Search Results - (( data detection mining algorithm ) OR ( parameter optimization _ algorithm ))
Search alternatives:
- parameter optimization »
- detection mining »
- mining algorithm »
- data detection »
-
1
An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning
Published 2019“…The BOCEDS algorithm is then applied to real-world weather data streams to demonstrate its capability to detect the drifts in the data stream and discover arbitrarily shaped clusters.…”
Get full text
Get full text
Thesis -
2
A new model for iris data set classification based on linear support vector machine parameter's optimization
Published 2020“…Data mining is known as the process of detection concerning patterns from essential amounts of data. …”
Get full text
Get full text
Get full text
Article -
3
Comparative analysis of K-Means and K-Medoids for clustering exam questions / Nurul Zafirah Mokhtar
Published 2016“…Each and every attribute and parameters selected undergo several process of data mining starting from pre-processing until the analysis of the data. …”
Get full text
Get full text
Thesis -
4
A buffer-based online clustering for evolving data stream
Published 2019“…The sensitivity of clustering parameters is also measured. The proposed algorithm is then applied to real-world weather data streams to demonstrate its capability to detect changes in data stream and discover arbitrarily shaped clusters. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Predicting heart disease using ant colony optimization / Siti Aisyah Ismail
Published 2021“…Thus, this study used the Ant Colony Optimization algorithm with data mining called Ant-Miner to predict heart disease because it is said that Ant-Miner’s rule list is simpler than other rule induction algorithms. …”
Get full text
Get full text
Student Project -
7
Improvement on rooftop classification of worldview-3 imagery using object-based image analysis
Published 2019“…Then, the classifier (support vector machine (SVM) and data mining (DM) algorithm, decision tree (DT) were applied on each fusion image and their accuracy were evaluated. …”
Get full text
Get full text
Thesis -
8
Analysis of Data Mining Tools for Android Malware Detection
Published 2019“…There are various data mining tools available to analyze data related android malware detection. …”
Get full text
Get full text
Get full text
Article -
9
Outlier Detection Technique in Data Mining: A Research Perspective
Published 2005“…Outlier detection as a branch of data mining has many important applications, and deserves more attention from data mining community. …”
Get full text
Get full text
Conference or Workshop Item -
10
Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines
Published 2020“…This current study proposes an intelligent data mining approach for the Machine Learning- Adaptive Distance Relay (ML-ADR) fault classification model using novel extracted 1-cycle transient voltage and current signals hidden knowledge from both healthy and faulty lines parameters. …”
Get full text
Get full text
Thesis -
11
Identification of debris flow initiation zones using topographic model and airborne laser scanning data
Published 2017“…MARSpline multivariate data mining predictive approach was implemented using morphometric indices and topographical derived parameter as independent variables. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…Thus, to deal with huge dataset, data mining technique can be improved by introducing discretization algorithm to increase classification performance. …”
Get full text
Get full text
Thesis -
13
Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling
Published 2011“…Data mining is a well-known artificial intelligence technique to build network intrusion detection systems. …”
Get full text
Get full text
Get full text
Article -
14
A Text Mining Algorithm Optimising the Determination of Relevant Studies
Published 2023Conference Paper -
15
Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng
Published 2006“…Inference can be made both from writing style and from clues hidden in the posting data. A text-mining algorithm was designed to detect gender deception based on gender-preferential features at the word or clause level of Malaysian e-mail users. …”
Get full text
Get full text
Get full text
Article -
16
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007“…This , paper discusses the development of data mining and pattern recognition algorithm to handle the complexity of hyperspectral remote sensing images in Geographical Information Systems environment. …”
Get full text
Get full text
Conference or Workshop Item -
17
Effective mining on large databases for intrusion detection
Published 2014“…Data mining is a common automated way of generating normal patterns for intrusion detection systems. …”
Get full text
Get full text
Conference or Workshop Item -
18
Detecting Critical Least Association Rules In Medical Databases
Published 2010“…In certain medical data, detecting these rules is very critical and most valuable. …”
Get full text
Get full text
Article -
19
A norms mining approach to norms detection in multi-agent systems
Published 2012“…In this paper, we propose a norms mining technique for a visitor agent to detect the norms of a community of local agents to comply with the community's normative protocol. …”
Get full text
Conference or Workshop Item -
20
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…Data mining (DM) is a novel data extraction technology which can employ for development of inverse analysis. …”
Get full text
Get full text
Get full text
Thesis
