Search results for "Intelligence"

showing 10 items of 6959 documents

2019

This paper describes a single body-mounted sensor that integrates accelerometers, gyroscopes, compasses, barometers, a GPS receiver, and a methodology to process the data for biomechanical studies. The sensor and its data processing system can accurately compute the speed, acceleration, angular velocity, and angular orientation at an output rate of 400 Hz and has the ability to collect large volumes of ecologically-valid data. The system also segments steps and computes metrics for each step. We analyzed the sensitivity of these metrics to changing the start time of the gait cycle. Along with traditional metrics, such as cadence, speed, step length, and vertical oscillation, this system est…

Computer scienceAngular velocity02 engineering and technologyAccelerometerBiochemistryAnalytical Chemistrylaw.invention03 medical and health sciencesAcceleration0302 clinical medicinelaw0202 electrical engineering electronic engineering information engineeringForce platformElectrical and Electronic EngineeringGround reaction forceInstrumentationSimulationbusiness.industryGyroscope030229 sport sciencesAtomic and Molecular Physics and OpticsAssisted GPSGait analysisGlobal Positioning System020201 artificial intelligence & image processingbusinessSensors
researchProduct

Machine Learning Techniques for Intrusion Detection: A Comparative Analysis

2016

International audience; With the growth of internet world has transformed into a global market with all monetary and business exercises being carried online. Being the most imperative resource of the developing scene, it is the vulnerable object and hence needs to be secured from the users with dangerous personality set. Since the Internet does not have focal surveillance component, assailants once in a while, utilizing varied and advancing hacking topologies discover a path to bypass framework " s security and one such collection of assaults is Intrusion. An intrusion is a movement of breaking into the framework by compromising the security arrangements of the framework set up. The techniq…

Computer scienceAnomaly-based intrusion detection system02 engineering and technologyIntrusion detection systemIDSMachine learningcomputer.software_genre[ INFO.INFO-CV ] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV][INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]Machine LearningResource (project management)Component (UML)0202 electrical engineering electronic engineering information engineeringROCSet (psychology)[ INFO.INFO-AI ] Computer Science [cs]/Artificial Intelligence [cs.AI]False Positivebusiness.industryACM[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]020206 networking & telecommunicationsPrecisionObject (computer science)True PositiveOutlier020201 artificial intelligence & image processingThe InternetArtificial intelligenceData miningbusinesscomputer
researchProduct

Combining conjunctive rule extraction with diffusion maps for network intrusion detection

2013

Network security and intrusion detection are important in the modern world where communication happens via information networks. Traditional signature-based intrusion detection methods cannot find previously unknown attacks. On the other hand, algorithms used for anomaly detection often have black box qualities that are difficult to understand for people who are not algorithm experts. Rule extraction methods create interpretable rule sets that act as classifiers. They have mostly been combined with already labeled data sets. This paper aims to combine unsupervised anomaly detection with rule extraction techniques to create an online anomaly detection framework. Unsupervised anomaly detectio…

Computer scienceAnomaly-based intrusion detection systemNetwork securityintrusion detectiontunkeutumisen havaitseminenFeature extractionDiffusion mapdiffusion mapIntrusion detection systemMachine learningcomputer.software_genrepoikkeavuuden havaitseminenBlack boxtiedon louhintan-grammiCluster analysista113Training setrule extractionbusiness.industryn-gramanomaly detectiondiffuusiokarttakoneoppiminensääntöjen erottaminenAnomaly detectionArtificial intelligenceData miningtiedonlouhintabusinesscomputer2013 IEEE Symposium on Computers and Communications (ISCC)
researchProduct

Cryptanalysis of Knapsack Cipher Using Ant Colony Optimization

2018

Ant Colony Optimization is a search metaheuristic inspired by the behavior of real ant colonies and shown their effectiveness, robustness to solve a wide variety of complex problems. In this paper, we present a novel Ant Colony Optimization (ACO) based attack for cryptanalysis of knapsack cipher algorithm. A Cipher-text only attack is used to discover the plaintext from the cipher-text. Moreover, our approach allows us to break knapsack cryptosystem in a minimum search space when compared with other techniques. Experimental results prove that ACO can be used as an effective tool to attack knapsack cipher.

