Search Results - (( using classification using algorithm ) OR ( pattern detection mining algorithm ))

Refine Results
  1. 1

    The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment by Nanna Suryana, Herman

    Published 2007
    “…This , paper discusses the development of data mining and pattern recognition algorithm to handle the complexity of hyperspectral remote sensing images in Geographical Information Systems environment. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling by Zulaiha Ali Othman, Afaf Muftah Adabashi, Suhaila Zainudin, Saadat M. Al Hashmi

    Published 2011
    “…This paper presents our work to improve the performance of anomaly intrusion detection using Fuzzy-ART based on the K-means algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Data Classification and Its Application in Credit Card Approval by Thai , VinhTuan

    Published 2004
    “…This project is involved with identification of the available algorithms used in data classification and the implementation of C4.5 decision tree induction algorithm in solving the data classifying task. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Rough Set Discretize Classification of Intrusion Detection System by Noor Suhana, Sulaiman, Rohani, Abu Bakar

    Published 2016
    “…In proposed framework, analysis should been done to discretization, reduct and rules stage to determine the significant algorithm and core element in IDS data. The classification using standard voting, since it is a rule-based classification.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The results reveal that the proposed hybrid algorithm is capable of achieving classification accuracy values of (95.82 % and 97.68 %), detection rates values of (95.8 % and 99.3 %) and false alarm rates values of (0.083 % and 0.045 %) on both KDD CUP 99 and NSL KDD. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    A hybrid interpretable deep structure based on adaptive neuro‑fuzzy inference system, decision tree, and K‑means for intrusion detection by Jia, Lu, Yin Chai, Wang, Chee Siong, Teh, Xinjin, Li, Liping, Zhao, Fengrui, Wei

    Published 2022
    “…The proposed algorithm was trained, validated, and tested on the NSL-KDD (National security lab–knowledge discovery and data mining) dataset. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    An enhanced android botnet detection approach using feature refinement by Anwar, Shahid

    Published 2019
    “…The obtained results show that by using the additional features the detection accuracy improved. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Effective mining on large databases for intrusion detection by Adinehnia, Reza, Udzir, Nur Izura, Affendey, Lilly Suriani, Ishak, Iskandar, Mohd Hanapi, Zurina

    Published 2014
    “…Data mining is a common automated way of generating normal patterns for intrusion detection systems. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…Subsequently, NB+RF, a hybrid classification algorithm is used to distinguish similar and dissimilar content behaviours of a packet. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Outlier Detection Technique in Data Mining: A Research Perspective by Mansur, M. O., Md. Sap, Mohd. Noor

    Published 2005
    “…Finding ,removing and detecting outliers is very important in data mining, for example error in large databases can be extremely common, so an important property of a data mining algorithm is robustness with respect to outliers in the database. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Detecting Critical Least Association Rules In Medical Databases by Herawan, Tutut

    Published 2010
    “…We also employed our scalable algorithm called Significant Least Pattern Growth algorithm (SLP-Growth) to mine the respective association rules. …”
    Get full text
    Get full text
    Article
  16. 16

    Collective interaction filtering with graph-based descriptors for crowd behaviour analysis by Wong, Pei Voon

    Published 2018
    “…The group detection experiment is implemented using the clustering algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A Review of Unsupervised Machine Learning Frameworks for Anomaly Detection in Industrial Applications by Usmani, U.A., Happonen, A., Watada, J.

    Published 2022
    “…Without human input, these algorithms discover patterns or groupings in the data. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    An Improved Artificial Dendrite Cell Algorithm for Abnormal Signal Detection by Mohamad Mohsin, Mohamad Farhan, Abu Bakar, Azuraliza, Hamdan, Abdul Razak, Abdul Wahab, Mohd Helmy

    Published 2018
    “…This causes the DCA fails to detect new data points if the pattern has distinct behavior from previous information and affects detection accuracy. …”
    Get full text
    Get full text
    Article
  20. 20

    Sequential pattern mining using personalized minimum support threshold with minimum items by Alias, Suraya, Razali, Mohd Norhisham, Tan, Soo Fun, Sainin, Mohd Shamrie

    Published 2011
    “…One of the challenges of Sequential Pattern Mining is finding frequent sequential patterns in a huge click stream data (web logs) since the data has the issue of a very low support distribution.By applying a Frequent Pattern Discovery technique, a sequence is considered as frequent if it occurs more than the minimum support (min sup) threshold value.The conventional method of assuming one min sup value is valid for all levels of k-sequence, may have an impact on the overall results or pattern generation. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item