共查询到20条相似文献,搜索用时 0 毫秒
1.
Intrusion Detection System for Wireless Sensor Networks Using Danger Theory Immune-Inspired Techniques 总被引:1,自引:0,他引:1
Helio Mendes Salmon Claudio M. de Farias Paula Loureiro Luci Pirmez Silvana Rossetto Paulo Henrique de A. Rodrigues Rodrigo Pirmez Flávia C. Delicato Luiz Fernando R. da Costa Carmo 《International Journal of Wireless Information Networks》2013,20(1):39-66
An IDS framework inspired in the Human Immune System to be applied in the wireless sensor network context is proposed. It uses an improved decentralized and customized version of the Dendritic Cell Algorithm, which allows nodes to monitor their neighborhood and collaborate to identify an intruder. The work was implemented and tested both in simulation and in real sensor platform scenarios, comparing them to each other and was also compared to a Negative Selection Theory implementation in order to demonstrate its efficiency in detecting a denial-of-sleep attack and in energy consumption. Results demonstrated the success of the proposal. 相似文献
2.
介绍了全自动平衡机系统的组成及体系结构,并结合系统的运行环境、运行效果要求分析了系统的电磁兼容性,从电磁干扰三要素(干扰源、噪声耦合路径和敏感设备)着手,提出了保障系统电磁兼容性的若干手段.在此基础上进行了电磁兼容测试,给出了试验结果及结果分析.试验及实践结果表明,全自动平衡机系统达到了电磁兼容性要求. 相似文献
3.
4.
Klove T. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2009,55(8):3520-3525
It is shown that for any alphabet size q and any code size M, there exist proper codes for error detection on a q-ary symmetric channel for all sufficiently large lengths. The stronger condition zero-strong proper code is defined. It is shown that such codes can only exist for q dividing M, and if this is the case they are shown to exist for sufficiently large lengths. The existence proofs are constructive. 相似文献
5.
Khandoker A.H. Palaniswami M. Karmakar C.K. 《IEEE transactions on information technology in biomedicine》2009,13(1):37-48
Obstructive sleep apnea syndrome (OSAS) is associated with cardiovascular morbidity as well as excessive daytime sleepiness and poor quality of life. In this study, we apply a machine learning technique [support vector machines (SVMs)] for automated recognition of OSAS types from their nocturnal ECG recordings. A total of 125 sets of nocturnal ECG recordings acquired from normal subjects (OSAS- ) and subjects with OSAS (OSAS+), each of approximately 8 h in duration, were analyzed. Features extracted from successive wavelet coefficient levels after wavelet decomposition of signals due to heart rate variability (HRV) from RR intervals and ECG-derived respiration (EDR) from R waves of QRS amplitudes were used as inputs to the SVMs to recognize OSAS +/- subjects. Using leave-one-out technique, the maximum accuracy of classification for 83 training sets was found to be 100% for SVMs using a subset of selected combination of HRV and EDR features. Independent test results on 42 subjects showed that it correctly recognized 24 out of 26 OSAS + subjects and 15 out of 16 OSAS - subjects (accuracy = 92.85%; Cohen's kappa value of 0.85). For estimating the relative severity of OSAS, the posterior probabilities of SVM outputs were calculated and compared with respective apnea/hypopnea index. These results suggest superior performance of SVMs in OSAS recognition supported by wavelet-based features of ECG. The results demonstrate considerable potential in applying SVMs in an ECG-based screening device that can aid a sleep specialist in the initial assessment of patients with suspected OSAS. 相似文献
6.
Moness Mohammed Gaber Lamya Hussein Aziza I. Ali Hanafy M. 《Journal of Electronic Testing》2022,38(4):395-417
Journal of Electronic Testing - As the complexity and scope of VLSI designs continue to grow, fault detection processes in the pre-silicon stage have become crucial to guaranteeing reliability in... 相似文献
7.
LetM andN be two communicating finite state machines which exchange one type of message. We develope a polynomial algorithm to detect whether or notM andN can reach a deadlock. The time complexity of the algorithm isO(m^{3}n^{3} and its space isO(mn) wherem andn are the numbers of states inM andN , respectively. The algorithm can also be used to verify that two communicating machines which exchange many types of messages are deadlock-free. 相似文献
8.
Comparison of AdaBoost and Support Vector Machines for Detecting Alzheimer's Disease Through Automated Hippocampal Segmentation 总被引:1,自引:0,他引:1
《IEEE transactions on medical imaging》2010,29(1):30-43
9.
This paper introduces the concept of a similarity check function for error-resilient multimedia data transmission. The proposed similarity check function provides information about the effects of corrupted data on the quality of the reconstructed image. The degree of data corruption is measured by the similarity check function at the receiver, without explicit knowledge of the original source data. The design of a perceptual similarity check function is presented for wavelet-based coders such as the JPEG2000 standard, and used with a proposed ldquoprogressive similarity-based ARQrdquo (ProS-ARQ) scheme to significantly decrease the retransmission rate of corrupted data while maintaining very good visual quality of images transmitted over noisy channels. Simulation results with JPEG2000-coded images transmitted over the binary symmetric channel, show that the proposed ProS-ARQ scheme significantly reduces the number of retransmissions as compared to conventional ARQ-based schemes. The presented results also show that, for the same number of retransmitted data packets, the proposed ProS-ARQ scheme can achieve significantly higher PSNR and better visual quality as compared to the selective-repeat ARQ scheme. 相似文献
10.
