pdf格式的英文文獻(xiàn),是關(guān)于認(rèn)知無線電網(wǎng)絡(luò)的,編者是加拿大桂爾夫大學(xué)的Qusay H. Mahmoud。ISBN:978-0-470-06196-1
章節(jié)內(nèi)容:
1 Biologically Inspired Networking
2 The Role of Autonomic Networking in Cognitive NETWORKS
3 Adaptive NETWORKS
4 Self-Managing NETWORKS
5 Machine Learning for Cognitive NETWORKS: Technology Assessment
and Research Challenges
6 Cross-Layer Design and Optimization in Wireless NETWORKS
等,共計(jì)13章,全書348頁,pdf文件383頁。
L. Dong and A. P. Petropulu, 揗ultichannel ALLIANCES: A Cross-layer Cooperative Scheme for Wireless NETWORKS,擨EEE Trans. on Signal ProcessingJanuary 2008. (MATLAB Code)
L. Dong and A. P. Petropulu, 揗ultichannel ALLIANCES: A Cross-layer Cooperative Scheme for Wireless NETWORKS,擨EEE Trans. on Signal ProcessingJanuary 2008.
A paper that I presented on Supervisory Control and Data Acquisition (SCADA) won the second prize at the symposium conducted by the Electrical and Electronics Engineering department of the SRM University. Other topics on which I presented papers were Performance enhancement of wireless sensor NETWORKS using directional antennas, Smart card application and wireless communication. Also my research idea titled “Wavelet Based Image Compression Using SPIHT Algorithm “secured third prize in a technical festival.
The book consists of three sections. The first, foundations, provides a tutorial overview of the principles underlying data mining algorithms and their application. The presentation emphasizes intuition rather than rigor. The second section, data mining algorithms, shows how algorithms are constructed to solve specific problems in a principled manner. The algorithms covered include trees and rules for classification and regression, association rules, belief NETWORKS, classical statistical models, nonlinear models such as neural NETWORKS, and local memory-based models. The third section shows how all of the preceding analysis fits together when applied to real-world data mining problems. Topics include the role of metadata, how to handle missing data, and data preprocessing.
SensorSimII is the framework of a simulator that I have been working on to study how future sensor NETWORKS should operate. the simulator is written in a modular fashion so that it can be adapted to serve a number of needs. However, please remember that it is still a work in progress. This web page is here just to give a glimpse of the approach we ve taken with this simulator. Likewise this web page is simply preliminary information to attempt to answer some of the questions that researchers might have about this project.
Programming language: Developed in Omnet++.
Comment: The model implements the AntNet routing algorithm proposed in: G. Di Caro and M. Dorigo. AntNet: Distributed Stigmergetic Control for Communications NETWORKS. Journal of Artificial Intelligence Research, 9:317-365, 1998. It reqires OMNeT++ 2.3 or later.
Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack-ng is a set of tools for auditing wireless NETWORKS.
FERRET - a broadcast analysis tool
This tool is designed to demonstrate the problem of "data seapage".
The average machine broadcasts a lot of information about itself
on open NETWORKS. This tool captures and organizes this information.
This code is extremely low quality, hacked together in order to
demonstrate the problem at the BlackHat Federal 2007 conference.
Higher quality code should be available around May 2007 on our
website at http://www.erratasec.com.
Model for Opnet. Use this model to generate traffic between source and destination pairs. The resultant traffic file can then be imported into the NETWORKS to mimic traffic patterns and represent background loading on a network