This paper deals with the various roles that can be recognized in self organized wireless devices. Wireless network which demands for a higher level of self organization, proposes strategies of creating backbone, requ...
详细信息
ISBN:
(纸本)9783642274428
This paper deals with the various roles that can be recognized in self organized wireless devices. Wireless network which demands for a higher level of self organization, proposes strategies of creating backbone, requires identifying various roles which each participating device is playing. In this approach the efficient way to identify the roles and devices that can perform appropriate roles suitably is identified to yield a complex global emergent behavior. Various roles are identified like agents, willingness to act as a gateway, gateways etc. A minimum connection in backbone of self organized network avoids unnecessary broadcasting and in turn energy savings can be achieved. Proposed strategy assigns roles to devices by identifying inconsistency in duplicate gateways and tries to minimize unnecessary broadcast with effective connections.
Artificial Intelligence deals with the machines or a systems that understand, learn think and behave like humans do. Recent research in Artificial Intelligence mainly focused on developing an intelligent system for de...
详细信息
The Domain Name System (DNS) is an essential component of the Internet infrastructure that translates domain names into IP addresses. Recent incidents verify the enormous damage of malicious activities utilizing DNS s...
详细信息
ISBN:
(纸本)9783319591711;9783319591704
The Domain Name System (DNS) is an essential component of the Internet infrastructure that translates domain names into IP addresses. Recent incidents verify the enormous damage of malicious activities utilizing DNS such as bots that use DNS to locate their command & control servers. We believe that a domain that is related to malicious domains is more likely to be malicious as well and therefore detecting malicious domains using the DNS network topology is a key challenge. In this work we improve the flow model presented by Mishsky et al. [12] for computing the reputation of domains. This flow model is applied on a graph of domains and IPs and propagates their reputation scores through the edges that connect them to express the impact of malicious domains on related domains. We propose the use of clustering to guide the flow of reputation in the graph and examine two different clustering methods to identify groups of domains and IPs that are strongly related. The flow algorithms use these groups to emphasize the influence of nodes within the same cluster on each other. We evaluate the algorithms using a large database received from a commercial company. The experimental evaluation of our work have shown the expected improvement over previous work [12] in detecting malicious domains.
In order to further clarify the path to high yield cultivation techniques for Yongyou 8, a hybrid late season japonica rice line, we selected 65 sets of data from 11 sites in Zhejiang and Jiangsu Provinces between 200...
详细信息
Ubiquitous networks in home environments are expanding connectivity to electronic objects/things which can be used to build home network services. This approach uses thing-to-thing or thing-to-gateway connections to a...
详细信息
ISBN:
(纸本)9781479947744
Ubiquitous networks in home environments are expanding connectivity to electronic objects/things which can be used to build home network services. This approach uses thing-to-thing or thing-to-gateway connections to access the Internet of Things, allowing data to be stored for cross-referencing and accessing services, such as remote home sensors, etc. In order to make these ubiquitous networks available in the home, power line communication is used. These lines carry data simultaneously with AC electric power. Power lines connect heterogeneous devices through private electrical networks, allowing greater flexibility in the deployment of applications that require important data transfer. Broadband access and advancements in ubiquitous computing have fostered the development of power line communication offering integrated services through a reliable and robust system at the physical and data link layer of the open system interconnection ( OSI) model. In this paper we describe application of ubiquitous networks in smart home environment.
Natural Language Processing is concerned with processing and analyzing natural language with the help of a computer, i.e., any language that is spoken or written by us. Natural language processing is one of the fundam...
详细信息
During the COVID-19 outbreak, all the physical classes suspended, and switched to online learning. The new era of learning presented several challenges for the teachers and students. The students did not have the oppo...
详细信息
This paper presents a binary search analog to digital converter based on sub-ADC scheme in which the 16-bit architecture is split into four stages and the whole architecture uses only N comparators instead of (2N-1) c...
详细信息
Cube connected networks are designed from the hypercube architecture which has attractive properties. Edges in the cube-connected networks depict the node-to-node communication amidst processors. M-Polynomials have go...
详细信息
In order to resolve the problem of the non-repudiation of digital signatures, this paper analyzes the RSA signature scheme and the undeniable signature scheme, based on this an improved undeniable signature algorithm ...
详细信息
暂无评论