Nowadays Intrusion Detection systems plays very important role in Network security. With the growing use of internet, the possibility of being attacked is also increasing. People are using signature based IDS's an...
详细信息
ISBN:
(纸本)9781849198462
Nowadays Intrusion Detection systems plays very important role in Network security. With the growing use of internet, the possibility of being attacked is also increasing. People are using signature based IDS's and all other type of IDS's which are basically used to detect intrusion and as well as prevent the systems from them in all aspects. The advantages of using knowledge management techniques in information security have been already identified by some researchers, however, little has been done to enable security technologies with them Detecting the attacks as well as maintaining a secured environment in the network by having a complete knowledge about the system and detecting attacks using a signature based technique would helps us to deploy the same for our future use. In this technique, we have used Snort (a signature based detection tool and created ontology for DoS attacks to help in prevention techniques.
In this study, analyzes were performed to detection of cyberbullying by Artificial Neural Network (ANN) based classifiers. In contrast to the general classifiers used in the detection of cyberbullying in the literatur...
详细信息
A novel reversible binary image data hiding scheme using run-length (RL) histogram modification is presented in this paper. The binary image is scanned from left to right and from top to bottom to form a sequence of a...
详细信息
A new parallel processing system has been proposed, and a prototype model of the system has been constructed. It is designed to perform parallel vector operations at maximum efficiency. In addition, it can also handle...
详细信息
This paper presents the findings of an exploratory study comparing two of Brain-computer Interface approaches, P300 and Motor Imagery, with EEG signals acquired using the Emotiv Neuroheadset. It was conducted to deter...
详细信息
In this paper, we compare the face recognition performance for five different methods with using only one training sample. Firstly, we investigate the Singular Value Decomposition (SVD) Of the face image and propose a...
详细信息
ISBN:
(纸本)7810778021
In this paper, we compare the face recognition performance for five different methods with using only one training sample. Firstly, we investigate the Singular Value Decomposition (SVD) Of the face image and propose an augmenting algorithm via using only one sample to generate a group of training samples. Then we implement the methods Of face recognition with Discrete Cosine Transform (DCT) and Two Dimensional Principal Component Analysis (2DPCA). Secondly, we implement face recognition approach via DCT directly with one training sample. Thirdly, we primarily use DCT to generate some low-frequency matrices in frequency domain and then converted into the spatial domain as .independent training images. Then, 2DPCA will be used for face recognition. Finally, we use DCT to generate some low-frequency matrices in frequency domain and use DCT to do face recognition. Experiments on the AMP and Yale face database show that the approach DCT+2DPCA produces better results on the AMP database. The approach SVD+2DPCA produces better result on Yale database.
The proposed ABA scheme uses the queue occupancy as a feedback to adaptively allocate the bandwidth for each queue of EF PHB. Because the allocated bandwidth converges to the corresponding input traffic, ABA remains t...
详细信息
One of the main characteristics of the peer-to-peer systems is the highly dynamic nature of the users present in the system. In such a rapidly changing enviroment, end-user guarantees become hard to handle. In this pa...
详细信息
Early dementia detection is a crucial but challenging task in Bangladesh. Often, dementia is not recognized until it is too late to receive effective care. This results in part from a lack of knowledge about the illne...
详细信息
This paper presents a new active learning paradigm which considers not only the uncertainty of the classifier but also the diversity of the corpus. The two measures for uncertainty and diversity were combined using th...
详细信息
暂无评论