Open Access   Article Go Back

Result of Misbehaviour Activities In Postponement Accepting Scheme by Belief Expert

C.Suganya 1 , V.Mangaiyarkarasi 2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-1 , Page no. 218-223, Jan-2015

Online published on Jan 31, 2015

Copyright © C.Suganya , V.Mangaiyarkarasi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: C.Suganya , V.Mangaiyarkarasi, “Result of Misbehaviour Activities In Postponement Accepting Scheme by Belief Expert,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.1, pp.218-223, 2015.

MLA Style Citation: C.Suganya , V.Mangaiyarkarasi "Result of Misbehaviour Activities In Postponement Accepting Scheme by Belief Expert." International Journal of Computer Sciences and Engineering 3.1 (2015): 218-223.

APA Style Citation: C.Suganya , V.Mangaiyarkarasi, (2015). Result of Misbehaviour Activities In Postponement Accepting Scheme by Belief Expert. International Journal of Computer Sciences and Engineering, 3(1), 218-223.

BibTex Style Citation:
@article{_2015,
author = {C.Suganya , V.Mangaiyarkarasi},
title = {Result of Misbehaviour Activities In Postponement Accepting Scheme by Belief Expert},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2015},
volume = {3},
Issue = {1},
month = {1},
year = {2015},
issn = {2347-2693},
pages = {218-223},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=390},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=390
TI - Result of Misbehaviour Activities In Postponement Accepting Scheme by Belief Expert
T2 - International Journal of Computer Sciences and Engineering
AU - C.Suganya , V.Mangaiyarkarasi
PY - 2015
DA - 2015/01/31
PB - IJCSE, Indore, INDIA
SP - 218-223
IS - 1
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2422 2433 downloads 2502 downloads
  
  
           

Abstract

Hateful then self-centered presentations signify a solemn danger against transmitting in delay/disruption accepting systems (DTNs). Owing to the single scheme characteristics, scheming a misdemeanor result arrangement in DTN is regarded as a greon challenge. It trust, a probabilistic misdemeanor result scheme, aimed at safe DTN transmitting to well-prearranged belief establishment. The elementary idea of ibelief is introducing a occasionally obtainintelligent important expert (ta) to justice the node’s demeanor founded on the calm transmitting indications then probabilistically checking. Ibelief classical as the appraisal willing then use willing theoretic enquiry to demonstrate that, via location an appropriate examination probability, ta could safeguard the refuge of DTN transmitting on a abridged cost. To extra extend the productivity of the planned scheme, to relate result likelihood with a node’s reputation, which permits a lively result likelihood strong-minded via the belief of the users. The varied enquiry then perfect results display thon the planned arrangement substantiates the productivity then productivity of the planned scheme.

