Critical Path Method in the Network Analysis with Parametric Fuzzy Activity
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2019, Vol 21, Issue 1
Abstract
In this paper, a method is presented to find fuzzy critical path using parametric interval valued function. Here network model has been developed in fuzzy environment. All activities are considered as a Trapezoidal fuzzy number. This fuzzy number has been transform as an interval number using Nearest Interval Approximation method. In this work, we develop a parametric interval-valued functional form of an interval number and then solve the parametric network problem. To illustrate the technique, an airport’s cargo ground operation system is considered here.
Authors and Affiliations
Debrupa Sen, Debolina Roy, Samir Dey
Prevention and Detection of Wormhole Attack in Mobile Adhoc Network Using Clustering and RTT
Abstract: A security constraint in mobile adhoc network is very critical task. Some critical security issue such as black hole attack, wormhole attack, sinkhole attack, prevention and detection of attack is major challen...
Skew Detection based on Bounding Edge Approximation
Abstract: Any paper document when converted to electronic form through standard digitizing devices, like scanners, is subject to a small tilt or skew. With recent advances of hand-held devices such as cell-phones,...
Enhancing Security Of Publish/Subscribe System Using Identity Based Encryption Model
Abstract: In a content based publish subscribe system providing security related to the events or messages and subscriptions is very difficult. This paper presents approach to provide security in a Broker-less Publish/Su...
Simulating ECA-AODV Routing Scheme using TCP for MANETs
ECA model checks different resource constraints before constructing the path. This will ensure long time connectivity between source and destination nodes. TCP model will provide reliable data transfer between source nod...
Effects Of Wormhole Attack On AODV And DSR Routing Protocol Through The Using NS2 Simulator
Abstract : Mobile Adhoc Networks (MANET) are self organizing, decentralized networks and possess dynamic topology, which make them attractive for routing attacks. Attacks on ad hoc networks can be classified as pas...