scispace - formally typeset
Search or ask a question
Author

Kaoru Shimada

Other affiliations: Waseda University
Bio: Kaoru Shimada is an academic researcher from Fukuoka Dental College. The author has contributed to research in topics: Association rule learning & Evolutionary computation. The author has an hindex of 17, co-authored 141 publications receiving 1263 citations. Previous affiliations of Kaoru Shimada include Waseda University.


Papers
More filters
Journal ArticleDOI
Shingo Mabu1, Ci Chen1, Nannan Lu1, Kaoru Shimada1, Kotaro Hirasawa1 
01 Jan 2011
TL;DR: A novel fuzzy class-association-rule mining method based on genetic network programming (GNP) for detecting network intrusions and can be flexibly applied to both misuse and anomaly detection in network-intrusion-detection problems.
Abstract: As the Internet services spread all over the world, many kinds and a large number of security threats are increasing. Therefore, intrusion detection systems, which can effectively detect intrusion accesses, have attracted attention. This paper describes a novel fuzzy class-association-rule mining method based on genetic network programming (GNP) for detecting network intrusions. GNP is an evolutionary optimization technique, which uses directed graph structures instead of strings in genetic algorithm or trees in genetic programming, which leads to enhancing the representation ability with compact programs derived from the reusability of nodes in a graph structure. By combining fuzzy set theory with GNP, the proposed method can deal with the mixed database that contains both discrete and continuous attributes and also extract many important class-association rules that contribute to enhancing detection ability. Therefore, the proposed method can be flexibly applied to both misuse and anomaly detection in network-intrusion-detection problems. Experimental results with KDD99Cup and DARPA98 databases from MIT Lincoln Laboratory show that the proposed method provides competitively high detection rates compared with other machine-learning techniques and GNP with crisp data mining.

190 citations

Proceedings ArticleDOI
01 Jan 2006
TL;DR: An efficient algorithm for important class association rule mining using genetic network programming (GNP) and measuring the significance of the association via the chi-squared test to present a classifier using these extracted rules.
Abstract: An efficient algorithm for important class association rule mining using genetic network programming (GNP) is proposed. GNP is one of the evolutionary optimization techniques, which uses directed graph structures as genes. Instead of generating a large number of candidate rules, the method can obtain a sufficient number of important association rules for classification. The proposed method measures the significance of the association via the chi-squared test. Therefore, all the extracted important rules can be used for classification directly. In addition, the method suits class association rule mining from dense databases, where many frequently occurring items are found in each tuple. Users can define conditions of extracting important class association rules. In this paper, we describe an algorithm for class association rule mining with chi-squared test using GNP and present a classifier using these extracted rules.

70 citations

Journal ArticleDOI
TL;DR: The stock trading model using GNP-Sarsa outperforms all the other methods and sub-nodes are introduced in each node to select appropriate stock price information depending on the situations and to determine appropriate actions (buying/selling).
Abstract: In this paper, an enhancement of stock trading model using Genetic Network Programming (GNP) with Sarsa Learning is described. There are three important points in this paper: First, we use GNP with Sarsa Learning as the basic algorithm while both Technical Indices and Candlestick Charts are introduced for efficient stock trading decision-making. In order to create more efficient judgment functions to judge the current stock price appropriately, Importance Index (IMX) has been proposed to tell GNP the timing of buying and selling stocks. Second, to improve the performance of the proposed GNP-Sarsa algorithm, we proposed a new method that can learn the appropriate function describing the relation between the value of each technical index and the value of the IMX. This is an important point that devotes to the enhancement of the GNP-Sarsa algorithm. The third point is that in order to create more efficient judgment functions, sub-nodes are introduced in each node to select appropriate stock price information depending on the situations and to determine appropriate actions (buying/selling). To confirm the effectiveness of the proposed method, we carried out the simulation and compared the results of GNP-Sarsa with other methods like GNP with Actor Critic, GNP with Candlestick Chart, GA and Buy&Hold method. The results shows that the stock trading model using GNP-Sarsa outperforms all the other methods.

50 citations

Journal ArticleDOI
Weishui Wan1, Shingo Mabu1, Kaoru Shimada1, Kotaro Hirasawa1, Jinglu Hu1 
01 Jan 2009
TL;DR: Two new variants of backpropagation algorithm are proposed that the outputs of nodes in the hidden layers are controlled with the aim to solve the moving target problem and the distributed weights problem through using Gaussian regularizer.
Abstract: In this paper we proposed two new variants of backpropagation algorithm. The common point of these two new algorithms is that the outputs of nodes in the hidden layers are controlled with the aim to solve the moving target problem and the distributed weights problem. One algorithm (AlgoRobust) is not so insensitive to the noises in the data, the second one (AlgoGS) is through using Gauss-Schmidt algorithm to determine in each epoch which weight should be updated, while the other weights are kept unchanged in this epoch. In this way a better generalization can be obtained. Some theoretical explanations are also provided. In addition, simulation comparisons are made between Gaussian regularizer, optimal brain damage (OBD) and the proposed algorithms. Simulation results confirm that the new proposed algorithms perform better than that of Gaussian regularizer, and the first algorithm AlgoRobust performs better than the second algorithm AlgoGS in the noisy data. On the other hand AlgoGS performs better than the AlgoRobust on the data without noise and the final structure obtained by two new algorithms is comparable to that obtained by using OBD.

