Search Results - (( knowledge deviation detection algorithm ) OR ( java data classification algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function by Kamaruddin, Siti Sakira, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Mat Nor, Fauzias

    Published 2012
    “…We propose a novel error tolerance dissimilarity algorithm to detect deviations in the CGIFs. We evaluate our method in the context of analyzing real world financial statements for identifying deviating performance indicators. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Major problems in classification task are large amount of training data, large number of features and different behavior of data streams that reduce accuracy and increase computational cost in classifier training phase. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…Firstly, k-luster could incorporate additional clustering algorithms, or even classification algorithms in the future. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7
  8. 8

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    An enhanced sequential exception technique for semantic-based text anomaly detection by Taiye, Mohammed Ahmed

    Published 2019
    “…Text anomaly detection identifies deviating information from general information contained in documents. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    A hybrid interpretable deep structure based on adaptive neuro‑fuzzy inference system, decision tree, and K‑means for intrusion detection by Jia, Lu, Yin Chai, Wang, Chee Siong, Teh, Xinjin, Li, Liping, Zhao, Fengrui, Wei

    Published 2022
    “…The proposed algorithm was trained, validated, and tested on the NSL-KDD (National security lab–knowledge discovery and data mining) dataset. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Region-growing based segmentation and bag of features classification for breast ultrasound images by Lee, Lay Khoon

    Published 2017
    “…In the next stage, which is the segmentation stage, region growing algorithm is used to automatically detect tumors in ultrasound images. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…Machine Learning is one of the ways as a preventive method by applying the data collected from the clogging experiment in the vibration lab to build up a machine learning model for classification of flow blockage levels in the centrifugal pump. …”
    Get full text
    Get full text
    Monograph
  14. 14
  15. 15

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…Future work should be focusing on data collection of the E-Nose sensors and the improvement of the learning algorithm robustness towards environmental noise during data acquisition, such as evaporation and contamination of odor samples.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning by Islam, Md Kamrul

    Published 2019
    “…The experiment on noisy data stream shows that BOCEDS algorithm can detect noise with an accuracy of approximately 100%. …”
    Get full text
    Get full text
    Thesis
  17. 17

    An improved hybrid learning approach for better anomaly detection by Mohamed Yassin, Warusia

    Published 2011
    “…This technique identifies an activity which deviates from the normal behaviours. Nonetheless, current anomaly detection techniques are unable to detect all types of attacks accurately and correctly. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Assessing the relationships between problem representation, capabilities and task performance fraud risk assessment by Nigerian deposit money banks' fraud investigators by Odukoya, Olusoji Olumide

    Published 2021
    “…Results provide verifiable supports for twelve of the hypothesised relationships and seven deviations from previous literature. Knowledge and skills capabilities and fraud-related problem representation were significantly positively related to task-performance fraud risk assessment. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Development of a phantom and metal artifact correction (MAC) algorithm for post-operative spine computed tomography (CT) imaging / Noor Diyana Osman by Osman, Noor Diyana

    Published 2014
    “…The artifacts are due to the beam hardening, photon starvation effect, and inappropriate correction algorithm during image reconstruction. Knowledge on factors affecting the artifacts is crucially important to minimize these artifacts. …”
    Get full text
    Get full text
    Thesis