Simulation And Auditing Of Network Security Based On Probabilistic Neural Network Approach
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2012, Vol 3, Issue 1
Abstract
: Probabilistic Neural Network approach used for mobile adhoc network is more efficient way to estimate the network security. In this paper, we are using an Adhoc On Demand Distance Vector (AODV) protocol based mobile adhoc network. In our Proposed Method we are considering the multiple characteristics of nodes. In this we use all the parameter that is necessary in AODV. For simulation purpose we use the probabilistic neural network approach that gives more efficient and accurate results as comparison to the clustering algorithm in the previous systems was used. The performance of PNN (probabilistic neural network) approach is improved for identifying the particular attack like as wormholes, black holes and selfish
Authors and Affiliations
Manoj Patel, Dr. Maneesh Shrivastava, Kavita Deshmukh
Expert system for Diagnosing Kidney diseases
The system mainly contains two modules one is Information System and the other is Expert Advisory system. The Information System contains the static information about different diseases in the field of Nephrology. This i...
Composite Lowpass Filter Realized by Image Parameter method and Integrated with Defected Ground Structures
An asymmetric DGS consisting of two square headed slots connected transversely with a rectangular slot is etched in the ground plane underneath a high-low impedance microstrip line. It provides a band-reject filtering...
IMPEMENTATION OF DATA WATCHER IN DATA LEAKAGE DETECTION SYSTEM
Now days, every company is facing data leakage. That is very serious problem faced by company. An owner of enterprise has given confidential data to its employee but most of the time employee leaks the data. That leak...
Wavelets assisted fuzzy edge refinement
Image enhancement is a crucial pre-processing step to be performed for various applications where object recognition, identification, verification is required. Among various image enhancement methods, edge enhancement ha...
Data Security In Cloud Computing: A Review
Cloud computing is Internet ("cloud") based development and use of computer technology ("computing"). It is a style of computing in which dynamically scalable and often virtualized resources are provided as a service ove...