49 citations


Cited by
More filters
Journal ArticleDOI

[...]

08 Dec 2001-BMJ
TL;DR: There is, I think, something ethereal about i —the square root of minus one, which seems an odd beast at that time—an intruder hovering on the edge of reality.
Abstract: There is, I think, something ethereal about i —the square root of minus one. I remember first hearing about it at school. It seemed an odd beast at that time—an intruder hovering on the edge of reality. Usually familiarity dulls this sense of the bizarre, but in the case of i it was the reverse: over the years the sense of its surreal nature intensified. It seemed that it was impossible to write mathematics that described the real world in …

33,785 citations

Journal ArticleDOI
TL;DR: This paper provides a structured and comprehensive overview of various facets of network anomaly detection so that a researcher can become quickly familiar with every aspect of network anomalies detection.
Abstract: Network anomaly detection is an important and dynamic research area. Many network intrusion detection methods and systems (NIDS) have been proposed in the literature. In this paper, we provide a structured and comprehensive overview of various facets of network anomaly detection so that a researcher can become quickly familiar with every aspect of network anomaly detection. We present attacks normally encountered by network intrusion detection systems. We categorize existing network anomaly detection methods and systems based on the underlying computational techniques used. Within this framework, we briefly describe and compare a large number of network anomaly detection methods and systems. In addition, we also discuss tools that can be used by network defenders and datasets that researchers in network anomaly detection can use. We also highlight research directions in network anomaly detection.

971 citations

Journal ArticleDOI
TL;DR: Comparative research review of three famous artificial intelligent techniques in financial market shows that accuracy of these artificial intelligent methods is superior to that of traditional statistical methods in dealing with financial problems, especially regarding nonlinear patterns.
Abstract: Nowadays, many current real financial applications have nonlinear and uncertain behaviors which change across the time. Therefore, the need to solve highly nonlinear, time variant problems has been growing rapidly. These problems along with other problems of traditional models caused growing interest in artificial intelligent techniques. In this paper, comparative research review of three famous artificial intelligence techniques, i.e., artificial neural networks, expert systems and hybrid intelligence systems, in financial market has been done. A financial market also has been categorized on three domains: credit evaluation, portfolio management and financial prediction and planning. For each technique, most famous and especially recent researches have been discussed in comparative aspect. Results show that accuracy of these artificial intelligent methods is superior to that of traditional statistical methods in dealing with financial problems, especially regarding nonlinear patterns. However, this outperformance is not absolute.

404 citations

Journal ArticleDOI
TL;DR: It is seen that factors such as chest pain being asymptomatic and the presence of exercise-induced angina indicate the likely existence of heart disease for both men and women, and resting ECG status is a key distinct factor for heart disease prediction.
Abstract: This paper investigates the sick and healthy factors which contribute to heart disease for males and females. Association rule mining, a computational intelligence approach, is used to identify these factors and the UCI Cleveland dataset, a biological database, is considered along with the three rule generation algorithms - Apriori, Predictive Apriori and Tertius. Analyzing the information available on sick and healthy individuals and taking confidence as an indicator, females are seen to have less chance of coronary heart disease then males. Also, the attributes indicating healthy and sick conditions were identified. It is seen that factors such as chest pain being asymptomatic and the presence of exercise-induced angina indicate the likely existence of heart disease for both men and women. However, resting ECG being either normal or hyper and slope being flat are potential high risk factors for women only. For men, on the other hand, only a single rule expressing resting ECG being hyper was shown to be a significant factor. This means, for women, resting ECG status is a key distinct factor for heart disease prediction. Comparing the healthy status of men and women, slope being up, number of coloured vessels being zero, and oldpeak being less than or equal to 0.56 indicate a healthy status for both genders.

329 citations

Journal ArticleDOI
TL;DR: An extended algorithm, GNP with Reinforcement Learning (GNPRL) is proposed which combines evolution and reinforcement learning in order to create effective graph structures and obtain better results in dynamic environments.
Abstract: This paper proposes a graph-based evolutionary algorithm called Genetic Network Programming (GNP). Our goal is to develop GNP, which can deal with dynamic environments efficiently and effectively, based on the distinguished expression ability of the graph (network) structure. The characteristics of GNP are as follows. 1) GNP programs are composed of a number of nodes which execute simple judgment/processing, and these nodes are connected by directed links to each other. 2) The graph structure enables GNP to re-use nodes, thus the structure can be very compact. 3) The node transition of GNP is executed according to its node connections without any terminal nodes, thus the past history of the node transition affects the current node to be used and this characteristic works as an implicit memory function. These structural characteristics are useful for dealing with dynamic environments. Furthermore, we propose an extended algorithm, “GNP with Reinforcement Learning (GNPRL)” which combines evolution and reinforcement learning in order to create effective graph structures and obtain better results in dynamic environments. In this paper, we applied GNP to the problem of determining agents' behavior to evaluate its effectiveness. Tileworld was used as the simulation environment. The results show some advantages for GNP over conventional methods.

329 citations