SlideShare a Scribd company logo
1 of 37
Download to read offline
Adventures in Real-World
Data Science
Automated Patent Classification
Rollie D. Goodman
TechLink Center
• Established as a technology transfer center in 1996
• Facilitates ~60% of DoD’s license agreements with industry
• Helps small companies secure R&D contracts
• Established as a technology transfer center in 1996
• Facilitates ~60% of DoD’s license agreements with industry
• Helps small companies secure R&D contracts
• Established as a technology transfer center in 1996
• Facilitates ~60% of DoD’s license agreements with industry
• Helps small companies secure R&D contracts
training set: ~9,000 labeled patents
Patent Data
Document Number US 9,832,220
Assignee US Air Force
Inventors Kwiat, Luke; Kamhoua, Charles; Kwiat, Kevin
Attorneys Mancini, Joseph A.
Title Security Method for Allocation of Virtual Machines in a Cloud Computing
Network
Abstract A method for enhancing security in a cloud computing system by allocating
virtual machines over hypervisors, in a cloud computing environment, in a
security-aware fashion. The invention solves the cloud user risk problem by
inducing a state such that, unless there is a change in the conditions under
which the present invention operates, the cloud users do not gain by deviating
from the allocation induced by the present invention. The invention’s methods
include grouping virtual machines of similar loss potential on the same
hypervisor, creating hypervisor environments of similar total loss, and
implementing a risk tiered system of hypervisors based on expense factors.
Publication Date 11-28-2017
CPC Classes H04L63/1441, G06F9/45558, H04L63/1408, H04L63/20
Patent Data
Document Number US 9,832,220
Assignee US Air Force
Inventors Kwiat, Luke; Kamhoua, Charles; Kwiat, Kevin
Attorneys Mancini, Joseph A.
Title Security Method for Allocation of Virtual Machines in a Cloud Computing
Network
Abstract A method for enhancing security in a cloud computing system by allocating
virtual machines over hypervisors, in a cloud computing environment, in a
security-aware fashion. The invention solves the cloud user risk problem by
inducing a state such that, unless there is a change in the conditions under
which the present invention operates, the cloud users do not gain by deviating
from the allocation induced by the present invention. The invention’s methods
include grouping virtual machines of similar loss potential on the same
hypervisor, creating hypervisor environments of similar total loss, and
implementing a risk tiered system of hypervisors based on expense factors.
Publication Date 11-28-2017
CPC Classes H04L63/1441, G06F9/45558, H04L63/1408, H04L63/20
Patent Data
Document Number US 9,832,220
Assignee US Air Force
Inventors Kwiat, Luke; Kamhoua, Charles; Kwiat, Kevin
Attorneys Mancini, Joseph A.
Title Security Method for Allocation of Virtual Machines in a Cloud Computing
Network
Abstract A method for enhancing security in a cloud computing system by allocating
virtual machines over hypervisors, in a cloud computing environment, in a
security-aware fashion. The invention solves the cloud user risk problem by
inducing a state such that, unless there is a change in the conditions under
which the present invention operates, the cloud users do not gain by deviating
from the allocation induced by the present invention. The invention’s methods
include grouping virtual machines of similar loss potential on the same
hypervisor, creating hypervisor environments of similar total loss, and
implementing a risk tiered system of hypervisors based on expense factors.
Publication Date 11-28-2017
CPC Classes H04L63/1441, G06F9/45558, H04L63/1408, H04L63/20
A01B33/028
A: Human necessities
A01: Agriculture
A01B: Machines for soil working in agriculture or industry
A01B33: Tilling implements with rotary driven tools
A01B33/02: …with tools on horizontal shaft transverse to direction of travel
A01B33/028: …of the walk-behind type
CPC Terms
A01B33/028
A: Human necessities
A01: Agriculture
A01B: Machines for soil working in agriculture or industry
A01B33: Tilling implements with rotary driven tools
A01B33/02: …with tools on horizontal shaft transverse to direction of travel
A01B33/028: …of the walk-behind type
CPC Terms
vocabulary: {A61K036, A61K038, A61K039, A61K041, A61K045}
instance: {A61K038/00, A61K038/005, A61K039/00}
CPC Vectorization
vocabulary: {A61K036, A61K038, A61K039, A61K041, A61K045}
instance: {A61K038/00, A61K038/005, A61K039/00}
{A61K038, A61K038, A61K039}
CPC Vectorization
vocabulary: {A61K036, A61K038, A61K039, A61K041, A61K045}
instance: {A61K038/00, A61K038/005, A61K039/00}
{A61K038, A61K038, A61K039}
[ 0, 2, 1, 0, 0 ]
CPC Vectorization
Support Vector Machines
a
x
y
Support Vector Machines
a
b
x
y
Support Vector Machines
a
b
x
x
y
y
Support Vector Machines
a
b
x
x
x
y
y
z
Support Vector Machines
a
b
x
x
x
y
y
z
Cross-Validation
experiment 1
experiment 2
experiment 3
experiment 4
experiment 5
fold 1 fold 2 fold 3 fold 4 fold 5
overall accuracy
randomized training data
Ensemble Learners
• Train and combine multiple learners to solve a single problem
• also: “multiple classifier systems”
• Often outperform single classifiers
• e.g. Netflix Competition, KDD 2009, and Kaggle
Text Processing
Text Processing
• Stopwords: remove words that appear frequently but do not
give any information about content
• a, an, and, for, from, is, it, the, to, with…
Text Processing
• Stopwords: remove words that appear frequently but do not
give any information about content
• a, an, and, for, from, is, it, the, to, with…
• Stemming: reduce derived words to root (“stemmed”) form
• different, differently, differ, differing, differed → differ
Text Processing
• Stopwords: remove words that appear frequently but do not
give any information about content
• a, an, and, for, from, is, it, the, to, with…
• Stemming: reduce derived words to root (“stemmed”) form
• different, differently, differ, differing, differed → differ
• Weighting: term frequency – inverse document frequency
!"#$"% = '()* +)(,-(./0% ∗ log
.-*5() 6+ 76/-*(.'8
.-*5() 6+ 76/-*(.'8 9ℎ()( '()* ; 6//-)8
the results are computed from the resulting generated text
Text Processing
the results are computed from the resulting generated text
results computed resulting generated text
Text Processing
the results are computed from the resulting generated text
results computed resulting generated text
result comput result gener text
Text Processing
the results are computed from the resulting generated text
results computed resulting generated text
result comput result gener text
3.03, 1.24, 0.68, 4.79. . .
Text Processing
CPC classifier
(SVM)
text classifier
(SVM)
?
“The results are computed from the
resulting generated text…”
{A61K036, A61K038, A61K039,
A61K041, A61K045}
final classification
class 1 class 2[class 1, class 2]
Decision Trees
outlook
humidity wind
N Y
Y
Y N
high low
sunny
overcast
rainy
high low
outlook: {sunny, overcast, rainy}
humidity: {high, low}
wind: {high, low}
hiking: {Yes, No}
CPC classifier
(SVM)
text classifier
(SVM)
decision tree
“The results are computed from the
resulting generated text…”
{A61K036, A61K038, A61K039,
A61K041, A61K045}
final classification
class 1 class 2[class 1, class 2]
87% 76%
98%
Questions?

