Search Results - (( data detection system algorithm ) OR ( program implementation mining algorithm ))
Search alternatives:
- program implementation »
- implementation mining »
- system algorithm »
- mining algorithm »
- data detection »
-
1
Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak
Published 2021“…Machine learning is an implementation of artificial intelligence (Al) that allows systems to learn and build on knowledge without being directly programmed automatically. …”
Get full text
Get full text
Thesis -
2
Data mining techniques for transformer failure prediction model: A systematic literature review
Published 2023Conference Paper -
3
Case Slicing Technique for Feature Selection
Published 2004“…Finding a good classification algorithm is an important component of many data mining projects. …”
Get full text
Get full text
Thesis -
4
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
5
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Monograph -
6
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Development of intrusion detection system using residual feedforward neural network algorithm
Published 2022“…This detection system must differentiate between normal data and abnormal or hacker-generated data. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Enhancing predictive crime mapping model using association rule mining for geographical and demographic structure
Published 2014“…The other 40% of the dataset is used to test generated rules. A simple program of C++ is implemented using Microsoft Visual Studio to test generated rules until accuracy of performance is obtained. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
-
11
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
Get full text
Get full text
Thesis -
13
Early detection for server availability in University Malaya data center / Mohd Azizi Osman
Published 2016“…The objective of the system is to design the detection algorithm for server availability, to develop the detection algorithm for server availability and to test the detection algorithm form server availability. …”
Get full text
Get full text
Thesis -
14
-
15
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Detection of head position using chain code algorithm
Published 2007“…Human head detection is the first step of an autonomous human recognition system. …”
Get full text
Get full text
Thesis -
17
Detection of head position using chain code algorithm
Published 2007“…Human head detection is the first step of an autonomous human recognition system. …”
Get full text
Get full text
Thesis -
18
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Study Of Modified Training Algorithm For Optimized Convergence Speed Of Neural Network
Published 2016“…In this research, a hand-written character recognition model are implemented in C++ programming with ability to classify digits 0, 1, 2, and 3. …”
Get full text
Get full text
Thesis -
20
Anomaly detection in ICS datasets with machine learning algorithms
Published 2021“…The ICS cyber threats are growing at an alarming rate on industrial automation applications. Detection techniques with machine learning algorithms on public datasets, suitable for intrusion detection of cyber-attacks in SCADA systems, as the first line of defense, have been detailed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article
