Sciweavers

165 search results - page 11 / 33
» Network Border Patrol
Sort
View
GLOBECOM
2006
IEEE
14 years 1 months ago
Efficient Construction of Weakly-Connected Dominating Set for Clustering Wireless Ad Hoc Networks
In most of the proposed clustering algorithms for wireless ad hoc networks, the cluster-heads form a dominating set in the network topology. A variant of dominating set which is mo...
Bo Han, Weijia Jia
ISCIS
2004
Springer
14 years 1 months ago
Finding Breach Paths Using the Watershed Segmentation Algorithm in Surveillance Wireless Sensor Networks
Considering wireless sensor networks for border surveillance, one of the major concerns is sensing coverage. Breach probability can be used as a measure to analyze the tradeoffs a...
Ertan Onur, Cem Ersoy, Hakan Deliç, Lale Ak...
ESANN
2001
13 years 9 months ago
Transfer functions: hidden possibilities for better neural networks
Abstract. Sigmoidal or radial transfer functions do not guarantee the best generalization nor fast learning of neural networks. Families of parameterized transfer functions provide...
Wlodzislaw Duch, Norbert Jankowski
COMCOM
2007
156views more  COMCOM 2007»
13 years 7 months ago
A survey on clustering algorithms for wireless sensor networks
The past few years have witnessed increased interest in the potential use of wireless sensor networks (WSNs) in applications such as disaster management, combat field reconnaissa...
Ameer Ahmed Abbasi, Mohamed F. Younis
ICANN
2005
Springer
14 years 1 months ago
Self Organizing Map (SOM) Approach for Classification of Power Quality Events
In this work, Self Organizing Map (SOM) is used in order to classify the types of defections in electrical systems, known as Power Quality (PQ) events. The features for classificat...
Emin Germen, Dogãn Gökhan Ece, Öm...