نتایج جستجو برای: feature selection method

تعداد نتایج: 2050637  

Journal: :Security and Communication Networks 2021

As an important part of intrusion detection, feature selection plays a significant role in improving the performance detection. Krill herd (KH) algorithm is efficient swarm intelligence with excellent data mining. To solve problem low efficiency and high false positive rate detection caused by increasing high-dimensional data, improved krill based on linear nearest neighbor lasso step (LNNLS-KH...

2006
Hidenao Abe Takahira Yamaguchi

Feature selection is one of key issues related with data pre-processing of classification task in a data mining process. Although many efforts have been done to improve typical feature selection algorithms (FSAs), such as filter methods and wrapper methods, it is hard for just one FSA to manage its performances to various datasets. To above problems, we propose another way to support feature se...

Journal: :IJIRR 2016
Prafulla Bharat Bafna Shailaja Shirwaikar Dhanya Pramod

rights, including translation into other languages reserved by the publisher. No part of this journal may be reproduced or used in any form or by any means without written permission from the publisher, except for noncommercial, educational use including classroom teaching purposes. Product or company names used in this journal are for identification purposes only. Inclusion of the names of the...

Journal: :Pattern Recognition Letters 2004
K. Shima M. Todoriki A. Suzuki

Latent Semantic Indexing (LSI) is an effective method to extract features that captures underlying latent semantic structure in the word usage across documents. However, subspace selected by this method may not be the most appropriate one to classify documents, since it orders extracted features according to their variances, not the classification power. We propose to apply feature ordering met...

Journal: :Indonesian Journal of Electrical Engineering and Computer Science 2019

Journal: :International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2019

Journal: :The Journal of Supercomputing 2023

Abstract One challenge of studying cloud workload traces is the lack available users’ identities. Therefore, clustering methods were used to address this through extracting these identities from traces. For better extraction, it beneficial select attributes (columns in traces) for by using feature selection methods. However, use general requires details that are not (e.g. predefined number clus...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید