Search
Now showing items 1-6 of 6
Cognitive artificial intelligence – a complexity based machine learning approach for advanced cyber threats
(ACM (IWSPA)IEEE (IJCNN)SpringerSpringerIEEE (ICCI*CC), 2016-03)
Application of machine intelligence is severely challenged in the domain of cyber security due to the surreptitious nature of advanced cyber threats which are persistent and defy existing cyber defense mechanisms. Further, ...
Acoustical analysis of respiratory sounds for detection of obstructive sleep apnea
(2012-03-16)
Obstructive Sleep Apnea (OSA) is a common respiratory disorder during sleep. Apnea
is cessation of airflow to the lungs, which lasts for at least 10 seconds accompanied by
more than 4% drop of the blood's Oxygen saturation. ...
Respiratory sound analysis for flow estimation during wakefulness and sleep, and its applications for sleep apnea detection and monitoring
(2011-04-15)
Tracheal respiratory sounds analysis has been investigated as a non-invasive method to estimate respiratory flow and upper airway obstruction. However, the flow-sound relationship is highly variable among subjects which ...
Snoring sounds analysis: automatic detection, higher order statistics, and its application for sleep apnea diagnosis
(IEEEElsevier, 2011)
Snoring is a highly prevalent disorder affecting 20-40% of adult population. Snoring
is also a major indicative of obstructive sleep apnea (OSA). Despite the magnitude of effort, the acoustical properties of snoring in ...
Near sets in pattern similarity distance based classification
(2018)
This research is focused on studying the nearness theory, various neighbourhoods of points in proximity spaces and similarity measures which leads to discovering the set patterns in digital images. The problem considered ...
Cognitive unsupervised clustering for detecting cyber attacks
(2020-06-26)
It has always been a challenge to extract meaning out of unstructured data. In the field of network intrusion detection, the availability of structured, labelled datasets is limited. Most approaches adhere to techniques ...