Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Blog Directory  >  Software Blogs  >  Programming Blogs  >  sleptons programming Blog  > 

Sleptons Blog


sleptons.blogspot.ca
a blog on programming, math, physics, engineering, software, pattern recognition, anomaly detection, cognitive sciences and more
2018-02-20 13:46
Sometimes when you are processing log files with the Spark, you need to have some data fields of the next (or previous) row in hand. For example, you have data file containing some credit ca… Read More
2018-02-19 23:33
A Practical Guide on Modeling Customer Behavior Most people think deep neural networks1 or any other modern machine learning techniques are capable of doing almost anything at least in spe… Read More
2018-02-12 01:30
The effect of time of observation in detecting anomalies or frauds I have been working on many anomaly and fraud detection systems for five years and what I have found in these years shows… Read More
2017-04-07 16:33
Here is a white paper on time series anomaly detection. This white paper is about finding anomalies in time series, which we encounter in almost every system. I usually keep notes when I wor… Read More
Free Port Monitoring Service
2016-04-21 12:54
One of my friends and I have built a service based on the recent posts of the blog on visualizing computer's port distribution and monitoring the usage. It is like the tools we already had h… Read More
Bias And Variance In Modeling
2016-04-13 19:24
It is alway important to remember why we do classification. We do it because we want to build a general model to support our problem, not to model the given training datasets only. Sometimes… Read More
Entropy Pattern Of Network Traffic Usage
2016-04-08 21:05
I am working on a new project; it is about recognizing usage patterns in network traffic by having as minimum as possible data. Usually, you need to do DPI or look for signatures, ... T… Read More
2016-03-18 12:41
In the previous posts, we saw that our raw data from your computer comes to our classification program as bellow:443:47,5223:2,5228:1, ...Then we apply the following function to get the port… Read More
2016-03-17 20:28
I used daily values of the following information from "Bank of Canada" and "Federal Reserve Bank of St. Louis." for ten years to build a model to predict the behavior of the Canadian dollar… Read More
2016-03-16 23:52
Visual perception is the power of processing information we typically get from our eyes. Why typically? Because even if we cover our eyes, we still have the ability to get visual perception… Read More
2016-03-13 23:21
Data for Machine Learning (ML) algorithms is like fuel for a car, no fuel no movement. If you do not have access to enough data, it is better to think about using rule-based systems rather t… Read More
2016-03-08 15:40
If you check the meaning of the word "sin" in a dictionary it is something like "transgression of the law of God", I am going to rephrase it as "violation of the society accepted law" to tal… Read More
2016-03-08 14:40
Suppose you have a simple system which has only four different states, and your observation shows the system changes its state like the following Markov Chain:Sample Markov Chain to walk onW… Read More
2016-03-07 23:44
1- IntroductionOnce in a while, we decide to get used to a new habit or forget a one, like doing morning exercise, not drinking a sugary beverage, studying every night, learning to play or s… Read More
2016-03-03 02:59
It is not wrong if we say human vision is one the most advanced pattern recognition systems that exists. Just consider our vision system starts to work since we get born even before it! And… Read More
2016-03-03 02:58
Suppose you need to train a machine with (or learn from) an online stream of data and the given data is not tagged, so you don't have any idea of if the recent data complies your classificat… Read More
2016-03-03 01:54
We saw we can represent a neuron memory layer as a matrix like the following:[  [a11, a12, ... , a1n],  [a21, a22, ... , a2n],  .  .  .  [am1,&nb&hell…Read More
2016-03-03 01:54
It turns out that human brain uses coarse coding to store information it gathers. In fact, this might be the easiest way to store this huge amount of information we gather as we explore the… Read More
2016-03-03 01:54
dense vs coarse codefor 16 bits number in dense and equivalent 13 bits coarse code.OK, suppose you have a single variable that represents the current value of a sensor. A network usage… Read More
2016-03-03 01:54
Although neurons can be considered having active state or not, but brain at its bare neocortex layer  doesn't understand binary information or processing binary data. I mean the neocort… Read More
2016-03-02 17:55
Our habits are strange, the more you do them the more it's difficult for you to get out of them. In a sense, it seems like some simple probability rules are controlling our habits, as you us… Read More
2016-03-02 17:55
Have you ever thought about how a goalkeeper dives for the ball or a dog runs to catch something?! Mathematical modeling and solving some complex time related differential equations? No way!… Read More
2016-02-12 16:08
I modified previously provided tools to build a new one which gets both training and test datasets of a time series to see how much the given test dataset satisfies the learnt pattern (or si… Read More
2016-01-29 23:07
If you ask me what are the main factors which don't let even carefully designed, developed and even tested software continue working in long run, I'd say "Memory & Disk". These two facto… Read More
2016-01-29 23:07
Loading only one page when you run a single page application (SPA) is not the only benefit of this model for building an application. I think keeping the state of the application in the clie… Read More
2016-01-29 23:07
If you search the web for big and famous software bugs or failures you'll find plenty of them like the followings:The famous Y2K problem in the year 2000 we experience.Similar to Y2K, we wil… Read More
2016-01-24 23:00
Java's Function and UnaryOperator provided in "java.util.function" package are two examples of functional interfaces and you can use them as a target for lambda expressions or method referen… Read More
2016-01-24 22:49
In two previous posts, we tried to see the effect of having a modular topology for bug generation in a development cycle. We saw that if we add some new lines to project and edit some previo… Read More
2016-01-24 22:39
I don't know why, but we have learned that we somehow always are in out of storage memory or disk space situation. We have learned we always have to compress data, for example, to show 256 s… Read More
2016-01-24 22:35
Image from www.shutterstock.com Random access memory is simply an array of directly addressable elements like Bytes, Words, Longs, ... or even Strings and ... Each memory element is dir… Read More
2016-01-24 22:31
Why do we need to work with sparse matrices or data representation? Look at the following video from "Max Planck institute of brain research". It shows the working neurons of a small pa… Read More
2016-01-24 22:24
Before all else let me say I have no deep knowledge and experience in biology or neuroscience so most of the things I'm going to talk about is based on the Jeff Hawkins and some ot… Read More
2016-01-24 22:05
I haven't written even a word in months, you start writing about stuff you like with love and excitement and you know you have to sacrifices something for it. At least, you have to get time… Read More

Share the post

sleptons

×

Subscribe to Sleptons

Get updates delivered right to your inbox!

Thank you for your subscription

×