With the increasing demand for enhanced security, iris biometrics-based personal identification has become an interesting research topic in the field of pattern recognition. While most state-of-the-art iris recognitio...
详细信息
With the increasing demand for enhanced security, iris biometrics-based personal identification has become an interesting research topic in the field of pattern recognition. While most state-of-the-art iris recognition algorithms are focused on preprocessing iris images, important new directions have been identified recently in iris biometrics research. These include optimal feature selection and iris pattern classification. In this paper, we propose an iris recognition scheme based on Genetic algorithms (GAs) and asymmetrical Support Vector Machines (SVMs). Instead of using the whole iris region, we elicit the iris information between the collarette and the pupillary boundaries to suppress effects of eyelids and eyelashes occlusions, and pupil dilation, and to minimize the matching error. To select the optimal feature subset together with increasing the overall recognition accuracy, we apply GAs with a new fitness function. The traditional SVMs are modified into asymmetrical SVMs to handle: (1) highly unbalanced sample proportion between two classes, and 2) different types of misclassification error that lead to different misclassification losses. Furthermore, the parameters of SVMs are optimized in order to improve the generalization performance. The proposed technique is computationally effective, with recognition rates of 97.80% and 95.70% on the Iris Challenge Evaluation (ICE) and the West Virginia University (WVU) iris datasets, respectively.
At present age, security in computer and network systems is a pressing concern because a solo attack may cause an immense destruction in computer and network systems. Various intrusion detection approaches be present ...
详细信息
At present age, security in computer and network systems is a pressing concern because a solo attack may cause an immense destruction in computer and network systems. Various intrusion detection approaches be present to resolve this serious issue but the dilemma is which one is more appropriate in the field of intrusion. Therefore, in this paper, we evaluated and compared different neural network (NN) approaches to intrusion detection. This work describes the concepts, tool and methodology being used for assay of different NN intrusion detection approaches using Analytic Hierarchy Process (AHP). Further, conclusion on results is made and direction for future works is presented. The outcome of this work may help and guide the security implementers in two possible ways, either by using the results directly obtained in this paper or by extracting the results using similar mechanism but on different intrusion detection systems or approaches.
In order to determine Remote to Local (R2L) attack, an intrusion detection technique based on artificial neural network is presented. This technique uses sampled dataset from Kddcup99 that is standard for benchmarking...
详细信息
In order to determine Remote to Local (R2L) attack, an intrusion detection technique based on artificial neural network is presented. This technique uses sampled dataset from Kddcup99 that is standard for benchmarking of attack detection tools. The backpropagation algorithm is used for training the feedforward neural network. The developed system is applied to R2L attacks. Moreover, experiment indicates this technique has comparatively low false positive rate and false negative rate, consequently it effectively resolves the deficiency of existing intrusion detection approaches.
The application of neural networks towards intrusion detection is becoming a mainstream and a useful approach to deal with several current issues in this area. Currently, security in computer and network is a main pro...
详细信息
This paper addresses the problem of avoiding dynamic obstacles while following the learned trajectory through non-point based maps directly through laser data. The geometric representation of free configuration area c...
详细信息
This paper addresses the problem of avoiding dynamic obstacles while following the learned trajectory through non-point based maps directly through laser data. The geometric representation of free configuration area changes while a moving obstacle enters into the safety region of autonomous mobile robot. We have applied the Bézier curve properties to the free configuration eigenspaces to satisfy the dynamic obstacle avoidance path constraints. The algorithm is designed to accurately represent the mobile robot's characteristics while avoiding obstacle such as minimum turning radius. Moreover, we also discuss the obstacle avoided path feasibility as a vectorial combination of free configuration eigen-vectors at discrete time scan-frames to manifest a trajectory, which once followed and mapped onto the two control signals of mobile robot will enable it to build an efficient and accurate online environment map. Preliminary results in Matlab have been shown to validate the idea, while the same has been implemented in Player/stage (robotics real-time software) to analyze the performance of the proposed system.
