Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Physical Sciences and Mathematics
Scatter Reduction By Exploiting Behaviour Of Convolutional Neural Networks In Frequency Domain, Carlos Ivan Jerez Gonzalez
Scatter Reduction By Exploiting Behaviour Of Convolutional Neural Networks In Frequency Domain, Carlos Ivan Jerez Gonzalez
Theses and Dissertations
In X-ray imaging, scattered radiation can produce a number of artifacts that greatly
undermine the image quality. There are hardware solutions, such as anti-scatter grids.
However, they are costly. A software-based solution is a better option because it is
cheaper and can achieve a higher scatter reduction. Most of the current software-based
approaches are model-based. The main issues with them are the lack of flexibility, expressivity, and the requirement of a model. In consideration of this, we decided to apply
Convolutional Neural Networks (CNNs), since they do not have any of the previously
mentioned issues.
In our approach we split …
Network Intrusion Detection: Monitoring, Simulation And Visualization, Mian Zhou
Network Intrusion Detection: Monitoring, Simulation And Visualization, Mian Zhou
Electronic Theses and Dissertations
This dissertation presents our work on network intrusion detection and intrusion sim- ulation. The work in intrusion detection consists of two different network anomaly-based approaches. The work in intrusion simulation introduces a model using explicit traffic gen- eration for the packet level traffic simulation. The process of anomaly detection is to first build profiles for the normal network activity and then mark any events or activities that deviate from the normal profiles as suspicious. Based on the different schemes of creating the normal activity profiles, we introduce two approaches for intrusion detection. The first one is a frequency-based approach which …