The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a new scheme for hyperspectral image classification through k-means clustering. The scheme includes three steps. Firstly, principal component analysis (PCA) is utilized for dimension reduction of the hyperspectral image. Secondly, the reduced features are clustered using k-means clustering algorithm and subsequently the clusters are trained separately by multi-class support vector...
Evolving technology has created an inevitable threat of expose of data that is shared online. Wireshark tool enables the ethical hacker to reveal the flaws in the system security at the user authentication level. This approach of identifying vulnerabilities is deemed fit as the strategy involved in this testing is rapid and provides good success in identifying vulnerabilities. The usage of Wireshark...
In this paper,[2] analyzed the interval optimality rejected level in k-phase Erlang service pattern. Here the queueing system consists in k-phase Erlang arrival pattern and the parameters are considered in TFN's. First we construct the inverse membership of the steady state performance measures. Second we construct the pairs of MILP to calculate the lower and upper bound of the performance measure...
Security of communication network is essential for the smooth functioning of smart grid. In this paper, an intrusion detection system is proposed for early detection of threats in advanced metering infrastructure of smart grid. The proposed intrusion detection system has a multi-support vector machine classifier with mutual information based feature selection technique to detect attacks in Neighborhood...
Moreover, these perceptrons are not really multilayer perceptron in the strictest possible sense, as the true multilayer perceptron are a special case of crime news that use a threshold activation function such as the heavy side step function, whereas the crime news in a multilayer perceptron are free to take on any random activation function. This gap between the actual crime and the one that is...
The switching activity due to various test vectors has direct effect on amount of power consumption during testing. Due to higher switching activity during test mode compared to the switching activity during functional mode the power consumption may be higher than functional mode power consumption. The excessive average and instantaneous power requirement during slow speed and high speed test conditions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.