Intelligent Networking Research Papers - Academia.edu (original) (raw)

Case study addresses NW slopes of Frus¿ka GoraMountain, Serbia. Landslide activity is quite notorious in this region, especially along the Danube's right river bank, and recently intensified seismicity coupled with atmospheric... more

Case study addresses NW slopes of Frus¿ka GoraMountain, Serbia. Landslide activity is quite notorious in this region, especially along the Danube's right river bank, and recently intensified seismicity coupled with atmospheric precipitation might be critical for triggering new landslide occurrences. Hence, it is not a moment too soon for serious landslide susceptibility assessment in this region. State-of-the-art approaches had been taken into consideration, cutting down to the support vector machine (SVM) and k-nearest neighbor (k-NN) algorithms, trained upon expert based model of landslide susceptibility (a multi-criteria analysis). The latter involved Analytical Hierarchy Process (AHP) for weighting influences of different input parameters. These included elevation, slope angle, aspect, distance from flows, vegetation cover, lithology, and rainfall, to represent the natural factors of the slope stability. Processed in a GIS environment (as discrete or float raster layers) trough AHP, those parameters yielded susceptibility pattern, classified by the entropy model into four classes. Subsequently the susceptibility pattern has been featured as training set in SVM and k-NN algorithms. Detailed fitting involved several cases, among which SVM with Gaussian kernel over geo-dataset (coordinates and input parameters) reached the highest accuracy (88%)outperforming other considered cases by far.

Management applications have not kept the fast changing pace of networks and services and still rely on centralized and deterministic approaches. Besides, distribution and uncertainty are intrinsic issues in the telecommunications... more

Management applications have not kept the fast changing pace of networks and services and still rely on centralized and deterministic approaches. Besides, distribution and uncertainty are intrinsic issues in the telecommunications environment. Therefore, new approaches to network and service management have to be explored that can deal with these challenges. In this paper a lightweight collaborative framework for network troubleshooting is presented. This framework is based on multi-agent platforms and probabilistic techniques and it has been prototyped and applied to three different network environments. A summary of the most relevant results obtained and conclusions reached is also provided.

Recently, long-term, advanced cyber-attacks targeting a specific enterprise or organization have been occurring again. These attacks occur over a long period and bypass detection by security systems unlike the existing attack pattern. For... more

Recently, long-term, advanced cyber-attacks targeting a specific enterprise or organization have been occurring again. These attacks occur over a long period and bypass detection by security systems unlike the existing attack pattern. For such reason, they create problems such as delayed real-time response and detection after damages have already been incurred. This paper introduces the design of technology that applies real-time network traffic monitoring to detect unknown functional cyber-attack on the network. Specifically, the algorithm was verified and evaluated in terms of performance in an actual commercial environment. Cyber-attack detection performance is expected to be improved by enhancing the algorithm and processing large volumes of traffic.

Across a number of different fields – health care, manufacturing, and research and education, for example – users are demanding more and more network resources, such as bandwidth, quality of service, and security, in order to collaborate... more

Across a number of different fields – health care, manufacturing, and research and education, for example – users are demanding more and more network resources, such as bandwidth, quality of service, and security, in order to collaborate and share data around ...