Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Department of Information Systems & Computer Science Faculty Publications

Classification

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Computer Sciences

Towards An Infodemiological Algorithm For Classification Of Filipino Health Tweets, Ma. Regina Justina E. Estuar, Kennedy E. Espina, Delfin Jay Sabido Ix, Raymond Josef Edward Lara, Vikki Car De Los Reyes Jan 2016

Towards An Infodemiological Algorithm For Classification Of Filipino Health Tweets, Ma. Regina Justina E. Estuar, Kennedy E. Espina, Delfin Jay Sabido Ix, Raymond Josef Edward Lara, Vikki Car De Los Reyes

Department of Information Systems & Computer Science Faculty Publications

Finding innovative ICT solutions to enhance the Philippines’ health sector is part and parcel of the Philippine eHealth Strategic Framework and Plan 2020 program. This study sees the opportunity of using collected Twitter data to create a model that processes tweets to produce a dataset that may be relevant in the field of epidemiology and infodemiology. Through the collection of relevant tweets, future studies may make use of the output of this research for various purposes, such as the improvement of epidemiological systems of the Department of Health in support of the eHealth strategy. In this study, we …


Comparative Analysis Of Combinations Of Dimension Reduction And Data Mining Techniques For Malware Detection, Proceso L. Fernandez Jr, Jeffrey C. Yiu, Paul Albert R. Arana Oct 2010

Comparative Analysis Of Combinations Of Dimension Reduction And Data Mining Techniques For Malware Detection, Proceso L. Fernandez Jr, Jeffrey C. Yiu, Paul Albert R. Arana

Department of Information Systems & Computer Science Faculty Publications

Many malware detectors utilize data mining techniques as primary tools for pattern recognition. As the number of new and evolving malware continues to rise, there is an increasing need for faster and more accurate detectors. However, for a given malware detector, detection speed and accuracy are usually inversely related. This study explores several configurations of classification combined with feature selection. An optimization function involving accuracy and processing time is used to evaluate each configuration. A real data set provided by Trend Micro Philippines is used for the study. Among 18 di↵erent configurations studied, it is shown that J4.8 without feature …