Learn More
The advent of digital computers has made the routine use of pattern-matching possible in various applications. This has also stimulated the development of many algorithms. In this paper, we propose a new algorithm that offers improved performance compared to those reported in the literature so far. The new algorithm has been evolved after analyzing the(More)
—Various Intrusion Detection Systems reported in literature have shown distinct preferences for detecting a certain class of attack with improved accuracy, while performing moderately on the other classes. In view of the enormous computing power available in the present-day processors, deploying multiple Intrusion Detection Systems in the same network to(More)
—In this paper, we present a novel heuristic for routing and wavelength assignment in Virtual-Wavelength-Path (VWP) routed WDM optical networks. We are the first to take up the approach of both minimizing the network cost as well as maximizing the resource utilization. Our algorithm not only minimizes the number of wavelengths required for supporting the(More)
— Various Intrusion Detection Systems reported in literature have shown distinct preferences for detecting a certain class of attacks with improved accuracy, while performing moderately on the other classes. With the advances in sensor fusion, it has become possible to obtain a more reliable and accurate decision for a wider class of attacks, by combining(More)
Biological systems present remarkable adaptation, reliability and robustness in various environments, even under hostility. Most of them are performed by the individuals in a distributed and self-organized way. These biological mechanisms provide the useful resources for designing the dynamical and adaptive routing schemes of the wireless mobile sensor(More)
— Sensor Fusion using heterogeneous Intrusion Detection Systems are employed to aggregate different views of the same event in order to improve the detection through detector reinforcement or complementarity. The fusion technique proposed in this paper is expected to combine the Intrusion Detection System outputs with subjective judgements. In this paper, a(More)
pany delivery with improved image guidance using offline and online projection x-ray imaging and computed tomog-raphy (CT). The second is to increase the total radiation dose using the historical dose per fraction (2 Gy) with the same image guidance. Literature on lung tumor irradiation has frequently cited the benefits to local tumor control of escalating(More)