In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
— Recently, trust establishment is recognized as an important approach to defend distributed networks, such as mobile ad hoc networks and sensor networks, against malicious attac...
An in-situ self-aware adaptive power control (APC) system is presented in this paper. This APC system consists of a voltage sensor, a variable threshold comparator, slack detectio...
In this paper, a neuro-fuzzy algorithm has been implemented to improve the path planning of a mobile robot based on modification of vector field histogram (VFH) approach using neu...
The ability of worms to spread at rates that effectively preclude human-directed reaction has elevated them to a first-class security threat to distributed systems. We present th...