Search Results - (( based solution mining algorithm ) OR ( variable detection method algorithm ))

Refine Results
  1. 1

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…Detection methods based on statistical and data mining techniques are widely deployed as anomaly-based detection system (ADS). …”
    Get full text
    Get full text
    Thesis
  2. 2

    Tree-based contrast subspace mining method by Florence Sia Fui Sze

    Published 2020
    “…The research works involve first preparing the real world numerical and categorical data sets. Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Accelerated mine blast algorithm for ANFIS training for solving classification problems by Mohd Salleh, Mohd Najib, Hussain, Kashif

    Published 2016
    “…Mine Blast Algorithm (MBA) is newly developed metaheuristic technique. …”
    Get full text
    Get full text
    Article
  4. 4

    A numerical method for frequent pattern mining by Mustapha, Norwati, Nadimi-Shahraki, Mohammad-Hossein, Mamat, Ali, Sulaiman, Md. Nasir

    Published 2009
    “…Frequent pattern mining is one of the active research themes in data mining. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    Machine-learning approach using thermal and synthetic aperture radar data for classification of oil palm trees with basal stem rot disease by Che Hashim, Izrahayu

    Published 2021
    “…In an imbalanced dataset, one of the two classes contains fewer total samples than the other class. The sampling-based method, also known as the data level method, is used to deal with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Robust diagnostics and variable selection procedure based on modified reweighted fast consistent and high breakdown estimator for high dimensional data by Baba, Ishaq Abdullahi

    Published 2022
    “…The results obtained from the simulation study and real data sets indicate that the proposed method possesses high detection power with minimal misclassification error compared to the MRCD and MDP methods. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Logistic regression methods for classification of imbalanced data sets by Santi Puteri Rahayu, -

    Published 2012
    “…Hence, it is required to develop effective imbalanced LR-based methods to be widely used in data mining applications. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Using unique-prime-factorization theorem to mine frequent patterns without generating tree by Tohidi, Hossein, Ibrahim, Hamidah

    Published 2011
    “…Our algorithm works based on prime factorization and is called Prime Factor Miner (PFM). …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Data Classification and Its Application in Credit Card Approval by Thai , VinhTuan

    Published 2004
    “…Many intensive researches have been conducted to enhance the capability of data mining solution in providing the intelligence so that different types of businesses can make informed decisions. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    A hybrid local search algorithm for minimum dominating set problems by Abed, S.A., Rais, H.M., Watada, J., Sabar, N.R.

    Published 2022
    “…This algorithm focuses on generating promising solutions in different areas of the solution space using the problem search history. …”
    Get full text
    Get full text
    Article
  15. 15

    A hybrid local search algorithm for minimum dominating set problems by Abed, S.A., Rais, H.M., Watada, J., Sabar, N.R.

    Published 2022
    “…This algorithm focuses on generating promising solutions in different areas of the solution space using the problem search history. …”
    Get full text
    Get full text
    Article
  16. 16

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti... by Mohd Sayud, Nur Asikin

    Published 2018
    “…In this study, several models has been created which are from QPS Fledermaus model, BTM model and Slope Variability model. Slope variability model is an algorithm that is being used for detecting terrain roughness. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Fault diagnostic algorithm for precut fractionation column by Heng, H. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2004
    “…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif by Sa’dan, Siti ‘Aisyah, Jantan, Hamidah, Abdul Latif, Mohd Hanapi

    Published 2016
    “…Immune based algorithm is part of bio-inspired algorithms elicits theories which can act as an inspiration for computer-based solutions. …”
    Get full text
    Get full text
    Research Reports