Search Results - (( outlier evaluation method algorithm ) OR ( java application using algorithm ))
Search alternatives:
- outlier evaluation »
- evaluation method »
- method algorithm »
- java application »
- using algorithm »
-
1
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Evaluation was made based on various evaluation metrics related to outlier detection and clustering quality. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Dissimilarity algorithm on conceptual graphs to mine text outliers
Published 2009“…In Comparison to other text outlier detection method, this approach managed to capture the semantics of documents through the use of CGs and is convenient to detect outliers through a simple dissimilarity function.Furthermore, our proposed algorithm retains a linear complexity with the increasing number of CGs.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Detection of multiple outliners in linear regression using nonparametric methods
Published 2004“…The predicted and residual values are obtained from an ordinary least squares fit of the data. The algorithm is described and is shown to perform well on classic multiple outlier data sets. …”
Get full text
Get full text
Monograph -
4
Dynamic robust bootstrap method based on LTS estimators
Published 2009“…We call this method Dynamic Robust Bootstrap-LTS based (DRBLTS) because here we have employed the LTS estimator in the modified bootstrap algorithm. …”
Get full text
Get full text
Article -
5
Robust Kernel Density Function Estimation
Published 2010“…The simulation study demonstrates that, on the whole, the accuracy of the proposed method is better than the competitor methods. The research also develops two new approaches for outlier and potential outlier detection in unimodal and multimodal distributions. …”
Get full text
Get full text
Thesis -
6
A clustering-based method for outlier detection under concept drift
Published 2024“…However, challenges may arise from assuming the majority of data comprises normal instances, particularly during sudden spikes in attack data, potentially diminishing algorithm effectiveness. Nonetheless, the method shows the potential to enhance network security by promptly identifying emerging anomalies in real-time streaming data. …”
Get full text
Get full text
Get full text
Article -
7
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
8
Reliability study of L1-Norm Adjustment in examining the inconsistencies of cadastral record / Nur Alya Nasuha Azizan
Published 2023“…In consideration of the mathematics mechanism employed by the adjustment approaches, it is advisable to proceed with LSE’s outliers’ detection variant in quantifying outliers.…”
Get full text
Get full text
Student Project -
9
-
10
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
11
MuDi-Stream: A multi density clustering algorithm for evolving data stream
Published 2016“…In this paper, a new method, called the MuDi-Stream, is developed. It is an online-offline algorithm with four main components. …”
Get full text
Get full text
Article -
12
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019“…Lastly, in order to externally judge the validity of these types of clustering algorithms, there is a need for a method to correctly and efficiently evaluate their variant multiclass clustering results. …”
Get full text
Get full text
Thesis -
13
Robust generalized multiplicative scatter correction algorithm on pretreatment of near infrared spectral data
Published 2018“…The Desirability Indices as statistical measures are presented for evaluating the methods.…”
Get full text
Get full text
Article -
14
Evaluating A New Adaptive Group Lasso Imputation Technique For Handling Missing Values In Compositional Data
Published 2024“…Considering the impact of outliers on the accuracy of estimation, both simulation and case analysis are conducted to compare the proposed algorithm against four existing methods. …”
Get full text
Get full text
Thesis -
15
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…EFS features effectiveness was evaluated in two ways: (1) by comparing them to the corresponding outliers percentage and flow features using four feature importance methods, and (2) by analyzing classification performance with and without EFS features. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
18
-
19
An adaptive density-based method for clustering evolving data streams / Amineh Amini
Published 2014“…The proposed method, which is called MuDi-Stream (Multi Density clustering algorithm for evolving data Stream), is an online-offline algorithm with four main components. …”
Get full text
Get full text
Get full text
Thesis -
20
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
