Search Results - (( java implication tree algorithm ) OR ( knowledge detection clustering algorithm ))
Search alternatives:
- detection clustering »
- knowledge detection »
- java implication »
- implication tree »
- tree algorithm »
-
1
An Evolutionary Stream Clustering Technique for Outlier Detection
Published 2020“…Later, this algorithm will be extended to optimize the model in detecting outlier on data streams. …”
Get full text
Get full text
Conference or Workshop Item -
2
-
3
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
Published 2005“…We present a clustering-based intrusion detection algorithm, unsupervised anomaly detection, which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Conference or Workshop Item -
4
An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning
Published 2019“…These results prove the superiority of BOCEDS algorithm over the existing clustering algorithms. …”
Get full text
Get full text
Thesis -
5
On density-based data streams clustering algorithms: A survey
Published 2017“…Recently, a lot of density-based clustering algorithms are extended for data streams. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…The system trains the NN on previously labelled data, and its knowledge is used to calculate the core online-offline clustering block error. …”
Get full text
Get full text
Thesis -
7
A buffer-based online clustering for evolving data stream
Published 2019“…The sensitivity of clustering parameters is also measured. The proposed algorithm is then applied to real-world weather data streams to demonstrate its capability to detect changes in data stream and discover arbitrarily shaped clusters. …”
Get full text
Get full text
Get full text
Article -
8
Comparative analysis of K-Means and K-Medoids for clustering exam questions / Nurul Zafirah Mokhtar
Published 2016“…This unsupervised learning usually leads to undirected knowledge discovery. The cluster detection algorithm searches for clusters of data which are similar to one another by using similarity measures. …”
Get full text
Get full text
Thesis -
9
KM-NEU: an efficient hybrid approach for intrusion detection system
Published 2014“…The K-means clustering algorithm is engaged for grouping analogous nodes into k clusters using the similarity measures such as attack and non-attack, whereas the Neural Network Multi-Layer Perceptron classifies the clustered data into detail categories such as R2L, Probing, DoS, U2R and Normal. …”
Get full text
Get full text
Article -
10
An improved hybrid learning approach for better anomaly detection
Published 2011“…In recent years, data mining approach for intrusion detection have been proposed and used such as neural networks, clustering, genetic algorithms, decision trees, and support vector machines. …”
Get full text
Get full text
Thesis -
11
Data stream clustering by divide and conquer approach based on vector model
Published 2016“…The continuous effort on data stream clustering method has one common goal which is to achieve an accurate clustering algorithm. …”
Get full text
Get full text
Article -
12
Parameter estimation of K-distributed sea clutter based on fuzzy inference and Gustafson-Kessel clustering
Published 2011“…The algorithm also improves the calculations of shape and width of membership functions by means of clustering in order to improve the accuracy. …”
Get full text
Get full text
Article -
13
Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation
Published 2024“…In response to the current issues of poor real-time performance, high computational costs, and excessive memory usage of object detection algorithms based on deep convolutional neural networks in embedded devices, a method for improving deep convolutional neural networks based on model compression and knowledge distillation is proposed. …”
Get full text
Get full text
Article -
14
-
15
-
16
A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework
Published 2019“…Ultimately, the framework is able to detect a broad range of intrusions exist in the logs without using either the attack knowledge or the traffic behavioural models. …”
Get full text
Get full text
Get full text
Article -
17
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
Get full text
Get full text
Thesis -
18
Fruity vegetable recognition system using Color Histogram and BRISK features extraction / Siti Hajar Mohd Nasri
Published 2016“…In process to extract the two main features, K-means clustering algorithm is used as background subtraction method with combination of Canny’s Edge Detection and Mathematical Morphology Operation for shape extraction. …”
Get full text
Get full text
Thesis -
19
A new model for iris data set classification based on linear support vector machine parameter's optimization
Published 2020“…Data mining is known as the process of detection concerning patterns from essential amounts of data. …”
Get full text
Get full text
Get full text
Article -
20
Characterization and pathogenicity of Rhizoctonia spp isolated from various crop species in different agroecosystems in Malaysia
Published 2017“…Phylogenetic analysis using different algorithms separated Rhizoctonia spp. to the distinct clades. …”
Get full text
Get full text
Thesis
