Sciweavers

725 search results - page 27 / 145
» Intelligent Techniques in Stock Analysis
Sort
View
IEEEIAS
2009
IEEE
14 years 2 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
INFORMATICALT
2006
88views more  INFORMATICALT 2006»
13 years 7 months ago
Improving the Performances of Asynchronous Algorithms by Combining the Nogood Processors with the Nogood Learning Techniques
Abstract. The asynchronous techniques that exist within the programming with distributed constraints are characterized by the occurrence of the nogood values during the search for ...
Ionel Muscalagiu, Vladimir Cretu
ESANN
2004
13 years 9 months ago
Data Mining Techniques on the Evaluation of Wireless Churn
This work focuses on one of the most critical issues to plague the wireless telecommunications industry today: the loss of a valuable subscriber to a competitor, also defined as ch...
Jorge Ferreira, Marley B. R. Vellasco, Marco Aur&e...
CEC
2007
IEEE
13 years 11 months ago
A closed loop stability analysis and parameter selection of the Particle Swarm Optimization dynamics for faster convergence
This paper presents an alternative formulation of the PSO dynamics by a closed loop control system, and analyzes the stability behavior of the system by using Jury's test and ...
Nayan R. Samal, Amit Konar, Swagatam Das, Ajith Ab...
ICTAI
2007
IEEE
14 years 2 months ago
Facial Image Retrieval through Compound Queries Using Constrained Independent Component Analysis
In this work we present a new technique of facial-image retrieval using constrained independent component analysis (cICA). We have employed cICA for the online extraction of those...
Bilal Ahmed, Tahir Rasheed, Young-Koo Lee, Sungyou...