Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering

PDF

Florida Institute of Technology

Electrical Engineering and Computer Science Faculty Publications

Clustering

Publication Year

Articles 1 - 4 of 4

Full-Text Articles in Engineering

Denoising Medical Imagery Using A Novel Framework, Samuel Peter Kozaitis, Jeetkumar M. Mehta, S. Ponkia Jun 2011

Denoising Medical Imagery Using A Novel Framework, Samuel Peter Kozaitis, Jeetkumar M. Mehta, S. Ponkia

Electrical Engineering and Computer Science Faculty Publications

We proposed a novel framework that allows a method optimized for white noise to be used for denoising CT imagery. We considered low-dose x-ray CT imagery where lowering the dose of x-rays results in an increase in quantum noise. We first denoised an image independently several times using different parameters. Then, we selected pixels from those denoised images to form a final composite image. We produced results using blockmatching denoising, but in principle other methods could work within this framework, as well. The proposed method was able to better reproduce regions of low-contrast than the conventional BM3D approach.


Idma: Improving The Defense Against Malicious Attack For Mobile Ad Hoc Networks Based On The Artp Protocol, Chaorong Peng, Chang Wen Chen Apr 2008

Idma: Improving The Defense Against Malicious Attack For Mobile Ad Hoc Networks Based On The Artp Protocol, Chaorong Peng, Chang Wen Chen

Electrical Engineering and Computer Science Faculty Publications

Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the …


Information-Aware Collaborative Routing In Wireless Sensor Network, Ji Sun Lee, Chang Wen Chen May 2006

Information-Aware Collaborative Routing In Wireless Sensor Network, Ji Sun Lee, Chang Wen Chen

Electrical Engineering and Computer Science Faculty Publications

In this paper, we propose a new approach to routing protocol called information-aware collaborative routing for wireless sensor networks. Clustering and local data aggregation schemes have been developed to reduce the energy for transmitting redundant data in the wireless sensor network. Most existing approaches have been developed for the cases when there is direct communication between cluster head and base station. Even though these schemes are able to reduce data redundancy to be transmitted from the cluster heads to the base station, they have not exploited the data redundancy between neighboring clusters. In this research, we study a more general …


Learning States And Rules For Time Series Anomaly Detection, Stan Salvador, Philip K. Chan, John Brodie Mar 2003

Learning States And Rules For Time Series Anomaly Detection, Stan Salvador, Philip K. Chan, John Brodie

Electrical Engineering and Computer Science Faculty Publications

In this paper, we investigate machine learning techniques for discovering knowledge that can be used to monitor the operation of devices or systems. Specifically, we study methods for generating models that can detect anomalies in time series data. The normal operation of a device can usually be characterized in different temporal states. To identify these states, we introduce a clustering algorithm called Gecko that can automatically determine a reasonable number of clusters using our proposed "L" method. We then use the RIPPER classification algorithm to describe these states in logical rules. Finally, transitional logic between the states is added to …