Search Results - (( set detection mining algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- detection mining »
- mining algorithm »
- java implication »
- set detection »
-
1
-
2
Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak
Published 2021“…A comparison between built-in Scikit Learn Naive Bayes algorithm, and the scratch Naive Bayes algorithm is used to measure its effectiveness in terms of accuracy. …”
Get full text
Get full text
Thesis -
3
Experimenting the dendrite cell algorithm for disease outbreak detection model
Published 2014“…The characteristics of early outbreak signal which are weak and behaved under uncertainties has brought to the development of outbreak detection model based on dendrite cell algorithm.Although the algorithm is proven can improve detection performance, it relies on several parameters which need to be defined before mining.In this study, the most appropriate parameter setting for outbreak detection using dendrite cell algorithm is examined.The experiment includes four parameters; the number of cell cycle update, the number of dendrite cell allowed to be in population, weight, and migration threshold value. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Building classification models from imbalanced fraud detection data / Terence Yong Koon Beh, Swee Chuan Tan and Hwee Theng Yeo
Published 2014“…Building classification models from such imbalanced data sets is a relatively new challenge in the machine learning and data mining community because many traditional classification algorithms assume similar proportions of majority and minority classes. …”
Get full text
Get full text
Get full text
Article -
5
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007“…However, hyperspectral image systems produce large data sets that are not easily interpretable by visual analysis and therefore require automated processing algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
6
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…This approach that is according to the DNN model reduces irrelevant features in the intrusion detection data sets of CICIDS2017 to improve the accuracy and cluster high-scale data sets. …”
Get full text
Get full text
Thesis -
7
A simultaneous spam and phishing attack detection framework for short message service based on text mining approach
Published 2017“…Additionally, the proposed framework also can detect the attack simultaneously using text mining approaches.…”
Get full text
Get full text
Get full text
Thesis -
8
Rough set discretization: equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
Published 2017“…Discretization of real value attributes is a vital task in data mining, particularly in the classification problem. …”
Get full text
Get full text
Get full text
Article -
9
Rough set discretization: Equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
Published 2016“…Discretization of real value attributes is a vital task in data mining, particularly in the classification problem. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
Published 2005“…Traditional anomaly detection algorithms require a set of purely normal data from which they train their model. …”
Get full text
Get full text
Conference or Workshop Item -
11
-
12
Rough Set Discretization: Equal Frequency Binning, Entropy/MDL and Semi Naives Algorithms of Intrusion Detection System
Published 2016“…Discretization of real value attributes is a vital task in data mining, particularly in the classification problem. …”
Get full text
Get full text
Book Chapter -
13
An ensemble feature selection method to detect web spam
Published 2018“…Web spam detection is one of research fields of data mining. …”
Get full text
Get full text
Get full text
Article -
14
Data Classification and Its Application in Credit Card Approval
Published 2004“…An analysis on the field of data mining is done to show how data mining, especially data classification, can help in businesses such as targeted marketing, credit card approval, fraud detection, medical diagnosis, and scientific work. …”
Get full text
Get full text
Final Year Project -
15
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018“…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
Get full text
Get full text
Article -
16
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
A new model for iris data set classification based on linear support vector machine parameter's optimization
Published 2020“…Data mining is known as the process of detection concerning patterns from essential amounts of data. …”
Get full text
Get full text
Get full text
Article -
18
Rough Set Discretize Classification of Intrusion Detection System
Published 2016“…In rough set, there are several stage processing including discretization part which is a vital task in data mining, particularly in the classification problem. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Feature selection algorithms for Malaysian dengue outbreak detection model
Published 2017“…The study also showed the set of features to represent dengue outbreak detection for Malaysian health agencies.…”
Get full text
Get full text
Get full text
Article
