Search Results - (( data normalization _ algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7
  8. 8

    Effect of normalization and effect of normalization and training algorithm on radial basis training algorithm on radial basis function network performance function network performa... by Wani, Eddie

    Published 2007
    “…To recognize the effect of normalization of data and training algorithm on Radial Basis Function (RBF) performance.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Monograph
  11. 11

    An alternative approach to normal parameter reduction algorithms for decision making using a soft set theory / Sani Danjuma by Sani , Danjuma

    Published 2017
    “…In addition, the algorithm was relatively easy to understand compare to the state of the art of normal parameter reduction algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Pengkelasan Sel Kanser Pangkal Rahim Kepada Sel Normal Dan Tidak Normal Menggunakan Analisis Pembezalayan Dan Rangkaian Neural by Saidin, Mohammad Norrish

    Published 2006
    “…The system is built to classify some certain data into two classes, which are normal or abnormal cells. …”
    Get full text
    Get full text
    Monograph
  13. 13
  14. 14

    Algorithm for calculation of cephalometric soft tissue facial traits by Azam Rana, Mohammad, Setan, Halim, Majid, Zulkepli, Chong, Albert K.

    Published 2007
    “…The source data used to get 3D digital models of human soft tissues include CT data and 3D laser scanner data. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Classification of Cardiac Disorders Based on Electrocardiogram Data with Fuzzy Cognitive Map (FCM) Algorithm Approach by Sumiati, ., Hoga, Saragih, T.K.A, Rahman, Viktor Vekky, Ronald Repi, Agung, Triayudi

    Published 2021
    “…This research contributes to the world of health, where we classify the Electrocardiogram (ECG) data, so that it can classify abnormal and normal cardiac disorders using the Fuzzy Cognitive Map (FCM) algorithm.…”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…Consequently, to handle these data, computer algorithms must adapt to their characteristics. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream by Abdulateef, Alaa Fareed

    Published 2023
    “…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Reference gene validation for gene expression normalization in canine osteosarcoma: a geNorm algorithm approach by Selvarajah, Gayathri Thevi, Bonestroo, Floor A. S., Timmermans Sprang, Elpetra P. M., Kirpensteijn, Jolle, Mol, Jan A.

    Published 2017
    “…Previous gene expression studies involving canine OS have used one or two reference genes to normalize gene expression. This study aimed to validate a panel of reference genes commonly used for normalization of canine OS gene expression data using the geNorm algorithm. qPCR analysis of nine canine reference genes was performed on 40 snap-frozen primary OS tumors and seven cell lines. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer by Ahmad, Noor Ashikin

    Published 2015
    “…Purpose: To identify the effect of dose calculation algorithms on the Normal Tissue Complication Probability values of thoracic cancer. …”
    Get full text
    Get full text
    Monograph
  20. 20

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Even a normal people using clustering to grouping their data. …”
    Get full text
    Get full text
    Thesis