Search Results - (( solution detection technique ) OR ( evolution mining techniques ))
Search alternatives:
- solution detection »
- mining techniques »
-
1
Data mining in computer auditing / Hiromi Wong, Siew Lan and Valery Fred Lee
Published 2004“…This evolution provokes the emergence of data mining tools, which perform data analysis and extract data patterns. …”
Get full text
Get full text
Thesis -
2
Global Trends of Educational Data Mining in Online Learning
Published 2023“…Educational data mining (EDM) in online learning involves data mining techniques to analyze data from online environments to gain insights into student behavior, performance, and engagement. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
A review of homogenous ensemble methods on the classification of breast cancer data
Published 2024“…This technique reinforced the use of multiple classifiers in the model. …”
Get full text
Get full text
Get full text
Article -
4
A review of homogenous ensemble methods on the classification of breast cancer data
Published 2024“…This technique reinforced the use of multiple classifiers in the model. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Classification with degree of importance of attributes for stock market data mining
Published 2004“…Many statistical and data mining techniques have been used to predict time series stock market. …”
Get full text
Get full text
Article -
6
-
7
Detection of dye molecules in solution using surface plasmon resonance technique
Published 2009“…Surface plasmon resonance technique has been utilized as a sensitive optical sensor for detection of dye molecule in water. …”
Get full text
Get full text
Get full text
Article -
8
A New Hybrid K-Means Evolving Spiking Neural Network Model Based on Differential Evolution
Published 2018“…Clustering is one of the essential unsupervised learning techniques in Data Mining. In this paper, a new hybrid (K-DESNN) approach to combine differential evolution and K-means evolving spiking neural network model (K-means ESNN) for clustering problems has been proposed. …”
Get full text
Get full text
Get full text
Book Chapter -
9
Classification of Immunosignature Using Random Forests for Cancer Diagnosis
Published 2015“…To attain this essential research purpose, a minimum set of genes that can assure higher performance in classification using data mining algorithms need to be detected. The evolution of authoritative immunofingerprint mining technology is exerting a growing influence on comprehensive cancer diagnosis biology. …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
Global trends of educational data mining in online learning
Published 2023“…Educational data mining (EDM) in online learning involves data mining techniques to analyze data from online environments to gain insights into student behavior, performance, and engagement. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
-
12
An elapsed-time based scheme for detecting and mitigating DDOS attacks in the SDN environment
Published 2024“…DDoS detection solutions based on Machine learning techniques and entropy techniques in SDN suffer from either increase the CPU usage or increase false alarms. …”
thesis::doctoral thesis -
13
Immuno nanosensor for the ultrasensitive naked eye detection of tuberculosis
Published 2018“…With the use of this technique, the CFP-10 detection limit can be lowered to 0.01μg/mL by the naked eye. …”
Get full text
Get full text
Get full text
Article -
14
Application of data mining techniques for economic evaluation of air pollution impact and control
Published 2007“…For that purpose, we use data mining techniques. Data mining techniques applied in this thesis were: 1) Group method of data handling (GMDH), originally from engineering, introducing principles of evolution - inheritance, mutation and selection - for generating a network structure systematically to develop the automatic model, synthesis, and its validation; 2) The weighted least square (WLS) and step wise regression were also applied for some cases; 3) The classification-based association rules were applied. …”
Get full text
Get full text
Thesis -
15
Suspicious online car advertisement detector using principle component analysis (PCA) / Fathiah Husna Firdaus
Published 2019“…Hence, this study is to propose suspicious advertisement detector by using data mining technique which is Principal Component Analysis (PCA). …”
Get full text
Get full text
Thesis -
16
Botnet Detection Using a Feed-Forward Backpropagation Artificial Neural Network
Published 2019“…The proposed technique aims to detect Botnet zero-day attack in real time. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Detection of heavy metal ions in solution using surface plasmon resonance optical sensor
Published 2012“…In this case, the gold/chitosan interface in SPR technique is sensitive with detection limit of 0.5 ppm. …”
Get full text
Get full text
Thesis -
18
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
Published 2022“…The current security solutions are deployed to detect APT signature and behaviour after APT bypasses the entire protections and accomplishes lateral movement technique, which makes the current solutions ineffective to resolve APT problem.…”
Get full text
Get full text
Thesis -
19
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…But the large number of available prevention techniques make the selection of the best solution a big challenge, because not every technique fit all types of web application, hence a one technique for all is another issue and a difficult task. …”
Get full text
Get full text
Get full text
Article -
20
