Automatic Identification of Database Workloads by using SVM Workload Classifier

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Automatic identification of radiation necrosis in resected GBM patients using cost-sensitive OC-SVM classifier

X. Hu, G. Young, S. Wong, and K. Wong Department of Radiology, The Methodist Hospital Research Institute, Houston, TX, United States, Department of Automation, Northwestern Polytechnical University, Xi'an, ShaanXi, China, People's Republic of, Department of Radiology, Brigham and Women's Hospital, Boston, MA, United States, Department of Radiology, Weill Medical College of Cornell University, N...

متن کامل

Automatic Brain Tumor Detection and Classification Using Svm Classifier

Tumor is unwanted growth of unhealthy cell which increase intracranial pressure within skull. Medical image processing is the most challenging and innovative field specially MRI imaging modalities. The strategy presented in this paper involves preprocessing, segmentation, feature extraction, detection of tumor and its classification from MRI scanned brain images. Magnetic Resonance Imaging (MRI...

متن کامل

Identification of EMG signals using discriminant analysis and SVM classifier

The electromyography (EMG) signal is a bioelectrical signal variation, generated in muscles during voluntary or involuntary muscle activities. The muscle activities such as contraction or relaxation are always controlled by the nervous system. The EMG signal is a complicated biomedical signal due to anatomical/physiological properties of the muscles and its noisy environment. In this paper, a c...

متن کامل

Using SVM as Back-End Classifier for Language Identification

Robust automatic language identification (LID) is a task of identifying the language from a short utterance spoken by an unknown speaker. One of the mainstream approaches named parallel phone recognition language modeling (PPRLM) has achieved a very good performance. The log-likelihood radio (LLR) algorithm has been proposed recently to normalize posteriori probabilities which are the outputs o...

متن کامل

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of the Korea Contents Association

سال: 2010

ISSN: 1598-4877

DOI: 10.5392/jkca.2010.10.4.084