The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Artificial Neural Network (ANN) enables systems to think and act intelligently. In recent years, neural networks are applied in security for such tasks as attack classification, prevention, attack detection… Therefore, there are several researches in this area, particularly in Intrusion Detection System (IDS) which are based on neural network. Most of these IDSs are developed by using Neural Network...
This paper presents an approach for unknown indoor environment exploration using a simultaneous localization and mapping system. The approach addresses the problem of unknown indoor environments exploration, based on robot mobile moving and sonar scanning. The measurements given by the localization system (odometry for the test system), update for the robot self-localization. The map building process...
Mobile Ad Hoc Networks (MANETs) are susceptible to a variety of attacks that threaten their operation and the provided services. Intrusion Detection Systems (IDSs) may act as defensive mechanisms, since they monitor network activities in order to detect malicious actions performed by intruders, and then initiate the appropriate countermeasures. IDS for MANETs have attracted much attention recently...
Mobile Ad Hoc Networks (MANETs) are susceptible to a variety of attacks that threaten their operation and the provided services. Intrusion Detection Systems (IDSs) may act as defensive mechanisms, since they monitor network activities in order to detect malicious actions performed by intruders, and then initiate the appropriate countermeasures. IDS for MANETs have attracted much attention recently...
Mobile Ad Hoc Networks (MANETs) are susceptible to a variety of attacks that threaten their operation and the provided services. Intrusion Detection Systems (IDSs) may act as defensive mechanisms, since they monitor network activities in order to detect malicious actions performed by intruders, and then initiate the appropriate countermeasures. IDS for MANETs have attracted much attention recently...
This paper present an approach for unknown indoor environment exploration with simultaneous localization and mapping, the approach address the problem of exploration unknown indoor environments based on robot mobile moving and sonar scanning. The measurements given by the odometry system, update for the self-localization. The map building process maintaining two map grids: (1) map grid models the...
Nowadays, remote control of robots (telerobots) is mainly based on two models; the first one is used for controlling robot that work in well-defined environments; The second model concerns the monitoring and surveillance robots acting in an unknown and dynamic workspace. The disadvantages of these models are the lack of real human dynamic control of the robot tasks and the functionally limited available...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.