One of the most promising areas of research in the area of Intrusion Detection deals with the applications of the Artificial Intelligence (AI) techniques.
Different algorithms, methods and applications are created and implemented to solve the problem of detecting the attacks in intrusion detection systems.
Domain is a set of words in which there is a strong semantic relation among the words.
Key words: WordNet, Comprehension Index (CI), Word Sense Disambiguation (WSD), Word Knowledge, Domain.
Reference
[1] Chen, J.
This tool not only make the text to be simple but even this will make the tool to go dynamic by developing its knowledge base with the WordNet and things to go updated into synsets.
Based on the result of simulation, modeling analysis can be undertaken by parameters such as throughput, delay, packet loss and packet delivery fraction.
Key words: Wireless Sensor Network, throughput, delay, packet loss, packet delivery fraction, landslide early detection.
Reference
[1] R.
Thispaper presents the design of a wide range voltagecontrolled oscillator, a wide range high speed fullyprogrammable integer N prescaler, a phasefrequency detector (PFD), an accurate chargepump and a loop filter which entails an entire48MHz to 992MHz frequency synthesizer.
Key words: Blind zone, CML Logic, Cycle Slip,Dead zone, Prescalar
Reference
[1] R Jakob Baker, Harry W Li, David E Boyce, "CMOS Circuit Design Layout and Simulation", (Prentice Hall if India, 2003), Ch.
This paper gives a comparison between signature based and anomoly based IDS,we capture real time traffic using ourmon and concenterate to work on attack on TCP,UDP,ICMP protocol.
Key words: anomaly, attack ,IDS, ourmon ,UDP
Reference
[1] Haitao Sun, Shengli Liu, JiayongChen and Changhe Zhang "HTTP tunnel Trojan detection based on network behavior", Elsevier, Proceedings to the Energy Procedia ESEP 2011: 9-10 December 2011, Singapore, pp.
Since fast attack activity make a connection in few second and uses a large amount of packet, detecting this early connection provide the administrator one step ahead in deflecting further damages towards the network infrastructure.
With the ability to analyze network traffic and recognize incoming and on- going network attack, majority of network administrator has turn to IDS to help them in detecting anomalies in network traffic.
Finally the area of detectorshole were modified in order to gain the bestpossible pictures.
Key words: Semiconductor; gamma camera;detector.
Reference
[1].
There exists a function, edge.m which is in the image toolbox.
Key words: Face recognition; discrete cosine transform (DCT); sobel edge detection (SED); SOM network.
Reference
[1] D.
A, "the study of appropriate semiconductor detectors as a substitute for gamma camera detector by using montecarlo simulation'',thesis fo r master of science degree, Department of Physics, payam noor University of Mashhad,2010.
This intelligence by removing redundant data from face images through image compression using Sobel Edge Detection (SED) and comparing this with the two-dimensional discrete cosine transform (2D-DCT) method for the better speed and efficiency.
Meher,and Kavita Khare proposed an area-time efficientCORDIC algorithm that completely eliminatesthe scale-factor by microrotation selection whichis done by the most significant one detector in themicro rotation sequence generation circuit.