Sciweavers

765 search results - page 118 / 153
» Detecting Anomalies and Intruders
Sort
View
ICASSP
2011
IEEE
14 years 3 months ago
An adaptive approach to abnormal heart sound segmentation
Heart sound is one of the significant bio-signals to diagnose certain cardiac anomalies. Aiming to provide an automatic heart sounds analysis to medical professionals, we present...
Dinesh Kumar, Paulo Carvalho, Manuel Antunes, Rui ...
ISI
2008
Springer
14 years 12 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
KDD
2001
ACM
1203views Data Mining» more  KDD 2001»
16 years 8 days ago
Application of Data Mining Techniques for Medical Image Classification
Breast cancer represents the second leading cause of cancer deaths in women today and it is the most common type of cancer in women. This paper presents some experiments for tumou...
Maria-Luiza Antonie, Osmar R. Zaïane, Alexand...
GECCO
2003
Springer
103views Optimization» more  GECCO 2003»
15 years 5 months ago
MILA - Multilevel Immune Learning Algorithm
The biological immune system is an intricate network of specialized tissues, organs, cells, and chemical molecules. T-cell-dependent humoral immune response is one of the complex i...
Dipankar Dasgupta, Senhua Yu, Nivedita Sumi Majumd...
KBS
2008
110views more  KBS 2008»
14 years 12 months ago
Intensity-based image registration using multiple distributed agents
Image registration is the process of geometrically aligning images taken from different sensors, viewpoints or instances in time. It plays a key role in the detection of defects o...
Roger J. Tait, Gerald Schaefer, Adrian A. Hopgood