نتایج جستجو برای: based detection

تعداد نتایج: 3322688  

2007
Stewart Massie Nirmalie Wiratunga Susan Craw Alessandro Donati Emmanuel Vicari

Creating case representations in unsupervised textual case-based reasoning applications is a challenging task because class knowledge is not available to aid selection of discriminatory features or to evaluate alternative system design configurations. Representation is considered as part of the development of a tool, called CAM, which supports an anomaly report processing task for the European ...

A. ‎Naderi Saatlo‎ N. ‎Romooz‎ S. ‎Sheykhivand‎ T. ‎Yousefi ‎R‎ezaii‎

‎There are different feature extraction methods in brain-computer interfaces (BCI) based on Steady-State Visually Evoked Potentials (SSVEP) systems‎. ‎This paper presents a comparison of five methods for stimulation frequency detection in SSVEP-based BCI systems‎. ‎The techniques are based on Power Spectrum Density Analysis (PSDA)‎, ‎Fast Fourier Transform (FFT)‎, ‎Hilbert‎- ‎Huang Transform (H...

Journal: :journal of computer and robotics 0
maryam fathi ahmadsaraei faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran abolfazl toroghi haghighat faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran

by extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. security is a serious challenge for actual implementation in wireless networks. due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

2005
Zonghua Zhang

Anomaly-based intrusion detection is about discerning intrusive and normal patterns of activities based on the normality characterization of information systems. The common goal of anomaly-based intrusion detection is to detect intrusive attacks as many as possible with fewer false alerts. Generally, our work is to study effective models, methods and techniques for anomaly-based intrusion detec...

Journal: :Ad Hoc Networks 2010
Adrian P. Lauf Richard A. Peters William H. Robinson

This paper describes the design and implementation of a two-stage intrusion detection system (IDS) for use with mobile ad-hoc networks. Our anomaly-based intrusion detection is provided by analyzing the context from the application-level interactions of networked nodes; each interaction corresponds to a specific function or behavior within the operational scenario of the network. A static set o...

2015
Yi Mao Bao-Long Guo Yunyi Yan Wei Sun

Saliency Detection is a hot research topic in both biological and computer vision. Salient structures, edges, regions would greatly contribute to high-level semantics understanding of people’s attention and improve retrieval precision, object detection, edge detection and etc. In this paper, based on the biological principle in visual system, we present a saliency detection system which combine...

2013
MONIKA RATHORE RAVINDRA GUPTA

Image retrieval has been popular for several years. This paper propose a generalized query method of content based image retrieval system (CBIR) by using the several features and technique [1] i.e. color, texture, shape and GLCM, and also content based image retrieval system based on the combination of local and global features. The local features used are Bi-directional Empirical Mode Decompos...

2001
Mark J. Crosbie Benjamin A. Kuperman

This paper details the design and implementation of a host-based intrusion detection system (Hewlett-Packard’s Praesidium IDS/9000) and a specialized kernel data source which supplies customized data to the IDS. Instead of the common attack-signature matching used in most other intrusion detection systems, IDS/9000 performs real-time monitoring of the system looking for misuse actions that are ...

Journal: :CoRR 2009
Farah Jemili Montaceur Zaghdoud Mohamed Ben Ahmed

This paper proposes an intrusion detection and prediction system based on uncertain and imprecise inference networks and its implementation. Giving a historic of sessions, it is about proposing a method of supervised learning doubled of a classifier permitting to extract the necessary knowledge in order to identify the presence or not of an intrusion in a session and in the positive case to rec...

2015
E. O. Ogunti W. Lawal B. Kareem

Inaccuracy in signal detection due to presence of noise in signal is responsible for fading/interference, this noise needs to be reduced for optimal signal detection, and detection must be accurate enough to minimize the risk of false alarm. A noise reduction model was developed to improve signal detection using component improvement strategy. The system was implemented on MATLAB software packa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید