A methodology for surveillance of multiple targets through a distributed mobile sensor network is proposed in this paper. We examine coordination among sensors that monitor a rect...
K. Madhava Krishna, Henry Hexmoor, Subbarao Pasupu...
: It is known that graphic interfaces using electromyogram (EMG) generated by wrist motion are a potentially viable for a wearable computer. However, these interface prototypes see...
Based on independent component analysis (ICA) and self-organizing maps (SOM), this paper proposes an ISOM-DH model for the incomplete data’s handling in data mining. Under these ...
The state of the art is explored in using soft computing (SC) methods for network intrusion detection, including the examination of efforts in ten specific areas of SC as well as ...
— Flow level measurements are used to provide insights into the traffic flow crossing a network link. However, existing flow based network detection devices lack adaptive reconfi...