• No results found

[PDF] Top 20 A Secure Data Transmission Using Fuzzy Logic And Multi-Key Generation Algorithm

Has 10000 "A Secure Data Transmission Using Fuzzy Logic And Multi-Key Generation Algorithm" found on our website. Below are the top 20 most common "A Secure Data Transmission Using Fuzzy Logic And Multi-Key Generation Algorithm".

A Secure Data Transmission Using Fuzzy Logic And Multi-Key Generation Algorithm

A Secure Data Transmission Using Fuzzy Logic And Multi-Key Generation Algorithm

... Boroujerdi, A. S., & Ayat, S [2] proposed A DDoS assault is a kind of web assault which attempts to interfere with the ordinary usefulness of the focused on PC organize. By and large, this assault endeavors to make ... See full document

6

Secure Routing Protocol in Delay Tolerant Networks Using Fuzzy Logic Algorithm

Secure Routing Protocol in Delay Tolerant Networks Using Fuzzy Logic Algorithm

... High data rate wireless communications links with transmission rates nearing 1 Gigabit/second (will quantify a “bit” shortly)Provide high speed links that still offer good Quality of Service (QoS) (will be ... See full document

8

ADVANCED SECURE METHOD FOR DATA TRANSMISSION IN MANET USING RSA ALGORITHM

ADVANCED SECURE METHOD FOR DATA TRANSMISSION IN MANET USING RSA ALGORITHM

... Assuming we have a secrete number 7 and we want to multiply it with another number say 328 i.e. , the result is a large number and it is not clear that 7 is part of this number it is said to be hidden or encrypted. But ... See full document

10

Secure Transmission of Data through Electronic Devices using ECC Algorithm

Secure Transmission of Data through Electronic Devices using ECC Algorithm

... same key for encryption and decryption of test whereas in asymmetric cryptography systems two keys namely public and private keys are used for encryption and decryption ...private key safe, you can assure ... See full document

6

NEW APPROACH IN COLOR DISTORTION REDUCTION IN UNDERWATER CORAL REEF COLOR IMAGE 
ENHANCEMENT BASED ON ESTIMATION ABSORPTION USING EXPONENTIAL EQUATION

NEW APPROACH IN COLOR DISTORTION REDUCTION IN UNDERWATER CORAL REEF COLOR IMAGE ENHANCEMENT BASED ON ESTIMATION ABSORPTION USING EXPONENTIAL EQUATION

... for secure data transmission in wireless ...keys. Key management is one of the vital aspects of security in mobile ad hoc ...of key management are strongly subject to restriction by the ... See full document

13

Secure Transmission of Data in Cloud Environment Using Elliptic Curve Cryptographic Algorithm

Secure Transmission of Data in Cloud Environment Using Elliptic Curve Cryptographic Algorithm

... private key. Public key is used for encryption/signature ...Private Key is used for decryption/signature ...proposed algorithm which has been used for the secure ... See full document

7

An Encryption Algorithm for Secure Data Transmission

An Encryption Algorithm for Secure Data Transmission

... confidential data is transmitted over the ...accepted algorithm is AES algorithm. We have proposed a new algorithm based on the concept used by Rijmen and Daemen (Rijndael algorithm), ... See full document

5

Secure Secret Key (SSK) Generation Algorithm for Multimedia Multicast Networks

Secure Secret Key (SSK) Generation Algorithm for Multimedia Multicast Networks

... like key generation and the key distribution among these groups should be done in a secure ...session key. In most of the Key Management schemes, different types of group users ... See full document

6

A Novel Technique For Secure Data Transmission Using Cryptography And Steganography

A Novel Technique For Secure Data Transmission Using Cryptography And Steganography

... the data security which is advised to be the higher level of security by using the multiple data files and key ...embedding, data embedding and data extraction model into one ... See full document

5

Secure Data Transmission using Blowfish Algorithm

Secure Data Transmission using Blowfish Algorithm

... power. Using CBC mode has added extra processing time, but overall it was relatively negligible especially for certain application that requires more secure encryption to a relatively large data ... See full document

7

A Study on Multi Fuzzy Graph

A Study on Multi Fuzzy Graph

... is multi fuzzy induced subgraph of ...called multi fuzzy sub graph of F obtained by the removal of the multi fuzzy line (e, B(e)), where D = B{(e, B(e) ...an multi ... See full document

14

MPPT Control of PMSG based Wind Generation with Interleaved CUK Converter using Fuzzy Logic Controller

MPPT Control of PMSG based Wind Generation with Interleaved CUK Converter using Fuzzy Logic Controller

... system using PID and Fuzzy logic control ...available using MPPT ...AC using single phase inverter. The results of Fuzzy logic controlled system are compared with those of ... See full document

9

Sleep Wake Scheduling Algorithm Using Enegy Efficient And Secure Data Transmission

Sleep Wake Scheduling Algorithm Using Enegy Efficient And Secure Data Transmission

... A wireless sensor arrange (WSN) comprises of spatially conveyed self-governing sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to helpfully go their data ... See full document

7

Secure MQTT: an efficient fuzzy logic based approach to detect DoS attack in MQTT protocol for internet of things

Secure MQTT: an efficient fuzzy logic based approach to detect DoS attack in MQTT protocol for internet of things

... IoT is a promising future network paradigm that enables communication among heterogeneous smart devices. The number of connected devices is expected to be 50 billion by 2020 [1]. The heterogeneous and huge number of de- ... See full document

15

Optimal Fuzzy Logic Controller Design for Robot Arm Control

Optimal Fuzzy Logic Controller Design for Robot Arm Control

... In this work, genetic-fuzzy onlineforward controller is structured. Theplant parameters of are identified byforward genetic fuzzy identificationmodel and then used by the controller tocontrol this plant.The ... See full document

6

A Two Step Secure Spectrum Sensing Algorithm Using Fuzzy Logic for Cognitive Radio Networks

A Two Step Secure Spectrum Sensing Algorithm Using Fuzzy Logic for Cognitive Radio Networks

... step secure spectrum sensing algorithm is proposed for cognitive radio ...this algorithm, the sensing results of secondary users are pre-filtered and applying fuzzy logic, so, the ... See full document

7

An Efficient Fuzzy Logic Classification over Semantically Secure Encrypted Data

An Efficient Fuzzy Logic Classification over Semantically Secure Encrypted Data

... the fuzzy control has emerged as one of the most active and fruitfulareas for research in the applicationsof fuzzy set theory, especially in the realm of industrial processes, whichdo not lend themselves to ... See full document

6

Various Strategies of Load Balancing Techniques and Challenges in Distributed Systems

Various Strategies of Load Balancing Techniques and Challenges in Distributed Systems

... of data storage and using different softwares on ...symmetric Key Standard-Advanced Encryption Standard (AES) to provide two way data ...text using a special key before ... See full document

8

Sugeno-Type Fuzzy Inference Optimization With Firefly and K-Means Clustering Algorithms  For Rainfall Forecasting

Sugeno-Type Fuzzy Inference Optimization With Firefly and K-Means Clustering Algorithms For Rainfall Forecasting

... Sugeno fuzzy method was used for predicting the rainfall intensity based on the data from Global Climate Model ...By using K-Means clustering algorithm, the accuracy of the data ... See full document

14

A Novel Behavior-based Navigation Architecture of Mobile Robot in Unknown Environments

A Novel Behavior-based Navigation Architecture of Mobile Robot in Unknown Environments

... In this paper, we have proposed a new behaviorbased navigation architecture, BBFM, for navigating the mobile robot in unknown environments. It inherits advantages of fuzzy logic to design objective ... See full document

15

Show all 10000 documents...