The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Intrusion alert analysis system correlates alerts that generated by one or more IDS(s), and yields a succinct attack scenario which reflects an intrusion process. This paper presents an intrusion alert analysis model consists of four modules: alert formalization, alert filtering, alert fusion and correlation, and scenario visualization. Alerts are fused and correlated using approach based on finite...
This study examines the long memory behavior in the aluminum future returns using the rescaled range technique. The rescaled range technique is robust to detect the long-term dependence and non-period cycle in aluminum data. Our empirical results suggest that the long memory behavior in aluminum future returns is very stable. It means that the aluminum future returns follow a biased random walk. That...
The complex network model is the research foundation of complex network, so it is important to evaluate and select model objectively .There is no effective evaluation way up to now. An evaluating method using cloud model is proposed to decrease randomness and fuzziness existing in conventional evaluation. The results of simulating experiments prove that such uncertainty is solved well.
This paper proposes a distributed energy-efficient routing algorithm for mobile Ad Hoc networks (MANETs). We adopt the cross-layer design paradigm. The distance from the source node to the destination node is estimated based on the received signal strength indication (RSSI) of the packets and is used to adaptively adjust the backoff time of the MAC layer. A distance threshold and a packet count threshold...
This paper deals with an inverse problem based on the simultaneous use of the Finite Element Method (FEM) and the experimental method for the shape reconstruction of defects in inhomogeneous material. In a cylindrical specimen including different defects, a classic 2D finite element method is used for flaw echo computations. Results obtained from such calculations are used as the data for the inverse...
Dimensionality reduction with prior information is considered. The semi-supervised Laplacian eigenmap algorithm is proposed. It is shown that the performance of dimensionality reduction algorithms can be improved by taking into account the label information of the data. The data analysis and experiments show the validity of our algorithm.
PageRank algorithm is a famous algorithm to mine the Web structure, but it has a drawback of topic-drift. To eliminate the topic-drift of the PageRank algorithm, and after the analysis of existing algorithms, a new algorithm called TC-PageRank algorithm is put forward. The TC-PageRank algorithm is based on fictitious file vector and correlation measure of cosine. Experimental results illustrate that...
Models of agent and ABDIDSS (ABDIDSS--distributed intelligence decision support system based on multi-agents) are defined in this paper. Approximation spaces of the agent reasoning in ABDIDSS are built up. Rough set on approximation spaces is defined. Reasoning in ABDIDSS may be realized through the means of establishing decision trees. Multi – agents comprehending to definable sets, synthesis operation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.