Subject Details
Dept     : CSE-IOT
Sem      : 7
Regul    : 2019
Faculty : RR.Kmalakkannan
phone  : NIL
E-mail  : kamalakannan.r.iot@snsce.ac.in
293
Page views
33
Files
2
Videos
0
R.Links

Icon
Lecture Notes

UNIT 1:
pdf
download    open file
Basics of pattern recognition
pdf
download    open file
Design principles of pattern recognition system
pdf
download    open file
Design principles of pattern recognition system
pdf
download    open file
Learning and adaptation
pdf
download    open file
Learning and adaptation
pdf
download    open file
Pattern recognition approaches.
UNIT 2:
pdf
download    open file
Bayesian Decision Theory Continuous Features
pdf
download    open file
Discriminant functions for the normal density Maximum likelihood estimation.
pdf
download    open file
Introduction
pdf
download    open file
The normal density- Discriminant functions
pdf
download    open file
discriminant functions, and decision surfaces
pdf
download    open file
Minimum error rate- classification- classifiers
UNIT 3:
pdf
download    open file
Density Estimation - Parzen Windows
pdf
download    open file
K-Nearest Neighbor Estimation - Nearest Neighbor Rule
pdf
download    open file
Fuzzy clustering. NonMetric Methods
pdf
download    open file
Introduction-Decision Trees- CART
pdf
download    open file
Other Tree Methods Recognition with Strings
pdf
download    open file
Netflow analyzer.
UNIT 4:
pdf
download    open file
Anomaly detection– data driven methods
pdf
download    open file
feature engineering – detection with data and algorithms
pdf
download    open file
challenges using ML- response and mitigation
pdf
download    open file
Malware Analysis: defining
pdf
download    open file
feature generation – classification
pdf
download    open file
Network Traffic Analysis
UNIT 5:
pdf
download    open file
Facing the Cybercrime Problem Head-on
pdf
download    open file
Emerging Cybercrime Techniques
pdf
download    open file
Understanding the People on the Scene
pdf
download    open file
The Computer Investigation Process
pdf
download    open file
Acquiring Data, Duplicating Data, and Recovering Deleted Files
pdf
download    open file
Understanding Network Intrusions and Attacks.