The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Color image histograms are very useful tools for content based image retrieval (CBIR) that can be applied on features such as colour, texture and shape. As these kinds of histograms results with large variations between neighbouring bins, they seem so sensitive to any kind of changes such as noise, illumination. To overcome this problem, in this paper, fuzzy linking histogram approach based on OWA...
A computer network intrusion detection and prevention system consists of collecting network traffic data, discovering user behavior patterns as intrusion detection rules, and applying these rules to prevent malicious and misuse. Many commercial off-the-shelf (COTS) products have been developed to perform each of these tasks. In this paper, the component-based software engineering approach is exploited...
At California State University Dominguez Hills, the Computer Science Department has created the "Computer Security Research Lab" (CSRL) to research and analyze ways to improve computer security at the network level. JACED is a program that will improve network and computer security. JACED will use data from sensors and mine the information to improve firewalls and detect new attacks. The...
Data mining techniques have been extensively applied in bioinformatics to analyze biomedical data. In this paper, we choose the Rapid-I??s RapidMiner as our tool to analyze a Pima Indians Diabetes Data Set, which collects the information of patients with and without developing diabetes. The discussion follows the data mining process. The focus will be on the data preprocessing, including attribute...
In this paper, a new linear matrix inequality approach to the multiobjective controller synthesis for continuous-time linear systems is presented. This new synthesis procedure is investigated for the dynamic output feedback controllers. Our approach is based on the newly developed extended norm characterizations which exhibits a kind of decoupling between the Lyapunov and the system matrices. In this...
Data mining and machine learning technology has been extensively applied in network intrusion detection and prevention systems by discovering user behavior patterns from the network traffic data. Some commercial tools for collecting network traffic data exist, such as SNORT. The traffic data collected from the network using these tools, however, usually doesnpsilat fit the format requirement of the...
In this paper, we discuss our research in developing general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover regular patterns of system features that describe program and user behavior. Server systems invariably write detailed activity logs whose value is useful in detecting intrusion. Unfortunately, production volumes overwhelm the capacity...
In this paper, we investigate the robustness of the observer-based controller under Parameter perturbations. Our goal is to find the conditions for insensitivity of the optimal observer-based controller to parameter variations. Consider the perturbed system.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.