More Related Content

Similar to Adventures in Real-World Data Science

The Optimizing Information Leakage in Multicloud Storage Services
The Optimizing Information Leakage in Multicloud Storage ServicesThe Optimizing Information Leakage in Multicloud Storage Services
The Optimizing Information Leakage in Multicloud Storage Servicesijtsrd
 
Security TechTalk | AWS Public Sector Summit 2016
Security TechTalk | AWS Public Sector Summit 2016Security TechTalk | AWS Public Sector Summit 2016
Security TechTalk | AWS Public Sector Summit 2016Amazon Web Services
 
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...IOSR Journals
 
Recording and Reasoning Over Data Provenance in Web and Grid Services
Recording and Reasoning Over Data Provenance in Web and Grid ServicesRecording and Reasoning Over Data Provenance in Web and Grid Services
Recording and Reasoning Over Data Provenance in Web and Grid ServicesMartin Szomszor
 
Cloud present, future and trajectory (Amazon Web Services) - JIsc Digifest 2016
Cloud present, future and trajectory (Amazon Web Services) - JIsc Digifest 2016Cloud present, future and trajectory (Amazon Web Services) - JIsc Digifest 2016
Cloud present, future and trajectory (Amazon Web Services) - JIsc Digifest 2016Jisc
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)IJNSA Journal
 
Azure Overview Arc
Azure Overview ArcAzure Overview Arc
Azure Overview Arcrajramab
 
Cloud computing lab open stack
Cloud computing lab open stackCloud computing lab open stack
Cloud computing lab open stackarunuiet
 
Elastic Software Infrastructure to Support the Industrial Internet
Elastic Software Infrastructure to Support the Industrial InternetElastic Software Infrastructure to Support the Industrial Internet
Elastic Software Infrastructure to Support the Industrial InternetReal-Time Innovations (RTI)
 
Everything you want to know about microservices
Everything you want to know about microservicesEverything you want to know about microservices
Everything you want to know about microservicesYouness Lasmak
 
Webinar: How Microsoft is changing the game with Windows Azure
Webinar: How Microsoft is changing the game with Windows AzureWebinar: How Microsoft is changing the game with Windows Azure
Webinar: How Microsoft is changing the game with Windows AzureCommon Sense
 
Stephane Lapointe, Frank Boucher & Alexandre Brisebois: Les micro-services et...
Stephane Lapointe, Frank Boucher & Alexandre Brisebois: Les micro-services et...Stephane Lapointe, Frank Boucher & Alexandre Brisebois: Les micro-services et...
Stephane Lapointe, Frank Boucher & Alexandre Brisebois: Les micro-services et...MSDEVMTL
 
Network Security and Access Control within AWS
Network Security and Access Control within AWSNetwork Security and Access Control within AWS
Network Security and Access Control within AWSAmazon Web Services
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingAnimesh Chaturvedi
 
AZUG.BE - Azure User Group Belgium - First public meeting
AZUG.BE - Azure User Group Belgium - First public meetingAZUG.BE - Azure User Group Belgium - First public meeting
AZUG.BE - Azure User Group Belgium - First public meetingMaarten Balliauw
 
Big Data on Azure Tutorial
Big Data on Azure TutorialBig Data on Azure Tutorial
Big Data on Azure Tutorialrustd
 
Virtualization on embedded boards
Virtualization on embedded boardsVirtualization on embedded boards
Virtualization on embedded boardsMohamed Ramadan
 
Building Event Driven (Micro)services with Apache Kafka
Building Event Driven (Micro)services with Apache KafkaBuilding Event Driven (Micro)services with Apache Kafka
Building Event Driven (Micro)services with Apache KafkaGuido Schmutz
 

Similar to Adventures in Real-World Data Science (20)

The Optimizing Information Leakage in Multicloud Storage Services
The Optimizing Information Leakage in Multicloud Storage ServicesThe Optimizing Information Leakage in Multicloud Storage Services
The Optimizing Information Leakage in Multicloud Storage Services
 
Security TechTalk | AWS Public Sector Summit 2016
Security TechTalk | AWS Public Sector Summit 2016Security TechTalk | AWS Public Sector Summit 2016
Security TechTalk | AWS Public Sector Summit 2016
 
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
 
F01113945
F01113945F01113945
F01113945
 
Recording and Reasoning Over Data Provenance in Web and Grid Services
Recording and Reasoning Over Data Provenance in Web and Grid ServicesRecording and Reasoning Over Data Provenance in Web and Grid Services
Recording and Reasoning Over Data Provenance in Web and Grid Services
 
Cloud present, future and trajectory (Amazon Web Services) - JIsc Digifest 2016
Cloud present, future and trajectory (Amazon Web Services) - JIsc Digifest 2016Cloud present, future and trajectory (Amazon Web Services) - JIsc Digifest 2016
Cloud present, future and trajectory (Amazon Web Services) - JIsc Digifest 2016
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
Azure Overview Arc
Azure Overview ArcAzure Overview Arc
Azure Overview Arc
 
Cloud computing lab open stack
Cloud computing lab open stackCloud computing lab open stack
Cloud computing lab open stack
 
Elastic Software Infrastructure to Support the Industrial Internet
Elastic Software Infrastructure to Support the Industrial InternetElastic Software Infrastructure to Support the Industrial Internet
Elastic Software Infrastructure to Support the Industrial Internet
 
Everything you want to know about microservices
Everything you want to know about microservicesEverything you want to know about microservices
Everything you want to know about microservices
 
Webinar: How Microsoft is changing the game with Windows Azure
Webinar: How Microsoft is changing the game with Windows AzureWebinar: How Microsoft is changing the game with Windows Azure
Webinar: How Microsoft is changing the game with Windows Azure
 
Stephane Lapointe, Frank Boucher & Alexandre Brisebois: Les micro-services et...
Stephane Lapointe, Frank Boucher & Alexandre Brisebois: Les micro-services et...Stephane Lapointe, Frank Boucher & Alexandre Brisebois: Les micro-services et...
Stephane Lapointe, Frank Boucher & Alexandre Brisebois: Les micro-services et...
 
