Search Results - (( simulation detection method algorithm ) OR ( problem implementation mining algorithm ))
Search alternatives:
- problem implementation »
- implementation mining »
- simulation detection »
- method algorithm »
- mining algorithm »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
A Rough-Apriori Technique in Mining Linguistic Association Rules
Published 2008“…It uses the rough membership function to capture the linguistic interval before implementing the Apriori algorithm to mine interesting association rules. …”
Get full text
Get full text
Get full text
Book Chapter -
4
ANALYSIS OF CUSTOMER SERVICE BUSINESS PROCESS USING DATA MINING
Published 2020“…Hence, this paper contribute to justify by the basic concepts of data mining, described the selected types and models of algorithms, and the process of data mining by using R Tools.…”
Get full text
Get full text
Final Year Project -
5
Comparative study of apriori-variant algorithms
Published 2016“…One of data mining methods is frequent itemset mining that has been implemented in real world applications, such as identifying buying patterns in grocery and online customers’ behavior.Apriori is a classical algorithm in frequent itemset mining, that able to discover large number or itemset with a certain threshold value. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…The simulation results indicate that the proposed method is suitable to detect a single outlier. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
Detection of head position using chain code algorithm
Published 2007“…This thesis focuses on a method to recognize and detect a human at the surveillance or highlighted area boundary based their head beside; a simulation system of head detection was developed using image processing. …”
Get full text
Get full text
Thesis -
9
Detection of head position using chain code algorithm
Published 2007“…This thesis focuses on a method to recognize and detect a human at the surveillance or highlighted area boundary based their head beside; a simulation system of head detection was developed using image processing. …”
Get full text
Get full text
Thesis -
10
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
11
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
12
Analysis of Data Mining Tools for Android Malware Detection
Published 2019“…However, the problem arises in deciding the most appropriate machine learning techniques or algorithm on particular tools to be implemented on particular data. …”
Get full text
Get full text
Get full text
Article -
13
A novel approach to data mining using simplified swarm optimization
Published 2011“…Therefore, the proposed SSO rule-based classifier with local search strategies has offered a new paradigm shift in solving complex problems in data mining which may not be able to be solved by other benchmark classifiers.…”
Get full text
Get full text
Thesis -
14
Attribute related methods for improvement of ID3 Algorithm in classification of data: A review
Published 2020“…Decision tree is an important method in data mining to solve the classification problems. There are several learning algorithms to implement the decision tree but the most commonly-used is ID3 algorithm. …”
Get full text
Get full text
Get full text
Article -
15
-
16
An enhanced intelligent database engine by neural network and data mining
Published 2000“…An Intelligent Database Engine (IDE) is developed to solve any classification problem by providing two integrated features: decision-making by a backpropagation (BP) neural network (NN) and decision support by Apriori, a data mining (DM) algorithm. …”
Get full text
Get full text
Article -
17
Process fault detection and diagnosis using Boolean representation on fatty acid fractionation column
Published 2003“…Through the proposed algorithm, various faults could be simulated and detected using the system. …”
Get full text
Get full text
Conference or Workshop Item -
18
Y-type Random 2-satisfiability In Discrete Hopfield Neural Network
Published 2024“…Additionally, the proposed Hybrid Differential Evolution Algorithm was implemented into the training phase to ensure that the cost function of the Discrete Hopfield Neural Network is minimized. …”
Get full text
Get full text
Thesis -
19
Outlier detection in circular regression model using minimum spanning tree method
Published 2019“…Therefore, this study aims to develop new algorithms that can detect outliers by using the minimum spanning tree method. …”
Get full text
Get full text
Conference or Workshop Item -
20
Comparative study of clustering-based outliers detection methods in circular-circular regression model
Published 2021“…This paper is a comparative study of several algorithms for detecting multiple outliers in circular-circular regression model based on the clustering algorithms. …”
Get full text
Get full text
Get full text
Article
