Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
With the advent of modern online services such as cloud, security of remote machines has become a major concern. Remote Attestation is a term recently introduced by the Trusted Computing Group that enables a platform owner to the remotely verify the trusted state of the client platform. For this purpose, TCG based attestation or Integrity Measurement Architecture is proposed. The major problem with...
Security of computers and the networks that connect them is increasingly becoming of great significance. As an effect, building effective intrusion detection models with good accuracy and real-time performance are essential. In this paper we propose a new data mining based technique for intrusion detection using Cost-sensitive classification and Support Vector Machines. We introduced an algorithm...
Reconfigurable hardware is now used in high performance computers, introducing the high performance reconfigurable computing. Dynamic hardware allows processors to devolve intensive computations to dedicated hardware circuitry optimized for that purpose. Our aim is to make larger use of hardware capabilities by pooling the hardware and software computations resources in a unified design in order to...
This paper analyses the effects of Network-on-Chip (NoC) models written in SystemC on simulation speed. Two Register Transfer Level (RTL) models and Approximately Timed (AT) and Loosely Timed (LT) Transaction Level (TL) models are compared against reference RTL VHDL 2D mesh model. Three different mesh sizes are evaluated using a commercial simulator and OSCI SystemC reference kernel. Studied AT model...
The website content management system mentioned in this paper is a foundational website application platform for website design and information distribution and is an auxiliary tool system for Website development. It enables the user to quickly develop, maintain and manage the high-performance dynamic website. The paper proposes the key method in which the system information distribution module is...
Support Vector Machine (SVM) is a useful technique for data classification with successful applications in different fields of bioinformatics, image segmentation, data mining, etc. A key problem of these methods is how to choose an optimal kernel and how to optimize its parameters in the learning process of SVM. The objective of this study is to propose a Genetic Algorithm approach for parameter optimization...
Information-theoretic cost functions such as minimization of the error entropy (MEE) can extract more structure from the error signal, yielding better results in many realistic problems. However, adaptive filters (AFs) using MEE methods are more computationally intensive when compared to conventional, mean-squared error (MSE) methods employed in the well-known, least mean squares (LMS) algorithm....
Against the low efficiency of training on large-scale SVM, a reduction approach is proposed. This paper presents a new samples reduction method, called bistratal reduction method (BRM). BRM has two levels. The first level is coarse-grained reduction. It deletes the redundant clusters with KDC reduction. The second level is fine-grained reduction. It picks out the support vectors from the clusters...
In safety engineering, lower and upper explosion limits are the important indices to evaluate the safety of multi-component explosive gas mixture such as hydrogen and methane. There is a nonlinear dependence of explosion limits on the composition (components and theirs concentration) of multi-component explosive gas mixture. Therefore, a least square support vector regression (LS-SVR) model was proposed...
The appointment game is studied, and the normal form is defined. It is proved that the game satisfy superadditivety, monotonic, and non-convexity. It is proved that the core of the game is non-empty when n≤3. It is proved the necessary and sufficient conditions of the core are non-empty. In addition, it is proved that the bargaining set and the stable set coincides with the imputation set. It is proved...
This paper uses Lib-SVM algorithm of RBF kernel and linear kernel to develop a model for detecting regulating-profits financial statement fraud with the data of 112 Chinese listed companies. It turns out that the prediction accuracy of Lib-SVM algorithm for RBF kernel function model is 86.667%, the overall accuracy is 87.5%. And the prediction accuracy of the Lib-SVM linear kernel function model is...
The food problem is a global problem and many countries in the world recognize the food issue that is related to a global safety problem of this century. In order to overcome some deficiencies of traditional risk pre-warning model of food in these aspects of hypotheses, sample size and generalization capabilities, etc., this article combines support vector machine classification(SVM)theory with pre-warning...
It is deficiency to use accuracy as a measurement to evaluate model classifying ability. This paper proposes a measurement method which uses the area under the ROC curve, or AUC value, to evaluate the performance of the model. Furthermore, applying cross validation and grid-search methods, through designed algorithms, to build an optimization of support vector machines medical prediction model. The...
Background subtraction is a traditional method for detecting objects in stationary background. However, this traditional method is difficult to detect objects accurately in the real world, because the background is usually cluttered and not completely static. In this paper, we propose an object detection approach using Ant Colony System (ACS) in a MAP-MRF framework. For object segmentation, a MAP-MRF...
From the auto-start behavior of rootkit, this paper presented a rootkit detection mechanism based on the hidden registry information, and designed a Windows rootkit detection method based on cross-view. This method by comparing from the kernel mode and user mode enumeration of the registry information found the registry hidden items by rootkit, and then detected the rootkit. Finally, a representative...
SVM is powerful for the problem with small samples, non linear and high dimension. But such important parameters as the kernel function parameters, the insensitive parameters and the penalty coefficient are determined based on experience and cross-validation in the SVM, so it has certain blindness. In the paper, support vector machine optimized particle algorithm is used to predict the intensity of...
Synthetic aperture radar (SAR) is well adapted to detect ocean pollution independently from daily or weather conditions. Oil slicks have a specific impact on ocean wave spectra because the presence of oil slicks can induce a damping of the backscattering to the sensor and a damping of the energy of wave spectra. Thus oil slicks can be discernible from the radar image. Several algorithms are applied...
A method to determine C,γ , the hyper-parameters, range for Radial Basis Function Support Vector Machines (RBF SVMs) is proposed. The γ range is determined by the extreme Squared Euclidean Distance (SED) quantiles of the training set, and the C range is determined by one pass whole training set training decreasingly along logγmax to the over-regularized limit first and increasingly along logγmedian...
The present work developed a basis to explore numerous damage events utilizing Self-Organizing Map (SOM) introducing Kullback-Leibler (KL) divergence as an appropriate similarity for frequency spectra of damage events. Firstly, we validated the use of KL divergence to frequency spectra of damage events. The experiment using the datasets of damage related sounds showed that the kernel SOM using KL...
This work presents the concept of Continuous Search (CS), which objective is to allow any user to eventually get their constraint solver achieving a top performance on their problems. Continuous Search comes in two modes: the functioning mode solves the user's problem instances using the current heuristics model; the exploration mode reuses these instances to train and improve the heuristics model...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.