Simulation And Auditing Of Network Security Based On Probabilistic Neural Network Approach
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2012, Vol 3, Issue 1
Abstract
: Probabilistic Neural Network approach used for mobile adhoc network is more efficient way to estimate the network security. In this paper, we are using an Adhoc On Demand Distance Vector (AODV) protocol based mobile adhoc network. In our Proposed Method we are considering the multiple characteristics of nodes. In this we use all the parameter that is necessary in AODV. For simulation purpose we use the probabilistic neural network approach that gives more efficient and accurate results as comparison to the clustering algorithm in the previous systems was used. The performance of PNN (probabilistic neural network) approach is improved for identifying the particular attack like as wormholes, black holes and selfish
Authors and Affiliations
Manoj Patel, Dr. Maneesh Shrivastava, Kavita Deshmukh
Advance Neighbor Embedding for Image Super Resolution
This paper presents the Advance Neighbor embedding (ANE) method for image super resolution. The assumption of the neighbor-embedding (NE) algorithm for single-image super-resolution Reconstruction is that the feature spa...
A REVIEW ON A NOVEL APPROACH FOR DATA COLLECTION IN WSN
Wireless sensor networks have become increasingly popular due to their wide range of application. Clustering sensor nodes organizing them hierarchically have proven to be an effective method to provide better data aggreg...
Knowledge based System for Improving Design and Manufacturing Processes for Electrochemical MachiningIn Computer based Concurrent Engineering
The traditional design of product, the preceding constraints and limitations are considered sequentially. In order to reduce the product development cycle time and cost and increase quality and productivity, concurrent (...
Wavelets assisted fuzzy edge refinement
Image enhancement is a crucial pre-processing step to be performed for various applications where object recognition, identification, verification is required. Among various image enhancement methods, edge enhancement ha...
BER performance analysis of Subtractive interference cancellation (SIC) Using Rayleigh channel in DS-CDMA Receiver system
In this paper, we present and analyze the performance of a parallel interference cancellation (PIC) scheme for multicarrier (MC) direct-sequence code-division multiple-access (DS-CDMA) systems. In order to mitigate the m...