Search Results - (( parameter estimation mining algorithm ) OR ( peer detection method algorithm ))
Search alternatives:
- estimation mining »
- mining algorithm »
- method algorithm »
- peer detection »
- parameter »
-
1
Tree-based contrast subspace mining method
Published 2020“…Hence, this thesis presents the optimization of parameters values for the tree-based method by genetic algorithm. …”
Get full text
Get full text
Get full text
Thesis -
2
Expectation maximization clustering algorithm for user modeling in web usage mining system
Published 2009“…In this study we advance a model for mining of user’s navigation pattern. The model is based on expectation-maximization (EM) algorithm and it is used for finding maximum likelihood estimates of parameters in probabilistic models, where the model depends on unobserved latent variables. …”
Get full text
Get full text
Article -
3
Multi-Objective Hybrid Algorithm For The Classification Of Imbalanced Datasets
Published 2019“…For its fast convergence and for its efficient search procedure, the self-adaptation is proposed in the parameters of the proposed hybrid algorithm. The effectiveness of this algorithm is verified by applying it on the unconstrained and constrained test functions through a simulation study. …”
Get full text
Get full text
Thesis -
4
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016Get full text
Get full text
Final Year Project -
5
ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE
Published 2012Get full text
Get full text
Conference or Workshop Item -
6
-
7
Prediction of Temerloh River water level for prediction of flood using Artificial Neural Network (ANN) method
Published 2015“…The purpose of this project is to research more about the flood occurrence in Temerloh, Pahang. The data mining approaches using artificial neural network (ANN) techniques will be use to conduct this research for flood estimation. …”
Get full text
Get full text
Undergraduates Project Papers -
8
-
9
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…To enhance the selection of most highly ranking features, irrelevant features are ‘pruned’ based on determined boundary threshold. In order to estimate the quality of ‘pruned’ features, self-adaptive DE algorithm is proposed. …”
Get full text
Get full text
Thesis -
10
-
11
Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines
Published 2020“…This current study proposes an intelligent data mining approach for the Machine Learning- Adaptive Distance Relay (ML-ADR) fault classification model using novel extracted 1-cycle transient voltage and current signals hidden knowledge from both healthy and faulty lines parameters. …”
Get full text
Get full text
Thesis -
12
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
13
-
14
-
15
-
16
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005Get full text
Get full text
Get full text
Conference or Workshop Item -
17
-
18
-
19
Outlier detection in circular regression model using minimum spanning tree method
Published 2019Get full text
Get full text
Conference or Workshop Item -
20
Machine learning algorithms in context of intrusion detection
Published 2016Get full text
Get full text
Conference or Workshop Item
