Search Results - (( java implication tree algorithm ) OR ( knowledge detection clustering algorithm ))

Refine Results
  1. 1

    An Evolutionary Stream Clustering Technique for Outlier Detection by Supardi, N.A., Abdulkadir, S.J., Aziz, N.

    Published 2020
    “…Later, this algorithm will be extended to optimize the model in detecting outlier on data streams. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    Unsupervised Anomaly Detection with Unlabeled Data Using Clustering by Chimphlee, Witcha, Abdullah, Abdul Hanan, Md. Sap, Mohd. Noor

    Published 2005
    “…We present a clustering-based intrusion detection algorithm, unsupervised anomaly detection, which trains on unlabeled data in order to detect new intrusions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning by Islam, Md Kamrul

    Published 2019
    “…These results prove the superiority of BOCEDS algorithm over the existing clustering algorithms. …”
    Get full text
    Get full text
    Thesis
  5. 5

    On density-based data streams clustering algorithms: A survey by Teh, Y.W.

    Published 2017
    “…Recently, a lot of density-based clustering algorithms are extended for data streams. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…The system trains the NN on previously labelled data, and its knowledge is used to calculate the core online-offline clustering block error. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A buffer-based online clustering for evolving data stream by Islam, Md. Kamrul, Ahmed, Md. Manjur, Kamal Z., Zamli

    Published 2019
    “…The sensitivity of clustering parameters is also measured. The proposed algorithm is then applied to real-world weather data streams to demonstrate its capability to detect changes in data stream and discover arbitrarily shaped clusters. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Comparative analysis of K-Means and K-Medoids for clustering exam questions / Nurul Zafirah Mokhtar by Mokhtar, Nurul Zafirah

    Published 2016
    “…This unsupervised learning usually leads to undirected knowledge discovery. The cluster detection algorithm searches for clusters of data which are similar to one another by using similarity measures. …”
    Get full text
    Get full text
    Thesis
  9. 9

    KM-NEU: an efficient hybrid approach for intrusion detection system by Lisehroodi, Mazyar Mohammadi, Muda, Zaiton, Yassin, Warusia, Udzir, Nur Izura

    Published 2014
    “…The K-means clustering algorithm is engaged for grouping analogous nodes into k clusters using the similarity measures such as attack and non-attack, whereas the Neural Network Multi-Layer Perceptron classifies the clustered data into detail categories such as R2L, Probing, DoS, U2R and Normal. …”
    Get full text
    Get full text
    Article
  10. 10

    An improved hybrid learning approach for better anomaly detection by Mohamed Yassin, Warusia

    Published 2011
    “…In recent years, data mining approach for intrusion detection have been proposed and used such as neural networks, clustering, genetic algorithms, decision trees, and support vector machines. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Data stream clustering by divide and conquer approach based on vector model by Khalilian, Madjid, Mustapha, Norwati, Sulaiman, Nasir

    Published 2016
    “…The continuous effort on data stream clustering method has one common goal which is to achieve an accurate clustering algorithm. …”
    Get full text
    Get full text
    Article
  12. 12

    Parameter estimation of K-distributed sea clutter based on fuzzy inference and Gustafson-Kessel clustering by Davari, Atefeh, Marhaban, Mohammad Hamiruce, Mohd Noor, Samsul Bahari, Karimadini, Mohammad, Karimoddini, Ali

    Published 2011
    “…The algorithm also improves the calculations of shape and width of membership functions by means of clustering in order to improve the accuracy. …”
    Get full text
    Get full text
    Article
  13. 13

    Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation by Chen, Qipeng, Xiong, Qiaoqiao, Huang, Haisong, Tang, Saihong, Liu, Zhenghong

    Published 2024
    “…In response to the current issues of poor real-time performance, high computational costs, and excessive memory usage of object detection algorithms based on deep convolutional neural networks in embedded devices, a method for improving deep convolutional neural networks based on model compression and knowledge distillation is proposed. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework by Udzir, Nur Izura, Hajamydeen, Asif Iqbal

    Published 2019
    “…Ultimately, the framework is able to detect a broad range of intrusions exist in the logs without using either the attack knowledge or the traffic behavioural models. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems by Franco, Daniel Jose Da Graca Peceguina

    Published 2021
    “…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Fruity vegetable recognition system using Color Histogram and BRISK features extraction / Siti Hajar Mohd Nasri by Mohd Nasri, Siti Hajar

    Published 2016
    “…In process to extract the two main features, K-means clustering algorithm is used as background subtraction method with combination of Canny’s Edge Detection and Mathematical Morphology Operation for shape extraction. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Characterization and pathogenicity of Rhizoctonia spp isolated from various crop species in different agroecosystems in Malaysia by Rashed, Osamah Zaid Ali

    Published 2017
    “…Phylogenetic analysis using different algorithms separated Rhizoctonia spp. to the distinct clades. …”
    Get full text
    Get full text
    Thesis