Journal of Engineering and Applied Sciences
Year:
2018
Volume:
13
Issue:
14
Page No.
5890 - 5896
Toward Mining Salient Attributes Based on Developing Principle Component
Analysis Algorithm
Authors :
KarimHashim Al-Saedi
References
Abbas, E.I., 2015. Effect of eigenfaces level on the face recognition rate using principal component analysis. Eng. Technol. J., 33: 729-737.
Direct Link | Anderson, A., 2013. Business Statistics for Dummies. John Wiley & Sons, Hoboken, New Jersey, USA.,.
Anton, H., 2010. Elementary Linear Algebra. 10th Edn., John Wiley & Sons, Hoboken, New Jersey, USA., ISBN:978-0-470-45821-1, Pages: 567.
Brown, B.L., S.B. Hendrix, D.W. Hedges and T.B. Smith, 2011. Multivariate Analysis for the Biobehavioral and Social Sciences. John Wiley & Sons, Hoboken, New Jersey, USA.,.
El-Taj, H.R. and O.A. Abouabdalla, 2010. False positive reduction by correlating the intrusion detection system alerts: Investigation study. J. Commun. Comput., 7: 25-31.
Han, J. and M. Kamber, 2012. Data Mining Concepts and Techniques. 3rd Edn., Elsevier, New York, USA., ISBN:9789380931913, Pages: 703.
Hashim, S.H. and I.A. Abdulmunem, 2013. A proposal to detect computer worms (Malicious Codes) using data mining classification algorithms. Eng. Technol. J., 31: 142-155.
Direct Link | Ilin, A. and T. Raiko, 2010. Practical approaches to principal component analysis in the presence of missing values. J. Mach. Learn. Res., 11: 1957-2000.
Direct Link | Karimi, Z. and A. Harounabadi, 2013. Feature ranking in intrusion detection dataset using combination of filtering methods. Intl. J. Comput. Appl., 78: 21-27.
Direct Link | Masdari, M. and F.C. Bakhtiari, 2014. Alert management system using K-means based genetic for IDS. Intl. J. Secur. Appl., 8: 109-118.
CrossRef | Mokarian, A., A. Faraahi and A.G. Delavar, 2013. False positives reduction techniques in intrusion detection systems-a review. Intl. J. Comput. Sci. Netw. Secur., 13: 128-134.
Direct Link | Paul, L.C., A.A. Suman and N. Sultan, 2013. Methodological analysis of Principal Component Analysis (PCA) method. Intl. J. Comput. Eng. Manage., 16: 32-38.
Direct Link | Siraj, M.M., M.A. Maarof and S.Z.M. Hashim, 2009. Intelligent alert clustering model for network intrusion analysis. Int. J. Adv. Soft Computing Appl., 1: 1-16.
Direct Link | Xie, X., 2014. Principal component analysis-based sports dance development influence factors research. J. Chem. Pharm. Res., 6: 970-976.
Direct Link |