نتایج جستجو برای: fuzzy end node

تعداد نتایج: 648134  

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

2013
Suganya Nagarajan Srinivasan

-In the present world the security vulnerabilities are highly challenging in MANET. To get the maximum security and minimum threat there is lots of work going on. To effectively isolate the malicious node this paper proposes a Neuro fuzzy algorithm. By using fuzzy logic we can further improve the security level by identifying the malicious node more accurately. The concept behind the paper is a...

2002
Richard E. Haskell

The terminal nodes of a binary tree classifier represent discrete classes to be recognized. In this paper the classes are considered to be fuzzy sets in which a specific sample can belong to more than one class with different degrees of membership. The terminal nodes is this case will contain information about the degrees to which test samples belong to particular classes. This will allow the d...

Wireless sensor networks have been widely considered as one of the most important 21th century technologies and are used in so many applications such as environmental monitoring, security and surveillance. Wireless sensor networks are used when it is not possible or convenient to supply signaling or power supply wires to a wireless sensor node. The wireless sensor node must be battery powered.C...

Journal: :Jurnal nasional teknologi dan sistem informasi (TEKNOSI) Universitas Andalas 2022

Indonesia terletak di daerah rawan bencana, khususnya gempa bumi. Salah satu dan tsunami adalah Kota Padang. Oleh sebab itu diperlukan upaya untuk memudahkan masyarakat melakukan pencarian lokasi shelter evakuasi jika terjadi besar yang diiringi bahaya tsunami. Paper ini menejelaskan sistem penilai kelayakan bangunan bertingkat sebagai (SPEAKS). Keunggulan dari SPEAKS mampu memberikan penilaian...

Journal: :international journal of smart electrical engineering 2012
mozhgan toulabi shahram javadi

a sensor network is made up of a large number of sensors with limited energy. sensors collect environmental data then send them to the sink. energy efficiency and thereby increasing the lifetime of sensor networks is important. direct transfer of the data from each node to the central station will increase energy consumption. previous research has shown that the organization of nodes in cluster...

A sensor network is made up of a large number of sensors with limited energy. Sensors collect environmental data then send them to the sink. Energy efficiency and thereby increasing the lifetime of sensor networks is important. Direct transfer of the data from each node to the central station will increase energy consumption. Previous research has shown that the organization of nodes in cluster...

P Panahi

Ad hoc networks are multi-hop wireless networks without a pre-installed infrastructure. Such networks are widely used in military applications and in emergency situations as they permit the establishment of a communication network at very short notice with a very low cost. Video is very sensitive for packet loss and wireless ad-hoc networks are error prone due to node mobility and weak links. H...

Abstract- Efficient message delivery in city environment is required to ensure driver’s safety and passenger’s comfortability. In cities of developed nations, routing of data in vehicular Ad hoc Network (VANET) faces many challenges such as radio obstacles, mobility constraints and uneven nodes distribution. These factors primarily makes communication between vehicles complex. To overcome and t...

Journal: :Neurocomputing 2012
Safdar Abbas Khan Boubaker Daachi Karim Djouani

In this paper we present a fault detection strategy for wireless sensor networks. The strategy is based on modeling a sensor node by Takagi–Sugeno–Kang (TSK) fuzzy inference system (FIS), where a sensor measurement of a node is approximated by a function of the sensor measurements of the neighboring nodes. We also model a node by recurrent TSK-FIS (RFIS), where the sensor measurement of the nod...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید