The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cardiovascular diseases are the leading cause of death in the United States. Advances in wireless technology have made possible the remote monitoring of a patient's heart sensors as part of a body area network. Some of these networks use a Bluetooth Low Energy (BLE) component to transmit the signal between the bio sensors and a smart phone. This study investigates the impact that stray wireless transmissions...
Ensemble-classifier is a technique that uses a combination of multiple classifiers to reach a more precise inference result than a single classifier. In this paper, a three-layer hierarchy multi-classifier intrusion detection architecture is proposed to promote the overall detection accuracy. For making every individual classifier is independent from others, each uses a diverse soft computing technique...
This paper describes a hybrid design for intrusion detection that combines anomaly detection with misuse detection. The proposed method includes an ensemble feature selecting classifier and a data mining classifier. The former consists of four classifiers using different sets of features and each of them employs a machine learning algorithm named fuzzy belief k-NN classification algorithm. The latter...
This paper presents a method of integration and implementation of transmitting video and audio data from multiple Internet protocol (IP) surveillance cameras in a wireless sensor network to a centralized management unit (central node) using real time streaming protocol (RTSP). The wireless network is based on ldquostarrdquo topology by using the IEEE 802.11 series of standards in wireless local area...
In this paper, we have proposed a System-on-a-Chip (SoC) architectural design to avoid potential intrusion or attacks from external devices. Either using misuse detection or anomaly detection techniques to design intrusion detection systems, a large amount of traffic data is needed to be collected in advance for analysis. However, it is not feasible in the limited resources available in SoC systems...
A novel parallel interference cancellation receiver for QAM modulated turbo coded uplink MC- CDMA systems has been proposed. In the receiver, the multi-stage partial soft parallel interference cancellation has been applied. The receiver employs the new adaptive minimum mean square combining, so that the system is able to adjust the equalization gain coefficients in every iterative stage adaptively...
In this paper, we propose a method to resolve uncertainty problems by incorporating fuzzy clustering technique and Dempster-Shafer theory. Also, the k-nearest neighbors (k-NN) technique is applied to speed up the detection process and C4.5 decision tree algorithm is used to improve the classification accuracy. For verifying the performance of our classifier, DARPA KDD99 intrusion detection evaluation...
In a large amount of monitoring network traffic data, not every feature of the data is relevant to the intrusion detection task. In this paper, we aim to reduce the dimensionality of the original feature space by removing irrelevant and redundant features. A correlation-based feature selection algorithm is proposed for selecting a subset of most informative features. Six data sets retrieved from UCI...
Fuzzy c-means (FCM) algorithm is popularly used as a tool in various classification applications, yet it cannot be applied directly to a data set with missing values. Unfortunately, it is inevitable that a real world data set always contains missing values. Consequently, finding an effective way to handle incomplete data becomes an essential and important task. In this paper, an approach based on...
Either using misuse detection or anomaly detection techniques to design intrusion detection systems, a large amount of traffic data is necessary to be collected in advance for analysis. However, the data always enclose uncertainties due to only limited intrusive information available and ambiguous information about computer users' activities. While designing intrusion detection systems, these uncertainties...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.