11.
Osnat Keren 《Journal of Electronic Testing》2010,26(3):337-353
The paper deals with context-oriented codes for concurrent error detection. We consider a fault model for which, in the presence of a fault, the values on the circuit’s output are arbitrary. This model allows one to design an error detection code without analyzing sensitive parts or error cones in the synthesized circuit. Conventional coding schemes are based on a one-to-one mapping between an original output vector (information word) and a codeword. In this paper, we introduce a different approach, which we call one-to-many coding. In one-to-many code, each codeword comprises a predefined set of words. The functional unit is referred to as an encoder enabling each activation to map an information word to a different word. This flexible mapping system results in a lower implementation cost of the functional unit and its checker. 相似文献
12.
关注MPI并行程序的运行时错误检测,提出了一种基于冗余进程的检错方法REDReP,能够检测MPI并行程序在运行过程中由于硬件故障导致的数据错误.介绍了REDReP的基本思想,讨论了一些关键问题,最后给出了实验结果,表明REDReP具有较低的检错开销. 相似文献
13.
《Industrial Electronics, IEEE Transactions on》2008,55(12):4200-4209
14.
15.
Polymorphic malware is a secure menace for application of computer network systems because hacker can evade detection and launch stealthy attacks. In this paper, a novel enhanced automated signature generation (EASG) algorithm to detect polymorphie malware is proposed. The EASG algorithm is composed of enhanced-expectation maximum algorithm and enhanced K-means clustering algorithm. In EASG algorithm, the fixed threshold value is replaced by the decision threshold of interval area. The false positive ratio can be controlled at low level, and the iterative operations and the execution time are effectively reduced. Moreover, the centroid updating is realized by application of similarity metric of Mahalanobis distance and incremental learning. Different malware group families are partitioned by the centroid updating. 相似文献
16.
Soumik Sarkar Vivek Venugopalan Kishore Reddy Julian Ryde Navdeep Jaitly Michael Giering 《Journal of Signal Processing Systems》2017,88(2):205-217
Occlusion edges correspond to range discontinuity in a scene from the point of view of the observer. Detection of occlusion edges is an important prerequisite for many machine vision and mobile robotic tasks. Although they can be extracted from range data, extracting them from images and videos would be extremely beneficial. We trained a deep convolutional neural network (CNN) to identify occlusion edges in images and videos with just RGB, RGB-D and RGB-D-UV inputs, where D stands for depth and UV stands for horizontal and vertical components of the optical flow field respectively. The use of CNN avoids hand-crafting of features for automatically isolating occlusion edges and distinguishing them from appearance edges. Other than quantitative occlusion edge detection results, qualitative results are provided to evaluate input data requirements and to demonstrate the trade-off between high resolution analysis and frame-level computation time that is critical for real-time robotics applications. 相似文献
17.
A variation of the Jelinski/Moranda model is described. The main feature of this new model is that the variable (growing) size of a developing program is accommodated, so that the quality of a program can be estimated by analyzing an initial segment of the written code. Two parameters are estimated from the data. The data are: a) time separations between error detections, b) the number of errors per written instruction, c)the failure rate (or finding rate) of a single error, and d) a time record of the number of instructions under test. This model permits predictions of MTTF and error content of any software package which is homogenous with respect to its complexity (error making/finding). It assists in determining the quality, as measured by error contents, early on, and could eliminate the present practice of applying models to the wrong regimes (decreasing failure rate models applied to growing-in-size software packages). The growth model is very tractable analytically. The important requirement for applications is that the error-making rate must be constant across the entire software program. 相似文献
19.
Kiran Kumar Reddy Bharadwaj S. Amrutur Rubin A. Parekhji 《Journal of Electronic Testing》2010,26(3):323-335
With technology scaling, vulnerability to soft errors in random logic is increasing. There is a need for on-line error detection
and protection for logic gates even at sea level. The error checker is the key element for an on-line detection mechanism.
We compare three different checkers for error detection from the point of view of area, power and false error detection rates.
We find that the Double Sampling checker (used in Razor), is the simplest and most area and power efficient, but suffers from
very high false detection rates of 1.15 times higher than the actual error rates. We also find that the alternate approaches
of Triple Sampling and Integrate & Sample method can be designed to have zero false detection rates, but at an increased area,
power and implementation complexity. The Triple Sampling method has about 1.74 times the area and 1.83 times the power as
compared to the Double Sampling method and also needs a complex clock generation scheme. The Integrate & Sample method needs
about 6% more power and is 0.58 times the area of Double Sampling. It comes with more stringent implementation constraints
as it requires detection of small voltage swings. We also analyse for Double Transient Faults (DTFs) and show that all the
methods are prone to DTFs, with Integrate & Sample method being more vulnerable. 相似文献
20.
岑健明 《电子工业专用设备》2022,(1):48-52
提出了在全自动晶圆磨边设备中对晶圆平面度误差的等角度单圆周测量方案,讲述了最小二乘法的算法原理;并根据最小二乘法的算法原理,基于Matlab软件编写平面度误差评定及其结果的可视化程序;运行程序对全自动磨边机测量的数据进行处理,程序运行结果表明,该算法运行稳定可靠,能够快速确定最小二乘法平面方程和评定平面度误差。 相似文献