The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Research of the wireless sensor and actor networks has confronted with many problems, such as the coordination of sensors and actors, the model for network colony, and so on. This paper discusses the coordination frame of wireless sensor and actor networks. In order to solve the coordination problem of sensors and actors, we propose an algorithm based on an event driven clustering paradigm, which...
Wireless Sensor Network (WSN) attract lots of researchers because of its potential wide applications and special challenges. Developing an energyefficient routing protocol has a significant impact on the overall lifetime and stability of the sensor network. In this paper, we propose a multiple-hop energy efficient cluster algorithm, called MHEECA, to obtain an optimal path between cluster head nods...
Anomaly detection is a vital component of Intrusion Detection system. The anomaly detection approaches can be classified into semi-supervised and unsupervised anomaly detection. Unsupervised anomaly detection technique is the mainly approaches establish the profile of normal behavior with unlabeled training data that consists of both normal as well as anomalous samples. This paper uses the unsupervised...
IDS (Intrusion Detection system) is an active and driving defense technology. This paper mainly focuses on intrusion detection based on clustering analysis. The aim is to improve the detection rate and decrease the false alarm rate. A modified dynamic K-means algorithm called MDKM to detect anomaly activities is proposed and corresponding simulation experiments are presented. Firstly, the MDKM algorithm...
IDS (Intrusion Detection system) is an active and driving defense technology. This paper mainly focuses on intrusion detection based on data mining. The aim is to improve the detection rate and decrease the false alarm rate, and the main research method is clustering analysis. The algorithm and model of ID are proposed and corresponding simulation experiments are presented. Firstly, a method to reduce...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.