The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Extreme Learning Adaptive Neuro Fuzzy Inference System (ELANFIS) is a new learning machine which combines the learning capabilities of neural networks and the explicit knowledge of the fuzzy systems as in the case of conventional adaptive neuro-fuzzy inference system (ANFIS). ELANFIS reduces the computational complexity of ANFIS by eliminating the hybrid learning algorithm and avoids the randomness...
Cloud computing and virtualization are two key technology priorities for telecom service providers. Besides total cost reduction, there are many strategic objectives while adopting cloud technology into the telecom sector. Telecom service providers core assets and strength lies in their communication networks, but these alone are not enough to maintain the industry in the higher level that it once...
Online dynamic security assessment involves analyzing the effect of a large number of contingencies in a short time. This is a computationally demanding task, and use of energy function method reduces the computational burden. Energy function method involves determination of a quantity called critical energy which requires system simulation for a short duration. In spite of the use of energy function...
Ensuring design correctness is an important task in the software development and in particular component-based protocol development. We developed a component-oriented design approach for the design of communication protocols and distributed systems. The approach aims at the reuse of components represented by Unified Modeling Language (UML) diagrams. In this paper we propose a verification approach...
Certain Wireless sensor network (WSN) applications such as military and e- health care require the inter-node communication to be secure. The tiny WSN nodes have limited computational power, memory and finite energy source. These constraints restrict the implementation of highly secure models on the devices as they demand more memory and involve compute intensive operations. Several protocols have...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.