Key-Words / Index Term

Burglary; Intrusion Detection; Fisheye Lens; Motion Result

References

[1]. Maiti, A. ; Sch. of Comput. Sci. & Eng., VIT Univ., Vellore, India ; Sivanesan, S,” Cloud controlled intrusion detection and burglary prevention stratagems in home automation systems”, Published in: Future Internet Communications (BCFIC), 2012 2nd Baltic Congress on Date of Conference: 25-27 April 2012 Page(s): 182 – 186.
[2]. Zhang Hanjun ; Hunan Univ. Of Technol., Zhuzhou, China ; Dong Ting,” Fiber Bragg Grating Sensor System in the Application of Guarding against Burglary”, Published in: Intelligent System Design and Engineering Application (ISDEA), 2012 Second International Conference on Date of Conference: 6-7 Jan. 2012 Page(s): 1259 – 1262.
[3]. Montoya, L. ; Distrib. & Embedded Security Group, Univ. of Twente, Enschede, Netherlands ; Junger, M. ; Hartel, P.,” How "Digital" is Traditional Crime?”, Published in: Intelligence and Security Informatics Conference (EISIC), 2013 European Date of Conference: 12-14 Aug. 2013 Page(s): 31 – 37.
[4]. Po-Hui Yu ; Dept. of Geogr., Nat. Taiwan Univ., Taipei, Taiwan ; Jinn-Guey Lay,” Exploring non-stationarity of local mechanism of crime events with spatial-temporal weighted regression”, Published in: Spatial Data Mining and Geographical Knowledge Services (ICSDM), 2011 IEEE International Conference on Date of Conference: June 29 2011-July 1 2011 Page(s): 7 – 12.
[5]. Harrington-Lynn, J. ; Building Res. Establ., Watford, UK ; Pascoe, T.,” A strategy for security of buildings”, Published in: Security Technology, 1995. Proceedings. Institute of Electrical and Electronics Engineers 29th Annual 1995 International Carnahan Conference on Date of Conference: 18-20 Oct 1995 Page(s): 189 – 196.
[6]. Yun Wang ; Dept. of Comput. Sci., Southern Illinois Univ. Edwardsville, Edwardsville, IL, USA ; Weihuang Fu ; Agrawal, D.P.,” Intrusion detection in Gaussian distributed Wireless Sensor Networks”, Published in: Mobile Adhoc and Sensor Systems, 2009. MASS '09. IEEE 6th International Conference on Date of Conference: 12-15 Oct. 2009 Page(s): 313 – 321.
[7]. Zhou Mingqiang ; Coll. of Comput. Sci., Chongqing Univ., Chongqing, China ; Huang Hui ; Wang Qian,” A graph-based clustering algorithm for anomaly intrusion detection”, Published in: Computer Science & Education (ICCSE), 2012 7th International Conference on Date of Conference: 14-17 July 2012 Page(s): 1311 – 1314.
[8]. Bo-heung Chung ; Electron. & Telecommun. Res. Inst. ; Seung-Ho Ryu ; Jeong-Nyeo Kim ; Jong-Soo Jang,” Kernel-level intrusion detection method using simplification and grouping”, Published in: Advanced Communication Technology, 2005, ICACT 2005. The 7th International Conference on (Volume:1 ) Date of Conference: 0-0 0 Page(s): 251 – 254.
[9]. Yongquan Mo ; Sch. of Inf. Technol. & Eng., Lanzhou Univ., Lanzhou ; Yizhong Ma ; Liang Xu,” Design and implementation of intrusion detection based on mobile agents”, Published in: IT in Medicine and Education, 2008. ITME 2008. IEEE International Symposium on Date of Conference: 12-14 Dec. 2008 Page(s): 278 – 281.
[10]. Garcia, K.A. ; Scotiabank, Mexico City, Mexico ; Monroy, R. ; Trejo, L.A. ; Mex-Perera, C.,” Analyzing Log Files for Postmortem Intrusion Detection”, Published in: Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on (Volume:42 , Issue: 6 ) Page(s): 1690 – 1704.
[11]. Shoubo Zhao ; Sch. of Electr. Eng., Tianjin Univ. of Technol., Tianjin, China ; Baofeng Zhang ; Li Li ; Zuoliang Cao,” Fisheye lens camera system calibration and localization error analysis”, Published in: Computer Design and Applications (ICCDA), 2010 International Conference on (Volume:4 ) Date of Conference: 25-27 June 2010 Page(s): V4-441 - V4-445.
[12]. Jie Sun ; Sch. of Electron. Inf. & Commun. Eng., Tianjin Univ. of Technol., Tianjin ; Jinhui Zhu,” Calibration and Correction for Omnidirectional Image with a Fisheye Lens”, Published in: Natural Computation, 2008. ICNC '08. Fourth International Conference on (Volume:6 ) Date of Conference: 18-20 Oct. 2008 Page(s): 133 – 137.
[13]. Donggyun Kim ; Image Process. & Intell. Syst. Lab., Chung-Ang Univ., Seoul, South Korea ; Wonseok Kang ; Joonki Paik,” High-resolution digital zooming using a fisheye lens and geometric compensation”, Published in: Consumer Electronics (ICCE), 2011 IEEE International Conference on Date of Conference: 9-12 Jan. 2011 Page(s): 207 – 208.
[14]. Te Chen ; State Key Lab. of Adv. Opt. Commun. Syst. & Networks, Peking Univ., Beijing, China ; Lu Liu ; Bo Tu ; Zhong Zheng,” High-Spatial-Diversity Imaging Receiver Using Fisheye Lens for Indoor MIMO VLCs”, Published in: Photonics Technology Letters, IEEE (Volume:26 , Issue: 22 ) Page(s): 2260 – 2263.
[15]. Yalin Xiong ; QuickTime VR Group, Apple Comput. Inc., Cupertino, CA, USA ; Turkowski, K.” Creating image-based VR using a self-calibrating fisheye lens”, Published in: Computer Vision and Pattern Recognition, 1997. Proceedings., 1997 IEEE Computer Society Conference on Date of Conference: 17-19 Jun 1997 Page(s): 237 – 243.
[16]. Young, G.-S.J. ; Dept. of Electr. Eng.-Syst., Univ. of Southern California. Los Angeles, CA, USA ; Chellappa, R.” 3-D motion estimation using a sequence of noisy stereo images: models, estimation, and uniqueness results”, Published in: Pattern Analysis and Machine Intelligence, IEEE Transactions on (Volume:12 , Issue: 8 ) Page(s): 735 – 759.
[17]. Chan, K.C.D. ; Los Alamos Nat. Lab., NM ; Ekdahl, C.A. ; Chen, Yu-Jiuan ; Hughes, T.P.” Simulation results of corkscrew motion in DARHT-II”, Published in: Particle Accelerator Conference, 2003. PAC 2003. Proceedings of the (Volume:5 ) Date of Conference: 12-16 May 2003 Page(s): 3210 – 3212.
[18]. Zhao, X. ; Intelligent Autom., Inc., Rockville, MD, USA ; Xu, R. ; Kwan, C.” Ship-motion prediction: algorithms and simulation results”, Published in: Acoustics, Speech, and Signal Processing, 2004. Proceedings. (ICASSP '04). IEEE International Conference on (Volume:5 ) Date of Conference: 17-21 May 2004 Page(s): V - 125-8 vol.5.
[19]. Chunchun Chen ; Sch. of Commun. & Inf. Eng., Shanghai Univ., Shanghai, China ; Xuewei Chen ; Yang, Eryan.” A new motion compensation algorithm and new test algorithm to compare the result of motion compensation”, Published in: Microelectronics and Electronics (PrimeAsia), 2011 Asia Pacific Conference on Postgraduate Research in Date of Conference: 6-7 Oct. 2011 Page(s): 33 – 36.
[20]. Cook, D.A. ; Naval Surface Warfare Center, Panama, Panama ; Stroud, J.S. ; Fernandez, J.E. ; Lathrop, J.D.” Results from a hybrid synthetic aperture sonar motion estimation scheme”, Published in: Oceans 2005 - Europe (Volume:2 ) Date of Conference: 20-23 June 2005 Page(s): 1376 - 1381 Vol. 2.