Machine learning empowered efficient intrusion detection framework

H Shafique, AA Shah, MA Qureshi, MK Ehsan… - VFAST Transactions on …, 2022 - vfast.org
In modern era security is becoming major and basic need of any system. Protecting of a
system from unauthorized access is very important for a network system. Network security is …

Recognition of Greek Orthodox Hymns Using Audio Fingerprint Techniques

K Karasavvidis, D Kampelopoulos… - 2023 8th South-East …, 2023 - ieeexplore.ieee.org
Audio fingerprinting was originally developed for music song identification, and over the
years has been used for many more cases. With fingerprinting, an equivalent signature of …

Optimizing human computer interaction for byzantine music learning: Comparing HMMs with RDFs

P Kritopoulou, A Stergiaki… - 2020 9th International …, 2020 - ieeexplore.ieee.org
The current paper presents the results of an optimization study conducted on a self-training
system of Byzantine chanting. The main aim of this work is the enhancement of the …

Development of Breathe Analysis Technique Using Labview

TPK Nandan, M Anusha… - … for Innovation in …, 2023 - ieeexplore.ieee.org
This paper deals with the analysis of breathe signal using LabVIEW. Pranayama is
practicing how to regulating the breath. It is one of the important components of yoga that …

[引用][C] Comparison of 5 classification algorithms: Decision Trees, Random Forest, Boosted Trees, Support Vector Machines and Neural Networks.

V Ananthakrishnan