Detection of intrusion in wireless sensor networks using ai approach (Record no. 19071)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | a |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OSt |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20230329083059.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 230329b xxu||||| |||| 00| 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | AIKTC-KRRC |
Transcribing agency | AIKTC-KRRC |
100 ## - MAIN ENTRY--PERSONAL NAME | |
9 (RLIN) | 17053 |
Author | Periyakaruppan, K. |
245 ## - TITLE STATEMENT | |
Title | Detection of intrusion in wireless sensor networks using ai approach |
250 ## - EDITION STATEMENT | |
Volume, Issue number | Vol.13(3), Sep |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Chennai |
Name of publisher, distributor, etc. | ICT Academy |
Year | 2022 |
300 ## - PHYSICAL DESCRIPTION | |
Pagination | 2763-2766p. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | We were able to solve the problem of discovering K-barriers with interpretability concerns for use in intrusion detection by collecting data from wireless sensor networks. This gave us the information we needed to find a solution. This paper contains the solution that we came up with. As a result of the results of the suggested model in the paper being assertive and interpretable in this context, vital information pertaining to the matter that was being researched could be gathered. The results were obtained through the process of showing how the model can be interpreted. The challenge is trying to figure out how many barriers are required for adequate territorial defense. It is therefore possible to bring the expenses involved with anticipating and installing equipment in these regions down to a level that is more tolerable. The approach that has been offered provides a fresh perspective on the nature of the underlying issue behavior and is expected to be of assistance in the distribution of relevant data and discoveries. Constructing expert systems that are relevant to the subject matter is doable if one makes use of these fuzzy principles. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
9 (RLIN) | 4619 |
Topical term or geographic name entry element | EXTC Engineering |
700 ## - ADDED ENTRY--PERSONAL NAME | |
9 (RLIN) | 17056 |
Co-Author | Kavitha, M.S. |
773 0# - HOST ITEM ENTRY | |
International Standard Serial Number | 0976-0091 |
Title | ICTACT journal on communication technology |
Place, publisher, and date of publication | Chennai ICT Academy |
856 ## - ELECTRONIC LOCATION AND ACCESS | |
URL | https://ictactjournals.in/paper/IJCT_Vol_13_Iss_3_Paper_7_2763_2766.pdf |
Link text | Click here |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | |
Koha item type | Articles Abstract Database |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Permanent Location | Current Location | Shelving location | Date acquired | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|
School of Engineering & Technology | School of Engineering & Technology | Archieval Section | 2023-03-29 | 2023-0541 | 2023-03-29 | 2023-03-29 | Articles Abstract Database |