The Ionosphere Data Set Sample Clauses

The Ionosphere Data Set. On the Ionosphere data set (Table 4.6) we see again that fuzzification has a negative effect on classification performance when the performance of the original Boolean gp algorithms is quite good. Only in the case of our clus- tering gp algorithm using k = 2 does fuzzification significantly improve the performance. In the case of the gain gp and gain ratio gp algorithms fuzzi- fication significantly decreases the classification performance.
The Ionosphere Data Set. When we consider the results of our gp algorithms on the Ionosphere data set in Table 3.9 we see that our gain ratio gp algorithms perform the best. Together with the gain gp algorithm with k = 2 they are significantly better than our other gp algorithms. If we look at the results of our new gp algo- rithms with respect to k we see that the misclassification rate increases with k, except for our clustering gp with k = 2. Our three best gain ratio gp algorithms are also significantly better than OC1. Compared to the results of Ltree and C4.5 the differences in perfor- mance with our new gp algorithms are not statistically significant, except for the worst performing gp algorithm, clustering gp with k = 5. The differ- ences between cefr-miner and our new algorithms are also no statistically significant.
The Ionosphere Data Set. The Ionosphere data set contains information of radar returns from the iono- sphere. According to [7] the data was collected by a phased array of 16 high-frequency antennas with a total transmitted power in the order of 6.4 kilowatts. The target class consists of the type of radar return. A “good” radar return shows evidence of some type of structure of electrons in the ≈ × ionosphere while a “bad” return does not. Although the number of records is quite small (351) the number of attributes is the largest (34) of the data sets on which we have tested our algorithms. All attributes are continuous valued. Because our simple gp constructs a node for each possible value of continuous valued attributes it constructs no less than 8147 possible internal nodes as well as 2 terminal nodes for the target classes. This results in a search space of size 1.1 10147. One fold consists of 36 records while the other 9 folds consist of 35 records each.

Related to The Ionosphere Data Set

  • Data Services In lieu of any other rates or discounts, the Customer will receive a discount equal to 15% for the following Data Services: Access: Standard VBS3 Guide local loop charges for DS-1 Access Service.

  • Data Storage Where required by applicable law, Student Data shall be stored within the United States. Upon request of the LEA, Provider will provide a list of the locations where Student Data is stored.

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.