Computer scienceAnt colony optimization algorithmsMathematicsofComputing_NUMERICALANALYSISMerkle–Hellman knapsack cryptosystemPlaintextData_CODINGANDINFORMATIONTHEORYAnt colonyComputingMethodologies_ARTIFICIALINTELLIGENCElaw.inventionKnapsack problemlawTheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITYCryptosystemCryptanalysisAlgorithmMetaheuristicSSRN Electronic Journal
researchProduct

A Non-Stationary Channel Model for the Development of Non-Wearable Radio Fall Detection Systems

2018

The emerging non-wearable fall detection systems rely on processing radio waves reflected off the body of the home user who has no active interaction with the system, increasing the user privacy and acceptability. This paper proposes a nonstationary channel model that is important for the development of such systems. A three-dimensional stochastic trajectory model is designed to capture targeted mobility patterns of the home user. The model is featured with a forward fall mechanism, which is actuated at a random point along the path. A transmitter emits radio waves throughout an indoor propagation environment, while a receiver collects fingerprints of the scattering objects on the emitted w…

Computer scienceApplied MathematicsReal-time computingTransmitterSpectral density020206 networking & telecommunications02 engineering and technologyComputer Science Applicationssymbols.namesake0202 electrical engineering electronic engineering information engineeringsymbols020201 artificial intelligence & image processingElectrical and Electronic EngineeringDoppler effectCommunication channelRadio wave
researchProduct

UnipaBCI a novel general software framework for brain computer interface

2017

The increasing interest in Brain Computer Interface (BCI) requires new fast, reliable and scalable frameworks that can be used by researchers to develop BCI based high performance applications in efficient and fast ways. In this paper is presented "UnipaBCI", a general software framework for BCI applications based on electroencephalogra-phy (EEG) that can fulfill these new needs. A visual evoked potentials (VEP) application has also been developed using the proposed framework in order to test the modular architecture and the overall performance. Different types of users (beginners and experts in BCI) have been involved during the "UnipaBCI" experimental test and they have exhibited good and…

Computer scienceAugmentative communication02 engineering and technologyVisual evoked potentialsHumanoid robotElectroencephalographycomputer.software_genre03 medical and health sciences0302 clinical medicineInformationSystems_MODELSANDPRINCIPLESBrain-Computer Interface (BCI) Humanoid Robot Assistive technology Augmentative Communication rehabilitation BCI frameworkHuman–computer interaction0202 electrical engineering electronic engineering information engineeringmedicineOverall performanceBrain–computer interfaceSettore ING-INF/05 - Sistemi Di Elaborazione Delle Informazionimedicine.diagnostic_testRehabilitationModular architectureBCI frameworkSoftware frameworkAssistive technologyScalability020201 artificial intelligence & image processingcomputerBrain-Computer Interface (BCI)030217 neurology & neurosurgery
researchProduct

Automated prostate gland segmentation based on an unsupervised fuzzy C-means clustering technique using multispectral T1w and T2w MR imaging

2017

Prostate imaging analysis is difficult in diagnosis, therapy, and staging of prostate cancer. In clinical practice, Magnetic Resonance Imaging (MRI) is increasingly used thanks to its morphologic and functional capabilities. However, manual detection and delineation of prostate gland on multispectral MRI data is currently a time-expensive and operator-dependent procedure. Efficient computer-assisted segmentation approaches are not yet able to address these issues, but rather have the potential to do so. In this paper, a novel automatic prostate MR image segmentation method based on the Fuzzy C-Means (FCM) clustering algorithm, which enables multispectral T1-weighted (T1w) and T2-weighted (T…

Computer scienceAutomated segmentation; Fuzzy C-Means clustering; Multispectral MR imaging; Prostate cancer; Prostate gland; Unsupervised machine learningMultispectral image02 engineering and technologyautomated segmentation; multispectral MR imaging; prostate gland; prostate cancer; unsupervised Machine Learning; Fuzzy C-Means clustering030218 nuclear medicine & medical imaging03 medical and health sciencesProstate cancer0302 clinical medicineProstate0202 electrical engineering electronic engineering information engineeringmedicineComputer visionSegmentationautomated segmentationunsupervised Machine LearningCluster analysisSettore ING-INF/05 - Sistemi Di Elaborazione Delle Informazionimedicine.diagnostic_testbusiness.industryINF/01 - INFORMATICAMagnetic resonance imagingmedicine.diseaseprostate cancerFuzzy C-Means clusteringmultispectral MR imagingmedicine.anatomical_structureUnsupervised learning020201 artificial intelligence & image processingArtificial intelligencebusinessprostate glandInformation SystemsMultispectral segmentation
researchProduct

