Rule Based Technique detecting Security attack for Wireless Sensor network using fuzzy logic
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
This paper represents the rule based technique which helps to detect the security attack in the Wireless Sensor network .There are many type of security attack which effects on the wireless sensor network. To demonstrate the effectiveness of the wireless sensor network, We have find ten security attack type in this work these parameters are fuzzy rule based system has been developed for calculating the impact of security attack on the wireless sensor network. We use the mouse data set to test these performances in Matlab tools.
Authors and Affiliations
Mohit Malik, , Namarta kapoor, , Esh naryan, , Aman Preet Singh
The optimize load balancing in cluster computing.
In this paper we introduce the efficient load balancing algorithm which is helpful to distribute the packet of data to the group of slave processor for achieving the highest possible execution speed and proper ut...
STUDY OF QUANTUM CRYPTOGRAPHY
t-The concept of quantum cryptography involves the quantum physics by which two parties can establish a secure key exchange. The security in such system is defined by the laws of quantum physics. Quantum cryptography...
Smart antenna for wi-max radio system
In simple words, smart antenna is such that it can sense its environment and can adjust its gain in different directions accordingly. They provide a smart solution to the problem of communication traffic overload i.e. th...
Study of ECG Signal Compression using modified discrete cosine and discrete wavelet transforms
A new hybrid two-stage electrocardiogram (ECG) signal compression method based on the modified discrete cosine transform (MDCT) and discrete wavelet transform (DWT) is proposed. The ECG signal is partitioned into blocks...
Memory Learning Framework for Retrieval of Neural Objects
Most current content-based image retrieval systems are still incapable of providing users with their desired results. The major difficulty lies in the gap between low-level image features and high-level image seman...