This paper investigates the suitability of linear genetic programming (LGP) technique to model efficient intrusion detection systems, while comparing its performance with artificia...
In today’s computing environment, unauthorized accesses and misuse of critical data can be catastrophic to personal users, businesses, emergency services, and even national defe...
Jianfeng Peng, Chuan Feng, Haiyan Qiao, Jerzy W. R...
The state of the art is explored in using soft computing (SC) methods for network intrusion detection, including the examination of efforts in ten specific areas of SC as well as ...
In this paper, we propose an efficient measurement of the eye blinking for drowsy driver detection system that is one of the driver safety systems for the intelligent vehicle. Howe...
We present a distributed vision-based surveillance system. The system acquires and processes grey level images through one or multiple Camera Units monitoring certain area(s) via ...
Xiaojing Yuan, Zehang Sun, Yaakov L. Varol, George...