Search Results - (( solution detection technique ) OR ( evolution mining techniques ))

Search alternatives:

Refine Results
  1. 1

    Data mining in computer auditing / Hiromi Wong, Siew Lan and Valery Fred Lee by Hiromi , Wong, Siew , Lan, Valery, Fred Lee

    Published 2004
    “…This evolution provokes the emergence of data mining tools, which perform data analysis and extract data patterns. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Global Trends of Educational Data Mining in Online Learning by Chen, Chwen Jen, Teh, Chee Siong, Dexter Sigan, John

    Published 2023
    “…Educational data mining (EDM) in online learning involves data mining techniques to analyze data from online environments to gain insights into student behavior, performance, and engagement. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Classification with degree of importance of attributes for stock market data mining by Khokhar, Rashid Hafeez, Md. Sap, Mohd. Noor

    Published 2004
    “…Many statistical and data mining techniques have been used to predict time series stock market. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Detection of dye molecules in solution using surface plasmon resonance technique by Ikhsan, Nurul Izrini, Mat Yunus, W. Mahmood, Talib, Zainal Abidin, Abdul Wahab, Zaidan

    Published 2009
    “…Surface plasmon resonance technique has been utilized as a sensitive optical sensor for detection of dye molecule in water. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A New Hybrid K-Means Evolving Spiking Neural Network Model Based on Differential Evolution by Abdulrazak Yahya, Saleh, Haza Nuzly, Abdull Hamed, Siti Mariyam, Shamsuddin, Ashraf, Osman Ibrahim

    Published 2018
    “…Clustering is one of the essential unsupervised learning techniques in Data Mining. In this paper, a new hybrid (K-DESNN) approach to combine differential evolution and K-means evolving spiking neural network model (K-means ESNN) for clustering problems has been proposed. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  9. 9

    Classification of Immunosignature Using Random Forests for Cancer Diagnosis by Zarzar, Mouayad, Razak, Eliza, Htike@Muhammad Yusof, Zaw Zaw, Yusof, Faridah

    Published 2015
    “…To attain this essential research purpose, a minimum set of genes that can assure higher performance in classification using data mining algorithms need to be detected. The evolution of authoritative immunofingerprint mining technology is exerting a growing influence on comprehensive cancer diagnosis biology. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Global trends of educational data mining in online learning by Nie Hui Ling, Chwen Jen Chen, Chee Siong Teh, Dexter Sigan John, Looi Chin Ch’ng, Yoon Fah Lay

    Published 2023
    “…Educational data mining (EDM) in online learning involves data mining techniques to analyze data from online environments to gain insights into student behavior, performance, and engagement. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    An elapsed-time based scheme for detecting and mitigating DDOS attacks in the SDN environment by Wisam H A.Muragaa

    Published 2024
    “…DDoS detection solutions based on Machine learning techniques and entropy techniques in SDN suffer from either increase the CPU usage or increase false alarms. …”
    thesis::doctoral thesis
  13. 13
  14. 14

    Application of data mining techniques for economic evaluation of air pollution impact and control by Lukman, Iing

    Published 2007
    “…For that purpose, we use data mining techniques. Data mining techniques applied in this thesis were: 1) Group method of data handling (GMDH), originally from engineering, introducing principles of evolution - inheritance, mutation and selection - for generating a network structure systematically to develop the automatic model, synthesis, and its validation; 2) The weighted least square (WLS) and step wise regression were also applied for some cases; 3) The classification-based association rules were applied. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Suspicious online car advertisement detector using principle component analysis (PCA) / Fathiah Husna Firdaus by Firdaus, Fathiah Husna

    Published 2019
    “…Hence, this study is to propose suspicious advertisement detector by using data mining technique which is Principal Component Analysis (PCA). …”
    Get full text
    Get full text
    Thesis
  16. 16

    Botnet Detection Using a Feed-Forward Backpropagation Artificial Neural Network by Ahmed, Abdulghani Ali

    Published 2019
    “…The proposed technique aims to detect Botnet zero-day attack in real time. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Detection of heavy metal ions in solution using surface plasmon resonance optical sensor by Yap, Wing Fen

    Published 2012
    “…In this case, the gold/chitosan interface in SPR technique is sensitive with detection limit of 0.5 ppm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique by Ali Mohamed, Nachaat Abdelatif

    Published 2022
    “…The current security solutions are deployed to detect APT signature and behaviour after APT bypasses the entire protections and accomplishes lateral movement technique, which makes the current solutions ineffective to resolve APT problem.…”
    Get full text
    Get full text
    Thesis
  19. 19

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…But the large number of available prevention techniques make the selection of the best solution a big challenge, because not every technique fit all types of web application, hence a one technique for all is another issue and a difficult task. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20