Displaying similar documents to “Note on studying change point of LRD traffic based on Li's detection of DDoS flood attacking.”

Acoustic analysis assessment in speech pathology detection

Daria Panek, Andrzej Skalski, Janusz Gajda, Ryszard Tadeusiewicz (2015)

International Journal of Applied Mathematics and Computer Science

Similarity:

Automatic detection of voice pathologies enables non-invasive, low cost and objective assessments of the presence of disorders, as well as accelerating and improving the process of diagnosis and clinical treatment given to patients. In this work, a vector made up of 28 acoustic parameters is evaluated using principal component analysis (PCA), kernel principal component analysis (kPCA) and an auto-associative neural network (NLPCA) in four kinds of pathology detection (hyperfunctional...

Data-driven models for fault detection using kernel PCA: A water distribution system case study

Adam Nowicki, Michał Grochowski, Kazimierz Duzinkiewicz (2012)

International Journal of Applied Mathematics and Computer Science

Similarity:

Kernel Principal Component Analysis (KPCA), an example of machine learning, can be considered a non-linear extension of the PCA method. While various applications of KPCA are known, this paper explores the possibility to use it for building a data-driven model of a non-linear system-the water distribution system of the Chojnice town (Poland). This model is utilised for fault detection with the emphasis on water leakage detection. A systematic description of the system's framework is...

Note onset detection in musical signals via neural-network-based multi-ODF fusion

Bartłomiej Stasiak, Jędrzej Mońko, Adam Niewiadomski (2016)

International Journal of Applied Mathematics and Computer Science

Similarity:

The problem of note onset detection in musical signals is considered. The proposed solution is based on known approaches in which an onset detection function is defined on the basis of spectral characteristics of audio data. In our approach, several onset detection functions are used simultaneously to form an input vector for a multi-layer non-linear perceptron, which learns to detect onsets in the training data. This is in contrast to standard methods based on thresholding the onset...

Classification Trees as a Technique for Creating Anomaly-Based Intrusion Detection Systems

Jecheva, Veselina, Nikolova, Evgeniya (2009)

Serdica Journal of Computing

Similarity:

Intrusion detection is a critical component of security information systems. The intrusion detection process attempts to detect malicious attacks by examining various data collected during processes on the protected system. This paper examines the anomaly-based intrusion detection based on sequences of system calls. The point is to construct a model that describes normal or acceptable system activity using the classification trees approach. The created database is utilized as a basis...

Towards spike-based speech processing: A biologically plausible approach to simple acoustic classification

Ismail Uysal, Harsha Sathyendra, John G. Harris (2008)

International Journal of Applied Mathematics and Computer Science

Similarity:

Shortcomings of automatic speech recognition (ASR) applications are becoming more evident as they are more widely used in real life. The inherent non-stationarity associated with the timing of speech signals as well as the dynamical changes in the environment make the ensuing analysis and recognition extremely difficult. Researchers often turn to biology seeking clues to make better engineered systems, and ASR is no exception with the usage of feature sets such as Mel frequency cepstral...