Sciweavers

ASIAMS
2008
IEEE
15 years 2 months ago
A Blended Text Mining Method for Authorship Authentication Analysis
The paper elaborates upon the interim results achieved in resolving a few newly discovered 16th century letters now alleged to be written by Queen Mary of Scots (QMS). Despite the...
Philip Sallis, Subana Shanmuganathan
118
Voted
ASIAMS
2008
IEEE
15 years 7 months ago
Optimization of a Kraft Pulping System: Using Particle Swarm Optimization and Differential Evolution
Expectation of profit is the economic driving force motivating business activity in a free-enterprise economy. An increase in this profit for a given organization can be accomplis...
Millie Pant, Radha Thangaraj, Ajith Abraham
ASIAMS
2008
IEEE
15 years 2 months ago
Modeling Group Decision-Making for Collaborative Teams in Enterprises
Multicriteria analysis can be incorporated as a method to model preferences and facilitate decision making within a group of decision makers. In this paper we present a Group Deci...
George Rigopoulos, Nikolaos V. Karadimas, Alessand...
ASIAMS
2008
IEEE
15 years 7 months ago
HiNFRA: Hierarchical Neuro-Fuzzy Learning for Online Risk Assessment
Our previous research illustrated the design of fuzzy logic based online risk assessment for Distributed Intrusion Prediction and Prevention Systems (DIPPS) [3]. Based on the DIPP...
Kjetil Haslum, Ajith Abraham, Svein J. Knapskog
ASIAMS
2008
IEEE
15 years 7 months ago
Data Reduction and Ensemble Classifiers in Intrusion Detection
Efficiency is one of the major issues in intrusion detection. Inefficiency is often attributed to high overhead and this is caused by several reasons. Among them are continuous de...
Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam ...
Modeling and Simulation
Top of PageReset Settings