Search Results - ((regression algorithm) OR (detection algorithm))
Search alternatives:
-
1
Outlier detection in circular regression model using minimum spanning tree method
Published 2019“…Therefore, this study aims to develop new algorithms that can detect outliers by using the minimum spanning tree method. …”
Get full text
Get full text
Conference or Workshop Item -
2
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Get full text
Article -
3
Comparative study of clustering-based outliers detection methods in circular-circular regression model
Published 2021“…This paper is a comparative study of several algorithms for detecting multiple outliers in circular-circular regression model based on the clustering algorithms. …”
Get full text
Get full text
Get full text
Article -
4
Comparative study of clustering-based outliers detection methods in circular-circular regression model
Published 2021“…This paper is a comparative study of several algorithms for detecting multiple outliers in circular-circular regression model based on the clustering algorithms. …”
Get full text
Get full text
Get full text
Article -
5
Comparative study of clustering-based outliers detection methods in circularcircular regression model
Published 2021“…This paper is a comparative study of several algorithms for detecting multiple outliers in circular-circular regression model based on the clustering algorithms. …”
Get full text
Get full text
Get full text
Article -
6
The effect of replacement strategies of genetic algorithm in regression test case prioritization of selected test cases
Published 2015“…This study presents an optimized regression test case prioritization of selected test cases for object-oriented software using Genetic algorithm with different replacement strategies. …”
Get full text
Get full text
Get full text
Article -
7
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024Subjects:Article -
8
Detection of multiple outliners in linear regression using nonparametric methods
Published 2004“…REFERENCES Agullo, J. (2000). New Algorithms for Computing the Least Trimmed Squares Regression Estimator. …”
Get full text
Get full text
Monograph -
9
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…The proposed method combined the New Teaching-Learning-Based Optimization Algorithm (NTLBO), Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) NTLBO algorithm with supervised machine learning techniques for Feature Subset Selection (FSS). …”
Get full text
Get full text
Get full text
Article -
10
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…This article presents the development of an improved intrusion detection method for binary classification. In the proposed IDS, Rao Optimization Algorithm, Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) were combined with NTLBO algorithm with supervised ML techniques (for feature subset selection (FSS). …”
Get full text
Get full text
Get full text
Article -
11
Single-linkage method to detect multiple outliers with different outlier scenarios in circular regression model
Published 2018“…Single-linkage is one of the algorithms in agglomerative clustering technique that can be used to detect outliers. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity
Published 2015“…This paper propose an optimized regression test case selection and prioritization for object-oriented software based on dependence graph model analysis of the source code and optimized the selected test case using Genetic Algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
13
Alternate methods for anomaly detection in high-energy physics via semi-supervised learning
Published 2020“…In this paper, we introduce two new algorithms called EHRA and C-EHRA, which use machine learning regression and clustering to detect anomalies in samples. …”
Get full text
Get full text
Get full text
Article -
14
An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset / Sarthak Rastogi ... [et al.]
Published 2022“…The IDS with machine learning method improves the detection accuracy of the security attacks. To this end, this paper studies the classification analysis of intrusion detection using various supervised learning algorithms such as SVM, Naive Bayes, KNN, Random Forest, Logistic Regression and Decision tree on the NSL-KDD dataset. …”
Get full text
Get full text
Get full text
Article -
15
A regression test case selection and prioritization for object-oriented programs using dependency graph and genetic algorithm
Published 2014“…This paper presents an evolutionary regression test case prioritization for object-oriented software based on dependence graph model analysis of the affected program using Genetic Algorithm. …”
Get full text
Get full text
Get full text
Article -
16
The Multiple Outliers Detection using Agglomerative Hierarchical Methods in Circular Regression Model
Published 2017“…Two agglomerative hierarchical clustering algorithms for identifying multiple outliers in circular regression model have been developed in this study. …”
Get full text
Get full text
Get full text
Article -
17
Evaluating Machine Learning Algorithms for Fake Currency Detection
Published 2024“…Consequently, financial institutions like banks and ATMs require robust automated systems to accurately detect counterfeit currency. In this study, we evaluate the effectiveness of six supervised machine learning algorithms—K-Nearest Neighbor, Decision Trees, Support Vector Machine, Random Forests, Logistic Regression, and Naive Bayes—in detecting the authenticity of banknotes. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Neural network algorithm-based fall detection modelling
Published 2020“…Related algorithm for the fall detection has been discussed in depth by researcher from the previous research. …”
Get full text
Get full text
Get full text
Article -
19
Elucidating the effect of process parameters on the production of hydrogen-rich syngas by biomass and coal Co-gasification techniques: A multi-criteria modeling approach
Published 2023“…Biomass; Coal; Complex networks; Errors; Forecasting; Gasification; Hydrogen production; Learning algorithms; Mean square error; Neural networks; Regression analysis; Sensitivity analysis; Support vector machines; Co-gasification; Gaussian process regression; Hydrogen-rich syngas; Machine learning algorithms; Machine-learning; Neural-networks; Process parameters; Regression model; Support vectors machine; Syn gas; Synthesis gas; coal; hydrogen; synfuel; biomass; chemical reaction; detection method; hydrogen; machine learning; multicriteria analysis; algorithm; Article; artificial neural network; biomass; controlled study; gasification; Gaussian processing regression; linear regression analysis; machine learning; mean absolute error; mean square error; parameters; prediction; root mean square error; sensitivity analysis; support vector machine; temperature; Bayes theorem; biomass; Bayes Theorem; Biomass; Coal; Hydrogen; Temperature…”
Article -
20
Evolutionary cost cognizant regression test prioritization for object-oriented programs based on fault dependency
Published 2018“…Furthermore, they did not consider incorporating evolution process such as applying genetic algorithms to their technique. In this work, we proposed an evolutionary cost-cognizant regression testing approach that prioritizes test case according to the rate of severity detection of test cases connected with dependent faults using genetic algorithms. …”
Get full text
Get full text
Get full text
Article
