Search
Now showing items 1-6 of 6
Aportaciones a la clasificación no supervisada y a su validación. Aplicación a la seguridad informática
(2010-07-26)
Dado el número y las características de las transacciones que se pueden realizar hoy en día a través de las redes de computadores, la seguridad informática es un área cada vez más importante. Sin embargo, dada la gran ...
Towards a standard methodology to evaluate internal cluster validity indices
(Elsevier, 2011-02-01)
The evaluation and comparison of internal cluster validity indices is a critical problem in the clustering area. The methodology used in most of the evaluations assumes that the clustering algorithms work correctly. We ...
An update of the J48Consolidated WEKA’s class: CTC algorithm enhanced with the notion of coverage
(2016-02-12)
This document aims to describe an update of the implementation of the J48Consolidated class within WEKA platform. The J48Consolidated class implements the CTC algorithm [2][3] which builds a unique decision tree based on ...
Generation of the database gurekddcup
(2017-02-10)
The database gureKDDCup has been generated within the UADI project (Unsupervised Anomaly Detection for Intrusion detection system) in which a classifier that detects intrusions or attacks in network based systems was ...
J48Consolidated: an implementation of CTC algorithm for WEKA
(2016-02-12)
The CTC algorithm, Consolidated Tree Construction algorithm, is a machine learning paradigm that was designed to solve a class imbalance problem, a fraud detection problem in the area of car insurance [1] where, besides, ...
Diagnostic classification of Parkinson’s disease based on non-motor manifestations and machine learning strategies
(Springer, 2023-03)
Non-motor manifestations of Parkinson’s disease (PD) appear early and have a significant impact on the quality of life of patients, but few studies have evaluated their predictive potential with machine learning algorithms. ...