A Study on Swarm Intelligence Techniques in Intrusion Detection
... Among the discovered rules the best one is selected and augmented to the discovered rules. This is done iteratively until a large base of rules is constructed which can be later on used in test sets as criteria for classifying network connections into intrusive or normal. The experimental results sh ...
... Among the discovered rules the best one is selected and augmented to the discovered rules. This is done iteratively until a large base of rules is constructed which can be later on used in test sets as criteria for classifying network connections into intrusive or normal. The experimental results sh ...
CSE 5290: Artificial Intelligence
... derived from simple propositions elicited in session 1. LES represents the likelihood with three modalities, probability, certainty factors, and natural languages. The subjects are chose from Oak Ridge National Laboratory and University of Tennessee, Knoxville. The proposition are from three fields, ...
... derived from simple propositions elicited in session 1. LES represents the likelihood with three modalities, probability, certainty factors, and natural languages. The subjects are chose from Oak Ridge National Laboratory and University of Tennessee, Knoxville. The proposition are from three fields, ...
Beyond AI: Artificial Dreams
... The contrast between desires and dummy-desires cannot be translated into matter of competing desires. The same goes for reducing it into other distinctions such as e.g., first-order and second-order desires, goals and subgoals, etc. Dummy-desires are not weaker versions of desires; dummy-desires are ...
... The contrast between desires and dummy-desires cannot be translated into matter of competing desires. The same goes for reducing it into other distinctions such as e.g., first-order and second-order desires, goals and subgoals, etc. Dummy-desires are not weaker versions of desires; dummy-desires are ...
Recognising Affect in Text using Pointwise
... Research in the area of affect recognition in text is currently rooted in the exploitation of human-supplied knowledge of emotion. Since the nature of affect is inherently ambiguous (both in terms of the affect classes and the natural language words that represent them), some researchers have electe ...
... Research in the area of affect recognition in text is currently rooted in the exploitation of human-supplied knowledge of emotion. Since the nature of affect is inherently ambiguous (both in terms of the affect classes and the natural language words that represent them), some researchers have electe ...
Computational Intelligence in Intrusion Detection System
... proposed NID models shows the models advantages of enhancing the detection accuracy and testing speed by reducing the feature dimension space. Also, it propose and validate a new feature selection approach ”Bi-Layer behavioral-based feature selection approach”, which depends on the behavior of the c ...
... proposed NID models shows the models advantages of enhancing the detection accuracy and testing speed by reducing the feature dimension space. Also, it propose and validate a new feature selection approach ”Bi-Layer behavioral-based feature selection approach”, which depends on the behavior of the c ...
A Stochastic Algorithm for Feature Selection in Pattern Recognition
... discriminant properties . In a recent work of Fleuret (2004), the author suggests to use mutual information to recursively select features and obtain performance as good as that obtained with a boosting algorithm (Friedman et al., 2000) with fewer variables. Weston et al. (2000) and Chapelle et al. ...
... discriminant properties . In a recent work of Fleuret (2004), the author suggests to use mutual information to recursively select features and obtain performance as good as that obtained with a boosting algorithm (Friedman et al., 2000) with fewer variables. Weston et al. (2000) and Chapelle et al. ...
Knowledge Based System and Database Management System: An
... Hierarchical and network models are frequently considered as a single class of data models since they are based on similar modeling concepts (King & McLeod, 1985). Also, there is very little research in the KBMS field relating to these two models to actually differentiate them. Hence, we have chosen ...
... Hierarchical and network models are frequently considered as a single class of data models since they are based on similar modeling concepts (King & McLeod, 1985). Also, there is very little research in the KBMS field relating to these two models to actually differentiate them. Hence, we have chosen ...
The Twins Corpus of Museum Visitor Questions
... mispronunciations, and repetitions. 2. Speech is coming mainly from children. 3. There are no vocabulary constraints. The above characteristics make the corpus an ideal testbed for speech recognition research. Automatic recognition of the handlers’ speech using speaker-adapted models is significantl ...
... mispronunciations, and repetitions. 2. Speech is coming mainly from children. 3. There are no vocabulary constraints. The above characteristics make the corpus an ideal testbed for speech recognition research. Automatic recognition of the handlers’ speech using speaker-adapted models is significantl ...
Impossibles AIBO Four-Legged Team Description Paper
... 4-legged league, agents have to have interactions with several physical objects, e.g. the orange ball. This interaction is typically implemented as a perception-action loop. AIBO Robots are equipped with sensors that perceive physical characteristics of the environment and they use these percepts to ...
... 4-legged league, agents have to have interactions with several physical objects, e.g. the orange ball. This interaction is typically implemented as a perception-action loop. AIBO Robots are equipped with sensors that perceive physical characteristics of the environment and they use these percepts to ...
