Your selections:
Cluster based rule discovery model for enhancement of government's tobacco control strategy
- Huda, Shamsul, Yearwood, John, Borland, Ron
Consensus clustering and supervised classification for profiling phishing emails in internet commerce security
- Dazeley, Richard, Yearwood, John, Kang, Byeongho, Kelarev, Andrei
Exploring novel features and decision rules to identify cardiovascular autonomic neuropathy using a hybrid of wrapper-filter based feature selection
- Huda, Shamsul, Jelinek, Herbert, Ray, Biplob, Stranieri, Andrew, Yearwood, John
From convex to nonconvex: A loss function analysis for binary classification
- Zhao, Lei, Mammadov, Musa, Yearwood, John
Hybrid wrapper-filter approaches for input feature selection using maximum relevance and Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA)
- Huda, Shamsul, Yearwood, John, Stranieri, Andrew
Internet security applications of Grobner-Shirvov bases
- Kelarev, Andrei, Yearwood, John, Watters, Paul
Internet security applications of the Munn rings
- Kelarev, Andrei, Yearwood, John, Watters, Paul, Wu, Xinwen, Abawajy, Jemal, Pan, L.
Learning parse-free event-based features for textual entailment recognition
- Ofoghi, Bahadorreza, Yearwood, John
Profiling phishing emails based on hyperlink information
- Yearwood, John, Mammadov, Musa, Banerjee, Arunava
Smokers' characteristics and cluster based quitting rule discovery model for enhancement of government's tobacco control systems
- Huda, Shamsul, Yearwood, John, Borland, Ron
Understanding victims of identity theft: A grounded theory approach
- Turville, Kylie, Firmin, Sally, Yearwood, John, Miller, Charlynn
Understanding victims of identity theft: Preliminary insights
- Turville, Kylie, Yearwood, John, Miller, Charlynn
A classification algorithm that derives weighted sum scores for insight into disease
- Quinn, Anthony, Stranieri, Andrew, Yearwood, John, Hafen, Gaudenz
A constraint-based evolutionary learning approach to the expectation maximization for optimal estimation of the hidden Markov model for speech signal modeling
- Huda, Shamsul, Yearwood, John, Togneri, Roberto
A formula for multiple classifiers in data mining based on Brandt semigroups
- Kelarev, Andrei, Yearwood, John, Mammadov, Musa
A polynomial ring construction for the classification of data
- Kelarev, Andrei, Yearwood, John, Vamplew, Peter
- Huda, Shamsul, Yearwood, John, Togneri, Roberto
An algorithm for the optimization of multiple classifers in data mining based on graphs
- Kelarev, Andrei, Ryan, Joe, Yearwood, John
Applying clustering and ensemble clustering approaches to phishing profiling
- Webb, Dean, Yearwood, John, Vamplew, Peter, Ma, Liping, Ofoghi, Bahadorreza, Kelarev, Andrei
Are you sure you would like to clear your session, including search history and login status?