Search Results - (( process detection mining algorithm ) OR ( java applications testing algorithm ))
Search alternatives:
- applications testing »
- process detection »
- java applications »
- testing algorithm »
- detection mining »
- mining algorithm »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
2
A Text Mining Algorithm Optimising the Determination of Relevant Studies
Published 2023Conference Paper -
3
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023Subjects:Short Survey -
4
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…The generation of rule is considered a crucial process in data mining and the generated rules are in a huge number. …”
Get full text
Get full text
Thesis -
5
Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak
Published 2021“…Sentiment Analysis refers to natural language processing and text mining approaches to classify thoughts or sentiments from the tweet. …”
Get full text
Get full text
Thesis -
6
A norms mining approach to norms detection in multi-agent systems
Published 2012“…In this paper, we propose a norms mining technique for a visitor agent to detect the norms of a community of local agents to comply with the community's normative protocol. …”
Get full text
Conference or Workshop Item -
7
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007“…This , paper discusses the development of data mining and pattern recognition algorithm to handle the complexity of hyperspectral remote sensing images in Geographical Information Systems environment. …”
Get full text
Get full text
Conference or Workshop Item -
8
Dissimilarity algorithm on conceptual graphs to mine text outliers
Published 2009“…In Comparison to other text outlier detection method, this approach managed to capture the semantics of documents through the use of CGs and is convenient to detect outliers through a simple dissimilarity function.Furthermore, our proposed algorithm retains a linear complexity with the increasing number of CGs.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
The semantics of norms mining in multi-agent systems
“…We define the semantics of entities and processes that are involved in the norms mining technique. …”
Get full text
Conference or Workshop Item -
10
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…The collected datasets were used as inputs for the DM process. In this research, a fault diagnosis methodology based on Cross Industry Standard Process for Data Mining (CRISP-DM) model was proposed for the purpose of damage detection. …”
Get full text
Get full text
Get full text
Thesis -
11
Designing a new model to detect Trojan Horse based on knowledge discovery and data mining
Published 2024thesis::master thesis -
12
A norms mining approach to norms detection in multi-agent systems
Published 2023“…In this paper, we propose a norms mining technique for a visitor agent to detect the norms of a community of local agents to comply with the community's normative protocol. …”
Conference paper -
13
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
14
Development and implementation of a technique for norms-adaptable agents in open multi-agent communities
Published 2023“…Computer science; Systems science; Agent based simulation; Mining algorithms; Multi-agent community; nocv1; Normative agents; norms deatetcin; Norms detections; Third parties; Verification process; Multi agent systems…”
Article -
15
The semantics of norms mining in multi-agent systems
Published 2023“…We define the semantics of entities and processes that are involved in the norms mining technique. …”
Conference paper -
16
Arabic Speaker Identification System for Forensic Authentication Using K-NN Algorithm
Published 2023Conference Paper -
17
Feature selection algorithms for Malaysian dengue outbreak detection model
Published 2017“…The experimental results showed that the predictive accuracy was improved by applying feature selection process before the predictive modeling process. The study also showed the set of features to represent dengue outbreak detection for Malaysian health agencies.…”
Get full text
Get full text
Get full text
Article -
18
Data Classification and Its Application in Credit Card Approval
Published 2004“…This project demonstrates how data mining can address the need of business intelligence in the process of decision-making. …”
Get full text
Get full text
Final Year Project -
19
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
20
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2013“…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent’s belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent’s belief base with new normative protocol. …”
Get full text
Get full text
Article
