期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Intrusion Detection Using Ensemble Wrapper Filter Based Feature Selection with Stacking Model
1
作者 D.Karthikeyan V.Mohan Raj +1 位作者 J.Senthilkumar Y.Suresh 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期645-659,共15页
The number of attacks is growing tremendously in tandem with the growth of internet technologies.As a result,protecting the private data from prying eyes has become a critical and tough undertaking.Many intrusion dete... The number of attacks is growing tremendously in tandem with the growth of internet technologies.As a result,protecting the private data from prying eyes has become a critical and tough undertaking.Many intrusion detection solutions have been offered by researchers in order to decrease the effect of these attacks.For attack detection,the prior system has created an SMSRPF(Stacking Model Significant Rule Power Factor)classifier.To provide creative instance detection,the SMSRPF combines the detection of trained classifiers such as DT(Decision Tree)and RF(Random Forest).Nevertheless,it does not generate any accuratefindings that are adequate.The suggested system has built an EWF(Ensemble Wrapper Filter)feature selection with SMSRPF classifier for attack detection so as to overcome this problem.The UNSW-NB15 dataset is used as an input in this proposed research project.Specifically,min–max normalization approach is used to pre-process the incoming data.The feature selection is then carried out using EWF.Based on the selected features,SMSRPF classifiers are utilized to detect the attacks.The SMSRPF is integrated with the trained classi-fiers such as DT and RF to create creative instance detection.After that,the testing data is classified using MCAR(Multi-Class Classification based on Association Rules).The SRPF judges the rules correctly even when the confidence and the lift measures fail.Regarding accuracy,precision,recall,f-measure,computation time,and error,the experimental findings suggest that the new system outperforms the prior systems. 展开更多
关键词 Intrusion detection system(IDS) ensemble wrapperfilter(EWF) stacking model with significant rule power factor(SMSRPF) classifier
下载PDF
Application of an expert system using neural network to control the coagulant dosing in water treatment plant 被引量:3
2
作者 HangZHANG 《控制理论与应用(英文版)》 EI 2004年第1期89-92,共4页
The coagulation process is one of the most important stages in water treatment plant, which involves many complex physical and chemical phenomena. Moreover, coagulant dosing rate is non-linearly correlated to raw wate... The coagulation process is one of the most important stages in water treatment plant, which involves many complex physical and chemical phenomena. Moreover, coagulant dosing rate is non-linearly correlated to raw water characteristics such as turbidity, conductivity, PH, temperature, etc. As such, coagulation reaction is hard or even impossible to control satisfactorily by conventional methods. Based on neural network and rule models, an expert system for determining the optimum chemical dosage rate is developed and used in a water treatment work, and the results of actual runs show that in the condition of satisfying the demand of drinking water quality, the usage of coagulant is lowered. 展开更多
关键词 Water treatment Process control Expert system Neural network rule models
下载PDF
Hydraulic metal structure health diagnosis based on data mining technology 被引量:3
3
作者 Guang-ming Yang Xiao Feng Kun Yang 《Water Science and Engineering》 EI CAS CSCD 2015年第2期158-163,共6页
In conjunction with association rules for data mining, the connections between testing indices and strong and weak association rules were determined, and new derivative rules were obtained by further reasoning. Associ... In conjunction with association rules for data mining, the connections between testing indices and strong and weak association rules were determined, and new derivative rules were obtained by further reasoning. Association rules were used to analyze correlation and check consistency between indices. This study shows that the judgment obtained by weak association rules or non-association rules is more accurate and more credible than that obtained by strong association rules. When the testing grades of two indices in the weak association rules are inconsistent, the testing grades of indices are more likely to be erroneous, and the mistakes are often caused by human factors. Clustering data mining technology was used to analyze the reliability of a diagnosis, or to perform health diagnosis directly. Analysis showed that the clustering results are related to the indices selected, and that if the indices selected are more significant, the characteristics of clustering results are also more significant, and the analysis or diagnosis is more credible. The indices and diagnosis analysis function produced by this study provide a necessary theoretical foundation and new ideas for the development of hydraulic metal structure health diagnosis technology. 展开更多
