Search Results - (( based optimization method algorithm ) OR ( data detection mining algorithm ))
Search alternatives:
- method algorithm »
- detection mining »
- mining algorithm »
- data detection »
-
1
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
2
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
3
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018“…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
Get full text
Get full text
Article -
5
A buffer-based online clustering for evolving data stream
Published 2019“…In this study, we present a fully online density-based clustering algorithm called buffer-based online clustering for evolving data stream (BOCEDS). …”
Get full text
Get full text
Get full text
Article -
6
A new model for iris data set classification based on linear support vector machine parameter's optimization
Published 2020“…Data mining is known as the process of detection concerning patterns from essential amounts of data. …”
Get full text
Get full text
Get full text
Article -
7
An enhanced sequential exception technique for semantic-based text anomaly detection
Published 2019“…The detection of semantic-based text anomaly is an interesting research area which has gained considerable attention from the data mining community. …”
Get full text
Get full text
Get full text
Thesis -
8
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…The temporal micro cluster data structure is proposed in CC_TRS algorithm to store the summarized information for each group of similar segments. …”
Get full text
Get full text
Thesis -
9
Improvement on rooftop classification of worldview-3 imagery using object-based image analysis
Published 2019“…Then, the classifier (support vector machine (SVM) and data mining (DM) algorithm, decision tree (DT) were applied on each fusion image and their accuracy were evaluated. …”
Get full text
Get full text
Thesis -
10
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…This research work uses the Knowledge Discovery and Data mining (KDD) cup dataset, which is considered benchmark for evaluating security detection mechanisms. …”
Get full text
Get full text
Thesis -
11
A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent
Published 2023“…This study aims to develop a cryptojacking detection system based to the random forest algorithm.…”
Get full text
Get full text
Undergraduates Project Papers -
12
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…This research work uses the Knowledge Discovery and Data mining (KDD) cup dataset, which is considered benchmark for evaluating security detection mechanisms. …”
Get full text
Get full text
Thesis -
13
A novel ensemble decision tree-based CHi-squared Automatic Interaction Detection (CHAID) and multivariate logistic regression models in landslide susceptibility mapping
Published 2014“…An ensemble algorithm of data mining decision tree (DT)-based CHi-squared Automatic Interaction Detection (CHAID) is widely used for prediction analysis in variety of applications. …”
Get full text
Get full text
Article -
14
Analysis of Data Mining Tools for Android Malware Detection
Published 2019“…There are various data mining tools available to analyze data related android malware detection. …”
Get full text
Get full text
Get full text
Article -
15
Outlier Detection Technique in Data Mining: A Research Perspective
Published 2005“…Outlier detection as a branch of data mining has many important applications, and deserves more attention from data mining community. …”
Get full text
Get full text
Conference or Workshop Item -
16
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…Thus, to deal with huge dataset, data mining technique can be improved by introducing discretization algorithm to increase classification performance. …”
Get full text
Get full text
Thesis -
17
Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling
Published 2011“…Data mining is a well-known artificial intelligence technique to build network intrusion detection systems. …”
Get full text
Get full text
Get full text
Article -
18
A Text Mining Algorithm Optimising the Determination of Relevant Studies
Published 2023Conference Paper -
19
Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng
Published 2006“…Inference can be made both from writing style and from clues hidden in the posting data. A text-mining algorithm was designed to detect gender deception based on gender-preferential features at the word or clause level of Malaysian e-mail users. …”
Get full text
Get full text
Get full text
Article -
20
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007“…This , paper discusses the development of data mining and pattern recognition algorithm to handle the complexity of hyperspectral remote sensing images in Geographical Information Systems environment. …”
Get full text
Get full text
Conference or Workshop Item
