Sciweavers

3191 search results - page 497 / 639
» Qualitative Modeling in Education
Sort
View
CORR
2010
Springer
149views Education» more  CORR 2010»
13 years 9 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh
CORR
2010
Springer
112views Education» more  CORR 2010»
13 years 9 months ago
Data security in mobile devices by geo locking
In this paper we present a way of hiding the data in mobile devices from being compromised. We use two level data hiding technique, where in its first level data is encrypted and ...
M. Prabu Kumar, K. Praneesh Kumar Yadav
CORR
2010
Springer
160views Education» more  CORR 2010»
13 years 9 months ago
PCA 4 DCA: The Application Of Principal Component Analysis To The Dendritic Cell Algorithm
As one of the newest members in the field of artificial immune systems (AIS), the Dendritic Cell Algorithm (DCA) is based on behavioural models of natural dendritic cells (DCs). U...
Feng Gu, Julie Greensmith, Robert Oates, Uwe Aicke...
CORR
2010
Springer
47views Education» more  CORR 2010»
13 years 9 months ago
Lower bounds for the error decay incurred by coarse quantization schemes
Several analog-to-digital conversion methods for bandlimited signals used in applications, such as quantization schemes, employ coarse quantization coupled with oversampling. The...
Felix Krahmer, Rachel Ward
CORR
2010
Springer
220views Education» more  CORR 2010»
13 years 9 months ago
Multichannel Sampling of Pulse Streams at the Rate of Innovation
We consider minimal-rate sampling schemes for streams of delayed and weighted versions of a known pulse shape. Such signals belong to the class of finite rate of innovation (FRI) m...
Kfir Gedalyahu, Ronen Tur, Yonina C. Eldar