Search Results - (( features deviation detection algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- deviation detection »
- features deviation »
- application mining »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Feature selection in intrusion detection, state of the art: A review
Published 2016“…These input features give information to the learning algorithms which used in intrusion detection system in the form of the detection method. …”
Get full text
Get full text
Article -
4
Skin detection using HSV color component subtraction and texture information / Rizal Mat Jusoh and Norhazimi Hamzah
Published 2010“…This thesis presents skin detection algorithm for detecting human skin regions in color images. …”
Get full text
Get full text
Research Reports -
5
-
6
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
7
Image Copy-Move Forgery Detection Algorithms Based on Spatial Feature Domain
Published 2023Conference Paper -
8
Feature extraction and selection algorithm based on self adaptive ant colony system for sky image classification
Published 2023“…The fine-grained cloud detection and recognition (FGCDR) algorithm is use to extract colour, inside texture and neighbour texture features from multiview of superpixels sky images. …”
Get full text
Get full text
Get full text
Thesis -
9
Computer vision automation system for sorting partially overlapping tiles
Published 2019“…The CbATS consists of three main components which are a color-detection algorithm for distinguishing tiles according to the color, image segmentation that ensures the separation between partially overlapped tiles, and texture features extraction method to determine overturned tiles. …”
Get full text
Get full text
Thesis -
10
-
11
Pairwise clusters optimization and cluster most significant feature methods for anomaly-based network intrusion detection system (POC2MSF) / Gervais Hatungimana
Published 2018“…Anomaly-based Intrusion Detection System (IDS) uses known baseline to detect patterns which have deviated from normal behaviour. …”
Get full text
Get full text
Get full text
Article -
12
Analysis Of Feature Reduction Algorithms To Estimate Human Stress Conditions
Published 2022“…Therefore, this study aimed to present analyse of the performance of feature classify when combining with feature selection algorithm to estimate human stress based on the facial feature of thermal imaging. …”
Get full text
Get full text
Thesis -
13
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Region-growing based segmentation and bag of features classification for breast ultrasound images
Published 2017“…In the next stage, which is the segmentation stage, region growing algorithm is used to automatically detect tumors in ultrasound images. …”
Get full text
Get full text
Thesis -
16
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…An Intrusion Detection System (IDS) is capable to detect unauthorized intrusions into computer systems and networks by looking for signatures of known attacks or deviations of normal activity. …”
Get full text
Get full text
Thesis -
17
Fault detection and diagnosis using rule-based support system on fatty acid fractionation column
Published 2003“…Process variables are defined as fault if they are deviated outside this region. Identification of causes, consequences and suggested actions for each deviation assisted by Hazard and Operability Study (HAZOP) analysis are generated into rule-based algorithm. …”
Get full text
Get full text
Article -
18
Detection of smooth texture in facial images for the evaluation of unnatural contrast enhancement
Published 2023“…This paper presents an algorithm for detecting smooth texture in facial images which is prone to unnatural contrast enhancement. …”
Article -
19
Hearing disorder detection using auditory evoked potential (AEP) signals
Published 2020Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal
