• No results found

network layer

An Architecture for Network Layer Privacy

An Architecture for Network Layer Privacy

... application layer, privacy can be compromised by much simpler ...transport layer ports, IP addresses, or link layer addresses in locations close to the communicating ...Transport layer ...

6

A Critical Analysis on Network Layer Attacks  in Wireless Sensor Network

A Critical Analysis on Network Layer Attacks  in Wireless Sensor Network

... networks, among those Wireless Sensor Networks(WSNs) are gaining importance recent years due to its impact on cost, ability to cope up with node and communication failure, capability to withstand harsh environmental ...

8

Network Layer and Routing.pptx

Network Layer and Routing.pptx

...  IPX/SPX, a routable protocol, is a very fast and highly established protocol, but it is not used on the Internet.  The protocol IPX/SPX/NWLink was written by Microsoft and is fully[r] ...

36

Enhanced Simulation Model of ZigBee Wireless Sensor Network

Enhanced Simulation Model of ZigBee Wireless Sensor Network

... of network layer process model based on OPNET includes three stages: process decomposition, event enumeration, and state response ...ZigBee network layer process model is described in a single ...

6

Layered Based Classification Framework For Network Fault Management using Machine Learning

Layered Based Classification Framework For Network Fault Management using Machine Learning

... to network problems for each network ...describe network problems using almost same terms and ...of network problems (phase ...in network access ...

8

Title: Classification and Detection of Distributed Denial of Service (DDoS) Attack

Title: Classification and Detection of Distributed Denial of Service (DDoS) Attack

... the network layer, such as ICMP flooding, SYN flooding, and UDP flooding, which are called Network layer DDoS ...Application layer DDoS attacks zombies attack the victim internet ...

5

Current State Of Art And Key Rationales Of Application Layer Distributed Denial Of Service Attacks In Software Defined Networking

Current State Of Art And Key Rationales Of Application Layer Distributed Denial Of Service Attacks In Software Defined Networking

... SDN network. These security threats may distress at application layer, control layer and data layer of SDN ...the network equipment as the attackers send multiple requests to controller ...

10

Analyzing Different Features of Artificial Neural Networks and Its Applications In Different Fields

Analyzing Different Features of Artificial Neural Networks and Its Applications In Different Fields

... forward network which associates with inputs & ...the network, layer by layer, until it reaches at the output ...output layer and there can be any number of hidden ...hidden ...

6

FACE EMOTION RECOGNITION USING NEURAL NETWORK

FACE EMOTION RECOGNITION USING NEURAL NETWORK

... neural network model. This network model is composed of an input layer, an output layer and several hidden ...Each layer consists of many units that correspond to the number of the data ...

10

Cross Layer Transport Layer Approach for Multihop Wireless Sensor Network

Cross Layer Transport Layer Approach for Multihop Wireless Sensor Network

... link layer, Network layer and all rest of the layers are yet to be ...OSI layer model but will have cross layer functionality due to the nature of desired small radio networks ...

5

Evaluation of Convolutional Neural Network Model for Classifying Red and Healthy Eye

Evaluation of Convolutional Neural Network Model for Classifying Red and Healthy Eye

... connected layer, apart from input layer and output ...convolutional layer filters the 23*23*3 input image with 20 kernels of size ...convolutional, layer 50 filters with kernel size of 5*5 are ...

7

Research on the Overall Technical Framework of the Ship Networking System in the Yangtze River Delta

Research on the Overall Technical Framework of the Ship Networking System in the Yangtze River Delta

... (perception layer, network layer, data resource layer, application layer and presentation layer) and two assurance systems (security insurance system and standard system), based ...

7

Title: Security and Privacy Challenges in the Internet of Things

Title: Security and Privacy Challenges in the Internet of Things

... the network layer of IoT are similar to the network layer of standard Internet; however, the network layer of IoT is specified towards low-power and lossy ...a network as ...

7

CMC ICT3207 Call Flow

CMC ICT3207 Call Flow

... comprising the application layer, transport layer, network layer, data link layer, and.. physical layer.[r] ...

22

TRAINING AND DEVELOPMENT OFARTIFICIAL NEURAL NETWORK MODELS: SINGLE LAYER 
FEEDFORWARD AND MULTI LAYER FEEDFORWARD NEURAL NETWORK

TRAINING AND DEVELOPMENT OFARTIFICIAL NEURAL NETWORK MODELS: SINGLE LAYER FEEDFORWARD AND MULTI LAYER FEEDFORWARD NEURAL NETWORK

... on network utilization via the best node allocation using the ABC algorithm and a ranking ...and network layer handoffs in ...the network utilization factor was sufficient to determine the ...

8

A Brief Review on Internet of Things

A Brief Review on Internet of Things

... Perception Layer: The layer contains the data sensors that too in the different form of IR sensors, RFID etc that are used to sense the temperature, speed, humidity, and location etc of the ...this ...

5

Estimating river suspended sediment yield using MLP neural network in arid and semi-arid basins Case study: Bar River, Neyshaboor, Iran

Estimating river suspended sediment yield using MLP neural network in arid and semi-arid basins Case study: Bar River, Neyshaboor, Iran

... neural network. They used two kinds of neural network: Multi-layer perceptron neural network and counter propagation of Grassberg and stated that the Grassberg network, before mapping, ...

10

Fixed layer Convolutional Neural Network

Fixed layer Convolutional Neural Network

... This network has the structure explained in section II- C; more specifically it is composed by four 2D-convolution, four max-pooling, one flatten and one Dense with a soft-max activation ...of network was ...

7

Big Data Analytics With Reference To Wide Variety of Domains

Big Data Analytics With Reference To Wide Variety of Domains

... Alberto M. C. Souza ,et.al [7] using Hadoop framework and Mahout K-means algorithm has implemented an outlier detection algorithm integrated with Internet of Things architecture which is implemented using LinkSmart ...

5

TRAINING AND DEVELOPMENT OFARTIFICIAL NEURAL NETWORK MODELS: SINGLE LAYER 
FEEDFORWARD AND MULTI LAYER FEEDFORWARD NEURAL NETWORK

TRAINING AND DEVELOPMENT OFARTIFICIAL NEURAL NETWORK MODELS: SINGLE LAYER FEEDFORWARD AND MULTI LAYER FEEDFORWARD NEURAL NETWORK

... 3.2 Data Video Retrieval Scheme In designing the vehicle counting system and measuring vehicle speed, the technology used is a video image processing via cameras mounted on the highway b[r] ...

9

Show all 10000 documents...

Related subjects