Learn More
ata mining is " the data-driven discovery and modeling of hidden patterns in large volumes of data. " Data mining differs from retrospective technologies because it produces models that capture and represent hidden patterns in the data. Space images have inspired researchers to study the intrinsic use of information gathering and information delivery.(More)
—In this paper, we present a novel heuristic for routing and wavelength assignment in Virtual-Wavelength-Path (VWP) routed WDM optical networks. We are the first to take up the approach of both minimizing the network cost as well as maximizing the resource utilization. Our algorithm not only minimizes the number of wavelengths required for supporting the(More)
What do proteins look like? Proteins are composed of fundamental building blocks of chemical molecules called amino acids. When a protein is synthesized by the cells, initially it is just a string of amino acids. This string arranges itself in a process called protein folding into a complex three-dimensional structure capable of exerting the function of the(More)
The advent of digital computers has made the routine use of pattern-matching possible in various applications. This has also stimulated the development of many algorithms. In this paper, we propose a new algorithm that offers improved performance compared to those reported in the literature so far. The new algorithm has been evolved after analyzing the(More)
Various intrusion detection systems (IDSs) reported in the literature have shown distinct preferences for detecting a certain class of attack with improved accuracy, while performing moderately on the other classes. In view of the enormous computing power available in the present-day processors, deploying multiple IDSs in the same network to obtain(More)
Infrastructure creation and data dissemination in WSN have traditionally been treated as independent problems. We argue that the two are tightly coupled; the former can expose key structural elements which can be exploited by the latter. This paper proposes the algorithm pair iGroup-iSpread that achieves fast and message-efficient operation by treating the(More)
Various intrusion detection systems reported in literature have shown distinct preferences for detecting a certain class of attacks with improved accuracy, while performing moderately on the other classes. With the advances in sensor fusion, it has become possible to obtain a more reliable and accurate decision for a wider class of attacks, by combining the(More)
Biological systems present remarkable adaptation, reliability and robustness in various environments, even under hostility. Most of them are performed by the individuals in a distributed and self-organized way. These biological mechanisms provide the useful resources for designing the dynamical and adaptive routing schemes of the wireless mobile sensor(More)