The purpose of this paper is to review the key issues in the virtual universities and to provide general overview of the concepts based on the latest trends for the academic decision makers, e-learning designers and t...
详细信息
The purpose of this paper is to review the key issues in the virtual universities and to provide general overview of the concepts based on the latest trends for the academic decision makers, e-learning designers and teaching professionals. In the rest of the paper author summarizes the key issues in the virtual learning in universities and the other factors that are important in that area.
Information security is a serious issue especially in present age because a solo attack may cause a big harm in computer and network systems. Several intrusion detection approaches exist to tackle this critical issue ...
详细信息
ISBN:
(纸本)9781424466146;9780769540160
Information security is a serious issue especially in present age because a solo attack may cause a big harm in computer and network systems. Several intrusion detection approaches exist to tackle this critical issue but the problem is which one is more suitable in the field of intrusion. Further, these approaches are used in intrusion detection systems. Therefore, in this paper, we evaluated them so that a suitable approach may be advised to intrusion detection systems. This work describes the concepts, tool and methodology being used for evaluation analysis of different intrusion detection approaches using multi-criteria decision making technique. Moreover, conclusion on results is made and direction for future works is presented.
Intrusion detection using artificial neural networks is an ongoing area and thus interest in this field has increased among the researchers. Therefore, in this paper we present a system for tackling User to Root (U2R)...
详细信息
Intrusion detection using artificial neural networks is an ongoing area and thus interest in this field has increased among the researchers. Therefore, in this paper we present a system for tackling User to Root (U2R) attacks using generalized feedforward neural network. A backpropagation algorithm is used for training and testing purpose. The system uses sampled data from Kddcup99 dataset, an attack database that is a standard for evaluating the security detection mechanisms. The system is implemented in two phases such as training phase and testing phase. The developed system is applied to different U2R attacks to test its performance. Furthermore, the results indicate that this approach is more precise and accurate in case of false positive, false negative and detection rate.
A low-level logic fault test simulation environment for embedded systems directed specifically towards application-specific integrated circuits (ASICs) and intellectual property (IP) cores is proposed in the paper. Th...
详细信息
A low-level logic fault test simulation environment for embedded systems directed specifically towards application-specific integrated circuits (ASICs) and intellectual property (IP) cores is proposed in the paper. The developed simulation environment emulates a typical builtin self-testing (BIST) architecture with automatic test pattern generator (ATPG) that sends its outputs to a circuit (core) under test (CUT) and the output streams from the CUT are fed into an output response analyzer (ORA). The paper delineates the development of the test architecture, test application and fault injection including the relevance of the logic fault *** great details. Some results on simulation on specific IP cores designed using combinations from ISCAS 85 combinational and ISCAS 89 sequential benchmark circuits are provided as well for evaluation.
Extraction of noun phrase (NP) from text is useful for many natural language processing applications, such as name entity recognition, indexing, searching, parsing etc. We present a noun phrase chunker for Urdu which ...
详细信息
Extraction of noun phrase (NP) from text is useful for many natural language processing applications, such as name entity recognition, indexing, searching, parsing etc. We present a noun phrase chunker for Urdu which is based on a statistical approach. A 100,000 words Urdu corpus is manually tagged with NP chunk tags. The corpus is used to develop a statistical approach. Initially, a statistical approach based on standard HMM model is developed for automatics NP chunking. In Urdu phrases, the case marker (CM) indicates the end of a noun phrase and is appended at its end. Thus, if one scans the sentence in reverse order, one may be able to better predict phrase endings. So, the technique is enhanced by changing scanning direction. The technique is further enhanced by merging chunk and POS tags to achieve maximum accuracy. The results of all experiments are reported with maximum overall accuracy of 97.61% achieved using HMM based approach with extended tagset and right to left (RTL) scanning.
暂无评论