Rough set discretization: equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
Discretization of real value attributes is a vital task in data mining, particularly in the classification problem. Discretization part is also the crucial part resulting the good classification. Empirical results have shown that the quality of classification methods depends on the discretization al...
| Main Authors: | Noor Suhana, Sulaiman, Rohani, Abu Bakar |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Digital Information Research Foundation, India
2017
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/21203/ http://umpir.ump.edu.my/id/eprint/21203/1/Rough%20Set%20Discretization%20Equal%20Frequency%20Binning%2C%20Entropy%20MDL%20and%20Semi%20Naives.pdf |
Similar Items
Rough set discretization: Equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Rough Set Discretization: Equal Frequency Binning, Entropy/MDL and Semi Naives Algorithms of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Rough Set Discretize Classification of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Rough Set Significant Reduct and Rules of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2017)
by: Noor Suhana, Sulaiman, et al.
Published: (2017)
Rough Set Significant Reduction and Rules of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Feature selection using rough set in intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
An enhancement of classification technique based on rough set theory for intrusion detection system application
by: Noor Suhana, Sulaiman
Published: (2019)
by: Noor Suhana, Sulaiman
Published: (2019)
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
Anomaly-based intrusion detection using fuzzy rough clustering
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Feature selection using rough-dpso in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Generation of rough set (RS) significant reducts and rules for cardiac dataset classification
by: Sulaiman, Noor Suhana
Published: (2007)
by: Sulaiman, Noor Suhana
Published: (2007)
Feature selection using Rough-DPSO in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
A Review on Soft Computing Technique in Intrusion Detection System
by: Sulaiman, Noor Suhana, et al.
Published: (2012)
by: Sulaiman, Noor Suhana, et al.
Published: (2012)
Empirical analysis of rough set categorical clustering techniques based on rough purity and value set
by: Uddin, Jamal
Published: (2017)
by: Uddin, Jamal
Published: (2017)
Fuzzy rules reduction using rough set approach
by: Yusof, Norazah, et al.
Published: (2003)
by: Yusof, Norazah, et al.
Published: (2003)
Rough sets theory for travel demand analysis in Malaysia
by: Wong, Jenn Hwee
Published: (2008)
by: Wong, Jenn Hwee
Published: (2008)
An optimized feature set for anomaly-based intrusion detection / Wasswa Hassan
by: Wasswa, Hassan
Published: (2019)
by: Wasswa, Hassan
Published: (2019)
Applying Rough Set Theory for Student Clustering on Assessment Datasets
by: Suhirman, na, et al.
Published: (2013)
by: Suhirman, na, et al.
Published: (2013)
Rough Set Granularity in Mobile Web Pre-Caching
by: Sulaiman, Sarina, et al.
by: Sulaiman, Sarina, et al.
Intrusion detection based on K-means clustering and Naïve Bayes classification
by: Muda, Zaiton, et al.
Published: (2011)
by: Muda, Zaiton, et al.
Published: (2011)
Prediction of Diabetes Using Hidden Naïve Bayes: Comparative Study
by: Al-Hameli, Bassam Abdo, et al.
Published: (2021)
by: Al-Hameli, Bassam Abdo, et al.
Published: (2021)
Textured Renyl Entropy for Image Thresholding
by: Abu Shareha, Ahmad Adel, et al.
Published: (2008)
by: Abu Shareha, Ahmad Adel, et al.
Published: (2008)
Trademark image classification approaches using neural network and rough set theory
by: Saad, Puteh
Published: (2003)
by: Saad, Puteh
Published: (2003)
Rough Sets Clustering and Markov model for Web Access Prediction
by: Chimphlee, Siriporn, et al.
Published: (2006)
by: Chimphlee, Siriporn, et al.
Published: (2006)
Customer churn classification in telecommunication company using rough set theory
by: Nur Syafiqah, Mohd Nafis
Published: (2016)
by: Nur Syafiqah, Mohd Nafis
Published: (2016)
A K-Means and Naive Bayes learning approach for better intrusion detection
by: Muda, Zaiton, et al.
Published: (2011)
by: Muda, Zaiton, et al.
Published: (2011)
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
by: Keshkeh, Kinan
Published: (2022)
by: Keshkeh, Kinan
Published: (2022)
Arabic language script and encoding identification with support vector machines and rough set theory
by: Mohamed Sidya, Mohamed Ould
Published: (2007)
by: Mohamed Sidya, Mohamed Ould
Published: (2007)
RMF: Rough Set Membership Function-based for Clustering Web Transactions
by: Herawan, Tutut, et al.
Published: (2013)
by: Herawan, Tutut, et al.
Published: (2013)
Behavious based computer user clustering using rough set theory
by: Wang , Le Wei
Published: (2013)
by: Wang , Le Wei
Published: (2013)
Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining.
by: Saeed, Walid
Published: (2005)
by: Saeed, Walid
Published: (2005)
Permutation entropy based full-reference image
quality qssessment
by: Baqar, Mohtashim *, et al.
Published: (2019)
by: Baqar, Mohtashim *, et al.
Published: (2019)
Anomaly-based intrusion detection through K-means clustering and naives Bayes classification
by: Mohamed Yassin, Warusia, et al.
Published: (2013)
by: Mohamed Yassin, Warusia, et al.
Published: (2013)
Comparison of SVM, Naive Bayes, and ELM Models in Plant Growth
Classification
by: M., Muflih, et al.
Published: (2024)
by: M., Muflih, et al.
Published: (2024)
Frames selection based on modified entropy and object motion in video steganography
by: Muhammad, Fuad, et al.
Published: (2019)
by: Muhammad, Fuad, et al.
Published: (2019)
Segmentation Of Ultisequence Medical Images Using Random Walks Algorithm And Rough Sets Theory
by: Lim, Khai Yin
Published: (2017)
by: Lim, Khai Yin
Published: (2017)
Sentiment Analysis of Omicron COVID-19 Variant using Naïve Bayes Classifier and RapidMiner
by: Dayu, Wijaya, et al.
Published: (2023)
by: Dayu, Wijaya, et al.
Published: (2023)
Utilize Medical Text Data to Estimate Disease Types by Using Naïve Bayes and ANN Classifier
by: Mujiono, Sadikin, et al.
Published: (2021)
by: Mujiono, Sadikin, et al.
Published: (2021)
Naive Bayesian decision model for interoperability of heterogeneous systems in an intelligent building environment
by: Soozaei, Ahmad Shahi
Published: (2015)
by: Soozaei, Ahmad Shahi
Published: (2015)
Test cases reduction using similarity relation and conditional entropy
by: Md Nasir, Noor Fardzilawati
Published: (2017)
by: Md Nasir, Noor Fardzilawati
Published: (2017)
Similar Items
-
Rough set discretization: Equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
by: Noor Suhana, Sulaiman, et al.
Published: (2016) -
Rough Set Discretization: Equal Frequency Binning, Entropy/MDL and Semi Naives Algorithms of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016) -
Rough Set Discretize Classification of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016) -
Rough Set Significant Reduct and Rules of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2017) -
Rough Set Significant Reduction and Rules of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)