| Technique | Description | Real-Life Example |
| Resampling | - Oversampling: Increase the number of minority class samples. - Undersampling: Reduce the number of majority class samples. | Example: In fraud detection, where fraudulent transactions are rare, you can oversample the minority class to balance the dataset. Conversely, you can undersample non-fraudulent transactions. |
| Synthetic Data | Generate synthetic samples for the minority class using techniques like SMOTE (Synthetic Minority Over-sampling Technique). | Example: In medical diagnosis, when positive cases are scarce, generate synthetic data points to improve model accuracy. |
| Cost-Sensitive Learning | Modify the algorithm's objective function to penalize misclassification of the minority class more than the majority class. | Example: In healthcare, misdiagnosing a rare disease may be costlier, so the algorithm can be tuned to minimize such errors. |
| Ensemble Methods | Combine predictions from multiple models to improve performance, e.g., Random Forests, AdaBoost, or XGBoost. | Example: In credit scoring, ensemble methods can help balance recall and precision when dealing with rare default cases. |
| Anomaly Detection | Treat the minority class as anomalies and use anomaly detection algorithms like Isolation Forest or One-Class SVM. | Example: In network security, detecting rare intrusions among legitimate traffic patterns. |
| Change the Threshold | Adjust the classification threshold to increase sensitivity or specificity based on the problem's requirements. | Example: In email spam detection, lowering the threshold may increase the recall of spam emails. |
| Collect More Data | Sometimes, collecting more data for the minority class may be a practical solution if feasible. | Example: In manufacturing, if defective products are rare, collecting more data on defect cases can help. |
Logged operations are replicated. These include, but are not limited to: DDL DML Create/alter table space Create/alter storage group Create/alter buffer pool XML data. Logged LOBs Not logged operations are not replicated. These include, but are not limited to: Database configuration parameters (this allows primary and standby databases to be configured differently). "Not logged initially" tables Not logged LOBs UDF (User Defined Function) libraries. UDF DDL is replicated. But the libraries used by UDF (such as C or Java libraries) are not replicated, because they are not stored in the database. Users must manually copy the libraries to the standby. Note: You can use database configuration parameter BLOCKNONLOGGED to block not logged operations on the primary.
Comments