Mukesh Kumar Baghel

  • Citations Per Year
Learn More
Rule mining is very efficient technique for find relation of correlated data. The correlation of data gives meaning full extraction process. For the mining of rule mining a variety of algorithm are used such as Apriori algorithm and tree based algorithm. Some algorithm is wonder performance but generate negative association rule and also suffered from(More)
The growth of internet technology spread a large amount of data communication. The communication of data compromised network threats and security issues. The network threats and security issues raised a problem of data integrity and loss of data. For the purpose of data integrity and loss of data before 20 year Anderson developed a model of intrusion(More)
In this paper proposed a hybrid model for feature selection and intrusion detection. Feature selection is important issue in intrusion detection. The selection of feature in attack attribute and normal traffic attribute is challenging task. The selection of known and unknown attack is also faced a problem of classification. PCNN is dynamic network used for(More)
Ad hoc wireless network is evolving as one of the major networking areas as its concepts benefits Sensor Networks, Mobile Ad hoc Networks, Intelligent Transportation Systems, Pervasive and Wearable Computing, Wireless Mesh Networks, to name some. Ad hoc wireless network beholds the unique proprietorship as network is decentralize, dynamic, mobile and self(More)
Digital image watermarking is widely used for copyright protection of digital information. The effectiveness of a digital watermarking technique is indicated by the robustness of embedded watermarks against various attacks. A new method for watermarking is suggested is feature based watermarking. For getting robust watermark, the watermark should be(More)
  • 1