An Efficient Three-Phase Fuzzy Logic Clone Node Detection Model

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

design of an analog fuzzy logic controller chip

fuzzy logic has been developed over the past three decades into a widely applied techinque in classification and control engineering. today fuzzy logic control is one of the most important applications of fuzzy set theory and specially fuzzy logic. there are two general approachs for using of fuzzy control, software and hardware. integrated circuits as a solution for hardware realization are us...

15 صفحه اول

an application of fuzzy logic for car insurance underwriting

در ایران بیمه خودرو سهم بزرگی در صنعت بیمه دارد. تعیین حق بیمه مناسب و عادلانه نیازمند طبقه بندی خریداران بیمه نامه براساس خطرات احتمالی آنها است. عوامل ریسکی فراوانی می تواند بر این قیمت گذاری تاثیر بگذارد. طبقه بندی و تعیین میزان تاثیر گذاری هر عامل ریسکی بر قیمت گذاری بیمه خودرو پیچیدگی خاصی دارد. در این پایان نامه سعی در ارائه راهی جدید برای طبقه بندی عوامل ریسکی با استفاده از اصول و روش ها...

Effective and Efficient Model Clone Detection

Code clones are a major source of software defects. Thus, it is likely that model clones (i.e., duplicate fragments of models) have a signi cant negative impact on model quality, and thus, on any software created based on those models, irrespective of whether the software is generated fully automatically ( MDD-style ) or hand-crafted following the blueprint de ned by the model ( MBSD-style ). U...

متن کامل

An Efficient Method of Edge Detection using Fuzzy Logic

Various Edge detection algorithms have been proposed in the literature for extracting the edges from the image. But after emerging the fuzzy logic concept, a lot of Researcher of image processing has been shifted towards the fuzzy logic and its applicability in the field of image processing. This paper presents a fuzzy rule base algorithm, in MATLAB environment, which is capable of detecting ed...

متن کامل

Node Clone Detection in Wireless Sensor Networks

Wireless sensor networks are harmed to the node clone, and different distributed protocols have been proposed to detect this attack. However, they require too strong assumptions to be practical for randomly deployed sensor networks. Here, we propose two new node clone detection protocols with different tradeoffs on network conditions and performance. The first one is based on a DHT concept whic...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2021

ISSN: 1939-0122,1939-0114

DOI: 10.1155/2021/9924478