نتایج جستجو برای: we propose a new comprehensive classification for e

تعداد نتایج: 16785252  

Journal: :the modares journal of electrical engineering 2008
ahmad reza sharafat mahdi rasti

high processing loads, need for complicated and frequent updating, and high false alarm are some of the challenges in designing anomaly detection and misuse detection systems. we propose a new network-based intrusion detection system (ids) that resolves such shortcomings. our scheme fuses anomaly detection and misuse detection systems, which has not been utilized so far in existing systems. in ...

Journal: :international journal of information science and management 0
badr elmir al-qualsadi research & development team université mohammed v – souissi rabat maroc bouchaib bounabat al-qualsadi research & development team université mohammed v – souissi rabat maroc

delivering added value public e-services often requires cooperation between two or more government departments. in general, such cooperation is ensured by implementing interoperability between automated business processes. in spite of the existence of several works interested in public online services in general, only few of them were focused on measuring interoperability degree, whether used o...

B. Sabzalian V. Abolghasemi

Non-negative Matrix Factorization (NMF) is a part-based image representation method. It comes from the intuitive idea that entire face image can be constructed by combining several parts. In this paper, we propose a framework for face recognition by finding localized, part-based representations, denoted “Iterative weighted non-smooth non-negative matrix factorization” (IWNS-NMF). A new cost fun...

Predicting different behaviors in computer networks is the subject of many data mining researches. Providing a balanced Intrusion Detection System (IDS) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. Many of the proposed methods perform well in one of the two aspects, and concentrate on a su...

In this paper, we propose a novel method for ranking a set of fuzzy numbers. In this method a preference index is proposed based on $alpha$-optimistic values of a fuzzy number. We propose a new ranking method by adopting a level of credit in the ordering procedure. Then, we investigate some desirable properties of the proposed ranking method.

Due to the expected increase of defects in circuits based on deep submicron technologies, reliability has become an important design criterion. Although different approaches have been developed to estimate reliability in digital circuits and some measuring concepts have been separately presented to reveal the quality of analog circuit reliability in the literature, there is a gap to estimate re...

پایان نامه :دانشگاه آزاد اسلامی واحد کرمانشاه - دانشکده فنی 1393

. [1] [2] [3] ...

  Radial polydactyly, the most common digital duplication in Asian and white populations, has a wide range of manifestations. Its classification is useful for planning and assessing surgical treatment. Our patient had four thumbs, duplicated radial carpal bones, and a bifurcated radius. This presentation is not covered by any of the current classifications. To the best of our knowledge, this is...

پایان نامه :0 1374

the present study investigated the effect of the two vocabulary teaching techniques in est, namely the use of translation and the use of visual aids as two separate vocabulary teaching techniques. to answer the question of the study, a pretest (michigan test) was administered to the 58 randomly selected est students at khajeh nasiredin tusi university, faculty of mechanics. after the homogeneit...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده علوم 1393

in this thesis, structural, electronical, and optical properties of inverse pervskite(ca3pbo) in cubic phase have been investigated.the calculation have been done based on density functional theory and according to generalized gradiant approximate (gga) as correlating potential. in order to calculate the configurations, implementing in the wien2k code have been used from 2013 version. first of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید