In order to well solve the phase-only reconfigurable arrays synthesis problems, we introduce an adaptive strategy in invasive weed optimization (IWO), and integrate the adaptive IWO (AIWO) into the framework of MOEA/D...
详细信息
Traditional Naive Bayesian classification model does not consider the feature redundancy in intrusion forensics and neglects the difference between data attributes in different intrusion actions. This paper proposed a...
详细信息
Traditional Naive Bayesian classification model does not consider the feature redundancy in intrusion forensics and neglects the difference between data attributes in different intrusion actions. This paper proposed a Naive Bayesian network intrusion detection algorithm based on the principal component analysis, it calculate the characteristic value of the original network attack data, then extract the main properties through the principal component analysis. Take the main properties as the new attribute set and the corresponding principal component contribution rate as weights to improve traditional Naive Bayesian classification algorithm. The experimental results showed that the algorithm can effectively reduce the data dimension and improve the efficiency of detection.
This note presents the sub-optimal linear-quadratic controller for a discretetime system with multiple control input delays. Sub-optimality of the solution is designed in two steps. First, a delay-free transformed sys...
详细信息
Web spam has emerged to be a critical problem in web search. Unfortunately, single classifiers always perform poorly on imbalanced web spam data sets. For better solving these problems, a nested Rotation Forest struct...
详细信息
In order to overcome the shortcoming of the static threshold and the problem of the false reports, the method of double filtering topic tracking based on Kullback-Leibler divergence is put forward. In this method, it ...
详细信息
In order to overcome the shortcoming of the static threshold and the problem of the false reports, the method of double filtering topic tracking based on Kullback-Leibler divergence is put forward. In this method, it uses the KL divergence to obtain the initial threshold and the candidate reports. Then, depending on the time characteristics of reports, it studies dynamic threshold method. Finally, it extracts named entities of the reports to calculate similarity of named entities, which completes topic tracking. The experiments prove the feasibility of the algorithm and improves the efficiency of the topic tracking to a certain extent. In addition, it reduces the false negative rate and the false alarm rate.
As an important branch in the field of frequent pattern mining, approximate frequent pattern (AFP) mining attracts much attention recently. Various algorithms have been proposed to discover long true AFPs in presence ...
详细信息
ISBN:
(纸本)9781467383165
As an important branch in the field of frequent pattern mining, approximate frequent pattern (AFP) mining attracts much attention recently. Various algorithms have been proposed to discover long true AFPs in presence of random noise. This paper considers the key issues of AFP mining in noisy databases, and categorizes the previous approaches according to the ways they cope with missing items in the transactions. And then a study of different data models on AFP is presented, in which the merits and defects are analyzed. Finally, we draw a conclusion and propose some solutions to deal with the problems in the field of AFP mining.
Reconstruction Method of Network Forensics Scenario has grown into a mature and rich technology that provides advanced skills to get the chain of evidence. Using statistical methods to analyze intrusion logs in order ...
详细信息
Reconstruction Method of Network Forensics Scenario has grown into a mature and rich technology that provides advanced skills to get the chain of evidence. Using statistical methods to analyze intrusion logs in order to present evidentiary values in court are often refuted as baseless and inadmissible evidences which is not considering the input spent. These spendings is to generate the reports no matter they are well-grounded evidences or not. Thus, this paper presents the Scenario Reconstruction Method combines the Viterbi algorithm, the most likely sequence of Meta evidence which replaces the Meta evidence was acquired. With suspected evidence, thus obtaining the chain of evidence. However, the Viterbi algorithm parameters is derived from the Baum-Welch (B-W) algorithm, and the B-W algorithm is easy to fall into local optima solution. While an Adaptive Genetic Algorithm (AGA) is used to estimate parameters of the Hidden Markov model (HMM), where Chromosome coding method and genetic operation mode are designed. The experimental results show that, this method can accurately reproduce the crime scene of network intrusion, compared with the network forensic evidence fusion method which is based on the HMM. The method has been applied to forensics system, and has obtained good result.
On the problem of data quantity in anomaly detection, traditional dendritic cell algorithms should be improved by proposing an antigen data preprocessing method which introduced suspected abnormal base. The abnormal d...
详细信息
Many researchers have been attracted in personalized recommendation which is considered as one of the most effective methods to solve the problem of information overloading. We propose a hybrid collaborative filtering...
详细信息
We present a visualization-based knowledge expression approach for virtual educational system in this paper. Our method allows teachers and students to understand complex algorithms and procedures more intuitively and...
详细信息
暂无评论