Filters








17 Hits in 10.7 sec

A Novel Network Intrusion Detection Based on Support Vector Machine and Tent Chaos Artificial Bee Colony Algorithm

Fang-Jun Kuang, Si-Yang Zhang
2017 Journal of network intelligence  
A novel network intrusion detection model by combining support vector machine (SVM) and Tent chaos artificial bee colony algorithm (TCABC) is proposed in the paper.  ...  The experimental results demonstrate that the improved intrusion detection model has higher detection accuracy and faster computational time, and it can also shorten the training time.  ...  In this paper, a novel network intrusion detection model by combining support vector machine (SVM) and Tent chaos artificial bee colony algorithm (TCABC) is proposed.  ... 
dblp:journals/jni/KuangZ17 fatcat:a5t6cmksd5ezvjlpgjjluqodai

A comprehensive survey of sine cosine algorithm: variants and applications

Asma Benmessaoud Gabis, Yassine Meraihi, Seyedali Mirjalili, Amar Ramdane-Cherif
2021 Artificial Intelligence Review  
Sine Cosine Algorithm (SCA) is a recent meta-heuristic algorithm inspired by the proprieties of trigonometric sine and cosine functions.  ...  This paper presents a brief overview of the basic SCA and its variants divided into modified, multi-objective, and hybridized versions.  ...  Other techniques in this class are: Artificial Bee Colony (ABC) Algorithm (Karaboga and Basturk 2007) , Cuckoo Search Algorithm (CS) (Yang and Deb 2009; Shehab et al. 2017) , Firefly Algorithm (FA)  ... 
doi:10.1007/s10462-021-10026-y pmid:34092884 pmcid:PMC8171367 fatcat:moutlepxhvgvbk2arulqyaut6q

A Review of the Modification Strategies of the Nature Inspired Algorithms for Feature Selection Problem

Ruba Abu Abu Khurma, Ibrahim Aljarah, Ahmad Sharieh, Mohamed Abd Abd Elaziz, Robertas Damaševičius, Tomas Krilavičius
2022 Mathematics  
We identified and performed a thorough literature review in three main streams of research lines: Feature selection problem, optimization algorithms, particularly, meta-heuristic algorithms, and modifications  ...  The most widely used hybridization is the one that integrates a classifier with the NIA.  ...  The SI category includes other types of algorithms such as Particle Swarm Optimization (PSO) [24] , Ant Colony Optimization (ACO) [25] , the Artificial Bee Colony (ABC) algorithm [26] , memetic algorithms  ... 
doi:10.3390/math10030464 fatcat:sjg667gilzfktokxxjwdg52jbm

Neural network modeling of a dolphin's sonar discrimination capabilities

Whitlow W. L. Au, Lars N. Andersen, A. René Rasmussen, Herbert L. Roitblat, Paul E. Nachtigall
1995 Journal of the Acoustical Society of America  
The sound field scattered by a smooth thin elastic shell immersed in fluid arises largely from specular reflection and acoustic-membrane coupling, unless both source and observer are located near or on  ...  The speech vectors are then quantized into a determined number of categories using a self-organizing neural network.  ...  Search algorithms based on the optimal generators may find the deepest point in the valley several times faster than algorithms based on other generators.  ... 
doi:10.1121/1.413700 pmid:7608403 fatcat:m3nunzs4wfflhfl27n4shdn2n4

Neural network modeling of a dolphin's sonar discrimination capabilities

Lars N. Andersen, A. René Rasmussen, Whitlow W. L. Au, Paul E. Nachtigall, Herbert Roitblat
1994 Journal of the Acoustical Society of America  
The sound field scattered by a smooth thin elastic shell immersed in fluid arises largely from specular reflection and acoustic-membrane coupling, unless both source and observer are located near or on  ...  The speech vectors are then quantized into a determined number of categories using a self-organizing neural network.  ...  Search algorithms based on the optimal generators may find the deepest point in the valley several times faster than algorithms based on other generators.  ... 
doi:10.1121/1.410770 fatcat:ioiiov6bmjdi7kiflait5dhdfe

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+77 others)
2018 International Journal of Network Security   unpublished
Thus, we survey the previous research of data hiding of compressed images to provide the representative methods and analyze their capacities and bit rates.  ...  Data hiding has been popular over the past decades, and many different methods of the data hiding have been proposed.  ...  Patankar for guidance, helpful discussions and a careful first reading of the manuscript.  ... 
fatcat:l5qol3fgizghrkdel7sgt3qz6q

Influence of statistical surface models on dynamic scattering of high‐frequency signals from the ocean surface

Christian Bjerrum‐Niese, Leif Bjo/rno/
1994 Journal of the Acoustical Society of America  
The sound field scattered by a smooth thin elastic shell immersed in fluid arises largely from specular reflection and acoustic-membrane coupling, unless both source and observer are located near or on  ...  The speech vectors are then quantized into a determined number of categories using a self-organizing neural network.  ...  Search algorithms based on the optimal generators may find the deepest point in the valley several times faster than algorithms based on other generators.  ... 
doi:10.1121/1.411137 fatcat:ajwj7bozxzg6fd27v4xe57drgm