Enriqueciendo la investigación en humanidades digitales. Análisis de textos de claustros académicos de la Universidad de Valencia (1775-1779) con KH …

2020

[ES] La aplicación de métodos automatizados en cualquier investigación ha facilitado el trasvase de metodologías de una disciplina a otra, permitiendo realizar análisis cuantitativos a textos con estructura o semiestructurados. El objeto de este trabajo es aplicar a un dataset en lenguaje natural -castellano del siglo XVIII- métodos de análisis de la disciplina de documentación. Pretende establecer una metodología automática de análisis cuantitativo y cualitativo de textos, que permita enriquecer en el futuro las conclusiones procedentes del análisis histórico tradicional. Este estudio construye los procedimientos necesarios para poder aplicar análisis de frecuencia, extracción y clasificac…

Computer scienceBIBLIOTECONOMIA Y DOCUMENTACIONUniversitatsLibrary and Information Sciences050905 science studiescomputer.software_genresiglo xviiiBibliography. Library science. Information resourcesQualitative analysis5202.01 Metodología de InvestigaciónClaustros universitarios1209.03 Análisis de Datoscastellano antiguoKH CoderSiglo XVIIIbusiness.industry05 social sciencesAnàlisi del discursanálisis de lenguaje naturalAutomationHumanitats InformàticaAnálisis de lenguaje naturalkh coderclaustros universitariosWork (electrical)Quantitative analysis (finance)Natural language analysisArtificial intelligence0509 other social sciencesCastellano antiguo050904 information & library sciencesbusinesscomputerWord frequency analysisNatural language processingZRevista Española de Documentación Científica
researchProduct

Efficient linear fusion of partial estimators

2018

Abstract Many signal processing applications require performing statistical inference on large datasets, where computational and/or memory restrictions become an issue. In this big data setting, computing an exact global centralized estimator is often either unfeasible or impractical. Hence, several authors have considered distributed inference approaches, where the data are divided among multiple workers (cores, machines or a combination of both). The computations are then performed in parallel and the resulting partial estimators are finally combined to approximate the intractable global estimator. In this paper, we focus on the scenario where no communication exists among the workers, de…

Computer scienceBayesian probabilityInferenceAsymptotic distribution02 engineering and technology01 natural sciences010104 statistics & probability[INFO.INFO-TS]Computer Science [cs]/Signal and Image ProcessingArtificial Intelligence0202 electrical engineering electronic engineering information engineeringStatistical inferenceFusion rules0101 mathematicsElectrical and Electronic EngineeringComputingMilieux_MISCELLANEOUSMinimum mean square errorApplied MathematicsConstrained optimizationEstimator020206 networking & telecommunicationsComputational Theory and MathematicsSignal ProcessingComputer Vision and Pattern RecognitionStatistics Probability and Uncertainty[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processingAlgorithmDigital Signal Processing
researchProduct

Adaptive Importance Sampling: The past, the present, and the future

2017

A fundamental problem in signal processing is the estimation of unknown parameters or functions from noisy observations. Important examples include localization of objects in wireless sensor networks [1] and the Internet of Things [2]; multiple source reconstruction from electroencephalograms [3]; estimation of power spectral density for speech enhancement [4]; or inference in genomic signal processing [5]. Within the Bayesian signal processing framework, these problems are addressed by constructing posterior probability distributions of the unknowns. The posteriors combine optimally all of the information about the unknowns in the observations with the information that is present in their …

Computer scienceBayesian probabilityPosterior probabilityInference02 engineering and technologyMachine learningcomputer.software_genre01 natural sciences010104 statistics & probabilityMultidimensional signal processing[INFO.INFO-TS]Computer Science [cs]/Signal and Image ProcessingPrior probability0202 electrical engineering electronic engineering information engineering0101 mathematicsElectrical and Electronic EngineeringComputingMilieux_MISCELLANEOUSbusiness.industryApplied Mathematics020206 networking & telecommunicationsApproximate inferenceSignal ProcessingProbability distributionArtificial intelligencebusinessAlgorithmcomputer[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processingImportance sampling
researchProduct