Bakar et al., 2010 - Google Patents
A rough set outlier detection based on particle swarm optimizationBakar et al., 2010
View PDF- Document ID
- 5916930171667189066
- Author
- Bakar A
- Hamdan A
- Nazri M
- et al.
- Publication year
- Publication venue
- 2010 10th international conference on intelligent systems design and applications
External Links
Snippet
Outlier is strange data values that stand out from datasets. In some applications, finding outliers are more interesting than finding inliers in datasets, such as fraud detection, network system, financial and others. In this research, an algorithm is proposed to find minimum non …
- 239000002245 particle 0 title abstract description 26
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/12—Computer systems based on biological models using genetic models
- G06N3/126—Genetic algorithms, i.e. information processing using digital simulations of the genetic system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6232—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
- G06K9/6251—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on a criterion of topology preservation, e.g. multidimensional scaling, self-organising maps
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
- G06N5/025—Extracting rules from data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6296—Graphical models, e.g. Bayesian networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computer systems based on specific mathematical models
- G06N7/005—Probabilistic networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Tian et al. | Evolutionary large-scale multi-objective optimization: A survey | |
Zhang et al. | Novel prediction strategies for dynamic multiobjective optimization | |
Injadat et al. | Multi-stage optimized machine learning framework for network intrusion detection | |
Lin et al. | Particle swarm optimization for parameter determination and feature selection of support vector machines | |
Samunnisa et al. | Intrusion detection system in distributed cloud computing: Hybrid clustering and classification methods | |
Bae et al. | Feature selection with intelligent dynamic swarm and rough set | |
Chen et al. | A parallel genetic algorithm based feature selection and parameter optimization for support vector machine | |
Dada | A hybridized svm-knn-pdapso approach to intrusion detection system | |
Nanjappan et al. | DeepLG SecNet: utilizing deep LSTM and GRU with secure network for enhanced intrusion detection in IoT environments | |
Li | Decomposition multi-objective evolutionary optimization: From state-of-the-art to future opportunities | |
Qu et al. | A comprehensive review of machine learning in multi-objective optimization | |
Galvan-Nunez et al. | Hybrid particle swarm optimization and k-means analysis for bridge clustering based on national bridge inventory data | |
Parmar et al. | A novel density peak clustering algorithm based on squared residual error | |
Chen et al. | Evolutionary clustering with differential evolution | |
Wu et al. | Ensemble model of intelligent paradigms for stock market forecasting | |
Priya et al. | PaSOFuAC: particle swarm optimization based fuzzy associative classifier for detecting phishing websites | |
CN115114484A (en) | Abnormal event detection method and device, computer equipment and storage medium | |
Bakar et al. | A rough set outlier detection based on particle swarm optimization | |
Singh et al. | Clustering using genetic algorithm: A collaborative performance analysis | |
Abdeldayem | Intrusion detection system based on pattern recognition | |
Macktoobian et al. | Learning optimal topology for ad-hoc robot networks | |
Yu et al. | Stochastic Multiple Chaotic Local Search‐Incorporated Gradient‐Based Optimizer | |
Sindhu et al. | Comparative analysis among decision tree vs. naive bayes for prediction of weather prognostication | |
Yassi et al. | Distinguishing and clustering breast cancer according to hierarchical structures based on chaotic multispecies particle swarm optimization | |
Manokaran et al. | A Novel Set Theory Rule based Hybrid Feature Selection Techniques for Efficient Anomaly Detection System in IoT Edge |