<Previous Article In Volume
New boundary point detection algorithm NPRIM in hospital information security intrusion detection system
Authors
Xingshan Li, Xiangyang Shao
Corresponding Author
Xingshan Li
Available Online November 2016.
- DOI
- 10.2991/icimm-16.2016.141How to use a DOI?
- Keywords
- NPRIM algorithm, triangulation graph, threshold of boundary value, boundary point detection algorithm
- Abstract
In this paper, the advantages and disadvantages of various kinds of clustering analysis and boundary point detection algorithms are analyzed, Combined with intrusion detection to deal with the characteristics of the data object containing noise, varied types,uneven density, and large amount of data. The Non parametric boundary point detection algorithm NPRIM algorithm is used by the project group to add the clustering function. It is proposed that the algorithm can not only be able to cluster and extract the boundary points without input parameters, but also can be applied to intrusion detection system.
- Copyright
- © 2016, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
<Previous Article In Volume
Cite this article
TY - CONF AU - Xingshan Li AU - Xiangyang Shao PY - 2016/11 DA - 2016/11 TI - New boundary point detection algorithm NPRIM in hospital information security intrusion detection system BT - Proceedings of the 6th International Conference on Information Engineering for Mechanics and Materials PB - Atlantis Press SP - 778 EP - 782 SN - 2352-5401 UR - https://doi.org/10.2991/icimm-16.2016.141 DO - 10.2991/icimm-16.2016.141 ID - Li2016/11 ER -