Search Results - (( data classification using algorithm ) OR ( pattern detection a algorithm ))
Search alternatives:
- classification using »
- data classification »
- pattern detection »
- using algorithm »
- detection a »
- a algorithm »
-
1
Evaluation of fall detection classification approaches
Published 2012“…The acceleration data with a total data of 6962 instances and 29 attributes were used to evaluate the performance of the different classification algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
2
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
Get full text
Get full text
Thesis -
3
Pattern Recognition for Human Diseases Classification in Spectral Analysis
Published 2022“…On the other hand, classification methods are techniques or algorithms used to group samples into a predetermined category. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
4
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010“…The algorithm tested use KDD Cup dataset and the result shows a significant improvement in detection accuracy and reducing the false alerts …”
Get full text
Get full text
Get full text
Citation Index Journal -
5
Distributed Online Averaged One Dependence Estimator (DOAODE) Algorithm for Multi-class Classification of Network Anomaly Detection System
Published 2019“…Therefore, this paper aims to develop an effective and efficient network anomaly detection system by using distributed online averaged one dependence estimator (DOAODE) classification algorithm for multi-class network data to overcome these issues. …”
Get full text
Get full text
Conference or Workshop Item -
6
Distributed Online Averaged One Dependence Estimator (DOAODE) Algorithm for Multi-class Classification of Network Anomaly Detection System
Published 2019“…Therefore, this paper aims to develop an effective and efficient network anomaly detection system by using distributed online averaged one dependence estimator (DOAODE) classification algorithm for multi-class network data to overcome these issues. …”
Get full text
Get full text
Conference or Workshop Item -
7
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
Conference Paper -
8
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
9
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007“…Region growing segmentation and radial basis function algorithms are considered a powerful tool to minimize the mixed pixel classification error.…”
Get full text
Get full text
Conference or Workshop Item -
10
Swarm negative selection algorithm for electroencephalogram signals classification
Published 2009“…The SNS classification model use negative selection and PSO algorithms to form a set of memory Artificial Lymphocytes (ALCs) that have the ability to distinguish between normal and epileptic EEG patterns. …”
Get full text
Article -
11
Classification and detection of intelligent house resident activities using multiagent
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…In the implementation phase, Bubble Sort, Euclidean Distance, 10-Fold Cross validation, and K Nearest Neighbor algorithm are developed. This application is using the data from a Taiwan bank which is obtained from the UCI data repository website. …”
Get full text
Get full text
Thesis -
13
HEP-2 CELL IMAGES CLASSIFICATION BASED ON STATISTICAL TEXTURE ANALYSIS AND FUZZY LOGIC
Published 2014“…A working classification algorithm is developed by using MATLAB and the Fuzzy Logic Toolbox to differentiate and classify the staining pattern of HEp-2 cell images. …”
Get full text
Get full text
Final Year Project -
14
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
16
Random Undersampling on Imbalance Time Series Data for Anomaly Detection
Published 2023Conference Paper -
17
Rough Set Discretize Classification of Intrusion Detection System
Published 2016“…Many pattern classification tasks confront with the problem that may have a very high dimensional feature space like in Intrusion Detection System (IDS) data. …”
Get full text
Get full text
Get full text
Article -
18
Android Mobile Malware Classification Based on System Call and Permission Using Tokenization
Published 2024thesis::master thesis -
19
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
Get full text
Get full text
Thesis -
20
