Incremental Cluster Detection using a Soft Computing Approach
نویسندگان
چکیده
منابع مشابه
Pothole Detection by Soft Computing
Subject- Potholes on roads are regarded as serious problems in the transportation domain and ignoring them leads to the increase of accidents, traffic, vehicle fuel consumption and waste of time and energy. As a result, pothole detection has attracted researchers’ attention and different methods have been presented for it up to now. Background- The major part of previous research is based on i...
متن کاملIntrusion Detection Using Soft Computing Techniques
As the popularity and usage of Internet increases all over the world, security issues have also become very essential that have to be considered. In literature, different techniques from various disciplines have been utilized to develop efficient security methods but those techniques always have some shortcomings. In this chapter the author discuss soft computing techniques that have been appli...
متن کاملEdge Detection Using Soft Computing in Matlab
Edge detection is a primary operation of most of the image processing applications such as image detection, boundary detection, image classification, image registration. Edge detection filters out less important information and preserve the structural properties of image.The Proposed technique uses ANFIS edge detector for edge detection on digital images. It involves a neuro fuzzy system with t...
متن کاملBrain Tumor Detection Using Soft Computing Tools
Modern medical imaging research faces the challenge of detecting brain tumor through Magnetic Resonance Images (MRI). Normally, to produce images of soft tissue of human body, MRI images are used by experts. For brain tumor detection, image segmentation is required, which is a challenging task faced by today’s medical neurologist. This is considered to be one of the most important step in detec...
متن کاملNetwork Anomaly Detection using Soft Computing
One main drawback of intrusion detection system is the inability of detecting new attacks which do not have known signatures. In this paper we discuss an intrusion detection method that proposes independent component analysis (ICA) based feature selection heuristics and using rough fuzzy for clustering data. ICA is to separate these independent components (ICs) from the monitored variables. Rou...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2010
ISSN: 0975-8887
DOI: 10.5120/1604-2155