Search Results - (( code classifications mining algorithm ) OR ( rate data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- classifications mining »
- code classifications »
- data normalization »
- mining algorithm »
-
1
Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer
Published 2017“…Furthermore, the Lazy-IBK algorithm have been validated to produce the best classifier model, with the machine learning algorithm performance of 65.26%, recall of 65.3%, and 65.4% F-measured as compared to other evaluated machine learning classifier algorithms proposed within the WEKA data mining algorithm. …”
Get full text
Get full text
Get full text
Thesis -
2
Comparative analysis for topic classification in juz Al-Baqarah
Published 2018“…The SVM performance is then compared against other classification algorithms such as Naive Bayes, J48 Decision Tree and K-Nearest Neighbours. …”
Get full text
Get full text
Article -
3
Classification of metamorphic virus using n-grams signatures
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
5
Learner’s emotion prediction using production rules classification algorithm through brain computer interface tool
Published 2018“…No EEG studies in Malaysia has been done on school children to study their emotional behaviour while learning. Classification and prediction are the functions provided by the data mining techniques that suit in EEG signal processing. …”
Get full text
Get full text
Thesis -
6
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
7
A clustering-based method for outlier detection under concept drift
Published 2024“…However, challenges may arise from assuming the majority of data comprises normal instances, particularly during sudden spikes in attack data, potentially diminishing algorithm effectiveness. …”
Get full text
Get full text
Get full text
Article -
8
Electroencephalography Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation
Published 2015“…Unlike the commercial ECG simulators, to the best of our knowledge, there is no such commercially available system that can be used for such research tasks. With controlled data types, healthy/normal, seizure and pre-seizure classes, tuning of algorithms for detection and classification applications can be attained. …”
Get full text
Get full text
Article -
9
Improving Channel Assignment for Vehicular Ad-hoc Sensor Network in Disaster Management System
Published 2024“…Moreover, an average of 22.91% for LTE-AIC with respect to normal LTE-A and 38.63% compared to LTE for high data rate. …”
Get full text
Get full text
Get full text
Thesis -
10
An improved recommender system based on normalization of matrix factorization and collaborative filtering algorithms
Published 2015“…The hypothesis is that the tendency of normalization technique to simplify the data combined with the accuracy of the neighborhood models can improve the accuracy of the RS. …”
Get full text
Get full text
Thesis -
11
EEG Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation
Published 2015“…Unlike the commercial ECG simulators, to the best of our knowledge, there is no such commercially available system that can be used for such research tasks. With controlled data types, healthy/normal, seizure and pre-seizure classes, tuning of algorithms for detection and classification applications can be attained. …”
Get full text
Get full text
Citation Index Journal -
12
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…Self data are regarded as the normal behavioral pattern of the monitored system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
An algorithm for pulsed activation of solenoid valves for variable rate application of agricultural chemicals
Published 2008“…A potential advantage of this alternative algorithm over pulse width modulation based systems is the use of lower-cost industrial solenoid valves with slower opening and closing times instead of the more expensive high speed valves normally used in PWM systems.…”
Get full text
Get full text
Conference or Workshop Item -
14
Identification of non-equilibrium growth for bitcoin exchange rate: mathematical derivation method in Islamic financial engineering
Published 2017“…This study validates the normality distribution of data using graphical and numerical method. …”
Get full text
Get full text
Get full text
Article -
15
A Comparative Study of Z-Score and Min-Max Normalization for Rainfall Classification in Pekanbaru
Published 2024“…The objective is to compare various data normalization techniques, including Min-Max Normalization and Z-Score Normalization. …”
Get full text
Get full text
Get full text
Article -
16
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…Thus, to deal with huge dataset, data mining technique can be improved by introducing discretization algorithm to increase classification performance. …”
Get full text
Get full text
Thesis -
17
A FUZZY LOGIC ALGORITHM FOR HEART RATE MONITORING
Published 2014Get full text
Get full text
Final Year Project -
18
Smart diagnosis of long bone tumor / Mazni Parimin
Published 2005“…The data samples involve in this project are data that had been normalize and become the inputs of the prototype. …”
Get full text
Get full text
Student Project -
19
Mitigating Unbalanced And Overlapped Problems Of Large Network Intrusion Data Using Multiplelevel Detection Techniques
Published 2022“…These problems have caused a low detection rate for intrusions that are the minority in data sets because learning algorithms favour the majority class (normal traffic). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Robust remote heart rate estimation from multiple asynchronous noisy channels using autoregressive model with Kalman filter
Published 2019“…A two-steps data fusion method is also introduced to combine current and previous measured heart rates to calculate a more accurate result. …”
Get full text
Get full text
Article
