نتایج جستجو برای: based detection
تعداد نتایج: 3322688 فیلتر نتایج به سال:
due to extraordinary large amount of information and daily sharp increasing claimant for ui benefits and because of serious constraint of financial barriers, the importance of handling fraud detection in order to discover, control and predict fraudulent claims is inevitable. we use the most appropriate data mining methodology, methods, techniques and tools to extract knowledge or insights from ...
In this paper, radar detection based on Monte Carlo sampling is studied. Two detectors based on Importance Sampling are presented. In these detectors, called Particle Detector, the approximated likelihood ratio is calculated by Monte Carlo sampling. In the first detector, the unknown parameters are first estimated and are substituted in the likelihood ratio (like 
the GLRT method). In the s...
Ensuring that the appropriate level of security is available in wireless networks is absolutely essential. To aid in the defense and detection of potential threats, WLANs should employ security solutions that include an anomaly-based intrusion detection system (ADS) that identify wireless network intrusions by gathering and analyzing the data that is available on the system. This paper is to pr...
Audit sequences have been used effectively to study process behaviors and build host-based intrusion detection models. Most sequencebased techniques make use of a pre-defined window size for scanning the sequences to model process behavior. In this paper, we propose two methods for extracting variable length patterns from audit sequences that avoid the necessity of such a pre-determined paramet...
Quantitative characterization of randomly roving agents in Agent Based Intrusion Detection Environment (ABIDE) is studied. Formula simplifications regarding known results and publications are given. Extended Agent Based Intrusion Detection Environment (EABIDE) is introduced and quantitative characterization of roving agents in EABIDE is studies.
Corruption is universally considered as an undesirable characteristic of public services. But despite attempts to simplify and automate such services, there is very little prior work to detect, handle or prevent corruption in computation literature. This is particularly surprising given the significant advances made in detecting fraud, a relevant but different form of public impropriety afflict...
In this paper we propose a novel approach to the task of salient object detection. In contrast to previous salient object detectors that are based on a spotlight attention theory, we follow an object-based attention theory and incorporate the notion of an object directly into our saliency measurements. Particularly, we consider proto-objects as units of the analysis, where a protoobject is a co...
We introduce a flexible combination of volume, surface, and line rendering. We employ object-based edge detection because this allows a flexible parametrization of the generated lines. Our techniques were developed mainly for medical applications using segmented patient-individual volume datasets. In addition, we present an evaluation of the generated visualizations with 8 medical professionals...
A framework for combining object detection techniques with a content-based image retrieval(CBIR) system is discussed. As an example, a special CBIR system which focuses on human faces as foreground and decides the similarity of images based on background features is presented. This system may be useful in automatically generating albums from consumer photos.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید