Search Results - (( using detection method algorithm ) OR ( data visualisation mining algorithm ))
Search alternatives:
- visualisation mining »
- data visualisation »
- method algorithm »
- mining algorithm »
- using detection »
-
1
The summer heat of cryptojacking season : Detecting cryptojacking using heatmap and fuzzy
Published 2022“…After that, this study employs the heatmap method to visualise the PMCC value as a colour version of heat. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
-
3
Dynamic modeling by usage data for personalization systems
Published 2009Get full text
Get full text
Conference or Workshop Item -
4
Forecasting utility management in UiTMCTKKT using predictive analytics / Nur Sufiah Muhammad Taufik
Published 2025“…In this project we will use the Cross Industry Standard Process for Data Mining (CRISP-DM) framework to mitigate these issues combining predictive analytics with iconic factors such as Holt-Winters and Autoregressive Integrated Moving Average (ARIMA) models. …”
Get full text
Get full text
Thesis -
5
-
6
-
7
A COMPARISON STUDY OF DATA CLUSTERING AND VISUALISATION TECHNIQUES WITH VARIOUS DATA TYPES
Published 2020“…Clustering is used to identify the intrinsic grouping of a set of unlabelled data. It can be applied in data mining exploration and statistical data analysis. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
8
Mining and integration of oral cancer genomics for predictive therapeutics / Bernard Lee Kok Bang
Published 2019“…In conclusion, the present work has demonstrated that cancer genomics data mining and integration through GENIPAC and DeSigN is a viable approach to accelerating the drug development process for oral cancer. …”
Get full text
Get full text
Thesis -
9
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
Get full text
Get full text
Final Year Project -
10
Multi road marking detection system for autonomous car using hybrid- based method
Published 2018“…One of the embedded systems that received great attention is road detection system, that operates using road markings detection algorithm. …”
Get full text
Get full text
Get full text
Thesis -
11
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
12
Amplitude independent muscle activity detection algorithm of soft robotic glove system for hemiparesis stroke patients using single sEMG channel
Published 2020“…The algorithm employs the First Lag Autocorrelation and the Modified Sample Entropy methods to detect and classify weak hand closing and opening muscle activities by using signal obtained from the Flexor Carpi Ulnaris forearm muscle. …”
Get full text
Get full text
Thesis -
13
Optimised content-social based features for fake news detection in social media using text clustering approach
Published 2025“…In general, the process of fake news detection was conducted in two different phases, the topic detection phase using a graph-based unsupervised clustering method based on HFPA and Markov Clustering Algorithm (MCL) called (HFPA-MCL) and the fake news detection phase using an unsupervised clustering method based on K-means algorithm. …”
Get full text
Get full text
Get full text
Thesis -
14
Outlier detection in circular regression model using minimum spanning tree method
Published 2019“…Therefore, this study aims to develop new algorithms that can detect outliers by using the minimum spanning tree method. …”
Get full text
Get full text
Conference or Workshop Item -
15
Obfuscated Malware Detection: Impacts on Detection Methods
Published 2024“…This paper focuses on the impacts of obfuscated malware detection techniques using a variety of detection methods. …”
Conference Paper -
16
Multi-Phase Information Theory-Based Algorithm for Edge Detection of Aerial Images
Published 2022“…Such findings make the proposed algorithm desirable to be used as a key image detection method with other image-related applications.…”
Get full text
Get full text
Article -
17
Detection of head position using chain code algorithm
Published 2007“…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
Get full text
Get full text
Thesis -
18
Detection of head position using chain code algorithm
Published 2007“…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
Get full text
Get full text
Thesis -
19
-
20
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…In this paper we propose an intrusion detection method that combines Fuzzy Clustering and Genetic Algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
