SMOTE-BD: A distributed Synthetic Minority Oversampling Technique (SMOTE) for Big Data.
☆10Apr 1, 2019Updated 6 years ago
Alternatives and similar repositories for smote-bd
Users that are interested in smote-bd are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Monitorización de alumnos en la plataforma Moodle☆13Sep 17, 2025Updated 6 months ago
- Servicio de Resumen de Textos con AI en la Nube (versión TFG).☆13Feb 24, 2021Updated 5 years ago
- Approx-SMOTE: fast SMOTE for Big Data on Apache Spark☆18Apr 27, 2022Updated 3 years ago
- Radial-Based Undersampling for Imbalanced Data Classification☆12Jun 2, 2019Updated 6 years ago
- Implementation of novel oversampling algorithms.☆34Oct 20, 2025Updated 5 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Deep Convolutional Autoencoders for reconstructing magnetic resonance images of the healthy brain☆39Jun 1, 2021Updated 4 years ago
- Radial-Based Oversampling for Noisy Imbalanced Data Classification☆14Mar 12, 2018Updated 8 years ago
- codes from the book “推荐系统开发实战”☆11Mar 19, 2020Updated 6 years ago
- This repository contains implementation of some techniques like SMOTE, ADASYN, SMOTE + Tomek Links, SMOTE + ENN to overcome class imbalan…☆49Oct 6, 2020Updated 5 years ago
- The Synthetic Minority Oversampling Technique (SMOTE) implemented in Spark.☆48Jul 4, 2018Updated 7 years ago
- Taller del Máster Profesional de Informática UGR. Curso de CloudComputing.☆10May 6, 2019Updated 6 years ago
- Pytorch Implementation of SMOTE☆18Feb 6, 2021Updated 5 years ago
- Comparing Anomaly-Based Network Intrusion Detection Approaches Under Practical Aspects☆11Mar 25, 2023Updated 3 years ago
- 预测rossmann1115家商店未来的销售额☆21Nov 14, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This gym environment simulates network intrusion similar to that described in the NSL-KDD Dataset given in this link http://www.unb.ca/ci…☆14Feb 15, 2018Updated 8 years ago
- Stemming Algorithms for the Portuguese Language☆21May 12, 2020Updated 5 years ago
- Neural Network based Intrusion Detection System (NIDS) on Intrusion Detection Evaluation Dataset (CICIDS2017)☆13Aug 16, 2020Updated 5 years ago
- Network Intrusion Detection System(Abnormal Detection)☆11Jun 14, 2020Updated 5 years ago
- 利用MapReduce对海量微博数据进行排序,并找出top10的Topic☆12Sep 25, 2024Updated last year
- Final career project on PAC theory and imbalanced datasets☆18Sep 6, 2020Updated 5 years ago
- Deep Learning based Intrusion Detection on NSL-KDD Dataset☆13Aug 24, 2019Updated 6 years ago
- Customised UITextField and UITextView with HintLabel, ErrorLabel, Divider and validations☆10May 20, 2016Updated 9 years ago
- Plantilla LaTeX para el Trabajo de Fin de Grado de Ingeniería Informática de la Universidad de Burgos☆12Jul 11, 2025Updated 8 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Scalable PCA (sPCA) is a scalable implementation of Principal component analysis algorithm on top of Spark☆12May 12, 2015Updated 10 years ago
- GANs for class imbalanced problems☆29Jul 18, 2022Updated 3 years ago
- This repository provides the code for replicating the experiments in the paper "Building One-Shot Semi-supervised (BOSS) Learning up to F…☆36Aug 9, 2020Updated 5 years ago
- Analysis and preprocessing of the kdd cup 99 dataset using python and scikit-learn☆22Mar 11, 2020Updated 6 years ago
- deep learning applied to Network Intrusion Detection with NSL-KDD data☆16Feb 3, 2018Updated 8 years ago
- ☆10Sep 19, 2019Updated 6 years ago
- R package for Non Parametric and Bayesian Statistical Tests☆11Apr 12, 2022Updated 3 years ago
- Contact: Alexander Hartl, Maximilian Bachl, Fares Meghdouri. Explainability methods and Adversarial Robustness metrics for RNNs for Intru…☆19Mar 16, 2021Updated 5 years ago
- 🧠 A model for early detection of multiple faults in induction motors based on the use of PCA and multilabel decision-trees☆34Jun 2, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆36Dec 17, 2019Updated 6 years ago
- ☆16Jan 5, 2018Updated 8 years ago
- Tensorflow Implementation of paper Applying long short-term memory recurrent neural networks to intrusion detection with KDDCup99 Data☆15Nov 14, 2018Updated 7 years ago
- ☆10Jul 20, 2018Updated 7 years ago
- a configurable git commit hook implementation☆10Jul 6, 2020Updated 5 years ago
- Intrusion Detection using various Data Mining Techniques (KDD Cup 1999 Data)☆19Jul 9, 2019Updated 6 years ago
- Web Design / July 2015 / Group 1 (Sundays & Tuesdays 18-21)☆10Aug 24, 2015Updated 10 years ago