The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We consider the problem of routing and resource allocation in a multi-layer network loaded by a combination of constant bit-rate (CBR) and variable bit-rate (VBR) traffic streams. One scalable heuristic method that addresses this problem is the multi-layer market algorithm (MMA). In this paper we focus on two validation benchmarks of MM A by Integer Linear Programming (ILP). The first is based on...
This paper presents the magnetic field modeling-based energy efficient routing for WSN which models the routing problem as a current-carrying solenoid and a free to turn magnet put into a uniform magnetic field respectively. The optimal routing is then performed through the path with the maximum generated magnetic field intensity for the solenoid technique and with minimum torque for the magnetic...
This paper proposes a vehicle detection and traffic volume statistics algorithm Based on an improved single Gaussian model. This algorithm contains three major sections, which are moving target detection, shadows suppression and traffic volume count. Firstly, with an improved background initialization method, the paper detects the moving target by using the single Gaussian model. Then, a computational...
In this paper, we introduce an Intrusion Detection system (IDS) based Hybrid Evolutionary Neural Network (HENN). A brief overview of IDS, genetic algorithm, and related detection techniques are discussed. The system architecture is also introduced. Factors affecting the genetic algorithm are addressed in detail. Unlike other implementations of IDS, Input features, network structure and connection...
To overcome the limitation of the approach proposed by Chomicki et ah, this paper presents a new methodology for policy conflict resolution. The property of action constraint instance set is studied, and an optimal solution for conflict resolution, i.e., the largest action-acceptance set, is introduced, and the general property of the smallest action-cancellation set as the complement of the solution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.