A hybrid case-based reasoning and neural network approach to
... related applications [1]. Traditionally, case-based reasoning (CBR) [2-9] has been successfully applied to fault diagnosis for customer service support or help desk. CBR systems rely on building a large repository of diagnostic cases (or past service reports) in order to circumvent the difficult tas ...
... related applications [1]. Traditionally, case-based reasoning (CBR) [2-9] has been successfully applied to fault diagnosis for customer service support or help desk. CBR systems rely on building a large repository of diagnostic cases (or past service reports) in order to circumvent the difficult tas ...
CS437
... solve it and fail in rather unpredictable ways. n Heuristic rules represent knowledge in abstract form and lack even basic understanding of the domain area. It makes the task of identifying incorrect, incomplete or inconsistent knowledge difficult. n Expert systems, especially the first generation, ...
... solve it and fail in rather unpredictable ways. n Heuristic rules represent knowledge in abstract form and lack even basic understanding of the domain area. It makes the task of identifying incorrect, incomplete or inconsistent knowledge difficult. n Expert systems, especially the first generation, ...
Advanced Research into AI Ising Computer (PDF format, 212KB)
... obtain a roughly optimal combination of parameters. Unfortunately, as the number of parameters increases, finding even an approximate solution becomes difficult. Furthermore, semiconductor scaling has enabled the computational methods used in the past to deal with larger problems by improving the pe ...
... obtain a roughly optimal combination of parameters. Unfortunately, as the number of parameters increases, finding even an approximate solution becomes difficult. Furthermore, semiconductor scaling has enabled the computational methods used in the past to deal with larger problems by improving the pe ...
Computational Intelligence: Neural Networks and
... ANN [15]. First, it can perform more complex tasks than any of its components (i.e., individual ANNs in the ensemble). Second, it can make the overall system easier to understand and modify. Finally, it is more robust than a monolithic ANN, and can show graceful performance degradation in situations ...
... ANN [15]. First, it can perform more complex tasks than any of its components (i.e., individual ANNs in the ensemble). Second, it can make the overall system easier to understand and modify. Finally, it is more robust than a monolithic ANN, and can show graceful performance degradation in situations ...
A Review of Class Imbalance Problem
... and data mining. It aims to select important features that improve the accuracy and performance of the classifier. High dimensional data and irrelevant features may reduce the performance of the classifier and increase the misclassification rate especially in imbalance data sets [4], [5]. Feature se ...
... and data mining. It aims to select important features that improve the accuracy and performance of the classifier. High dimensional data and irrelevant features may reduce the performance of the classifier and increase the misclassification rate especially in imbalance data sets [4], [5]. Feature se ...
Intelligent User Interfaces for Ubiquitous Computing
... goals, e.g., being an understandable and enjoyable assistant for some user task, we do not need any system but can make up a fake system without bothering with how to build a real one. A number of methods can be used (Dix et al., 1998; Shneiderman, 1997): Design sketches: Instead of actually buildin ...
... goals, e.g., being an understandable and enjoyable assistant for some user task, we do not need any system but can make up a fake system without bothering with how to build a real one. A number of methods can be used (Dix et al., 1998; Shneiderman, 1997): Design sketches: Instead of actually buildin ...
New Trends in Intelligent Systems and Soft Computing Towards and
... interactions and “bouncing ideas” off other people. Seminar on New Trends in Intelligent Systems and Soft Computing October 2-3.2003, Granada, Spain ...
... interactions and “bouncing ideas” off other people. Seminar on New Trends in Intelligent Systems and Soft Computing October 2-3.2003, Granada, Spain ...
PDF
... SIGCHI, its CHI conference, and the journals Human Computer Interaction, ACM Transactions on Computer-Human Interaction, and Interacting with Computers. Other threads of HCI research appear in human factors and ergonomics, management information systems, and information science. They are part of the ...
... SIGCHI, its CHI conference, and the journals Human Computer Interaction, ACM Transactions on Computer-Human Interaction, and Interacting with Computers. Other threads of HCI research appear in human factors and ergonomics, management information systems, and information science. They are part of the ...
Artificial Intelligence in Network Intrusion Detection
... and/or software. It is an academic field of study which studies the goal of creating intelligence. The central problems (or goals) of AI research include reasoning, knowledge representation, automated planning and scheduling, ML, natural language processing, computer vision, robotics and general int ...
... and/or software. It is an academic field of study which studies the goal of creating intelligence. The central problems (or goals) of AI research include reasoning, knowledge representation, automated planning and scheduling, ML, natural language processing, computer vision, robotics and general int ...