Sciweavers

329 search results - page 42 / 66
» Utilizing Neural Networks For Effective Intrusion Detection
Sort
View
JCIT
2010
156views more  JCIT 2010»
13 years 2 months ago
Intelligent Monitoring Approach for Pipeline Defect Detection from MFL Inspection
Artificial Neural Networks(ANNS) have top level of capability to progress the estimation of cracks in metal tubes. The aim of this paper is to propose an algorithm to identify mod...
Saeedreza Ehteram, Seyed Zeinolabedin Moussavi, Mo...
MVA
2007
153views Computer Vision» more  MVA 2007»
13 years 7 months ago
An image-based feature tracking algorithm for real-time measurement of clad height
This paper presents a novel algorithm for real-time detection of clad height in laser cladding which is known as a layered manufacturing technique. A realtime measurement of clad g...
Mehrdad Iravani-Tabrizipour, Ehsan Toyserkani
ISCC
2006
IEEE
169views Communications» more  ISCC 2006»
14 years 1 months ago
Hierarchical Anomaly Detection in Distributed Large-Scale Sensor Networks
In this paper, an anomaly detection approach that fuses data gathered from different nodes in a distributed wireless sensor network is proposed and evaluated. The emphasis of this...
Vasilis Chatzigiannakis, Symeon Papavassiliou, Mar...
CORR
2010
Springer
175views Education» more  CORR 2010»
13 years 7 months ago
Detecting Security threats in the Router using Computational Intelligence
Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and acc...
J. Visumathi, K. L. Shunmuganathan
TISSEC
2008
202views more  TISSEC 2008»
13 years 7 months ago
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Qing Zhang, Ting Yu, Peng Ning