Skip to main content

Showing 1–5 of 5 results for author: Parsazad, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:1305.2388  [pdf

    cs.CR cs.LG

    Fast Feature Reduction in intrusion detection datasets

    Authors: Shafigh Parsazad, Ehsan Saboori, Amin Allahyar

    Abstract: In the most intrusion detection systems (IDS), a system tries to learn characteristics of different type of attacks by analyzing packets that sent or received in network. These packets have a lot of features. But not all of them is required to be analyzed to detect that specific type of attack. Detection speed and computational cost is another vital matter here, because in these types of problems,… ▽ More

    Submitted 1 April, 2013; originally announced May 2013.

    Journal ref: Parsazad, Shafigh; Saboori, Ehsan; Allahyar, Amin; , "Fast Feature Reduction in intrusion detection datasets," MIPRO, 2012 Proceedings of the 35th International Convention , vol., no., pp.1023-1029, 21-25 May 2012

  2. Improving the K-means algorithm using improved downhill simplex search

    Authors: Ehsan Saboori, Shafigh Parsazad, Anoosheh Sadeghi

    Abstract: The k-means algorithm is one of the well-known and most popular clustering algorithms. K-means seeks an optimal partition of the data by minimizing the sum of squared error with an iterative optimization procedure, which belongs to the category of hill climbing algorithms. As we know hill climbing searches are famous for converging to local optimums. Since k-means can converge to a local optimum,… ▽ More

    Submitted 4 September, 2012; originally announced September 2012.

    Comments: 4 Pages

    Journal ref: 2010 2nd International Conference on Software Technology and Engineering (ICSTE), vol.2, no., pp.V2-350-V2-354, 3-5 Oct. 2010

  3. Automatic firewall rules generator for anomaly detection systems with Apriori algorithm

    Authors: Ehsan Saboori, Shafigh Parsazad, Yasaman Sanatkhani

    Abstract: Network intrusion detection systems have become a crucial issue for computer systems security infrastructures. Different methods and algorithms are developed and proposed in recent years to improve intrusion detection systems. The most important issue in current systems is that they are poor at detecting novel anomaly attacks. These kinds of attacks refer to any action that significantly deviates… ▽ More

    Submitted 4 September, 2012; originally announced September 2012.

    Comments: 4 Pages

    Journal ref: 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), vol.6, no., pp.V6-57-V6-60, 2010

  4. A new scheduling algorithm for server farms load balancing

    Authors: Ehsan Saboori, Shahriar Mohammadi, Shafigh Parsazad

    Abstract: This paper describes a new scheduling algorithm to distribute jobs in server farm systems. The proposed algorithm overcomes the starvation caused by SRPT (Shortest Remaining Processing Time). This algorithm is used in process scheduling in operating system approach. The algorithm was developed to be used in dispatcher scheduling. This algorithm is non-preemptive discipline, similar to SRPT, in whi… ▽ More

    Submitted 4 September, 2012; originally announced September 2012.

    Comments: 4 Pages

    Journal ref: 2010 2nd International Conference on Industrial and Information Systems (IIS), vol.1, no., pp.417-420, 2010

  5. arXiv:1208.1315  [pdf

    cs.LG

    Data Selection for Semi-Supervised Learning

    Authors: Shafigh Parsazad, Ehsan Saboori, Amin Allahyar

    Abstract: The real challenge in pattern recognition task and machine learning process is to train a discriminator using labeled data and use it to distinguish between future data as accurate as possible. However, most of the problems in the real world have numerous data, which labeling them is a cumbersome or even an impossible matter. Semi-supervised learning is one approach to overcome these types of prob… ▽ More

    Submitted 6 August, 2012; originally announced August 2012.

    Comments: 6 Pages

    Journal ref: International Journal of Computer Science Issues, Vol. 9, Issue 2, No 3, pp. 195-200, March 2012