Search Results - (( set detection mining algorithm ) OR ( java based optimization algorithm ))
Search alternatives:
- detection mining »
- mining algorithm »
- set detection »
- java »
-
1
-
2
Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak
Published 2021“…A comparison between built-in Scikit Learn Naive Bayes algorithm, and the scratch Naive Bayes algorithm is used to measure its effectiveness in terms of accuracy. …”
Get full text
Get full text
Thesis -
3
Experimenting the dendrite cell algorithm for disease outbreak detection model
Published 2014“…The characteristics of early outbreak signal which are weak and behaved under uncertainties has brought to the development of outbreak detection model based on dendrite cell algorithm.Although the algorithm is proven can improve detection performance, it relies on several parameters which need to be defined before mining.In this study, the most appropriate parameter setting for outbreak detection using dendrite cell algorithm is examined.The experiment includes four parameters; the number of cell cycle update, the number of dendrite cell allowed to be in population, weight, and migration threshold value. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…The optimization of a computationally intensive algorithm such as this on a mobile platform is challenging due to the limited resources available. …”
Get full text
Get full text
Conference or Workshop Item -
5
Building classification models from imbalanced fraud detection data / Terence Yong Koon Beh, Swee Chuan Tan and Hwee Theng Yeo
Published 2014“…Building classification models from such imbalanced data sets is a relatively new challenge in the machine learning and data mining community because many traditional classification algorithms assume similar proportions of majority and minority classes. …”
Get full text
Get full text
Get full text
Article -
6
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007“…However, hyperspectral image systems produce large data sets that are not easily interpretable by visual analysis and therefore require automated processing algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
7
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…Hence, the objective of this research is to propose suitable and optimize algorithm for ANPR system on Android mobile phone. …”
Get full text
Get full text
Get full text
Book -
8
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…This approach that is according to the DNN model reduces irrelevant features in the intrusion detection data sets of CICIDS2017 to improve the accuracy and cluster high-scale data sets. …”
Get full text
Get full text
Thesis -
9
A simultaneous spam and phishing attack detection framework for short message service based on text mining approach
Published 2017“…Additionally, the proposed framework also can detect the attack simultaneously using text mining approaches.…”
Get full text
Get full text
Get full text
Thesis -
10
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
Get full text
Get full text
Article -
11
Rough set discretization: equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
Published 2017“…Discretization of real value attributes is a vital task in data mining, particularly in the classification problem. …”
Get full text
Get full text
Get full text
Article -
12
Rough set discretization: Equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
Published 2016“…Discretization of real value attributes is a vital task in data mining, particularly in the classification problem. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
Published 2005“…Traditional anomaly detection algorithms require a set of purely normal data from which they train their model. …”
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Rough Set Discretization: Equal Frequency Binning, Entropy/MDL and Semi Naives Algorithms of Intrusion Detection System
Published 2016“…Discretization of real value attributes is a vital task in data mining, particularly in the classification problem. …”
Get full text
Get full text
Book Chapter -
16
An ensemble feature selection method to detect web spam
Published 2018“…Web spam detection is one of research fields of data mining. …”
Get full text
Get full text
Get full text
Article -
17
Data Classification and Its Application in Credit Card Approval
Published 2004“…An analysis on the field of data mining is done to show how data mining, especially data classification, can help in businesses such as targeted marketing, credit card approval, fraud detection, medical diagnosis, and scientific work. …”
Get full text
Get full text
Final Year Project -
18
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
Get full text
Get full text
Get full text
Monograph -
19
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018“…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
Get full text
Get full text
Article -
20
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
Get full text
Get full text
Get full text
Get full text
Article
