This paper a survey of artificial neural network on various welding technology and also discusses the result based on analysis. The role of optimization techniques in concerned domain with experimental analysis is explained. Refer ences-Parikshik dutta, Dilip Kumar pratihar do modelling of TIF welding process using conventional regression analysis and… (More)
Computer viruses are big problem for security. It is essential to differentiate between reproducing programs and its similar forms. Reproducing programs will not necessarily harm the system. Classification aspect of metamorphic viruses is an emerging issue of research. The orientation and expansion of metamorphic viruses is quite critical and general… (More)
Malicious codes are serious threat to our society. The presented work discusses various aspects of technological level, detection, mitigation , identification and Classification of malicious codes. Detection method depicts how various antivirus technologies get used to fight with complex encrypting , decrypting and nature changing virus activities.… (More)
Recent research work shows that feature fusion technique is not widely used in computer virus detection. Viruses generated from kits like NGVCK are detected effectively using feature fusion approach. Our purpose is to examine various flavours of feature fusion approach in virus detection.
Image classification is an important field of artificial intelligence. A machine tries to classify the images into different predefined categories using the intelligence and experience gained by the training session. Classification is a complex process which is affected by many factors as it is difficult to classify an image containing blurry and noisy… (More)
Class imbalance problem refers to unequal distribution of data instances between classes. Due to this, popular classifiers misclassify data instances of minority class into majority class. Initially, Extreme learning machine was proposed with the prime objective of handling real valued datasets. Though, it a fast learning technique, it suffers from the… (More)
In many pattern recognition applications, limiting the number of features is a very important requirement due to high dimensional cost as well as the risk of “overfitting” imposed by the high-dimensional feature vectors. Feature subset selection addresses the dimensionality reduction problem by determining a subset of available features which… (More)
Advancement in computer viruses complexity is a big threat for researchers working in the field of computer virology. The methods and techniques developed cannot assure the complete disinfection and cure, but still lot of efficient methods are developed by researchers. Our proposed technique includes the three test cases that are designed for the… (More)
Video based Face Recognition is an emerging research issue which has received much attention during the recent years. In this research, an effective approach for calculating the periodicity of a subject i.e. exact appearance of a subject in different time in video data stream is presented. The system is the combination of two studies: face detection and… (More)
In this paper a survey study is made on various issues of mobile malicious codes. Spreading pattern of different mobile viruses is discussed to make a collective analysis of concerned problem and various approaches are also discussed to solve those problems.