Learn More
Most of the existing IDS use all the features in network packet to evaluate and look for known intrusion patterns. This data contains irrelevant and redundant features. Unfortunately, the drawback to this approach is a lengthy detection process. In real-time environment this may degrade the performance of an IDS. Thus, feature selection is required to(More)
3D object reconstruction is frequent used in various fields such as product design, engineering, medical and artistic applications. Numerous reconstruction techniques and software were introduced and developed. However, the purpose of this paper is to fully integrate an adaptive artificial neural network (ANN) based method in reconstructing and representing(More)
Particle Swarm Optimization (PSO) is a biologically inspired computational search and optimization method developed in 1995 by Eberhart and Kennedy based on the social behaviors of birds flocking or fish schooling. A number of basic variations have been developed due to improve speed of convergence and quality of solution found by the PSO. On the other(More)
Exact optimization algorithms are not able to provide an appropriate solution in solving optimization problems with a high-dimensional search space. In these problems, the search space grows exponentially with the problem size therefore; exhaustive search is not practical. Also, classical approximate optimization methods like greedy-based algorithms make(More)
Two of the major challenges in designing anomaly intrusion detection are to maximize detection accuracy and to minimize false alarm rate. In addressing this issue, this paper proposes an ensemble of one-class classifiers where each adopts different learning paradigms. The techniques deployed in this ensemble model are; Linear Genetic Programming (LGP),(More)
This paper presents an intelligent technique for segmentation of off-line cursive handwritten words particularly on touching characters problem. In this study, Self Organizing Feature Maps (SOM) is implemented to identify the touching portion of the cursive words. The image of the connected characters is preprocessed and the core-zone is detected to(More)
Writer Identification (WI) is one of the areas in pattern recognition that have created a center of attention for many researchers to work in. Recently, its main focus is in forensics and biometric application, e.g. writing style can be used as biometric features for authenticating individuality uniqueness. Existing works in WI concentrate on feature(More)
Three Term Backpropagation(BP) Network as proposed by Zweiri in 2003 has outperformed standard Two Term Backpropagation. However, further studies on Three Term Backpropagation in 2007 indicated that this network only surpassed standard BP for small scale datasets but not for medium and large scale datasets. It has also been observed that by using Mean(More)