In this paper, we propose a novel data mining technique for the efficient damage detection within the large-scale complex mechanical structures. Every mechanical structure is defi...
Aleksandar Lazarevic, Ramdev Kanapady, Chandrika K...
In Ad hoc networks, malicious nodes can enter in radio transmission range on the routing path and disrupt network activity. Therefore, protecting from intrusion of malicious node a...
Abstract--Recent spates of cyber-attacks and frequent emergence of applications affecting Internet traffic dynamics have made it imperative to develop effective techniques that can...
The Prairie Pothole Region (PPR) of the US and Canada is characterized by thousands of shallow, water-filled depressions with sizes ranging from a fraction of a hectare to several...
Location-based services like reminders, electronic graffiti, and tourist guides normally require a custom, location-sensitive database that must be custom-tailored for the applicat...