150 Words
    • 37 Pages

    that we’ll be using to learn—a list of m training examples {(x(i) , y (i) ); i =…

    • 9150 Words
    • 37 Pages
    Good Essays
  • Powerful Essays

    Fingerprint Identification

    • 4430 Words
    • 18 Pages

    References: [1] W. F. Leung, S. H. Leung, W. H. Lau, And A. Luk,Fingerprint Recognition Using Neural Network, Neural Networks For Signal Processing – Proceedings Of The 1991 IEEE Workshop…

    • 4430 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    The data mining model chosen for this project is the Naïve Bayes classification model. This…

    • 642 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Behavior Therapy

    • 500 Words
    • 2 Pages

    * is a form of associative learning that was first demonstrated by Ivan Pavlov (1927)…

    • 500 Words
    • 2 Pages
    Good Essays
  • Best Essays

    It Essay - Data Mining

    • 1998 Words
    • 8 Pages

    He, J. (2009). Advances in Data Mining: History and Future. Third International Symposium on Intelligent . Retrieved November 1, 2012, from http://ieeexplore.ieee.org.ezproxy.lib.ryerson.ca/stamp/stamp.jsp?tp=&arnumber=5370232&tag=1…

    • 1998 Words
    • 8 Pages
    Best Essays
  • Satisfactory Essays

    In order to explain the use of various algorithms in this study, the algorithms will be discussed in this research. Naïve Bayes and Apriori will be used against the Stylometry data set. IBk will be used against the Keystroke Capture and Mouse Movement data sets. J48 will be used with the Mushroom Database. The choices of these techniques and their implementation will be discussed in detail in the methodologies section. According to Witten and Frank in Data Mining, the Naïve Bayes method is, “based on Bayes’srule and ‘Naïvely’ assumed independence — it is only valid to multiply probabilities when the According to Witten and Frank in Data Mining, the Naïve Bayes method is, “based on Bayes’s rule and ‘Naïvely’ assumed independence — it is only valid to multiply probabilities when the events are independent. The assumption that attributes are independent in real life certainly is simplistic one events are independent. The assumption that attributes are independent in real life certainly is a simplistic one.…

    • 494 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    * By: KIM, KEEHYUNG; CHOI, HYUKGEUN; McKAY, RI (BOB). International Journal on Artificial Intelligence Tools. Apr2011, Vol. 20 Issue 2, p349-366. 18p. 8 Diagrams, 6 Charts.…

    • 892 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Datasets

    • 5674 Words
    • 23 Pages

    Wei Wang – Graduate Assistant goldblade84@hotmail.com YouTube Channel: www.youtube.com/user/fordhamstats Tutoring Hours: Tues, Wed, Thurs: 8pm – 10pm (By Appointment) I’ve decided to shift the tutoring to evening hours, but only by appointment. Please e-mail me 48 hours before the desired date. However, I suggest sending questions to me via E-mail as a faster alternative.…

    • 5674 Words
    • 23 Pages
    Powerful Essays
  • Satisfactory Essays

    My Learning Style

    • 11557 Words
    • 47 Pages

    Busato, V. V., Prins, F. J., Elshout, J. J., & Hamaker, C. (1998). The relationship between learning…

    • 11557 Words
    • 47 Pages
    Satisfactory Essays
  • Powerful Essays

    The 8-Queen Chess puzzle which was originally proposed in 1848 by the chess player Max Bezzel is a problem of placing eight (8) chess Queens on an 8x8 chessboard so that no two queens attack each other.…

    • 3670 Words
    • 31 Pages
    Powerful Essays
  • Powerful Essays

    AI in cyber Defense

    • 2430 Words
    • 9 Pages

    Cyber security is a multidisciplinary field that is targeted on reduction of risks to the secrecy, affinity and integrity of data, information and resources in computer as well as in network systems. Modern systems have become much complex. Need for an intelligent, adaptive and multimodal solution raises here for which best suited approach is artificial…

    • 2430 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Assgn

    • 2191 Words
    • 10 Pages

    A. Become familiar with the use of the WEKA workbench to invoke several different machine learning schemes.…

    • 2191 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    If you do not have access to MATLAB, please visit the PC clusters at Engineering:…

    • 4142 Words
    • 38 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Java and Web Technologies

    • 37194 Words
    • 149 Pages

    1 Matrix Memory . . . . . . . . . . . . . . . . . . . . . . . . . .…

    • 37194 Words
    • 149 Pages
    Satisfactory Essays