The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Record linkage is widely used in many fields, which is a crucial step to increase data quality before data analyzing and data mining. The task of record linkage is to identify records that correspond to the same entities from multi-sources data. In this paper, we describe detailed process of record linkage through an application of internet video, with the purpose of guiding the practice. A method...
Intrusion-detection systems (IDSs) are essential tools for the security of computer systems. Anomaly detection, which uses knowledge about normal behaviors and attempts to detect intrusions by noting significant deviations, has been paid more and more attention. In this paper, we introduce a novel framework for anomaly detection. In the proposed method, two widely used statistical learning method,...
Gait recognition is a new type of biometric identification technology. In the preliminary study of biped robot with heterogeneous legs, we detect road information by classify of subject's gait data by measurement using gyroscope. Then we can make bionic leg's movement to follow artificial leg's movement perfectly. So gait recognition is a very important step in it. This paper adopted the Fast Fourier...
For solving the problem of less information getting about unknown intrusions in anomaly detection, a model based on hybrid SVM/SOM is proposed. Firstly, C-SVM is used to find out the anomalous connections, and then, a packet filtering scheme is used to remove the known intrusions, which is performed by one-class SVM, after that, the identified unknown intrusions are projected onto the output grid...
Previous condition monitoring products classify the wind turbine operation condition based on one operation parameter. And a series of monitoring alarm thresholds are defined for each one of the classified wind turbine operation conditions. This leads to a lot of false alarms during the application of condition monitoring system of wind turbine. This paper uses multiple operation parameters to classify...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.