Network Security and Access Control within AWS
Network Security and Access Control within AWSNetwork Security and Access Control within AWS
Network Security and Access Control within AWS
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
AZUG.BE - Azure User Group Belgium - First public meeting
AZUG.BE - Azure User Group Belgium - First public meetingAZUG.BE - Azure User Group Belgium - First public meeting
AZUG.BE - Azure User Group Belgium - First public meeting
 
Big Data on Azure Tutorial
Big Data on Azure TutorialBig Data on Azure Tutorial
Big Data on Azure Tutorial
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
 
Virtualization on embedded boards
Virtualization on embedded boardsVirtualization on embedded boards
Virtualization on embedded boards
 
Building Event Driven (Micro)services with Apache Kafka
Building Event Driven (Micro)services with Apache KafkaBuilding Event Driven (Micro)services with Apache Kafka
Building Event Driven (Micro)services with Apache Kafka
 

More from roblund

2 years into drinking the Microservice kool-aid (Fact and Fiction)
2 years into drinking the Microservice kool-aid (Fact and Fiction)2 years into drinking the Microservice kool-aid (Fact and Fiction)
2 years into drinking the Microservice kool-aid (Fact and Fiction)roblund
 
ES6 Primer
ES6 PrimerES6 Primer
ES6 Primerroblund
 
Jason Moore - Why releasing 50 features are less than 1 solution - BSDC 2016
Jason Moore - Why releasing 50 features are less than 1 solution - BSDC 2016Jason Moore - Why releasing 50 features are less than 1 solution - BSDC 2016
Jason Moore - Why releasing 50 features are less than 1 solution - BSDC 2016roblund
 
Will Price - Venture Capital in Montana - BSDC 2016
Will Price - Venture Capital in Montana - BSDC 2016Will Price - Venture Capital in Montana - BSDC 2016
Will Price - Venture Capital in Montana - BSDC 2016roblund
 
Pete Sveen - How to Build, Grow, and Monetize Your Online Platform - BSDC 2016
Pete Sveen - How to Build, Grow, and Monetize Your Online Platform - BSDC 2016Pete Sveen - How to Build, Grow, and Monetize Your Online Platform - BSDC 2016
Pete Sveen - How to Build, Grow, and Monetize Your Online Platform - BSDC 2016roblund
 
Chris Omland - AWS Code Deploy - BSDC 2016
Chris Omland - AWS Code Deploy - BSDC 2016Chris Omland - AWS Code Deploy - BSDC 2016
Chris Omland - AWS Code Deploy - BSDC 2016roblund
 
Josef Verbanac - Voice is (a) Best Practice
Josef Verbanac - Voice is (a) Best PracticeJosef Verbanac - Voice is (a) Best Practice
Josef Verbanac - Voice is (a) Best Practiceroblund
 
Emergence Of Code Schools
Emergence Of Code SchoolsEmergence Of Code Schools
Emergence Of Code Schoolsroblund
 
Nora McDougall-Collins - I Can Do That
Nora McDougall-Collins - I Can Do ThatNora McDougall-Collins - I Can Do That
Nora McDougall-Collins - I Can Do Thatroblund
 
Better tests automagically (big sky dev con 2015)
Better tests automagically (big sky dev con 2015)Better tests automagically (big sky dev con 2015)
Better tests automagically (big sky dev con 2015)roblund
 
Ben Werner - Mountains and startups
Ben Werner - Mountains and startupsBen Werner - Mountains and startups
Ben Werner - Mountains and startupsroblund
 
Jason Moore - Interaction design in enterprise teams
Jason Moore - Interaction design in enterprise teamsJason Moore - Interaction design in enterprise teams
Jason Moore - Interaction design in enterprise teamsroblund
 

More from roblund (12)

2 years into drinking the Microservice kool-aid (Fact and Fiction)
2 years into drinking the Microservice kool-aid (Fact and Fiction)2 years into drinking the Microservice kool-aid (Fact and Fiction)
2 years into drinking the Microservice kool-aid (Fact and Fiction)
 
ES6 Primer
ES6 PrimerES6 Primer
ES6 Primer
 
Jason Moore - Why releasing 50 features are less than 1 solution - BSDC 2016
Jason Moore - Why releasing 50 features are less than 1 solution - BSDC 2016Jason Moore - Why releasing 50 features are less than 1 solution - BSDC 2016
Jason Moore - Why releasing 50 features are less than 1 solution - BSDC 2016
 
Will Price - Venture Capital in Montana - BSDC 2016
Will Price - Venture Capital in Montana - BSDC 2016Will Price - Venture Capital in Montana - BSDC 2016
Will Price - Venture Capital in Montana - BSDC 2016
 
Pete Sveen - How to Build, Grow, and Monetize Your Online Platform - BSDC 2016
Pete Sveen - How to Build, Grow, and Monetize Your Online Platform - BSDC 2016Pete Sveen - How to Build, Grow, and Monetize Your Online Platform - BSDC 2016
Pete Sveen - How to Build, Grow, and Monetize Your Online Platform - BSDC 2016
 
Chris Omland - AWS Code Deploy - BSDC 2016
Chris Omland - AWS Code Deploy - BSDC 2016Chris Omland - AWS Code Deploy - BSDC 2016
Chris Omland - AWS Code Deploy - BSDC 2016
 
Josef Verbanac - Voice is (a) Best Practice
Josef Verbanac - Voice is (a) Best PracticeJosef Verbanac - Voice is (a) Best Practice
Josef Verbanac - Voice is (a) Best Practice
 
Emergence Of Code Schools
Emergence Of Code SchoolsEmergence Of Code Schools
Emergence Of Code Schools
 
Nora McDougall-Collins - I Can Do That
Nora McDougall-Collins - I Can Do ThatNora McDougall-Collins - I Can Do That
Nora McDougall-Collins - I Can Do That
 
Better tests automagically (big sky dev con 2015)
Better tests automagically (big sky dev con 2015)Better tests automagically (big sky dev con 2015)
Better tests automagically (big sky dev con 2015)
 
Ben Werner - Mountains and startups
Ben Werner - Mountains and startupsBen Werner - Mountains and startups
Ben Werner - Mountains and startups
 
Jason Moore - Interaction design in enterprise teams
Jason Moore - Interaction design in enterprise teamsJason Moore - Interaction design in enterprise teams
Jason Moore - Interaction design in enterprise teams
 

Recently uploaded

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 

Recently uploaded (20)

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 

Adventures in Real-World Data Science

  • 1. Adventures in Real-World Data Science Automated Patent Classification Rollie D. Goodman TechLink Center
  • 2. • Established as a technology transfer center in 1996 • Facilitates ~60% of DoD’s license agreements with industry • Helps small companies secure R&D contracts
  • 3. • Established as a technology transfer center in 1996 • Facilitates ~60% of DoD’s license agreements with industry • Helps small companies secure R&D contracts
  • 4. • Established as a technology transfer center in 1996 • Facilitates ~60% of DoD’s license agreements with industry • Helps small companies secure R&D contracts
  • 5.
  • 6. training set: ~9,000 labeled patents
  • 7. Patent Data Document Number US 9,832,220 Assignee US Air Force Inventors Kwiat, Luke; Kamhoua, Charles; Kwiat, Kevin Attorneys Mancini, Joseph A. Title Security Method for Allocation of Virtual Machines in a Cloud Computing Network Abstract A method for enhancing security in a cloud computing system by allocating virtual machines over hypervisors, in a cloud computing environment, in a security-aware fashion. The invention solves the cloud user risk problem by inducing a state such that, unless there is a change in the conditions under which the present invention operates, the cloud users do not gain by deviating from the allocation induced by the present invention. The invention’s methods include grouping virtual machines of similar loss potential on the same hypervisor, creating hypervisor environments of similar total loss, and implementing a risk tiered system of hypervisors based on expense factors. Publication Date 11-28-2017 CPC Classes H04L63/1441, G06F9/45558, H04L63/1408, H04L63/20
  • 8. Patent Data Document Number US 9,832,220 Assignee US Air Force Inventors Kwiat, Luke; Kamhoua, Charles; Kwiat, Kevin Attorneys Mancini, Joseph A. Title Security Method for Allocation of Virtual Machines in a Cloud Computing Network Abstract A method for enhancing security in a cloud computing system by allocating virtual machines over hypervisors, in a cloud computing environment, in a security-aware fashion. The invention solves the cloud user risk problem by inducing a state such that, unless there is a change in the conditions under which the present invention operates, the cloud users do not gain by deviating from the allocation induced by the present invention. The invention’s methods include grouping virtual machines of similar loss potential on the same hypervisor, creating hypervisor environments of similar total loss, and implementing a risk tiered system of hypervisors based on expense factors. Publication Date 11-28-2017 CPC Classes H04L63/1441, G06F9/45558, H04L63/1408, H04L63/20
  • 9. Patent Data Document Number US 9,832,220 Assignee US Air Force Inventors Kwiat, Luke; Kamhoua, Charles; Kwiat, Kevin Attorneys Mancini, Joseph A. Title Security Method for Allocation of Virtual Machines in a Cloud Computing Network Abstract A method for enhancing security in a cloud computing system by allocating virtual machines over hypervisors, in a cloud computing environment, in a security-aware fashion. The invention solves the cloud user risk problem by inducing a state such that, unless there is a change in the conditions under which the present invention operates, the cloud users do not gain by deviating from the allocation induced by the present invention. The invention’s methods include grouping virtual machines of similar loss potential on the same hypervisor, creating hypervisor environments of similar total loss, and implementing a risk tiered system of hypervisors based on expense factors. Publication Date 11-28-2017 CPC Classes H04L63/1441, G06F9/45558, H04L63/1408, H04L63/20
  • 10. A01B33/028 A: Human necessities A01: Agriculture A01B: Machines for soil working in agriculture or industry A01B33: Tilling implements with rotary driven tools A01B33/02: …with tools on horizontal shaft transverse to direction of travel A01B33/028: …of the walk-behind type CPC Terms
  • 11. A01B33/028 A: Human necessities A01: Agriculture A01B: Machines for soil working in agriculture or industry A01B33: Tilling implements with rotary driven tools A01B33/02: …with tools on horizontal shaft transverse to direction of travel A01B33/028: …of the walk-behind type CPC Terms
  • 12. vocabulary: {A61K036, A61K038, A61K039, A61K041, A61K045} instance: {A61K038/00, A61K038/005, A61K039/00} CPC Vectorization
  • 13. vocabulary: {A61K036, A61K038, A61K039, A61K041, A61K045} instance: {A61K038/00, A61K038/005, A61K039/00} {A61K038, A61K038, A61K039} CPC Vectorization
  • 14. vocabulary: {A61K036, A61K038, A61K039, A61K041, A61K045} instance: {A61K038/00, A61K038/005, A61K039/00} {A61K038, A61K038, A61K039} [ 0, 2, 1, 0, 0 ] CPC Vectorization
  • 20. Cross-Validation experiment 1 experiment 2 experiment 3 experiment 4 experiment 5 fold 1 fold 2 fold 3 fold 4 fold 5 overall accuracy randomized training data
  • 21. Ensemble Learners • Train and combine multiple learners to solve a single problem • also: “multiple classifier systems” • Often outperform single classifiers • e.g. Netflix Competition, KDD 2009, and Kaggle
  • 23. Text Processing • Stopwords: remove words that appear frequently but do not give any information about content • a, an, and, for, from, is, it, the, to, with…
  • 24. Text Processing • Stopwords: remove words that appear frequently but do not give any information about content • a, an, and, for, from, is, it, the, to, with… • Stemming: reduce derived words to root (“stemmed”) form • different, differently, differ, differing, differed → differ
  • 25. Text Processing • Stopwords: remove words that appear frequently but do not give any information about content • a, an, and, for, from, is, it, the, to, with… • Stemming: reduce derived words to root (“stemmed”) form • different, differently, differ, differing, differed → differ • Weighting: term frequency – inverse document frequency !"#$"% = '()* +)(,-(./0% ∗ log .-*5() 6+ 76/-*(.'8 .-*5() 6+ 76/-*(.'8 9ℎ()( '()* ; 6//-)8
  • 26. the results are computed from the resulting generated text Text Processing
  • 27. the results are computed from the resulting generated text results computed resulting generated text Text Processing
  • 28. the results are computed from the resulting generated text results computed resulting generated text result comput result gener text Text Processing
  • 29. the results are computed from the resulting generated text results computed resulting generated text result comput result gener text 3.03, 1.24, 0.68, 4.79. . . Text Processing
  • 30. CPC classifier (SVM) text classifier (SVM) ? “The results are computed from the resulting generated text…” {A61K036, A61K038, A61K039, A61K041, A61K045} final classification class 1 class 2[class 1, class 2]
  • 31. Decision Trees outlook humidity wind N Y Y Y N high low sunny overcast rainy high low outlook: {sunny, overcast, rainy} humidity: {high, low} wind: {high, low} hiking: {Yes, No}
  • 32. CPC classifier (SVM) text classifier (SVM) decision tree “The results are computed from the resulting generated text…” {A61K036, A61K038, A61K039, A61K041, A61K045} final classification class 1 class 2[class 1, class 2] 87% 76% 98%
  • 33.
  • 34.
  • 35.
  • 36.