An Efficient Three-Phase Fuzzy Logic Clone Node Detection Model
نویسندگان
چکیده
منابع مشابه
design of an analog fuzzy logic controller chip
fuzzy logic has been developed over the past three decades into a widely applied techinque in classification and control engineering. today fuzzy logic control is one of the most important applications of fuzzy set theory and specially fuzzy logic. there are two general approachs for using of fuzzy control, software and hardware. integrated circuits as a solution for hardware realization are us...
15 صفحه اولan application of fuzzy logic for car insurance underwriting
در ایران بیمه خودرو سهم بزرگی در صنعت بیمه دارد. تعیین حق بیمه مناسب و عادلانه نیازمند طبقه بندی خریداران بیمه نامه براساس خطرات احتمالی آنها است. عوامل ریسکی فراوانی می تواند بر این قیمت گذاری تاثیر بگذارد. طبقه بندی و تعیین میزان تاثیر گذاری هر عامل ریسکی بر قیمت گذاری بیمه خودرو پیچیدگی خاصی دارد. در این پایان نامه سعی در ارائه راهی جدید برای طبقه بندی عوامل ریسکی با استفاده از اصول و روش ها...
Effective and Efficient Model Clone Detection
Code clones are a major source of software defects. Thus, it is likely that model clones (i.e., duplicate fragments of models) have a signi cant negative impact on model quality, and thus, on any software created based on those models, irrespective of whether the software is generated fully automatically ( MDD-style ) or hand-crafted following the blueprint de ned by the model ( MBSD-style ). U...
متن کاملAn Efficient Method of Edge Detection using Fuzzy Logic
Various Edge detection algorithms have been proposed in the literature for extracting the edges from the image. But after emerging the fuzzy logic concept, a lot of Researcher of image processing has been shifted towards the fuzzy logic and its applicability in the field of image processing. This paper presents a fuzzy rule base algorithm, in MATLAB environment, which is capable of detecting ed...
متن کاملNode Clone Detection in Wireless Sensor Networks
Wireless sensor networks are harmed to the node clone, and different distributed protocols have been proposed to detect this attack. However, they require too strong assumptions to be practical for randomly deployed sensor networks. Here, we propose two new node clone detection protocols with different tradeoffs on network conditions and performance. The first one is based on a DHT concept whic...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2021
ISSN: 1939-0122,1939-0114
DOI: 10.1155/2021/9924478