GlobalView

Showing items 1 - 15 of 57.

Add to Quick Collection   All 57 Results

Sort:
 Add All Items to Quick Collection
Date: 2008
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.13/1057735
Description: Malicious code is a threat to computer systems globally. In this paper, we outline the evolution of malicious code attacks. The threat is evolving, leaving challenges for attackers to improve attack t... More
Reviewed: Reviewed
Date: 2008
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.13/1057530
Description: Naive Bayes has been widely used in the field of machine learning research for many years. While it is fast and easy to implement, its performance in comparison to other machine learning methods is no... More
Reviewed: Reviewed
Date: 2008
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.13/1057714
Description: An open research question in malware detection is how to accurately and reliably distinguish a malware program from a benign one, running on the same machine. In contrast to code signatures, which are... More
Reviewed: Reviewed
Date: 2008
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.13/1057699
Description: Peripheral arterial disease (PAD) affects 10-25% of people over the age of 55. It contributes to foot amputation, morbidity and mortality. Accurate and early diagnosis can lessen this public health bu... More
Reviewed: Reviewed
Date: 2008
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.13/1057717
Description: The intrusion detection system is one of the security defense tools for computer networks. In recent years this research has lacked in direction and focus. In this paper we present a survey on the rec... More
Reviewed: Reviewed
Date: 2008
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.13/1057729
Description: The Job-Shop Scheduling Problem (JSSP) is considered as one of the difficult combinatorial optimization problems and treated as a member of NP-complete problem class. In this paper, we consider JSSPs ... More
Reviewed: Reviewed
Creators: Xu, M | Park, M | Luo, S | Jin, JS
Date: 2008
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.13/45171
Description: Due to the wide viewer-ship and high commercial potentials, recently, sports video analysis attracts extensive research efforts. One of the main tasks in sports video analysis is to identify sports ge... More
Full Text: Full Text
Reviewed: Reviewed
Image Thumbnail
Date: 2008
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.13/1057533
Description: The cutting stock problem (CSP) is a combinatorial optimisation problem that involves cutting large stock sheets into smaller pieces. It has attracted vast attention along the years due to its applica... More
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.13/1052327
Description: Air-fuel ratio control is a challenging control problem for port-fuel-injected and throttle-body-fuel-injected spark ignition (SI) engines, since the dynamics of air manifold and fuel injection of the... More
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.13/1051883
Description: This paper considers the important problem of efficient allocation of available resources (such as radio spectrum and power) in orthogonal frequency-division multiple-access (OFDMA)-based multicast wi... More
Reviewed: Reviewed
Date: 2010
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.13/1057685
Description: Gene Regulatory Network (GRN) is an abstract mapping of gene regulations in living cells that can help to predict the system behavior of living organisms. In this research, we use a model based infere... More
Reviewed: Reviewed
Date: 2010
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.13/1057688
Description: A biclustering algorithm named ROBA has been used in a number of recent works. We present a time and space efficient implementation of ROBA that reduces the time and space complexity by an order of L ... More
Reviewed: Reviewed
Date: 2010
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.13/1057539
Description: Data mining is an important process, with applications found in many business, science and industrial problems. While a wide variety of algorithms have already been proposed in the literature for clas... More
Reviewed: Reviewed
Date: 2010
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.13/1057682
Description: Population structuring is used in cellular evolutionary algorithms (cEAs) as an effective means of controlling the selection pressure and thereby the exploration/exploitation tradeoff of the algorithm... More
Reviewed: Reviewed
Date: 2010
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.13/1057624
Description: In this paper, we present a new selection scheme, Polynomial Selection, that has wide range of selective pressure and is adjustable by only two parameters. In order to create an adaptive algorithm tha... More
Reviewed: Reviewed