Shaohua Teng

Learn More
The image of a face varies with the illumination, pose, and facial expression, thus we say that a single face image is of high uncertainty for representing the face. In this sense, a face image is just an observation and it should not be considered as the absolutely accurate representation of the face. As more face images from the same person provide more(More)
Apriori is one of the most important algorithms used in rule association mining. In this paper, we first discuss the limitations of the Apriori algorithm and then propose an enhancement for improving its efficiency. The improved algorithm is based on the combination of forward scan and reverse scan of a given database. If certain conditions are satisfied,(More)
Researchers have done lots of work in scan attack detection. Various methods have been proposed. Although these methods can defense some scan attacks from hackers in some degree, there are lots of missing detections and false alerts. Especially current intrusion detection systems are difficult to satisfy the demand of large-scale distributed network. After(More)
When a new intrusion means is developed, many intrusion methods can be derived by exchanging the command sequences or by replacing commands with the functionally similar commands, which makes the detection of the developed intrusion very difficult. To overcome this problem, a cooperative intrusion detection model based on scenario is proposed, which is(More)
As the network information includes a large number of noise data, in order to reduce or eliminate the noise impact on constructing the hyperplane of SVM, this paper firstly preprocesses the data. Then the fuzzy membership function is introduced into SVM. The fuzzy membership function acquires different values for each input data according to different(More)
Wireless networks provide limited reliability and less bandwidth than fixed networks for mobile nodes. And all mobile nodes are highly energy dependent as they use batteries with a limited capacity. Because of their physical portability, they can be used even when they move. This may require using different wireless networks while the node is moving. In(More)
The LLF (Least Laxity First) scheduling algorithm assigns a priority to a task according to its executing urgency. The smaller the laxity value of a task is, the sooner it needs to be executed. When two or more tasks have same or approximate laxity values, LLF scheduling algorithm leads to frequent switches among tasks, causes extra overhead in a system,(More)
SVM is not as favored for large-scale data training as for Network Intrusion Detection because the training complexity of SVM is highly dependent on the size of training sample set. And the network information includes a large number of noise data that impact on constructing the boundary (separating hyperplane) of SVM. Some redundant sample points and noisy(More)