Search Results - (( _ application mining algorithm ) OR ( its detection based algorithm ))
Search alternatives:
- application mining »
- mining algorithm »
- detection based »
- its detection »
-
1
An Improved Artificial Dendrite Cell Algorithm for Abnormal Signal Detection
Published 2018“…From the experiments towards 12 benchmark and two outbreak datasets, the improved DCA is proven to have a better detection result than its previous version in terms of sensitivity, specificity, false detection rate and accuracy.…”
Get full text
Get full text
Article -
2
An adaptive anomaly threshold in artificial dendrite cell algorithm
Published 2017“…The dendrite cell algorithm (DCA) relies on the multi-context antigen value (MCAV) to determine the abnormality of a record by comparing it with anomaly threshold.In practice, the threshold is pre-determined before mining based on previous information and the existing MCAV is inefficient when expose to extreme values.This causes the DCA fails to detect unlabeled data if the new pattern distinct from previous information and reduces the detection accuracy.This paper proposed an adaptive anomaly threshold for DCA using the statistical cumulative sum (CUSUM) with the aim to improve its detection capability.In the proposed approach, the MCAV were normalized with upper CUSUM and the new anomaly threshold was calculated during run time by considering the acceptance value and min MCAV.From the experiments towards 12 datasets, the new version of DCA generated a better detection result than its previous version in term of sensitivity, specificity, false detection rate, and accuracy.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2013“…The PNDT consists of five components: agent’s belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent’s belief base with new normative protocol. …”
Get full text
Get full text
Article -
4
Data Classification and Its Application in Credit Card Approval
Published 2004“…An analysis on the field of data mining is done to show how data mining, especially data classification, can help in businesses such as targeted marketing, credit card approval, fraud detection, medical diagnosis, and scientific work. …”
Get full text
Get full text
Final Year Project -
5
Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection
Published 2020“…Two main improvements were included into the original SSA algorithm to alleviate its drawbacks and adapt it for feature selection problems. …”
Get full text
Get full text
Article -
6
Arabic Text Clustering Methods And Suggested Solutions For Theme-based Quran Clustering: Analysis Of Literature
Published 2024journal::journal article -
7
Integration of object-based image analysis and data mining techniques for detailes urban mapping using remote sensing
Published 2015“…The proposed integration of DM algorithm and OBIA provides the opportunity to generate the transferable OBIA rule-sets based on the available training area which can be re-used in other study areas. …”
Get full text
Get full text
Thesis -
8
Unapparent information revelation for counterterrorism: Visualizing associations using a hybrid graph-based approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Identification of alzheimer diseaseassociated pathways and network using transcriptome analysis / Lau Ching Yee
Published 2018“…Since complex diseases like AD can be better understood from the perspective of network biology than at the individual gene level, we used NetDecoder, a state-of-the-art network-based transcriptomic analysis algorithm to capture genes that are associated with the differentially expressed genes in a network context. …”
Get full text
Get full text
Get full text
Thesis -
10
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
Get full text
Get full text
Final Year Project -
11
Modifying iEclat algorithm for infrequent patterns mining
Published 2018“…This paper proposes an enhancement algorithm based on iEclat algorithms for mining infrequent pattern.…”
Get full text
Get full text
Conference or Workshop Item -
12
An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition
Published 2011“…A blind signal detector, which is known as eigenvalue based detection, was found to be the most desired detector for its detection capabilities, time of execution, and zero a-priori knowledge. …”
Get full text
Get full text
Get full text
Thesis -
13
-
14
-
15
Efficient prime-based method for interactive mining of frequent patterns.
Published 2011“…Since rerunning mining algorithms from scratch is very costly and time-consuming, researchers have introduced interactive mining of frequent patterns. …”
Get full text
Get full text
Article -
16
Clustering algorithm for market-basket analysis : the underlying concept of data mining technology
Published 2003“…The author used a data mining software called PolyAnalyst 4.5 to perform analysis on the set of items that customers have bought in supermarket for market-basket application. …”
Get full text
Get full text
Thesis -
17
Modifying iEclat algo ithm for infrequent patterns mining
Published 2018“…This paper proposes an enhancement algorithm based on iEclat algorithms for mining infrequent pattern.…”
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…The NTLBO was proposed in this paper as an FSS mechanism; its algorithm-specific, parameter-less concept (which requires no parameter tuning during an optimization) was explored. …”
Get full text
Get full text
Get full text
Article -
20
Mobile machine vision for railway surveillance system using deep learning algorithm
Published 2021“…In order to overcome this issue, machine vision embedded with deep learning algorithm can be implemented. Obstacle detection can be achieved through vision-based object detection, where the object classification model computes the images similarity to its respective classes, classifying its potential as an obstacle. …”
Get full text
Get full text
Get full text
Get full text
Proceedings
