• No results found

[PDF] Top 20 Fuzzy based Congestion Detection in Computer Network

Has 10000 "Fuzzy based Congestion Detection in Computer Network" found on our website. Below are the top 20 most common "Fuzzy based Congestion Detection in Computer Network".

Fuzzy based Congestion Detection in Computer Network

Fuzzy based Congestion Detection in Computer Network

... Network Congestion [3] is considered as a catastrophic event. Congestion is associated with different properties, which are depending upon the various characteristics of the existing underlying ... See full document

5

Optimized Fuzzy based Malicious Node Detection on Routing and Certificate Authority based Secure Communication in Wireless Ad HOC Network

Optimized Fuzzy based Malicious Node Detection on Routing and Certificate Authority based Secure Communication in Wireless Ad HOC Network

... Mobile-Ad-Hoc- Network environment, however, all are stucked up in certain level of implementations and facing lots of issues over ...for network lifetime improvements, but all those sink-establishments ... See full document

7

Development of Hybrid Intrusion Detection System and Its Application to Medical Sensor Network

Development of Hybrid Intrusion Detection System and Its Application to Medical Sensor Network

... Intrusion detection is the challenge to monitor and probably prevent the attempts to intrude into or otherwise compromise your system and network ...a computer system is carried out by Intrusion ... See full document

16

WSN and Fuzzy Logic for Flash Flood and Traffic Congestion Detection

WSN and Fuzzy Logic for Flash Flood and Traffic Congestion Detection

... sensor network for a real-time flash flood and traffic congestion alert system for ...However, fuzzy membership function is required to be designed by an ... See full document

11

Computer aided detection of breast lesions in DCE MRI using region growing based on fuzzy C means clustering and vesselness filter

Computer aided detection of breast lesions in DCE MRI using region growing based on fuzzy C means clustering and vesselness filter

... A computer-aided detection (CAD) system is introduced in this paper for detection of breast lesions in dynamic contrast-enhanced magnetic resonance imaging ...with Fuzzy C-means (FCM) ... See full document

11

Neuro Fuzzy System for Routing in a Computer Network

Neuro Fuzzy System for Routing in a Computer Network

... travel based only on one measure, usually ...additional network characteristics will be more effective. Neuro-Fuzzy method was employed using both bandwidth and delay as a measure to obtain best ... See full document

9

IFCCDC: A Fuzzy Control based Congestion Detection and Control in Wireless Sensor Networks

IFCCDC: A Fuzzy Control based Congestion Detection and Control in Wireless Sensor Networks

... the congestion is detected by measuring the length of the ...the congestion increases. Congestion is controlled by assigning priority to the data ...balancing congestion control scheme ... See full document

6

Multipath Routing Protocol for Reducing Congestion and Delay in MANET

Multipath Routing Protocol for Reducing Congestion and Delay in MANET

... a congestion aware multipath routing protocol in mobile ad hoc networks (MANET) is ...the congestion status of the node is found by using the early congestion detection technique which is ... See full document

8

Wideband spectrum sensing using adaptive neuro fuzzy inference system in 
		cognitive radio networks

Wideband spectrum sensing using adaptive neuro fuzzy inference system in cognitive radio networks

... waveform based sensing algorithm, matched filter algorithm and energy detection algorithm are employed for recognizing the spectrums holes in the ...CR network is complicated to recognize, owing to ... See full document

6

Comparative Analysis Of Image Segmentation Techniques And Its Algorithm

Comparative Analysis Of Image Segmentation Techniques And Its Algorithm

... segmentation based on Region Based, Edge Detection, Thresholding, Clustering, Fuzzy Logic and Neural Network are discussed and ...mainly based on two properties similarity and ... See full document

9

Routing with Congestion Control in Computer Network using Neural Networks

Routing with Congestion Control in Computer Network using Neural Networks

... is based on observed delay ...neural network at each node of computer network use just local information to decide to which neighbor node should be send the packet in order to reach its ... See full document

8

FUZZY LOGIC BASED VOLTAGE AND FREQUENCY OF A SELF EXCITED INDUCTION GENERATOR 
FOR MICRO HYDRO TURBINES FOR RURAL APPLICATIONS

FUZZY LOGIC BASED VOLTAGE AND FREQUENCY OF A SELF EXCITED INDUCTION GENERATOR FOR MICRO HYDRO TURBINES FOR RURAL APPLICATIONS

... adhoc network (MANET), the previous work of the authors considered route recovery technique based on route failures alone and doesn’t consider the packet drops due to ...The congestion is likely to ... See full document

9

Comparative study between fuzzy C-Means algorithm and artificial immune network algorithm in intrusion detection system

Comparative study between fuzzy C-Means algorithm and artificial immune network algorithm in intrusion detection system

... Bace and Mell (2001) suggest that, to manage to identify novel attacks, anomaly-based Intrusion detection systems was recommended. The job starting with modeling a range of normal or valid behavior, ... See full document

25

An intrusion detection method for internet of things based on suppressed fuzzy clustering

An intrusion detection method for internet of things based on suppressed fuzzy clustering

... sensor network consisting of various sensor nodes, which are readily exposed to attacks as they are usually located in sites with no monitoring [1, ...The detection systems should be further optimized ... See full document

7

Survey of Adaptive Resonance Theory Techniques in IDS

Survey of Adaptive Resonance Theory Techniques in IDS

... Abstract— Computer networking has become an important infrastructure for our daily communication as it is interconnecting people together to make a borderless ...So computer network security has ... See full document

6

A Model for Computer Worm Detection in a Computer Network

A Model for Computer Worm Detection in a Computer Network

... detecting computer worms in Computer Networks by making use of detection based on the network behavior through the collection of various parameters such as: network latency, ... See full document

7

Traffic Management and QOE in MPLS Network based on Fuzzy Goal Programming

Traffic Management and QOE in MPLS Network based on Fuzzy Goal Programming

... the network by avoiding congestion of packets that result to packet drops and degradation of network efficiency fuzzy goal programming based on the fuzzy characterization for ... See full document

6

Automatic detection of computer network traffic anomalies based on eccentricity analysis

Automatic detection of computer network traffic anomalies based on eccentricity analysis

... is based on Packets only because very often the backups strategy is generally running at night, it is possible to coordinate an attack using IP address spoofing such the Packet mouse obtained during the day and ... See full document

8

State-of-the-Art Congestion Control Protocols in WSN: A Survey

State-of-the-Art Congestion Control Protocols in WSN: A Survey

... is network congestion which mainly arises when the reception rate of a node exceeds its transmission ...rate. Congestion also arises due to contention and interference at the link ...the ... See full document

6

A Fuzzy based Methods in Wireless Body Area Network for Controlling Congestion

A Fuzzy based Methods in Wireless Body Area Network for Controlling Congestion

... sensor network based communication has been adopted in each and every domain specifically, commercial fields like medical science ...Area Network (WBAN) is the part of wireless communication which is ... See full document

5

Show all 10000 documents...