The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Optimal operation of a practical blast furnace (BF) iron-making process depends largely on a good measurement of molten iron quality (MIQ) indices. However, measuring the MIQ online is not feasible using the available techniques. In this paper, a novel data-driven robust modeling is proposed for an online estimation of MIQ using improved random vector functional-link networks (RVFLNs). Since the output...
A bistatic Synthetic Aperture Radar (Bis-SAR) imagery simulation of an extended sea surface is presented which is based on a facet scattering model. A semi-deterministic approach is developed to calculate high frequency bistatic raw data from the model of large sea surface. An effective method of modified nonlinear chirp scaling (NLCS) algorithm is presented to handle a general case of bistatic raw...
Intrusion detection technique has become increasingly important in the area of network security research. It is innovative that various soft computing approaches have been applied to the intrusion detection field. This paper presents an intelligent intrusion detection system which incorporates several soft computing techniques to implement either misuse or anomaly detection. Genetic algorithm is used...
With the growing rate of network attacks, intelligent methods for detecting new attacks have attracted increasing interest. This paper presents an approach incorporating several soft computing techniques to construct a hierarchical neuro-fuzzy inference intrusion detection system which can implement either misuse or anomaly detection. In the proposed system principal component analysis neural network...
Analyzed the energy consumption disciplinarian of the nodes in WSN, the node's energy attenuation forecast model (EAFM) can be established. A difference-threshold reporting mechanism (DTRM) is used to report the residual energy of nodes. The energy collection mechanism based on EAFM and DTRM can reduce energy data reporting times significantly, improve the efficient of energy data collection, save...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.