Genetic algorithm for burst detection and activity tracking in ... - UNED
Recommend Documents
2009-09-sunggwa-7 from the Korea Aerospace Research Institute. (KARI) and Brain Korea 21 Project, Korea Advanced Institute of Science and Technology ...
Apr 15, 2016 - International Journal of Control, Automation and Systems ... Dedy Setiawan; Dae Hwan Kim; Hak Kyeong Kim; Sang Bong KimEmail author.
Sep 14, 2015 - Index TermsâConstant false alarm rate, multiple radar system, target detection, target tracking, feedback. I. INTRODUCTION. A. Background ...
consist of IP Camera and NVR. The proposed algorithm consists of two ..... internship program at Arcus IT Inc. located at Ortigas. Center, Pasig City as a web ...
Sep 3, 2018 - Selection and peer-review under responsibility of KES International. ...... [5] C. von Mering, M. Huynen, D. Jaeggi, S. Schmidt, P. Bork, and B.
netic based approach to discover communities in social networks. ..... noted GN) algorithms relative to Normalized Mutual Information for American College ...
I.J. Computer Network and Information Security, 2014, 12, 37-46. Published Online ... routing, data gathering and dissemination, frequent network topology ...
Nov 5, 2007 - The detection of attacks against computer networks is ... innovations for information assurance, it is still very ... technology that monitors network traffic and identifies ..... currently pursuing her Ph.D degree in Network Security.
Jun 27, 2018 - Ayah Atiyah and Sufyan Almajali. 2018. A Traffic Tracking Algorithm for a Fast Detection of Active Network Sources. In ICFNDS'18: International.
Gujarat, India. E-mail:[email protected] input for artificial neural networks (ANNs) to predict crack location and severity in beam like structure and ...
and for the news, movie review and blog domains. The system .... 8 http://www.amitavadas.com/sentiwordnet.php ..... âThe Use of Genetic Programming to Build.
subjectivity classifier based on the feature set identified by natural selection ..... for each theme word in a document is evaluated as follows: where n=number of ...
Jun 29, 2014 - is distributed in nature and run on low power sensor nodes. ... decision making reduces the base station work load. As a ..... and humidity sensors, and so forth. ..... transform uses filter banks for the analysis and synthesis of a.
Dec 2, 2013 - Xi'an Institute of High-Tech, Xi'an 710025, China; E-Mail: ..... with smaller difference and higher degree of symmetry is selected to describe a vehicle. 3. ..... After the vehicle detection process, a correction stage associates the ..
Feb 12, 2009 - technique is to record ocular movements (eye tracking) to analyze various scenarios of .... era), the internal corner of the eye is occluded by the.
encoding the network connection information into rules in IDS. ... the overall implementation an organization's information security policy (Jones and. Sielken, 2000), which reflects an organization's statement by defining the rules and practices ...
ing integration of object detection and tracking for more effective business oriented .... Earlier approaches use simple filters to make a prediction of background ...... Robust and accurate tracking of a deforming, non-rigid and fast moving ...... R
Feb 2, 2000 - ratio of low-band energy to full-band energy, zero-crossing rate, and peakiness measure. key words: voice activity detection, wireless ...
K. Yen, L. Hanzo. Dept. of Electronics and Computer .... d M U D . O ur s i mu l at ion resu lts are p resente d i n Sect ion I V , w h ile Sect i on V conc lu d es the.
Department of Computer Science and Information Engineering, National Chiayi University ..... consider that the BS measur
Department of Computer Science and Information Engineering, National Chiayi University ..... consider that the BS measur
Most of IEEE 802.16e resource allocation proposals only focus on how to allocate the resources to meet QoS parameters such as throughput, delay, and ...
Aug 5, 2009 - 1Islamic University of Technology (IUT), Gazipur-1704, Bangladesh. 2Northern ... interaction have become the subjects of intense focus in recent decades, facial ... Various facial features of human face convey very useful information fo
this paper, we are focusing on genetic algorithm (GA) and data mining based Intrusion ... Keywords - Intrusion Detection System, Genetic algorithm, Data mining, ...
Genetic algorithm for burst detection and activity tracking in ... - UNED
activity tracking in event streams*. Lourdes Araujoi, JosÑe A. Cuesta2 and Juan J. Merelo3. 1Departamento de Sistemas Informvaticos y Programacivon, ...