Automatic Identification of Database Workloads by using SVM Workload Classifier
نویسندگان
چکیده
منابع مشابه
Automatic identification of radiation necrosis in resected GBM patients using cost-sensitive OC-SVM classifier
X. Hu, G. Young, S. Wong, and K. Wong Department of Radiology, The Methodist Hospital Research Institute, Houston, TX, United States, Department of Automation, Northwestern Polytechnical University, Xi'an, ShaanXi, China, People's Republic of, Department of Radiology, Brigham and Women's Hospital, Boston, MA, United States, Department of Radiology, Weill Medical College of Cornell University, N...
متن کاملAutomatic Brain Tumor Detection and Classification Using Svm Classifier
Tumor is unwanted growth of unhealthy cell which increase intracranial pressure within skull. Medical image processing is the most challenging and innovative field specially MRI imaging modalities. The strategy presented in this paper involves preprocessing, segmentation, feature extraction, detection of tumor and its classification from MRI scanned brain images. Magnetic Resonance Imaging (MRI...
متن کاملIdentification of EMG signals using discriminant analysis and SVM classifier
The electromyography (EMG) signal is a bioelectrical signal variation, generated in muscles during voluntary or involuntary muscle activities. The muscle activities such as contraction or relaxation are always controlled by the nervous system. The EMG signal is a complicated biomedical signal due to anatomical/physiological properties of the muscles and its noisy environment. In this paper, a c...
متن کاملUsing SVM as Back-End Classifier for Language Identification
Robust automatic language identification (LID) is a task of identifying the language from a short utterance spoken by an unknown speaker. One of the mainstream approaches named parallel phone recognition language modeling (PPRLM) has achieved a very good performance. The log-likelihood radio (LLR) algorithm has been proposed recently to normalize posteriori probabilities which are the outputs o...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of the Korea Contents Association
سال: 2010
ISSN: 1598-4877
DOI: 10.5392/jkca.2010.10.4.084