Hyper-Image Network? An Investigation Into The Role Of Text And Image In The Design Of Hypertext Networks With Specific Consideration Of The World Wide Web

Vogelsang, Axel (Autor/in)
2007 Zenodo  
It will be demonstrated that hypertext and specifically the Web to the contrary are still very much text-based environments, strongly built on both the diachronic and synchronic qualities of language and  ...  It compares them to the status quo of design practice particularly in digital media networks such as the Web and reveals fundamental discrepancies between theory and this practice.  ...  , than a writer of a novel.  ... 
doi:10.5281/zenodo.44490 fatcat:osyyga7shrecneu2qfd2exdgly

Poster Abstracts

2009 Integrative and Comparative Biology  
A machine learning algorithm was used to identify sets of genes whose expression was associated with the fish.  ...  We captured twenty-one chickadees from five different sites in London, Ontario, and measured individual reactions to novelty and individual differences in ability to learn a novel foraging task from a  ...  a central timing network (CTN).  ... 
doi:10.1093/icb/icp003 fatcat:ogzq66svibfcjnht5szojhqk3q

Special Issue: Advances in Secure Data Streaming Systems

Fatos Xhafa, Jin Li, Vladi Kolici, Anton Železnikar, Matjaž Gams, Jožef Stefan, Drago Torkar, Jožef Stefan, Juan Carlos, Augusto, Argentina, Vladimir Batagelj (+18 others)
2015 unpublished
Acknowledgment The authors thank the anonymous reviewers for helpful comments and suggestions. This work was funded in part by the U.S. Army under grant #W911NF-11-1-0124.  ...  Long et al proposed network intrusion detection model based on FSVM.They concentrated on automatic detection of network intrusion behavior using FSVM.  ...  The intrusion detection algorithm based on FSVM is implemented by training and testing process.  ... 
fatcat:vvmbxyvcyfccfi3wnl6q2kkfka

A systematic approach for developing agent-based architectural design models of segmented shells : towards autonomously learned goal-oriented agent behaviors [article]

Tobias Schwinn, Universität Stuttgart
2021
Segmented shell design constitutes a novel and promising research area in shell design that has emerged over the last 10 years.  ...  The research pursues and synthesizes two investigative strands: on the one hand, generalizing findings from previously built plate shells as part of a case study-based, inductive research approach, which  ...  Macal [120, p. 127] reports that approaches for modeling the immune system have also inspired agent-based models of intrusion detection for computer networks, and have also found use in modeling the  ... 
doi:10.18419/opus-11633 fatcat:vxhgjrdtenfyvgzzzdjqhodlw4

Post-apocalypse now!

Sophie Publig
2019 unpublished
issues of ecological disasters, exhaustion of resources, and ethical dealings with artificial life.  ...  a case study.  ...  Allen, Nelson 1999 John Allen, Mark Nelson, Biospherics and Biosphere 2, mission one (1991 -1993), in: Ecological Engineering, Vol. 13, 1999.  ... 
doi:10.25365/thesis.58833 fatcat:5u6jn4saxrhbne4c2iaf6rgiz4

Behavioural ecology and advertising practice : an evolutionary approach to consumer engagement within complex networks

Maxwell Scott Amner
2017
The focus on the online world is a recognition of the internet's increasing importance – in general sociocultural terms, and as reflected in advertising practice.  ...  The theoretical approach will draw on insights from a range of disciplines including memetics, semiology and anthropology, as well as cross-disciplinary fields of study such as behavioural ecology.  ...  The same applies with bee hives, as Shirky describes: 'the hive is not part of any individual bee, it is part of the colony, both shaped by and shaping the lives of its inhabitants' (2008: 17).  ... 
doi:10.4225/03/58b75e69d8284 fatcat:way2nl3n5bbsrdujdlfbxqob5a

Album [chapter]

Ruth Rosengarten
2022 Second Chance  
There is a morbid pleasure in saying: 'No, it is not Percival.' I have seen the door open and shut twenty times already; each time the suspense sharpens. This is the place to which he is coming.  ...  of inner chaos.  ...  • oil-based house paint, wax crayon and lead pencil on canvas • wooden broom base, cotton thread • framed photocopies and filing cabinet • latinum, diamond, human teeth • oil, paper, fabric, wood, metal  ... 
doi:10.11647/obp.0285.06 fatcat:j5hgxeisgncwjpqtqw47wth4ke

"It is written": representations of determinism in contemporary popular science writing and contemporary British fiction

Bradon T L Smith, Apollo-University Of Cambridge Repository, Apollo-University Of Cambridge Repository
2011
Although these writers would (and do) deny the validity of genetic determinism, the emphasis on the role of genes and our evolutionary development gives support to the idea of the determining function  ...  I argue that there is a tendency in popular science books on the new physics to emphasise the indeterminacy supposedly implied by those theories, and that a number of recurrent metaphors are integral to  ...  Acknowledgements I would like to take this opportunity to thank my supervisor, David Clifford, for all the insights and comments that have helped to shape this thesis.  ... 
doi:10.17863/cam.16187 fatcat:edognh7vpjatlodlrh5qxuotsq
« Previous Showing results 1 — 15 out of 17 results