نتایج جستجو برای: resilient networks

تعداد نتایج: 440665  

2005
Junbeom Hur Yoonho Lee Seongmin Hong Hyunsoo Yoon

Wireless Sensor networks are often deployed in open environment, thus the networks can be susceptible to their unexpected physical environment and attacks from some adversaries. In addition, sensor devices are limited in resources and vulnerable to node capture, so even a few malicious adversaries can easily compromise sensor devices and inject forged data into the networks to make the networks...

2010
Alexander Gutfraind

Complex socioeconomic networks such as information, finance and even terrorist networks need resilience to cascades--to prevent the failure of a single node from causing a far-reaching domino effect. We show that terrorist and guerrilla networks are uniquely cascade-resilient while maintaining high efficiency, but they become more vulnerable beyond a certain threshold. We also introduce an opti...

Arman Zamani Ghasem Babaei Nayyer Mostafavi

Introduction: This study aimed to present a system based on intelligent models that can enhance the accuracy of diagnostic systems for acute leukemia. The three parts including preprocessing, feature extraction, and classification network are considered as associated series of actions. Therefore, any dysfunction or poor accuracy in each part might lead in general dysfunction of...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان 1389

wireless sensor networks (wsns) are one of the most interesting consequences of innovations in different areas of technology including wireless and mobile communications, networking, and sensor design. these networks are considered as a class of wireless networks which are constructed by a set of sensors. a large number of applications have been proposed for wsns. besides having numerous applic...

2016
David Saldaña Amanda Prorok Mario F. M. Campos Vijay Kumar

Consensus algorithms allow multiple robots to achieve agreement on estimates of variables in a distributed manner, hereby coordinating the robots as a team, and enabling applications such as formation control and cooperative area coverage. These algorithms achieve agreement by relying only on local, nearest-neighbor communication. The problem with distributed consensus, however, is that a singl...

2010
Tanvir Al Amin Rifat Ahsan

Recently, Sybil attack has become one of the most visible security problems in the peer to peer networks where it is not possible to depend on trusted authorities for admission control or maintenance. In such networks or in any open distributed systems, an adversary creates many fake identities in order to increase its influence and deny service to honest participants. Defending against this at...

2006
Kun Sun Mladen A. Vouk

SUN, KUN. Trustworthy and Resilient Time Synchronization in Wireless Sensor Networks. (Under the direction of Dr. Peng Ning and Dr. Cliff Wang.) Wireless sensor networks have received a lot of attention recently due to its wide applications. Accurate and synchronized time is crucial in many sensor network applications. A number of time synchronization schemes have been proposed recently to addr...

Journal: :CoRR 2017
Samuel F. Dodge Lina J. Karam

We study deep neural networks for classification of images with quality distortions. We first show that networks fine-tuned on distorted data greatly outperform the original networks when tested on distorted data. However, finetuned networks perform poorly on quality distortions that they have not been trained for. We propose a mixture of experts ensemble method that is robust to different type...

Journal: :isecure, the isc international journal of information security 0
a. mortazavi sharif university of technology m. salmasizadeh sharif university of technology a. daneshgar sharif university of technology

a non-malleable code is a variant of an encoding scheme which is resilient to tampering attacks. the main idea behind nonmalleable coding is that the adversary should not be able to obtain any valuable information about the message. non-malleablecodes are used in tamper-resilient cryptography and protecting memories against tampering attacks. many different types of nonmalleability have already...

G. Ghodrati Amiri, P. Namiranian,

The main objective of this paper is to use ant optimized neural networks to generate artificial earthquake records. In this regard, training accelerograms selected according to the site geology of recorder station and Wavelet Packet Transform (WPT) used to decompose these records. Then Artificial Neural Networks (ANN) optimized with Ant Colony Optimization and resilient Backpropagation algorith...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید