Chung-Ang University

Displaying 1-4 of 4 results

  • White Papers // Jan 2013

    Distributed Intrusion Detection Systems: A Computational Intelligence Approach

    Computer security is defined as the protection of computing systems against threats to confidentiality, integrity, and availability. An intrusion is defined as any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource. The process of monitoring the events occurring in a computer system or...

    Provided By Chung-Ang University

  • White Papers // Jul 2012

    Modeling Internet Diffusion in Developing Countries

    Despite the increasing importance of the Internet, there is little work that addresses the degree to which the models and theories of Internet diffusion in developed countries can be applied to Internet diffusion in developing countries. This paper presents the first attempt to address this issue through theory driven modeling...

    Provided By Chung-Ang University

  • White Papers // Aug 2009

    Optimized Algorithm for Balancing Clusters in Wireless Sensor Networks

    Wireless sensor networks consist of hundreds or thousands of sensor nodes that involve numerous restrictions including computation capability and battery capacity. Topology control is an important issue for achieving a balanced placement of sensor nodes. The clustering scheme is a widely known and efficient means of topology control for transmitting...

    Provided By Chung-Ang University

  • White Papers // Feb 2006

    Self Organizing Sensor Networks Using Intelligent Clustering

    Minimization of the number of cluster heads in a wireless sensor network is a very important problem to reduce channel contention and to improve the efficiency of the algorithm when executed at the level of cluster-heads. This paper proposes a Self Organizing Sensor (SOS) network based on an intelligent clustering...

    Provided By Chung-Ang University

  • White Papers // Jul 2012

    Modeling Internet Diffusion in Developing Countries

    Despite the increasing importance of the Internet, there is little work that addresses the degree to which the models and theories of Internet diffusion in developed countries can be applied to Internet diffusion in developing countries. This paper presents the first attempt to address this issue through theory driven modeling...

    Provided By Chung-Ang University

  • White Papers // Aug 2009

    Optimized Algorithm for Balancing Clusters in Wireless Sensor Networks

    Wireless sensor networks consist of hundreds or thousands of sensor nodes that involve numerous restrictions including computation capability and battery capacity. Topology control is an important issue for achieving a balanced placement of sensor nodes. The clustering scheme is a widely known and efficient means of topology control for transmitting...

    Provided By Chung-Ang University

  • White Papers // Jan 2013

    Distributed Intrusion Detection Systems: A Computational Intelligence Approach

    Computer security is defined as the protection of computing systems against threats to confidentiality, integrity, and availability. An intrusion is defined as any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource. The process of monitoring the events occurring in a computer system or...

    Provided By Chung-Ang University

  • White Papers // Feb 2006

    Self Organizing Sensor Networks Using Intelligent Clustering

    Minimization of the number of cluster heads in a wireless sensor network is a very important problem to reduce channel contention and to improve the efficiency of the algorithm when executed at the level of cluster-heads. This paper proposes a Self Organizing Sensor (SOS) network based on an intelligent clustering...

    Provided By Chung-Ang University