The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security of computers and the networks that connect them is increasingly becoming of great significance. As an effect, building effective intrusion detection models with good accuracy and real-time performance are essential. In this paper we propose a new data mining based technique for intrusion detection using Cost-sensitive classification and Support Vector Machines. We introduced an algorithm...
Support Vector Machine (SVM) is a useful technique for data classification with successful applications in different fields of bioinformatics, image segmentation, data mining, etc. A key problem of these methods is how to choose an optimal kernel and how to optimize its parameters in the learning process of SVM. The objective of this study is to propose a Genetic Algorithm approach for parameter optimization...
The following topics are dealt with: data hiding techniques; wavelet transform; management information system; image sequence compressing algorithm; trusted software; case-based reasoning system; education information platform; UML; multiobjective optimization; information retrieval; web mining; CUDA architecture; fuzzy association rules; BP neural network; network security detection method; adaptive...
In email networks, user behaviors affect the way emails are sent and replied. While knowing these user behaviors can help to create more intelligent email services, there has not been much research into mining these behaviors. In this paper, we investigate user engagingness and responsiveness as two interaction behaviors that give us useful insights into how users email one another. Engaging users...
Aiming at the shortages of the existing data-mining model for classification of customer's credit sale risk, a new classification model based on rough sets and support vector machine presents is put forward in this paper. First, the theory of rough set is applied to pick up and reduce the index attributes. Then, the training samples are sent to the support vector machine to train and learn. After...
To help handle battlefield information superiority to decision superiority (i.e. to rapidly arrive at better decisions than adversaries can respond to), many scientific, technical and technological challenges must be addressed. The most critical of those are information fusion and management at different levels, communication. This paper decribes battlefield information as data streams and mining...
In recent years high-resolution space borne images have disclosed a large number of new opportunities for medium and large-scale rubber plant mapping. Some traditional algorithms used for hyper spectral remote sensing image classification have some problems such as low computing rate, low accuracy. According to SVM theory, the Rubber plant classification model based on SVM was constructed, by experimenting...
A method of using statistical analysis on site-sampled sphygmogram data sets and support vector machines classifier to diagnose coronary heart disease is proposed. The hemodynamic parameters derived from sphygmogram reflect the status of human cardiovascular system. Based on homodynamic parameters, the dimension reduction methods and a modified support vector machines classifier are applied to meliorate...
Jet Grouting (JG) is a Geotechnical Engineering technique that is characterized by a great versatility, being the best solution for several soil treatment improvement problems. However, JG lacks design rules and quality control. As the result, the main JG works are planned from empirical rules that are often too conservative. The development of rational models to simulate the effect of the different...
The land use or land cover map depicts the physical coverage of the Earth's terrestrial surface according to its use (viz. vegetation, habitation, water body, bare soil, artificial structures etc.). Land use map generation from remotely sensed images is one of the challenging task of remote sensing technology. In this article, motivated from group forming behaviour of real ants, we have proposed two...
The growing usage of mobile camera phones has led to proliferation of many mobile applications. Landmark recognition is one of the mobile applications that are gaining more attention in recent years. The main idea of the application is that a user will use a camera phone to capture the image of a landmark or building and then the system will analyze, identify, and inform the user the name of the captured...
The paper provides a novel approach to emotion recognition from facial expression and voice of subjects. The subjects are asked to manifest their emotional exposure in both facial expression and voice, while uttering a given sentence. Facial features including mouth-opening, eye-opening, eyebrow-constriction, and voice features including, first three formants: F1, F2, and F3, and respective powers...
In this paper, a three tier strategy is suggested to recognize the hand-printed characters of Devanagari script. In primary and secondary stage classification, the structural properties of the script are exploited to avoid classification error. The results of all the three stages are reported on two classifiers i.e. MLP and SVM and the results achieved with the later are very good. The performance...
Feature selection is a process to select a subset of original features. It can improve the efficiency and accuracy by removing redundant and irrelevant terms. Feature selection is commonly used in machine learning, and has been wildly applied in many fields. we propose a new feature selection method. This is an integrative hybrid method. It first uses Affinity Propagation and SVM sensitivity analysis...
The increasing complexity of modern distributed systems makes conventional fault tolerance and recovery prohibitively expensive. One of the promising approaches is online failure prediction. However, the process of feature extraction depends on the experienced administrators and their domain knowledge to filtering and compressing error events into a form that is easy for failure prediction. In this...
The paper provides a novel approach to emotion recognition from facial expression and voice of subjects. The subjects are asked to manifest their emotional exposure in both facial expression and voice, while uttering a given sentence. Facial features including mouth-opening, eye-opening, eyebrow-constriction, and voice features including, first three formants: F1, F2, and F3, and respective powers...
The important issue in multi-class classification on support vector machines is the decision rule, which determines whether an input pattern belongs to a predicted class. To enhance the accuracy of multi-class classification, this study proposes a multi-weighted majority voting algorithm of support vector machine (SVM), and applies it to overcome complex facial security application. The proposed algorithm...
The study of the behavior of ion-channels can provide significant information to detect metal ions and small organic molecules in solution. Discrimination of different analytes can be performed by extracting appropriate features from the ion-channel signals and using them for classification. In this paper, we consider features extracted from the Fourier, Wavelet and Walsh-Hadamard domain representations...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.