Sciweavers

132 search results - page 3 / 27
» Handling of incomplete data sets using ICA and SOM in data m...
Sort
View
CNSR
2004
IEEE
174views Communications» more  CNSR 2004»
13 years 8 months ago
Network Intrusion Detection Using an Improved Competitive Learning Neural Network
This paper presents a novel approach for detecting network intrusions based on a competitive learning neural network. In the paper, the performance of this approach is compared to...
John Zhong Lei, Ali A. Ghorbani
IMSCCS
2006
IEEE
13 years 11 months ago
Clustering of Gene Expression Data: Performance and Similarity Analysis
Background: DNA Microarray technology is an innovative methodology in experimental molecular biology, which has produced huge amounts of valuable data in the profile of gene expre...
Longde Yin, Chun-Hsi Huang
IRI
2005
IEEE
13 years 10 months ago
Handling missing values via decomposition of the conditioned set
In this paper, a framework for replacing missing values in a database is proposed since a real-world database is seldom complete. Good data quality in a database can directly impr...
Mei-Ling Shyu, Indika Kuruppu-Appuhamilage, Shu-Ch...
ICDM
2008
IEEE
96views Data Mining» more  ICDM 2008»
13 years 11 months ago
Filling in the Blanks - Krimp Minimisation for Missing Data
Many data sets are incomplete. For correct analysis of such data, one can either use algorithms that are designed to handle missing data or use imputation. Imputation has the bene...
Jilles Vreeken, Arno Siebes
IDEAL
2003
Springer
13 years 10 months ago
Association Rule Mining Algorithms for Set-Valued Data
This paper presents an association rule mining system that is capable of handling set-valued attributes. Our previous research has exposed us to a variety of real-world biological ...
Christopher A. Shoemaker, Carolina Ruiz