A network intrusion detection system based on adaptive resonance theory (ARTNIDS) is put forward. It detects network intrusions by using anomaly-based detection method. Since the heads of network datagrams include alm...
详细信息
A network intrusion detection system based on adaptive resonance theory (ARTNIDS) is put forward. It detects network intrusions by using anomaly-based detection method. Since the heads of network datagrams include almost all the control information and all datagrams can be caught through an efficient method, the description of network behavior relies upon the datagrams. The advantage of adaptive resonance theory ensures that ARTNIDS can study in real time and in an unsupervised way, which is essential to anomaly-based detection. The modified adaptive resonance theory algorithm improves the efficiency of studying and the datagram missing rate has been reduced from 15% to 10%. A similar Hamming distance method is adopted in the detection, which is effective in reducing false positive errors and false negative errors;the error rate is less than 10%. The experimental results show that the intrusion detection system based on adaptive resonance theory can detect intrusion behavior in local area network accurately.
This paper presents a new model to incorporate decision theory into Graphplan framework, which enables our planner to handle uncertainty and make decision to choose the optimal one among a set of hypothesis valid plan...
详细信息
This paper presents a new model to incorporate decision theory into Graphplan framework, which enables our planner to handle uncertainty and make decision to choose the optimal one among a set of hypothesis valid plans. This planer, called UTDP is tested on several experimental domains. And the experimental results show that UTGP is sound and efficient and performs better than the famous probabilistic planner Buridan.
Cheng and Church algorithm is an important approach in biclustering algorithms. In this paper, the process of the extended space in the second stage of Cheng and Church algorithm is improved and the selections of two ...
详细信息
Cheng and Church algorithm is an important approach in biclustering algorithms. In this paper, the process of the extended space in the second stage of Cheng and Church algorithm is improved and the selections of two important parameters are discussed. The results of the improved algorithm used in the gene expression spectrum analysis show that, compared with Cheng and Church algorithm, the quality of clustering results is enhanced obviously, the mining expression models are better, and the data possess a strong consistency with fluctuation on the condition while the computational time does not increase significantly.
In this paper, a relatively flexible filter called extended bilateral filter is proposed, by which some particular filters can be designed via selecting an appropriate pixel of interest (POI) and defining a kernel for...
详细信息
In this paper, a relatively flexible filter called extended bilateral filter is proposed, by which some particular filters can be designed via selecting an appropriate pixel of interest (POI) and defining a kernel for the filter according to some specified requirements. Based on the filter, a fluorescein-angiogram-oriented filter, high-intensity preserving (HIP) filter is introduced to solve the problems of high-intensity preservation when denoising. The results of the experiments show that the HIP filter has the ability of noise suppression, and the ability of high-intensity preservation, which can keep the intensities of bright pixels from degrading via distributing the weights adaptively according to the location and the intensity of each pixel.
In this paper, a novel filter model called extended adaptive weighted averaging (EAWA) filter model is proposed, by which some particular filters can be designed via selecting an appropriate pixel of interest (POI) an...
详细信息
ISBN:
(纸本)076952432X
In this paper, a novel filter model called extended adaptive weighted averaging (EAWA) filter model is proposed, by which some particular filters can be designed via selecting an appropriate pixel of interest (POI) and defining a weight distribution function for the filter according to some specified requirements. Based on the novel model, a fluorescein-angiogram-oriented filter, high-intensity preserving (HIP) filter is introduced to solve the problems of high-intensity preservation when filtering noise. The results of the experiments show that the HIP filter has the features of frame-averaging, which can achieve noise suppression efficiently, and the features of high-intensity preservation, which can keep the intensities of bright pixels from degrading via distributing the weights adoptively according to the intensity of each pixel
The traditional RBAC model already cannot express the complicated secure access control constraint of the workflow. Based on the traditional RBAC model, a new conditioned RBAC model named as CMWRBSAC is proposed on th...
详细信息
The traditional RBAC model already cannot express the complicated secure access control constraint of the workflow. Based on the traditional RBAC model, a new conditioned RBAC model named as CMWRBSAC is proposed on the basis of multi-weighted roles. A conditioned RBAC strategy is discussed on the basis of dynamic role assignment. A new concept of workflow access authorization is defined on the basis of roles with multi-weights, including the hierarchy weight, the degree weight and the sequence weight. Furthermore, in order to solve the problems of the sequence constraint of cooperative activating task by multi-roles and multi-users, a sort algorithm based on token and a sort algorithm based on weighted roles synthesis are presented respectively. Finally, an example is given to show the work processes of these algorithms. This model can express complicated workflow secure access control constraint.
A new method is presented for robustly estimating fundamental matrix from matched points. The method comprises two parts. The first uses a robust technique - the random sample consensus (RANSAC) to discard outliers in...
详细信息
A new method is presented for robustly estimating fundamental matrix from matched points. The method comprises two parts. The first uses a robust technique - the random sample consensus (RANSAC) to discard outliers in an initial set of matched points. It adopts the sampling strategy to generate inliers from the initial set. The second part of the method is an algorithm for computing fundamental matrix, using the output of the RANSAC. This algorithm is based on the consistent fundamental matrix estimation in a quadratic measurement error model. An extended system for determining the estimator is proposed, and an efficient implementation for solving the system - a continuation method is developed. The proposed algorithm avoids solving total eigenvalue problems. Results for both synthetic and real images show the effectiveness of the proposed method.
In this article, we investigate the problem of preparing qualitative spatial relations before implementing spatial data mining by checking consistency in a constraint network, which includes topological and cardinal d...
详细信息
In this article, we investigate the problem of preparing qualitative spatial relations before implementing spatial data mining by checking consistency in a constraint network, which includes topological and cardinal directional relations between pairs of spatial objects. We aim to explore potential spatial relations and possible inconsistency among the data of relationships for enforcing the correctness of spatial data mining. This task is carried out through qualitative spatial reasoning method, specifically consistency checking. We try to lay the theoretical foundation for this kind of problem. Instead of using conventional composition tables, we investigate the interactions between topological and cardinal directional relations with the aid of rules. These rules are shown to be sound, i.e. the deductions are logically correct. Based on these rules, an improved constraint propagation algorithm is introduced to enforce the path consistency. An example is presented to show the utility of these rules.
Fourier-Mellin transform (FMT) is frequently used in content-based image retrieval and digital image watermarking. This paper extends the application of FMT into image registration and proposes an improved registratio...
详细信息
ISBN:
(纸本)076952432X
Fourier-Mellin transform (FMT) is frequently used in content-based image retrieval and digital image watermarking. This paper extends the application of FMT into image registration and proposes an improved registration algorithm based on FMT for the alignment of images differing in translation, rotation angle, and uniform scale factor. The proposed algorithm can eliminate the conversion from Cartesian to log-polar coordinates, avoid the process of interpolation required in the conversion, and obtain a more significant improvement than the conventional method using cross-correlation. Experiments show that the algorithm is accurate and robust regardless of white noise
It is well recognized that sequential pattern mining plays an essential role in many scientific and business domains. In this paper, a new extension of sequential pattern, attributes' sequential pattern, is propos...
详细信息
It is well recognized that sequential pattern mining plays an essential role in many scientific and business domains. In this paper, a new extension of sequential pattern, attributes' sequential pattern, is proposed. An attributes' sequential pattern is a sequence of attributes, whose values commonly occur in ascending order over data set. After each record in data set is transformed into an attributes' sequence according to their ordinal values, attributes' sequential patterns can be mined by means of mining sequential patterns. But our work is different from sequential pattern mining. One use of attributes' sequential patterns is to identify possible errors in data set for data cleaning, in which the values of attributes break the attributes' sequential patterns which most of the data conform to. Experiments verify the high efficiency of the method presented.
暂无评论