Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "KDD"

ADD TO MY LIST
 
A New Imputation Method for Missing Attribute Values in Data Mining

Author(s): Diwakar Shukla | Rahul Singhai | Singh Thakur Narendra
Survey on Frequent Itemset Mining Algorithms

Author(s): Pramod S. | O.P. Vyas
Overview on How Data Mining Tools May Support Cardiovascular Disease Prediction

Author(s): Dan-Andrei Sitar-Taut | Adela-Viviana Sitar-Taut
A Data Mining view on Class Room Teaching Language

Author(s): Umesh Kumar Pandey | Saurabh Pal
Novel Intrusion Detection using Probabilistic Neural Network and Adaptive Boosting

Author(s): Tich Phuoc Tran | Longbing Cao | Dat Tran | Cuong Duc Nguyen
Data Quality Mining using Genetic Algorithm

Author(s): Sufal Das | Sufal Das
Editorial

Author(s): Qi Luo | Ben K. M. Sim
Editorial

Author(s): Qi Luo | Ben K. M. Sim
Guest Editorial

Author(s): Qi Luo | Ben K. M. Sim
Mushroom Plant Analysis through Reduct Technique

Author(s): Ayesha butalia | Divya Shah | R.V Dharaskar
Mineração de Dados usando o software WizRule em Base de Dados de Compras de TI

Author(s): Denise Chaves Carvalho Barbosa | Maria Augusta Machado
Intrusion Detection System Methodologies Based on Data Analysis

Author(s): Shaik Akbar | Dr.K.Nageswara Rao | Dr.J.A.Chandulal
Mining Maximal Frequent Item Sets

Author(s): Dr. S.S. Mantha | Madhuri Rao | Ashwini Anil Mane | Anil S. Mane
Integrated Intrusion Detection using SCT

Author(s): Selvakani Kandeeban and R. S. Rajesh
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm

Author(s): Muna Elsadig Mohamed | Brahim Belhaouari Samir | Azween Abdullah
A K-Means and Naive Bayes Learning Approach for Better Intrusion Detection

Author(s): Z. Muda | W. Yassin | M.N. Sulaiman | N.I. Udzir
NETWORK INTRUSION DETECTION SYSTEM USING FUZZY LOGIC

Author(s): R. Shanmugavadivu | Dr.N.Nagarajan
Intrusion Detection System Using Intrusion Detection System Using Clustering with Reduced Features

Author(s): Murad Abdo Rassam | Mohd. Aizaini Maarof | Anazida Zainal
A New System for Clustering and Classification of Intrusion Detection System Alerts Using Self-Organizing Maps

Author(s): Amir Azimi Alasti Ahrabi, Ahmad Habibizad Navin, Hadi Bahrbegi, Mir Kamal Mirnia, Mehdi Bahrbegi, Elnaz Safarzadeh & Ali Ebrahimi
HYBRID FEATRUE SELECTION FOR NETWORK INTRUSION

Author(s): S.Sethuramalingam, | Dr.E.R. Naganathan
Knowledge discovery in databases of biomechanical variables: application to the sit to stand motor task

Author(s): Vannozzi Giuseppe | Croce Ugo | Starita Antonina | Benvenuti Francesco | Cappozzo Aurelio
Discriminant Analysis based Feature Selection in KDD Intrusion Dataset

Author(s): Dr.S.Siva Sathya | Dr. R.Geetha Ramani | K.Sivaselvi
Parkinson Disease Classification using Data Mining Algorithms

Author(s): Dr. R. Geetha Ramani | G. Sivagami
Intrusion Detection Model based on Differential Evolution

Author(s): M. Sailaja | R. Kiran Kumar | P. Sita Rama Murty
An Implementation of Integer Programming Techniques in Clustering Algorithm

Author(s): S. Shenbaga Ezhil | Dr. C. Vijayalakshmi
A Proposed System for Network Intrusion Detection System Using Data Mining

Author(s): Gidiya Priyanka V. | Ushir Kishori N | Mirza Shoeb A | Ikhankar Sagar D | Khivsara Bhavana A
An Improved Approach for Signature and Anomaly based Intrusion Detection and Prevention

Author(s): Shivarkar Sandip A. | Muzumdar Ajit A. | Dange Bapusaheb J.
New Strategy for detecting Intrusion by using c4.5 algorithm

Author(s): Radhakrishna Naik | Vivek Kshirsagar | B S Sonawane
Rise of Data Mining: Current and Future Application Areas

Author(s): Dharminder Kumar | Deepak Bhardwaj
An Immune Inspired Multilayer IDS

Author(s): Mafaz Muhsin Khalil Alanezi | Najlaa Badie Aldabagh
A New Expert System for Pediatric Respiratory Diseases by Using Neural Network

Author(s): A. A. Radwan | H. M. El Bakry | H. M. El Hadad
A Novel Approach to Intrusion Detection System using Rough Set Theory and Incremental SVM

Author(s): Ghanshyam Prasad Dubey | Neetesh Gupta | Rakesh K Bhujade
To Reduce the False Alarm in Intrusion Detection System using self Organizing Map

Author(s): Ritu Ranjani Singh | Neetesh Gupta | Shiv Kumar
Emerging Intuitionistic Fuzzy Classifiers for Intrusion Detection System

Author(s): Kavitha B | Karthikeyan Subramanian | Sheeba Maybell P
PERFORMANCE ANALYSIS OF VARIOUS DATA MINING CLASSIFICATION TECHNIQUES ON HEALTHCARE DATA

Author(s): Shelly Gupta | Dharminder Kumar | Anand Sharma
NIDS For Unsupervised Authentication Records of KDD Dataset in MATLAB

Author(s): Mis. Bhawana Pillai | Mr. Uday Pratap Singh
A Novel Approach for Intrusion Detection

Author(s): Vikram Chopra | Sunil Saini | Amit Kumar Choudhary
Mining databases on World Wide Web

Author(s): Manali Gupta | Vivek Tomar | Jaya Verma | Sudeepa Roy
Evaluación de redes tecnocientíficas: la red española sobre Áreas Protegidas, según la Web of Science

Author(s): Pino-Díaz, José | Jiménez-Contreras, Evaristo | Ruíz-Baños, Rosario | Bailón-Moreno, Rafael
TEMPORAL SEQUENTIAL PATTERN IN DATA MINING TASKS

Author(s): DR. NAVEETA MEHTA, | MS. SHILPA DANG
Mining Educational Data to Analyze Students Performance

Author(s): Brijesh Kumar Baradwaj | Saurabh Pal
Diagnosis of Heart Disease for Diabetic Patients using Naive Bayes Method

Author(s): G. Parthiban | S.K.Srivatsa | A. Rajesh
Hybrid Multi-level Intrusion Detection System

Author(s): Sahar Selim | Mohamed Hashem | Taymoor M. Nazmy
Why do you need a reservation system?      Affiliate Program