While null space based linear discriminant analysis (NLDA) obtains a good discriminant performance, the ability easily suffers from an implicit assumption of Gaussian model with sa...
Monitoring applications play an increasingly important role in many domains. They detect events in monitored systems and take actions such as invoke a program or notify an adminis...
Information-theoretic clustering aims to exploit information theoretic measures as the clustering criteria. A common practice on this topic is so-called INFO-K-means, which perfor...
— This paper presents clustering techniques (K-means, Fuzzy K-means, Subtractive) applied on specific databases (Flower Classification and Mackey-Glass time series) , to automati...
Juan E. Moreno, Oscar Castillo, Juan R. Castro, Lu...
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...