期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
An Overview of Principal Component Analysis 被引量:24
1
作者 Sasan Karamizadeh Shahidan M. Abdullah +2 位作者 Azizah A. Manaf Mazdak Zamani Alireza Hooman 《Journal of Signal and Information Processing》 2013年第3期173-175,共3页
The principal component analysis (PCA) is a kind of algorithms in biometrics. It is a statistics technical and used orthogonal transformation to convert a set of observations of possibly correlated variables into a se... The principal component analysis (PCA) is a kind of algorithms in biometrics. It is a statistics technical and used orthogonal transformation to convert a set of observations of possibly correlated variables into a set of values of linearly uncorrelated variables. PCA also is a tool to reduce multidimensional data to lower dimensions while retaining most of the information. It covers standard deviation, covariance, and eigenvectors. This background knowledge is meant to make the PCA section very straightforward, but can be skipped if the concepts are already familiar. 展开更多
关键词 BIOMETRIC PCA EIGENVECTOR COVARIANCE STANDARD Deviation
在线阅读 下载PDF
Using Genetic Algorithm to Support Artificial Neural Network for Intrusion Detection System
2
作者 Amin Dastanpour Suhaimi Ibrahim Reza Mashinchi Ali Selamat 《通讯和计算机(中英文版)》 2014年第2期143-147,共5页
关键词 入侵检测系统 人工神经网络 遗传算法 神经网络优化 ANN 数据集 攻击 线程
在线阅读 下载PDF
A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS
3
作者 Ahmad Bakhtiyari Shahri Zuraini Ismail 《Journal of Information Security》 2012年第2期169-176,共8页
Security remains to be a critical issue in the safe operation of Information Systems (IS). Identifying the threats to IS may lead to an effective method for measuring security as the initial stage for risk management.... Security remains to be a critical issue in the safe operation of Information Systems (IS). Identifying the threats to IS may lead to an effective method for measuring security as the initial stage for risk management. Despite many attempts to classify threats to IS, new threats to Health Information Systems (HIS) remains a continual concern for system developers. The main aim of this paper is to present a research agenda of threats to HIS. A cohesive completeness study on the identification of possible threats on HIS was conducted. This study reveals more than 70 threats for HIS. They are classified into 30 common criteria. The abstraction was carried out using secondary data from various research databases. This work-in-progress study will proceed to the next stage of ranking the security threats for assessing risk in HIS. This classification of threats may provide some insights to both researchers and professionals, who are interested in conducting research in risk management of HIS security. 展开更多
关键词 HEALTH Information System THREAT SECURITY
暂未订购
A New Maturity Model for Requirements Engineering Process: An Overview
4
作者 Badariah Solemon Shamsul Sahibuddin Abdul Azim Abdul Ghani 《Journal of Software Engineering and Applications》 2012年第5期340-350,共11页
It is widely acknowledged that Requirements Engineering (RE) has an important implication for the overall success of software or system development projects. As more and more organizations consider RE as the principal... It is widely acknowledged that Requirements Engineering (RE) has an important implication for the overall success of software or system development projects. As more and more organizations consider RE as the principal problem areas in the projects, improving RE process therefore appears critical for future business success. Moreover, nowadays there are evidences that support improving RE process maturity can contributes to improved business performance. There exist generic Software Process Improvement (SPI) standards, specialised RE process improvement models as well as guidance and advices on RE. However, they suffer from various issues that limit their adoption by organizations that are interested to assess and improve their RE process capability. Therefore, the research presented in this paper proposes a new RE process improvement model. The model is built by adapting and expanding the structure of the continuous representation of the formal maturity framework Capability Maturity Model Integration for Development (CMMI-DEV) developed by the Software Engineering Institute (SEI) through three rounds of development and validation stages, which involved RE and CMMI expert panel in the software industry. This paper aims to provide an overview on what, why and how we build the maturity model for RE. The intention is to provide a foundation for future development in the area of RE process improvement. 展开更多
关键词 Requirements ENGINEERING (RE) PROCESS IMPROVEMENT MATURITY Model
暂未订购
上一页 1 下一页 到第
使用帮助 返回顶部