Search Results - (( processes detection mining algorithm ) OR ( java application using algorithm ))
Search alternatives:
- detection mining »
- mining algorithm »
- java application »
- using algorithm »
- processes »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
2
A Text Mining Algorithm Optimising the Determination of Relevant Studies
Published 2023Conference Paper -
3
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023Subjects:Short Survey -
4
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…The generation of rule is considered a crucial process in data mining and the generated rules are in a huge number. …”
Get full text
Get full text
Thesis -
5
Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak
Published 2021“…Sentiment Analysis refers to natural language processing and text mining approaches to classify thoughts or sentiments from the tweet. …”
Get full text
Get full text
Thesis -
6
A norms mining approach to norms detection in multi-agent systems
Published 2012“…In this paper, we propose a norms mining technique for a visitor agent to detect the norms of a community of local agents to comply with the community's normative protocol. …”
Get full text
Conference or Workshop Item -
7
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007“…This , paper discusses the development of data mining and pattern recognition algorithm to handle the complexity of hyperspectral remote sensing images in Geographical Information Systems environment. …”
Get full text
Get full text
Conference or Workshop Item -
8
Dissimilarity algorithm on conceptual graphs to mine text outliers
Published 2009“…In Comparison to other text outlier detection method, this approach managed to capture the semantics of documents through the use of CGs and is convenient to detect outliers through a simple dissimilarity function.Furthermore, our proposed algorithm retains a linear complexity with the increasing number of CGs.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
The semantics of norms mining in multi-agent systems
“…We define the semantics of entities and processes that are involved in the norms mining technique. …”
Get full text
Conference or Workshop Item -
10
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…The collected datasets were used as inputs for the DM process. In this research, a fault diagnosis methodology based on Cross Industry Standard Process for Data Mining (CRISP-DM) model was proposed for the purpose of damage detection. …”
Get full text
Get full text
Get full text
Thesis -
11
Designing a new model to detect Trojan Horse based on knowledge discovery and data mining
Published 2024thesis::master thesis -
12
A norms mining approach to norms detection in multi-agent systems
Published 2023“…In this paper, we propose a norms mining technique for a visitor agent to detect the norms of a community of local agents to comply with the community's normative protocol. …”
Conference paper -
13
Development and implementation of a technique for norms-adaptable agents in open multi-agent communities
Published 2023“…Computer science; Systems science; Agent based simulation; Mining algorithms; Multi-agent community; nocv1; Normative agents; norms deatetcin; Norms detections; Third parties; Verification process; Multi agent systems…”
Article -
14
The semantics of norms mining in multi-agent systems
Published 2023“…We define the semantics of entities and processes that are involved in the norms mining technique. …”
Conference paper -
15
Arabic Speaker Identification System for Forensic Authentication Using K-NN Algorithm
Published 2023Conference Paper -
16
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
17
Feature selection algorithms for Malaysian dengue outbreak detection model
Published 2017“…The experimental results showed that the predictive accuracy was improved by applying feature selection process before the predictive modeling process. The study also showed the set of features to represent dengue outbreak detection for Malaysian health agencies.…”
Get full text
Get full text
Get full text
Article -
18
-
19
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
20
Data Classification and Its Application in Credit Card Approval
Published 2004“…This project demonstrates how data mining can address the need of business intelligence in the process of decision-making. …”
Get full text
Get full text
Final Year Project
