Compare the results of the selected best 2 classifiers

Assignment Help Computer Engineering
Reference no: EM133520940

Case Study: For this question you need to implement three multi-classifiers to identify attack and normal behaviour from the UNSW-NB15 intrusion dataset. You are required to read the data from training set (175,341 records) and test set (82,332 records).
You are required to implement it by using the publicly available machine learning software WEKA.

For this task you will need two files available on below link:
• training.arff and test.arff.

You need to perform the following steps:
• Import training data.
• For each classifier:
- Select an appropriate classifier (do not choose any meta classifier)
- Specify test option
- Perform the training
- Supply test data set
- Evaluate the classifier.

Question: You need to repeat for at least 3 classifiers (Random Forest, Random Tree, J48, and eventually select the results from the best 2 classifiers.
You need to include in your report the following:

1. Screenshot of the performance details for 3 classifiers

2. Compare the results of the selected best 2 classifiers, evaluating with the metrics: Accuracy, precision, recall, F1-Score and false positive rate.

3. Which classifier gave the best performance overall? Justify your selection of the 'best' classifier and given reasons why you think it is the best. Is there any way to improve the performance further?

Reference no: EM133520940

Questions Cloud

What things make up the internet anyway : Who owns the Internet? What things make up the Internet anyway? Who manages the Internet? Who makes the Internet rules? Is this a good arrangement?
Create a mission and goals to outwardly express : How can the organization create a mission and goals to outwardly express and reinforce its commitment to diversity and inclusion?
What is the overview of all social media used in markets : What is the Overview of all Social Media (instagram , youtube and facebook) used in markets in the region for Motorrad, BMW , MINI and Rolls Royce?
Analyse security and management issues : ICT373 Cloud Computing, Kings Own Institute - Identify and describe different enabling technologies for the Cloud and Design and apply a cloud strategy
Compare the results of the selected best 2 classifiers : Compare the results of the selected best 2 classifiers, evaluating with the metrics: Accuracy, precision, recall, F1-Score and false positive rate.
What annual return does he need to earn : If Mark wants to retire in 25 years with $1,011,000.00 and can save $9,680.00 annually for 25 years. What annual return does he need to earn?
Complete ife and calculate financial ratios for your company : Complete an IFE and calculate financial ratios for your company. Financial ratio analysis with key conclusions and implications for strategic choice.
Identify and describe two models of communication : Define communication and describe communication as a process. Identify and describe two models of communication.
Explore parallels and distinctions between security policies : explore the parallels and distinctions between security policies applicable to a standard business and those relevant to an eCommerce enterprise.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd