Search
Now showing items 1-6 of 6
Towards a standard methodology to evaluate internal cluster validity indices
(Elsevier, 2011-02-01)
The evaluation and comparison of internal cluster validity indices is a critical problem in the clustering area. The methodology used in most of the evaluations assumes that the clustering algorithms work correctly. We ...
An update of the J48Consolidated WEKA’s class: CTC algorithm enhanced with the notion of coverage
(2016-02-12)
This document aims to describe an update of the implementation of the J48Consolidated class within WEKA platform. The J48Consolidated class implements the CTC algorithm [2][3] which builds a unique decision tree based on ...
Generation of the database gurekddcup
(2017-02-10)
The database gureKDDCup has been generated within the UADI project (Unsupervised Anomaly Detection for Intrusion detection system) in which a classifier that detects intrusions or attacks in network based systems was ...
J48Consolidated: an implementation of CTC algorithm for WEKA
(2016-02-12)
The CTC algorithm, Consolidated Tree Construction algorithm, is a machine learning paradigm that was designed to solve a class imbalance problem, a fraud detection problem in the area of car insurance [1] where, besides, ...
A hierarchical architecture for recognising intentionality in mental tasks on a brain-computer interface
(Public Library Science, 2019-06-18)
A brain-computer interface (BCI), based on motor imagery EEG, uses information extracted from the electroencephalography signals generated by a person who intends to perform any action. One of the most important issues of ...
Smart Meeting Room Usage Information and Prediction by Modelling Occupancy Profiles
(MDPI, 2019-01-02)
The monitoring of small houses and rooms has become possible due to the advances in IoT sensors, actuators and low power communication protocols in the last few years. As buildings are one of the biggest energy consuming ...