Professional Documents
Culture Documents
Keywords:
Existing System:
Disadvantages:
Proposed System:
Advantages:
1. It can display bad list attacker’s information.
2. It is reduced the energy levels and cost.
Modules Description:
2. Dataset Construction:
Architecture:
Software Requirements:
Hardware requirements:
Processor : Pentium IV
Hard Disk : 80GB
RAM : 2GB