The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Fuzzy c-regression models (FCRM) give us multiple clusters and regression models of each cluster simultaneously, while support vector regression models (SVRM) involve kernel methods which enable us to analyze non-linear structure of the data. We combine these two concepts and propose the united fuzzy c-support vector regression models (FC-SVRM). In case that c is unknown, we introduce sequential regression...
Asset quality is the foundation of enterprise survival and development we choose one-class support vector machine (OCSVM) is chosen to deal with asset quality abnormal detection for it pays great roles to acquire the abnormal data. As well as flexible to be constructed, Biorthogonal wavelet consists linear-phase nature and high vanishing moment, therefore, corresponding wavelet kernel functions are...
This paper proposes a new kernel method for online identification of nonlinear system. The proposed Support Vector Regression-Regularized Network (SVR-RN) method uses the technique SVR in an offline phase to reduce the parameters number of the RKHS. Then the RN method is used to update theses reduced parameters.
The overall objective of the network security situation assessment is to establish security situation assessment system. This system can unify the large-scale network. First, it provides a security policy unified the whole network. It also provides the techniques for wide-area situation assessment. At the same time this system provides situational awareness and decision support tools for the implementation...
In order to detect the intrusion in the system, the information fusion technology was applied into intrusion detection. First, the audit data based on host and network data based on net were trained all together by using SVM and classification were realized. Then the D-S evidence theory was adopted to complete decision fusion. The performance of intrusion detection system is improved greatly, false...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.