Study of Machine Learning Techniques for EEG Eye State Detection
نویسندگان
چکیده
منابع مشابه
EEG Classification based on Machine Learning Techniques
The main issue to build applicable Brain-Computer Interfaces is the capability to classify the electroencephalograms (EEG). During the last decade, researchers developed lots of interests in this field. The purpose behind this research is to improve a model for EEG signals analysis. Filtration of EEG Signals is essential to remove artifacts. Otherwise, wavelet transform was used to extract feat...
متن کاملMachine Learning Techniques for Intrusion Detection
An Intrusion Detection System (IDS) is a software that monitors a single or a network of computers for malicious activities (attacks) that are aimed at stealing or censoring information or corrupting network protocols. Most techniques used in today’s IDS are not able to deal with the dynamic and complex nature of cyber attacks on computer networks. Hence, efficient adaptive methods like various...
متن کاملMachine Learning Techniques for Network Intrusion Detection
Most of the currently available network security techniques are not able to cope with the dynamic and increasingly complex nature of cyber attacks on distributed computer systems. Therefore, an automated and adaptive defensive tool is imperative for computer networks. Alongside the existing prevention techniques such as encryption and firewalls, Intrusion Detection System (IDS) has established ...
متن کاملA Study of Anomaly Intrusion Detection Using Machine Learning Techniques
In the era of information systems and internet there is more concern rising towards information security in daya to day life, along with the availability of the vulnerability assessment mechanisms to identifying the electronic attacks.Anomaly detection is the process of attempting to identify instances of attacks by comparing current activity against the expected actions of intruder. Machine le...
متن کاملA Study of Android Malware Detection Techniques and Machine Learning
Android OS is one of the widely used mobile Operating Systems. The number of malicious applications and adwares are increasing constantly on par with the number of mobile devices. A great number of commercial signature based tools are available on the market which prevent to an extent the penetration and distribution of malicious applications. Numerous researches have been conducted which claim...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings
سال: 2020
ISSN: 2504-3900
DOI: 10.3390/proceedings2020054053