Search Results - (( data reduction detection algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- reduction detection »
- application mining »
- java application »
- mining algorithm »
- data reduction »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…The model is implemented and tested on the CICDDoS2019 dataset using different data dimensionality reduction test scenarios. The results show that using dimensionality reduction techniques along with the ML algorithms with a dataset containing high-dimensional data significantly improves the classification results. …”
Get full text
Get full text
Get full text
Article -
4
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…The model is implemented and tested on the CICDDoS2019 dataset using different data dimensionality reduction test scenarios. The results show that using dimensionality reduction techniques along with the ML algorithms with a dataset containing high-dimensional data significantly improves the classification results. …”
Get full text
Get full text
Get full text
Article -
5
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…The model is implemented and tested on the CICDDoS2019 dataset using different data dimensionality reduction test scenarios. The results show that using dimensionality reduction techniques along with the ML algorithms with a dataset containing high-dimensional data significantly improves the classification results. …”
Get full text
Get full text
Get full text
Article -
6
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…The model is implemented and tested on the CICDDoS2019 dataset using different data dimensionality reduction test scenarios. The results show that using dimensionality reduction techniques along with the ML algorithms with a dataset containing high-dimensional data significantly improves the classification results. …”
Get full text
Get full text
Get full text
Article -
7
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2023“…The model is implemented and tested on the CICDDoS2019 dataset using different data dimensionality reduction test scenarios. The results show that using dimensionality reduction techniques along with the ML algorithms with a dataset containing high-dimensional data significantly improves the classification results. …”
Get full text
Get full text
Get full text
Article -
8
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Real-time time series error-based data reduction for internet-of-things applications
Published 2018“…Such requirements prevent effective deployments of data reduction techniques. This work is inspired by Perceptually Important Points (PIP) data reduction algorithm due to its superior data reduction ability. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
14
Soft Set Decision/Forecasting System Based on Hybrid Parameter Reduction Algorithm
Published 2017“…Although the decomposition scenario in the previous algorithms detects the reduction, it could not obtain the optimal decision. …”
Get full text
Get full text
Get full text
Article -
15
Data redundancy reduction scheme for data aggregation in wireless sensor network
Published 2020“…This research proposes Data Redundancy Reduction Scheme (DRRS) which includes three algorithms namely, Metadata Classification (MC), Selection Active Nodes (SAN) and Anomaly Detection (AD) algorithms that works before data aggregation, when multiple composite events simultaneously occur in the different locations within the cluster. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Improving the efficiency of clustering algorithm for duplicates detection
Published 2023“…The process of clustering records is affected by the quality of data. The more error-free the data, the more efficient the clustering algorithm, as data errors cause data to be placed in incorrect groups. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
An enhanced soft set data reduction using decision partition order technique
Published 2017“…The decomposition scenario in Rose’s and Kumar’s algorithms detects the reduction, but could not obtain the optimal decision. …”
Get full text
Get full text
Thesis -
18
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…The experimental results showed that the accuracy of the algorithm over the NSL-KDD dataset was 99.72%, with a memory reduction of 10%. …”
Get full text
Get full text
Thesis -
19
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
Published 2013“…It combines the following algorithms: the first algorithm is New Alert Reduction (NAR) algorithm to remove the redundancy from the alert’s file and reduce the false positives.…”
Get full text
Get full text
Thesis -
20
Accelerating FPGA-surf feature detection module by memory access reduction
Published 2019“…One of the popular algorithm used is called the Speeded-Up Robust Features (SURF), which realized the scale space pyramid to detect the features. …”
Get full text
Get full text
Get full text
Article
