Subscribe free to our newsletters via your
. Space Industry and Business News .




TECH SPACE
'Data smashing' could unshackle automated discovery
by Staff Writers
Ithaca NY (SPX) Oct 15, 2014


File image.

A little known secret in data mining is that simply feeding raw data into a data analysis algorithm is unlikely to produce meaningful results, say the authors of a new Cornell University study.

From recognizing speech to identifying unusual stars, new discoveries often begin with comparison of data streams to find connections and spot outliers. But most data comparison algorithms today have one major weakness - somewhere, they rely on a human expert to specify what aspects of the data are relevant for comparison, and what aspects aren't. But experts aren't keeping pace with the growing amounts and complexities of big data.

Cornell computing researchers have come up with a new principle they call "data smashing" for estimating the similarities between streams of arbitrary data without human intervention, and without access to the data sources.

Hod Lipson, associate professor of mechanical engineering and computing and information science, and Ishanu Chattopadhyay, a former postdoctoral associate with Lipson and now at the University of Chicago, have described their method in Royal Society Interface, Oct. 1.

Data smashing is based on a new way to compare data streams. The process involves two steps.

First, the data streams are algorithmically "smashed" to "annihilate" the information in each other. Then, the process measures what information remained after the collision. The more information remained, the less likely the streams originated in the same source.

Data smashing principles may open the door to understanding increasingly complex observations, especially when experts do not know what to look for, according to the researchers.

The authors demonstrated the application of their principle to data from real-world problems, including the disambiguation of electroencephalograph patterns from epileptic seizure patients; detection of anomalous cardiac activity from heart recordings; and classification of astronomical objects from raw photometry.

In all cases and without access to original domain knowledge, the researchers demonstrated performance on par with the accuracy of specialized algorithms and heuristics devised by experts.

.


Related Links
Cornell University
Space Technology News - Applications and Research






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








TECH SPACE
New frontier in error-correcting codes
Boston MA (SPX) Oct 10, 2014
Error-correcting codes are one of the glories of the information age: They're what guarantee the flawless transmission of digital information over the airwaves or through copper wire, even in the presence of the corrupting influences that engineers call "noise." But classical error-correcting codes work best with large chunks of data: The bigger the chunk, the higher the rate at which it c ... read more


TECH SPACE
Argentina launches its first telecom satellite

'Data smashing' could unshackle automated discovery

SSL Begins Post-Launch Maneuvers For Intelsat 30

ORNL research reveals unique capabilities of 3-D printing

TECH SPACE
Russia to Orbit 9 MilCom Satellites by 2020

Development of software for electronic warfare resumes

GD's MUOS-Manpack PRC-155 Radio Connects USAF Aircraft to Ops Center

Northrop Grumman Debuts Low-Cost Terminals To Protect US Warfighters

TECH SPACE
Proton-M Lofts Express-AM6 Satellite

China Completes Country's Largest Spaceport

Argentina launches geostationary satellite

Arianespace's December mission for DIRECTV-14 and GSAT-16 satellites in process

TECH SPACE
Russian Bank Offers 5 Billion Rubles for GLONASS

With IRNSS-1C, India a Step Closer to Own Navigation Satellite System

Galileo duo handed over in excellent shape

ISRO to Launch India's Third Navigation Satellite on October 16

TECH SPACE
Australia's Tiger armed recon helicopters getting upgrade

Maintenance, upgrade work on Italian aircraft carrier ahead of schedule

New Zealand updating Super Seasprite helicopter training systems

Heading, attitude system ordered by Airbus Helicopters

TECH SPACE
Future computers could be built from magnetic 'tornadoes'

Australian teams set new records for silicon quantum computing

A novel platform for future spintronic technologies

Wider product lineup lifts Intel profit, revenues

TECH SPACE
Satellites for smart logging

China Launches New Satellite Via Orbital Carrier Rocket

NASA Tool Helps Airliners Minimize Weather Delays

Chinese scientist proposes new scientific satellites

TECH SPACE
Major breakthrough could help detoxify pollutants

US hid troop exposure to chemical agents in Iraq: report

Days of heavy air pollution blight northern China

Nanoparticles Accumulate Quickly in Wetland Sediment




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.