Search Results - (( parameter optimization method algorithm ) OR ( based detection mining algorithm ))
Search alternatives:
- parameter optimization »
- method algorithm »
- detection mining »
- mining algorithm »
- based detection »
-
1
A new model for iris data set classification based on linear support vector machine parameter's optimization
Published 2020“…In this study, we proposed a newly mode for classifying iris data set using SVM classifier and genetic algorithm to optimize c and gamma parameters of linear SVM, in addition principle components analysis (PCA) algorithm was use for features reduction.…”
Get full text
Get full text
Get full text
Article -
2
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…In order to improve the detection rate of malicious application on the Android platform, a novel knowledge-based database discovery model that improves apriori association rule mining of a priori algorithm with Particle Swarm Optimization (PSO) is proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
3
A buffer-based online clustering for evolving data stream
Published 2019“…This algorithm recursively updates the micro-cluster radius to its local optimal. …”
Get full text
Get full text
Get full text
Article -
4
Improvement on rooftop classification of worldview-3 imagery using object-based image analysis
Published 2019“…The optimal scale, shape and compactness parameters of multi-resolution segmentation have been determined and the detection accuracy was evaluated based on receiver operating characteristics (ROC). …”
Get full text
Get full text
Thesis -
5
Potential norms detection in social agent societies
Published 2023“…In this paper, we propose a norms mining algorithm that detects a domain's potential norms, which we called the Potential Norms Mining Algorithm (PNMA). …”
Article -
6
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…Thus, to deal with huge dataset, data mining technique can be improved by introducing discretization algorithm to increase classification performance. …”
Get full text
Get full text
Thesis -
7
Outlier Detection Technique in Data Mining: A Research Perspective
Published 2005“…Finding ,removing and detecting outliers is very important in data mining, for example error in large databases can be extremely common, so an important property of a data mining algorithm is robustness with respect to outliers in the database. …”
Get full text
Get full text
Conference or Workshop Item -
8
Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng
Published 2006“…Inference can be made both from writing style and from clues hidden in the posting data. A text-mining algorithm was designed to detect gender deception based on gender-preferential features at the word or clause level of Malaysian e-mail users. …”
Get full text
Get full text
Get full text
Article -
9
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Inference can be made both from writing style and from clues hidden in the posting data. A text-mining algorithm was designed to detect gender deception based on gender-preferential features at the word or clause level of Malaysian e-mail users. …”
Get full text
Get full text
Research Reports -
10
Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling
Published 2011“…This paper presents our work to improve the performance of anomaly intrusion detection using Fuzzy-ART based on the K-means algorithm. …”
Get full text
Get full text
Get full text
Article -
11
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023“…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
Short Survey -
12
A Text Mining Algorithm Optimising the Determination of Relevant Studies
Published 2023Conference Paper -
13
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
14
Optimization of turning parameters using genetic algorithm method
Published 2008“…This study about development of optimization for turning parameters based on the Genetic Algorithm (GA). …”
Get full text
Get full text
Undergraduates Project Papers -
15
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
Get full text
Get full text
Article -
16
A simultaneous spam and phishing attack detection framework for short message service based on text mining approach
Published 2017“…Additionally, the proposed framework also can detect the attack simultaneously using text mining approaches.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Parameters optimization of surface grinding process with particles swarm optimization, gravitational search, and sine cosine algorithms: a comparative analysis
Published 2018“…The efficiency of the three algorithms are evaluated and compared with previous results obtained by other optimization methods on similar studies. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Optimization of PID parameters for hydraulic positioning system utilizing variable weight Grey-Taguchi and particle swarm optimization
Published 2014“…Particle swarm optimization algorithm (PSO) is one of the artificial intelligence methods. …”
Get full text
Get full text
Thesis -
19
Optimization of turning parameters using ant colony optimization
Published 2008“…The project objectives are to develop Ant Colony Optimization (ACO) algorithm for CNC turning process and to optimize turning parameters for minimized production cost per unit. …”
Get full text
Get full text
Undergraduates Project Papers -
20
Parameter estimation in double exponential smoothing using genetic algorithm / Foo Fong Yeng, Lau Gee Choon and Zuhaimy Ismail
Published 2014“…Trial and error often serves as the best method to determine the parameter. Therefore, a good optimization technique is required for identify the best parameter in minimizing the forecast errors. …”
Get full text
Get full text
Research Reports
