Search Results - (( java application testing algorithm ) OR ( mining detection method algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- java application »
- mining detection »
- method algorithm »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
2
Dissimilarity algorithm on conceptual graphs to mine text outliers
Published 2009“…In Comparison to other text outlier detection method, this approach managed to capture the semantics of documents through the use of CGs and is convenient to detect outliers through a simple dissimilarity function.Furthermore, our proposed algorithm retains a linear complexity with the increasing number of CGs.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Outlier Detection Technique in Data Mining: A Research Perspective
Published 2005“…Finding ,removing and detecting outliers is very important in data mining, for example error in large databases can be extremely common, so an important property of a data mining algorithm is robustness with respect to outliers in the database. …”
Get full text
Get full text
Conference or Workshop Item -
4
A Text Mining Algorithm Optimising the Determination of Relevant Studies
Published 2023Conference Paper -
5
Effective mining on large databases for intrusion detection
Published 2014“…Data mining is a common automated way of generating normal patterns for intrusion detection systems. …”
Get full text
Get full text
Conference or Workshop Item -
6
An ensemble feature selection method to detect web spam
Published 2018“…Web spam detection is one of research fields of data mining. …”
Get full text
Get full text
Get full text
Article -
7
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Experiments demonstrate that ensemble classifier learning method produces better accuracy mining data streams and selecting subset of relevant features comparing other single classifiers. …”
Get full text
Get full text
Thesis -
8
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
9
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
10
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
Get full text
Get full text
Article -
11
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…In this research, a fault diagnosis methodology based on Cross Industry Standard Process for Data Mining (CRISP-DM) model was proposed for the purpose of damage detection. …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
Cancer Prediction Based On Data Mining Using Decision Tree Algorithm
Published 2022“…Many studies have been conducted in order to predict cancer. Different data mining method has showed up with its related algorithms were adopted by different research. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Designing a new model to detect Trojan Horse based on knowledge discovery and data mining
Published 2024thesis::master thesis -
15
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
Published 2005“…We present a clustering-based intrusion detection algorithm, unsupervised anomaly detection, which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Image clustering comparison of two color segmentation techniques
Published 2010“…There are many algorithm for analysing clustering each having its own method to do clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Feature selection in intrusion detection, state of the art: A review
Published 2016“…These input features give information to the learning algorithms which used in intrusion detection system in the form of the detection method. …”
Get full text
Get full text
Article -
19
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…Moreover, a comparison of each algorithm for anomaly detection is also provided to produce a better algorithm. …”
Get full text
Get full text
Article -
20
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
“…Moreover, a comparison of each algorithm for anomaly detection is also provided to produce a better algorithm. …”
Get full text
Get full text
Article
