RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Predicting Groundwater Level Using the Soft Computing Tool: An Approach for Precision Enhancement

        Pagadala Damodaram Sreedevi,Pagadala Damodaram Sreekanth,Shakeel Ahmed 대한환경공학회 2012 Environmental Engineering Research Vol.17 No.-

        Monitoring a non-linear phenomenon—such as the groundwater levels in an aquifer—by cost-effective techniques is quite a difficult task. To overcome these limitations, soft computing tools are increasingly being used to predict groundwater levels with high accuracy. In the present study, a soft computing tool called support vector machine (SVM) was employed for predicting the groundwater levels jointly using weather parameters, at Maheshwaram watershed, Hyderabad, Andhra Pradesh, India. The accuracy of this approach was established based on statistical tools termed the regression coefficient, root mean square error, Nash-Sutcliffe coefficient, and error variation. For performance evaluation, the model outputs were compared with traditional statistical multiple regression (SMR) model outputs, and it was found that the SVR method offers better prediction than does SMR.

      • KCI등재

        FPGA implementation of genetic algorithm to detect optimal user by cooperative spectrum sensing

        D. Damodaram,T. Venkateswarlu 한국통신학회 2019 ICT Express Vol.5 No.4

        The major task for cognitive radio (CR) systems is to sense the spectrum holes reliably and make the secondary user share the spectrum efficiently and effectively with the primary users. The Cognitive Radio cannot sense the primary users correctly because of the shadowing and fading environment in the multipath channel. To overcome this sensing problem collaboration between the secondary users has to be established. In collaborative sensing, a fusion centre will receive information from each secondary user and a decision will be made by fusion rule. Genetic algorithm is used to select secondary users having higher SNRs. MATLAB is used to carry out the simulation to obtain the optimum number of users can involved in the collaboration. HDL is implemented on Genetic algorithm to detect the optimal secondary users. Simulation and synthesis report is given in this paper.

      • Intrusion Detection System for Mobile Ad hoc Networks Based on the Behavior of Nodes

        S. Mamatha,A. Damodaram 보안공학연구지원센터 2014 International Journal of Grid and Distributed Comp Vol.7 No.6

        A Mobile Ad hoc Network (MANET) can be defined as a network of mobile nodes that communicate over the wireless radio communication channel. It is also defined as a network without any underlying infrastructure and offers unrestricted mobility. Due to their open nature and lack of infrastructure, security for MANETs has become an intricate problem. To transmit data over such a network, generally any routing protocol that enables dynamic, self-starting multi hop routing between mobile nodes is used. However these routing protocols are vulnerable to various kinds of attacks. The conventional security mechanisms of protecting a network are not sufficient for these networks. Hence a second level of defense to detect and respond to the security problem called an Intrusion Detection System (IDS) is required. An IDS based on anomaly based intrusion detection that works by checking the behavior of the nodes was proposed to overcome some of the attacks like blackhole, grayhole and flooding attacks. Generally the malicious nodes demonstrate a different behavioral pattern of all the other normal nodes. So the specified approach where a Data Transmission Quality (DTQ) function is used to determine the behavior of the nodes as malicious or legitimate is used. The DTQ function is defined in such a way that it will be close to a constant or keep changing smoothly for genuine nodes and will keep on diminishing for malicious nodes. The proposed method was implemented using AODV as the routing protocol for transmitting data. The evaluation results show that the performance of the AODV protocol under attacks has improved significantly by using the proposed approach.

      • Survey of Group Key Management Techniques in MANET

        G.Narayana,M.Akkalakshmi,A.Damodaram 보안공학연구지원센터 2016 International Journal of Future Generation Communi Vol.9 No.11

        Group key management (GKM) technique is employed for ensuring security and integrity in Mobile Ad hoc Networks (MANET). It is the fundamental component of secure group communication systems. It involves distribution, updation and revocation of group keys. GKM can be carried out through many approaches. Existing studies on GKM techniques in MANET did not provide detailed analysis. This survey presents various GKM techniques for MANETs. The existing GKM techniques are classified into three categories namely centralized, distributed and hierarchical. Each of these techniques are explained with their advantages and disadvantages.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