Evolutionary computation for feature selection in classification problems
B De La Iglesia - Wiley Interdisciplinary Reviews: Data Mining …, 2013 - Wiley Online Library
Feature subset selection (FSS) has received a great deal of attention in statistics, machine
learning, and data mining. Real world data analyzed by data mining algorithms can involve …
learning, and data mining. Real world data analyzed by data mining algorithms can involve …
Non-conventional keystroke dynamics for user authentication
This paper introduces an approach for user authentication using free-text keystroke
dynamics which incorporates the use of non-conventional keystroke features. Semi-timing …
dynamics which incorporates the use of non-conventional keystroke features. Semi-timing …
Estimation of daily dew point temperature by using bat algorithm optimization based extreme learning machine
J Dong, L Wu, X Liu, Z Li, Y Gao, Y Zhang… - Applied Thermal …, 2020 - Elsevier
Capabilities of the bat algorithm optimized extreme learning machine (Bat-ELM) model for
dew point temperature (T dew) estimation were evaluated in this study, in comparison with …
dew point temperature (T dew) estimation were evaluated in this study, in comparison with …
Keystroke dynamics for biometric authentication—A survey
S Bhatt, T Santhanam - 2013 international conference on …, 2013 - ieeexplore.ieee.org
The latest trend in authenticating users is by using the potentiality of biometrics. Keystroke
dynamics is a behavioural biometrics which captures the ty** rhythms of users and then …
dynamics is a behavioural biometrics which captures the ty** rhythms of users and then …
A new feature scoring method in keystroke dynamics-based user authentications
DI Kim, S Lee, JS Shin - IEEE Access, 2020 - ieeexplore.ieee.org
In recent years, computing devices have become widely distributed, and the accumulated
data from these devices are growing rapidly, especially as they are increasingly equipped …
data from these devices are growing rapidly, especially as they are increasingly equipped …
Analysis of strong password using keystroke dynamics authentication in touch screen devices
In this paper user verification and identification system on touch screen mobile devices is
proposed. The system examines the keystroke dynamics and uses it as a second …
proposed. The system examines the keystroke dynamics and uses it as a second …
Free‐text keystroke dynamics authentication for Arabic language
This study introduces an approach for user authentication using free‐text keystroke
dynamics which incorporates text in Arabic language. The Arabic language has completely …
dynamics which incorporates text in Arabic language. The Arabic language has completely …
A mobile edge computing-assisted video delivery architecture for wireless heterogeneous networks
We focus on QoE-optimized video delivery in a wireless heterogeneous network setting,
where users equipped with multi-interface devices access a Dynamic Adaptive Streaming …
where users equipped with multi-interface devices access a Dynamic Adaptive Streaming …
Keystroke dynamics: a behavioral biometric model for user authentication in online exams
Online learning has entirely transformed the way of learning by the students. Online tests
and quizzes play an important role in online learning, which provides accurate results to the …
and quizzes play an important role in online learning, which provides accurate results to the …
User identification by keystroke dynamics using improved binary particle swarm optimisation
T Wu, K Zheng, G Xu, C Wu… - International Journal of …, 2019 - inderscienceonline.com
As a kind of behavioural characteristic, keystroke features are crucial to the accuracy of user
identification system using shallow machine learning algorithms. Filter and wrapper feature …
identification system using shallow machine learning algorithms. Filter and wrapper feature …