Search Results - (( variable deviation detection algorithm ) OR ( java applications mining algorithm ))
Search alternatives:
- deviation detection »
- applications mining »
- java applications »
- mining algorithm »
- variable »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
Fault diagnostic algorithm for precut fractionation column
Published 2004“…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
Get full text
Get full text
Conference or Workshop Item -
3
-
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
5
Development of a rule-based fault diagnostic advisory system for precut fractionation column
Published 2005“…Although the scheme was developed based on data of fatty acid precut fractionation column, the algorithm of fault detection and diagnosis can be extended to other chemical process by changing the x-MR chart and HAZOP for each selected monitoring variables.…”
Get full text
Get full text
Thesis -
6
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
7
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Fault diagnostic advisory system using moving-range chart and hazard operability study.
Published 2007“…Fault is considered to occur if one variable is out of control limit. The advisory system has successfully detected and diagnosed the deviations and displayed the causes and consequences of the faults. …”
Get full text
Get full text
Article -
9
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Monograph -
11
Fault diagnostic advisory system using moving-range chart and hazard operability study
Published 2007“…Fault is considered to occur if one variable is out of control limit. The advisory system has successfully detected and diagnosed the deviations and displayed the causes and consequences of the faults. …”
Get full text
Get full text
Get full text
Article -
12
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
13
Fault detection and diagnosis using rule-based support system on fatty acid fractionation column
Published 2003“…Identification of causes, consequences and suggested actions for each deviation assisted by Hazard and Operability Study (HAZOP) analysis are generated into rule-based algorithm. …”
Get full text
Get full text
Article -
14
Anomaly detection of denial-of-service network traffic attacks using autoencoders and isolation forest
Published 2026“…This paper presents an unsupervised network-based anomaly detection framework that integrates deep autoencoders with the Isolation Forest algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Lastly, we consider the problem of detecting multiple outliers in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Thesis -
16
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
17
Robust remote heart rate estimation from multiple asynchronous noisy channels using autoregressive model with Kalman filter
Published 2019“…We propose a novel algorithm to estimate heart rate. Also, it can differentiate between a photo of a human face and an actual human face meaning that it can detect false signals and skip them. …”
Get full text
Get full text
Article -
18
Characterization of digital intra-oral dental radiographs based on image enhancement algorithms (IEAs) / Siti Arpah Ahmad
Published 2017“…Thus, this work investigates the role of sharpening and AHE based image enhancement in reducing variability among the evaluation. New rule using existing standard deviation (std = 0) is utilized to determine the dentists' decision on the image quality and detected abnormalities. …”
Get full text
Get full text
Thesis -
19
HEP-2 CELL IMAGES CLASSIFICATION BASED ON STATISTICAL TEXTURE ANALYSIS AND FUZZY LOGIC
Published 2014“…The algorithm gives a mean accuracy of 84% out of 125 test images.…”
Get full text
Get full text
Final Year Project -
20
Development Of Two New Auxiliary Information Control Charts, And Economic And Economic-Statistical Designs Of Several Auxiliary Information Control Charts
Published 2020“…Results show that the RS X - AI chart generally surpasses the existing X - AI, synthetic X - AI and EWMA X - AI charts in the detection of outof- control signals. The second objective of this thesis is to develop the variable sampling interval exponentially weighted moving average t AI (VSI EWMA t - AI) chart for monitoring the process mean when errors in estimating the process standard deviation exist. …”
Get full text
Get full text
Thesis
