Search

  • Select Article Type
  • Abstract Supplements
  • Blood Group Review
  • Call to Arms
  • Hypothesis
  • In Memoriam
  • Interview
  • Introduction
  • Letter to the Editor
  • Short Report
  • abstract
  • Abstracts
  • Article
  • book-review
  • case-report
  • case-study
  • Clinical Practice
  • Commentary
  • Conference Presentation
  • conference-report
  • congress-report
  • Correction
  • critical-appraisal
  • Editorial
  • Editorial Comment
  • Erratum
  • Events
  • Letter
  • Letter to Editor
  • mini-review
  • minireview
  • News
  • non-scientific
  • Obituary
  • original-paper
  • original-report
  • Original Research
  • Pictorial Review
  • Position Paper
  • Practice Report
  • Preface
  • Preliminary report
  • Product Review
  • rapid-communication
  • Report
  • research-article
  • Research Communicate
  • research-paper
  • Research Report
  • Review
  • review -article
  • review-article
  • review-paper
  • Review Paper
  • Sampling Methods
  • Scientific Commentary
  • short-communication
  • short-report
  • Student Essay
  • Varia
  • Welome
  • Select Journal
  • In Jour Smart Sensing And Intelligent Systems
  • International Journal Advanced Network Monitoring Controls

 

Article | 11-January-2021

Review of Anomaly Detection Based on Log Analysis

anomaly detection. At the same time, issues such as security and privacy in the network have also emerged. Distributed denial of service attacks, zombie codes, Trojan horses, ransomware, worms and other malicious software have a great negative impact on people’s lives. Once the malware operates, it may cause irreversible losses to the company’s economy., Poses a great threat to people’s privacy. A study showed that [1][2]: Random sample surveys of large-scale systems, more than half of the system

Xudong Wu

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 4, 40–49

Research Article | 13-December-2017

INVESTIGATION OF ADVANCED DATA PROCESSING TECHNIQUE IN MAGNETIC ANOMALY DETECTION SYSTEMS

Advanced methods of data processing in magnetic anomaly detection (MAD) systems are investigated. Raw signals of MAD based on component magnetic sensors are transformed into energy signals in the space of specially constructed orthonormalized functions. This procedure provides a considerable improvement of the SNR thus enabling reliable target detection. Estimation of the target parameters is implemented with the help of Genetic Algorithm. Numerous computer simulations show good algorithm

B. Ginzburg, L. Frumkis, B.Z. Kaplan, A. Sheinker, N. Salomonski

International Journal on Smart Sensing and Intelligent Systems, Volume 1 , ISSUE 1, 110–122

Article | 27-December-2017

SECURITY OF WIRELESS SENSOR NETWORKS FOR HEALTH MONITORING HELMETS WITH ANOMALY DETECTION USING MONITORING HELMETS WITH ANOMALY DETECTION USING 

Biswajit Panja, Zachary Scott, Priyanka Meharia

International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 1, 561–580

Article | 07-November-2017

Physical and Virtual Intelligent Sensors for Integrated Health Management Systems

Ajay Mahajan, Christopher Oesch, Haricharan Padmanaban, Lucas Utterback, Sanjeevi Chitikeshi, Fernando Figueroa

International Journal on Smart Sensing and Intelligent Systems, Volume 5 , ISSUE 3, 559–575

No Record Found..
Page Actions