关键词 Hydraulic metal structure Health diagnosis Data mining technology Clustering model Association rule
下载PDF
The Rule of Law Model of Internet Governance 被引量:1
4
作者 Xu Hanming Zhang Xinping 《Social Sciences in China》 2019年第3期135-151,共17页
The rule of law is the basic form of national governance and the rule of law model is the necessary direction for the governance of online society.Online society is in essence a new pattern of social relationships and... The rule of law is the basic form of national governance and the rule of law model is the necessary direction for the governance of online society.Online society is in essence a new pattern of social relationships and structural forms comprising relationships among citizens,legal persons,organizational bodies,etc.,formed and brought together on the basis of Internet technology;and also a reflection,expansion and expression,singly or in synthesis,of various relationships in the fields of the real economy,politics,culture,society and the environment.The rule of law model of Internet governance refers to governance theories,systems and practices that employ rule of law thinking and the rule of law model to bring the elements,structures,procedures and functions of Internet governance into the scope of the rule of law and its operational track.Reviewing the tortuous course of the development of rule of law Internet governance in China,summarizing useful experience in the construction of rule of law Internet governance,and reflecting on existing legislative,law enforcement and judicial dilemmas will enable us to build up a rule of law system of online governance with comprehensive norms,effective implementation,strict supervision and strong guarantees.This will be marked by Chinese characteristics and will ensure the application of rule of law thinking and the rule of law model in governing,operating,using and safeguarding the Internet,thus achieving sound and orderly Internet operation and development along the path of the rule of law and advancing the modernization of the Internet governance system and governance capability. 展开更多
关键词 online society rule of law model Internet governance rule of law governance
原文传递
Bangla language modeling algorithm for automatic recognition of hand-sign-spelled Bangla sign language
5
作者 Muhammad Aminur RAHAMAN Mahmood JASIM +1 位作者 Md.Haider ALI Md.HASANUZZAMAN 《Frontiers of Computer Science》 SCIE EI CSCD 2020年第3期45-64,共20页
Because of using traditional hand-sign segmentation and classification algorithm,many diversities of Bangla language including joint-letters,dependent vowels etc.and representing 51 Bangla written characters by using ... Because of using traditional hand-sign segmentation and classification algorithm,many diversities of Bangla language including joint-letters,dependent vowels etc.and representing 51 Bangla written characters by using only 36 hand-signs,continuous hand-sign-spelled Bangla sign language(BdSL)recognition is challenging.This paper presents a Bangla language modeling algorithm for automatic recognition of hand-sign-spelled Bangla sign language which consists of two phases.First phase is designed for hand-sign classification and the second phase is designed for Bangla language modeling algorithm(BLMA)for automatic recognition of hand-sign-spelled Bangla sign language.In first phase,we have proposed two step classifiers for hand-sign classification using normalized outer boundary vector(NOBV)and window-grid vector(WGV)by calculating maximum inter correlation coefficient(ICC)between test feature vector and pre-trained feature vectors.At first,the system classifies hand-signs using NOBV.If classification score does not satisfy specific threshold then another classifier based on WGV is used.The system is trained using 5,200 images and tested using another(5,200×6)images of 52 hand-signs from 10 signers in 6 different challenging environments achieving mean accuracy of 95.83%for classification with the computational cost of 39.972 milliseconds per frame.In the Second Phase,we have proposed Bangla language modeling algorithm(BLMA)which discovers all"hidden characters"based on"recognized characters"from 52 hand-signs of BdSL to make any Bangla words,composite numerals and sentences in BdSL with no training,only based on the result of first phase.To the best of our knowledge,the proposed system is the first system in BdSL designed on automatic recognition of hand-sign-spelled BdSL for large lexicon.The system is tested for BLMA using hand-sign-spelled 500 words,100 composite numerals and 80 sentences in BdSL achieving mean accuracy of 93.50%,95.50%and 90.50%respectively. 展开更多
关键词 Bangla sign language(BdSL) hand-sign CLASSIFICATION Bangla language modeling rules(BLMR) Bangla language modeling algorithm(BLMA)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部