Search Results - (( processes evaluation detection algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- processes evaluation »
- evaluation detection »
- application mining »
- java application »
- mining algorithm »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
3
-
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Evaluation of feature selection algorithm for android malware detection
Published 2018“…This paper synthesizes an evaluation of feature selection algorithm by utilizing Term Frequency Inverse Document Frequency (TF-IDF) as the main algorithm in Android malware detection. …”
Get full text
Article -
8
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Evaluation was made based on various evaluation metrics related to outlier detection and clustering quality. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
10
Performance evaluation for different intrusion detection system algorithms using machine learning
Published 2018“…The objectives of this project is to evaluate the performance of various intrusion detection algorithms based on machine learning. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
A semi-synchronous label propagation algorithm with constraints for community detection in complex networks
Published 2017“…Constraints are utilised during the label propagation and community merging processes. The performance of the proposed algorithm is evaluated on various benchmark and real-world networks. …”
Get full text
Get full text
Article -
12
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…Thus, this study proposes an enhanced binary grey wolf optimiser (EBGWO) algorithm for FS in anomaly detection to overcome the algorithm issues. …”
Get full text
Get full text
Thesis -
13
Execution time optimization analysis on multiple algorithms performance of moving object edge detection
Published 2023“…This paper analyzes execution time optimization analysis between Sobel and Canny image processing algorithms in terms of moving objects edge detection. …”
Conference paper -
14
Evaluation of the Transfer Learning Models in Wafer Defects Classification
Published 2022“…Each image went through the embedding process by the evaluated algorithms. This enhanced image data numbers then went through Logistic Regression as a classifier. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Improved Switching-Basedmedian Filter For Impulse Noise Removal
Published 2013“…Broad impulse noise model has been employed for the evaluation process, to investigate the robustness of the method. …”
Get full text
Get full text
Thesis -
16
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…Adaptive optimization techniques such as fuzzy logic controller (FLC), reinforcement learning are discussed in this thesis in order to adopt Q-leaning algorithm to FLCs. We investigate the detection capability based on the fuzzy Q-learning (FQL) algorithm and evaluate it using distribute denial of service attacks (DDoS). …”
Get full text
Get full text
Thesis -
17
A review on object detection algorithms based deep learning methods / Wan Xing ... [et al.]
Published 2023“…Deep learning-based object detection algorithms can be categorized into three main types: end-to-end algorithms, two-stage algorithms, and one-stage algorithms. …”
Get full text
Get full text
Article -
18
Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji
Published 2018“…The algorithm for bleed detection consist of image processing to separate brain from the skull, rotation and realignment of the brain for mid-sagittal plane determination which used in bleeding detection. …”
Get full text
Get full text
Thesis -
19
Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF)
Published 2019“…The TF-IDF algorithm is used to filter Android features filtered before detection process. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Coronary artery stenosis detection and visualization / Tang Sze Ling
Published 2015“…The performance evaluation results show that the stenosis detection algorithm performs better average sensitivity than several state-of-the-art algorithms.…”
Get full text
Get full text
Thesis
