The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Deception happens in social life. Social life is now omnipresent in cyber domains. As a result, deception is also evident in cyberspace. Deception in cyberspace is diverse and often differs from traditional social deceptions. Deception has a cost or a loss, often incurred by the victim of the deception. Hence it is important to detect deceptions, and to protect assets. In this work, we carry out analyses...
Sensor networks pose a number of challenging conceptual and optimization problems. A fundamental problem in sensor networks is the clustering of the nodes into groups served by a high powered relay head, then forming a backbone among the relay heads for data transfer to the base station. We address this problem with a genetic algorithm (GA) as a search technique.
We consider a team of unmanned air vehicles (UAVs), deployed to carry out tasks such as searching for, classifying, attacking, and performing battle damage assessment of enemy targets. In some missions, it may be advantageous for the UAVs to form sub-teams to leverage their efforts and cooperatively handle single enemy targets. Within a sub-team, each UAV would be responsible for carrying out a specific...
Generally, cryptographic algorithms are based on NP-Complete problems like prime factorization, discrete logarithm etc. The difficulties of RSA and Rabin cryptographic algorithms are based on prime factorization problem. Prime factorization problem may be modeled as a Non-uniform discrete optimization problem. In this paper some meta heuristic techniques namely, Genetic algorithm, Differential Evolution...
Heterogeneous Sensor Networks are more powerful and efficient than homogeneous sensor networks. It has been shown that homogeneous sensor networks perform poorly because of routine limits and scalability. In our research, we consider to use heterogeneous topology to securely route data in a wireless sensor network. The given area of interest is initially partitioned into Voronoi clusters, where low-end...
Heterogeneous Sensor Networks are more powerful and efficient than homogeneous sensor networks. It has been shown that homogeneous sensor networks perform poorly because of routine limits and scalability. In our research, we consider to use heterogeneous topology to securely route data in a wireless sensor network. The given area of interest is initially partitioned into Voronoi clusters, where low-end...
Clustering, routing and security are essential for better performance of any sensor network. Providing inbuilt security to routing algorithms in sensor networks is essential since some of these sensor networks have applications in hostile environments. Researchers work either on a routing algorithm or on security. However, the security should be embedded to the design of a routing scheme. In this...
This paper presents an approach describing transmit power controlled clusters for Heterogeneous Sensor Networks (HSNs). There are two types of nodes in the network: the low-end and high-end nodes. The objective is to set a threshold limit of transmit power for low end nodes for the intra-cluster communication, and also set a limit for high end nodes for inter-cluster communication. We have tested...
Once sensors detect an event they always have to route the data to base station where the data is processed. Since sensors usually have concerns regarding coverage, energy, processing power and memory, etc achieving Quality of Service is hard in sensor networks. Therefore to deal with such issues of sensors and to maximize the Quality of Service, initially the two tiers Heterogeneous Sensor Networks...
When a malfunction occurs in a Smart Grid electricity provisioning system, it is vitally important to quickly diagnose the problem and take corrective action. The self-healing problem refers to the need to take action in near real time to reallocate power to minimize the disruption. To address this need, we present a collection of integer linear programming (ILP) models designed to identify optimal...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.