Multipath Routing Using Neuro Fuzzy in Wireless Sensor Network
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
In this project, neuro fuzzy mulipath routing protocol around connectivity holes is developed. The neuro fuzzy multipath routing protocol is mainly used as a apparatus to sense and route around connectivity shacks. The neuro fuzzy first calculates all the possible routes and identifies is there is any holes in the routes.It also find multiple path without any holes.It routes the transmission in the best route without any holes in it, by rejecting the routes with the holes. It is an better energy effective protocol,which gives better presentation. Dynamic secret key is used to improve the security. It is used for secure connection.
Authors and Affiliations
R. Pon Rohini, S. Shirly, D. C. Joy Winnie Wise
Thermal Analysis of Multiport Sinous Multichannel Heat Exchanger in ANSYS Fluent
Miniature heat exchanger concept is gaining popularity in automotive and other industrial applications due to enhanced heat flux, light weight, and larger heat transfer area density compared to conventional heat exchang...
Control of Brushless DC Motor Drive with BL Luo Converter using Sliding Mode Control
This paper proposes a Sliding Mode Control (SMC) for Luo Converter operated in Discontinuous Conduction Mode. Due to the time varying and switching nature of Luo converter, its dynamic behaviour becomes highly non-linea...
Power Quality Improvement using Super Capacitor for an Isolated Power Generation
Power generation will be formed in many weak distribution networks, after renewable energy sources are connected to them. It is very important to increase the reliability and efficiency of using these renewable energy s...
A Comparative Study of Some Image Compression Techniques
A remarkable progress has been made in the field of data compression and its application, digital image compression is associated with removing redundant information of image data. Compression of digital images has a tw...
Spyware Detection Using Data Mining
The systems connected to the network are vulnerable to many malicious programs which threatens the confidentiality, integrity and availability of a system. Many malicious programs such as viruses, worms, trojan horses,...