The automated and reliable delineation of atherosclerotic carotid plaques in ultrasound (CUS) videos is of significant clinical relevance for management of the disease and the prediction of future stroke events. To fa...
详细信息
The information in the logs produced by the servers, devices, and applications can be utilized to assess the system's health. It's crucial to manually review logs, for instance, during upgrades, to verify whet...
详细信息
Tolling is generally considered to be a method for balancing the supply and demand of social resources. This paper explores the emergence and development of the transportation toll policy. It examines the influence of...
详细信息
Fast and accurate methods for spectrum sensing (SS) are the key elements in cognitive radio networks (CRNs) that achieve high SS. This paper proposes a reinforcement learning (RL) scheme for secondary users (SUs) in a...
详细信息
Power indices such as the Banzhaf index were originally developed within voting theory in an attempt to rigorously characterise the influence that a voter is able to wield in a particular voting game. In this paper, w...
详细信息
Nowadays Intrusion Detection systems plays very important role in Network security. With the growing use of internet, the possibility of being attacked is also increasing. People are using signature based IDS's an...
详细信息
ISBN:
(纸本)9781849198462
Nowadays Intrusion Detection systems plays very important role in Network security. With the growing use of internet, the possibility of being attacked is also increasing. People are using signature based IDS's and all other type of IDS's which are basically used to detect intrusion and as well as prevent the systems from them in all aspects. The advantages of using knowledge management techniques in information security have been already identified by some researchers, however, little has been done to enable security technologies with them Detecting the attacks as well as maintaining a secured environment in the network by having a complete knowledge about the system and detecting attacks using a signature based technique would helps us to deploy the same for our future use. In this technique, we have used Snort (a signature based detection tool and created ontology for DoS attacks to help in prevention techniques.
In this study, analyzes were performed to detection of cyberbullying by Artificial Neural Network (ANN) based classifiers. In contrast to the general classifiers used in the detection of cyberbullying in the literatur...
详细信息
A novel reversible binary image data hiding scheme using run-length (RL) histogram modification is presented in this paper. The binary image is scanned from left to right and from top to bottom to form a sequence of a...
详细信息
A new parallel processing system has been proposed, and a prototype model of the system has been constructed. It is designed to perform parallel vector operations at maximum efficiency. In addition, it can also handle...
详细信息
This paper presents the findings of an exploratory study comparing two of Brain-computer Interface approaches, P300 and Motor Imagery, with EEG signals acquired using the Emotiv Neuroheadset. It was conducted to deter...
详细信息
暂无评论