Learn More
The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as intrusion detection system (IDS). This paper presents two hybrid approaches for modeling IDS. Decision trees (DT) and support vector machines (SVM) are combined as a hierarchical hybrid intelligent system model (DT–SVM) and an(More)
This paper proposes a new perspective for solving systems of complex nonlinear equations by simply viewing it as a multiobjective optimization problem. Every equation in the system represents an objective function whose goal is to minimize the difference between the right and left term of the corresponding equation. An evolutionary computation technique is(More)
This chapter presents the biological motivation and some of the theoretical concepts of swarm intelligence with an emphasis on particle swarm optimization and ant colony optimization algorithms. The basic data mining terminologies are explained and linked with some of the past and ongoing works using swarm intelligence techniques. Swarm behavior can be seen(More)
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromise the confidentiality, integrity, availability , or to bypass the security mechanisms of a computer or network. This paper proposes the development of an Intrusion Detection Program(More)
The use of intelligent systems for stock market predictions has been widely established. This paper introduces a genetic programming technique (called Multi-Expression programming) for the prediction of two stock indices. The performance is then compared with an artificial neural network trained using Levenberg-Marquardt algorithm, support vector machine,(More)
Large intronic expansions of the triplet-repeat sequence (GAA.TTC) cause transcriptional repression of the Frataxin gene (FXN) leading to Friedreich's ataxia (FRDA). We previously found that GAA-triplet expansions stimulate heterochromatinization in vivo in transgenic mice. We report here using chromosome conformation capture (3C) coupled with(More)
Multi Expression Programming (MEP) is a Genetic Programming (GP) variant that uses linear chromosomes for solution encoding. A unique MEP feature is its ability of encoding multiple solutions of a problem in a single chromosome. These solutions are handled in the same time complexity as other techniques that encode a single solution in a chromosome. In this(More)
Due to the wide deployment of sensor networks recently security in sensor networks has become a hot research topic. Popular ways to secure a sensor network are by including cryptographic techniques or by safeguarding sensitive information from unauthorized access/manipulation and by implementing efficient intrusion detection mechanisms. This paper proposes(More)
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. An IDS does not eliminate the use of preventive mechanism but it works as the last defensive mechanism in securing the system. This Chapter evaluates the performances of two Genetic(More)