An intelligent neuro fuzzy temporal knowledge representation model for mining temporal patterns | 6 | 0.54 | 2014 |
SpyNetMiner: An Outlier Analysis to Tag Elites in Clandestine Social Networks | 0 | 0.34 | 2014 |
A fuzzy similarity based approach for intelligent web based e-learning | 0 | 0.34 | 2013 |
Improved concept-based query expansion using Wikipedia | 1 | 0.38 | 2013 |
An intelligent knowledge mining model for kidney cancer using rough set theory | 7 | 0.62 | 2012 |
Storing XML rules in relational storage of XML DTD | 0 | 0.34 | 2012 |
Intelligent intrusion detection system using fuzzy rough set based C4.5 algorithm | 2 | 0.35 | 2012 |
A novel segmentation approach for improving diagnostic accuracy of CAD systems for detecting lung cancer from chest computed tomography images | 6 | 0.49 | 2012 |
Network intrusion detection system using genetic network programming with support vector machine | 0 | 0.34 | 2012 |
A Novel Rule Based Classifier for Mining Temporal Medical Databases Using Fuzzy Rough Set Approach. | 0 | 0.34 | 2012 |
Evolving optimised decision rules for intrusion detection using particle swarm paradigm | 4 | 0.48 | 2012 |
Decision tree based light weight intrusion detection using a wrapper approach | 55 | 1.78 | 2012 |
A self learning rough fuzzy neural network classifier for mining temporal patterns | 1 | 0.42 | 2012 |
Key distribution protocol for secure multicast with reduced communication delay | 2 | 0.39 | 2011 |
Content Based Compression for Quicx System. | 0 | 0.34 | 2011 |
Cluster based bit vector mining algorithm for finding frequent itemsets in temporal databases | 0 | 0.34 | 2011 |
Fuzzy neuro genetic approach for predicting the risk of cardiovascular diseases | 10 | 0.55 | 2010 |
Evolving Clusters for Network Intrusion Detection System Using Genetic-X-Means Algorithm | 1 | 0.35 | 2010 |
An Effective Method of Image Retrieval using Image Mining Techniques | 0 | 0.34 | 2010 |
Computer-aided diagnosis system for the detection of bronchiectasis in chest computed tomography images | 4 | 0.50 | 2009 |
A neuro-genetic based short-term forecasting framework for network intrusion prediction system | 9 | 0.68 | 2009 |
Validating Constraints for Inter and Intra Relationships in XML Structured Document. | 0 | 0.34 | 2008 |
A Behavior Based Approach to Host-Level Intrusion Detection Using Self-Organizing Maps. | 1 | 0.35 | 2008 |
Composite event monitoring in XML repositories using generic rule framework for providing reactive e-services | 5 | 0.49 | 2006 |
LSCrawler: A Framework for an Enhanced Focused Web Crawler Based on Link Semantics | 18 | 0.74 | 2006 |
A genetic-algorithm based neural network short-term forecasting framework for database intrusion prediction system | 17 | 1.03 | 2006 |
Intelligent Multi-agent Based Genetic Fuzzy Ensemble Network Intrusion Detection | 2 | 0.37 | 2004 |
Intelligent Multi-agent Based Database Hybrid Intrusion Prevention System | 6 | 0.58 | 2004 |
Tree-structured models of parameter dependence for rapid adaptation in large vocabulary conversational speech recognition | 3 | 0.52 | 1999 |
A comparison of constrained trajectory segment models for large vocabulary speech recognition | 3 | 0.57 | 1998 |
Integration of diverse recognition methodologies through reevaluation of N-best sentence hypotheses | 32 | 10.74 | 1991 |