Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Mythili, S.
- Evaluation of Soil Fertility Status in Teak Plantations of South India
Abstract Views :196 |
PDF Views:0
Authors
Source
Indian Forester, Vol 124, No 2 (1998), Pagination: 146-149Abstract
In the present study, the available macro-nutrient status and the physico-chemical properties of soils at different Teak plantations of Sterling Tree Magnum (India) Ltd., were evaluated. It has been found that the nitrogen (Alkaline KMnO4), phosphorus (Bray I-P and Olsen-P) and potassium (NH4OAc) status of the plantations were low to medium, low and medium to high levels, respectively. Thus, Soil Fertility Evaluation could form the basis for better discriminatory fertilizer recommendation to the growing Teak plantations of India for the maintenance of soil fertility status and to have sustainable Teak production.- Fabric Defect Detection Using Steerable Pyramid
Abstract Views :180 |
PDF Views:2
Authors
Affiliations
1 Department of Computer Science & Engineering, United Institute of Technology, Tamil Nadu, IN
1 Department of Computer Science & Engineering, United Institute of Technology, Tamil Nadu, IN
Source
ICTACT Journal on Image and Video Processing, Vol 1, No 4 (2011), Pagination: 204-212Abstract
In this paper, a novel idea is proposed for fabric defect detection. De-fects are detected in the fabric using steerable pyramid along with a defect detection algorithm. Various steerable pyramid of four size 256256, 128128, 6464, 3232 and with four orientation bands 00,450, 900, 1350 are used. Utilizing a Steerable pyramid proved ade-quate in the representation of fabric images in multi-scale and multi-orientations; thus allowing defect detection algorithms to run more effectively. Defect detection algorithm identifies and locates the im-perfection in the defective sample using the statistics mean and stan-dard deviation. This statistics represents the relative amount of inten-sity in the texture and is sufficient to measure defects in the current model .The obtained result are compared with the existing methods wavelet based system and with Gaussian and Laplacian pyramid.Keywords
Fabric Automatic Visual Inspection, Steerable Pyramid, Feature Extractor, Defect Detector.- Parallel Implementation of Genetic Algorithm using K-Means Clustering
Abstract Views :126 |
PDF Views:6
Authors
Affiliations
1 Department of Computer Applications, Hindusthan College of Arts and Science, Coimbatore, IN
1 Department of Computer Applications, Hindusthan College of Arts and Science, Coimbatore, IN
Source
International Journal of Advanced Networking and Applications, Vol 3, No 6 (2012), Pagination: 1450-1455Abstract
The existing clustering algorithm has a sequential execution of the data. The speed of the execution is very less and more time is taken for the execution of a single data. A new algorithm Parallel Implementation of Genetic Algorithm using KMeans Clustering (PIGAKM) is proposed to overcome the existing algorithm. PIGAKM is inspired by using KM clustering over GA. This process indicates that, while using KM algorithm, it covers the local minima and it initialization is normally done randomly, by KM and GA. It always converge the global optimum eventually by PIGAKM. To speed up GA process, the evalution is done parallely not individually. To show the performance and efficiency of this algorithms, the comparative study of this algorithm has been done.Keywords
Clustering, Genetic Algorithm, K-Means, Mutation, Parallel.- Design And Analysis of Koch Fractal Antenna for Wlan Applications
Abstract Views :142 |
PDF Views:0
Authors
Affiliations
1 Department of Electronics and Communication Engineering, Rajiv Gandhi College of Engineering College, IN
1 Department of Electronics and Communication Engineering, Rajiv Gandhi College of Engineering College, IN
Source
ICTACT Journal on Microelectronics, Vol 6, No 2 (2020), Pagination: 923-927Abstract
In this paper, a Koch fractal antenna is designed for Wireless Local Area Network (WLAN) applications. Koch snowflake design is symmetrical and self-similar structure that induces space filling capability and improves the surface current on the antenna. The overall fractal antenna structure consist of a copper foils (Patch and Ground Plane) mounted on either sides of the dielectric material (Flame Retardant-4 (FR-4) with permittivity εr =4.4 and loss tangent δ=0.02). The antenna is fed using a microstrip line feed. The dimensions of the Koch fractal antenna are 30x30x1.6mm3 which is compact sized design made on High Frequency Structure Simulator (HFSS) platform. The simulation outputs are internally compared with different iterations implemented on the patch using Iterated Function System (IFS) and the difference in the radiating frequency, return loss, bandwidth, gain and directivity of all three different iterations. The resonating frequency for three iterations ranges from 5.8GHz to 7.47GHz which can be used in WLAN applications. Thus, the proposed Koch snowflake fractal antenna design provides improvements in the antenna parameters on increasing scale of iteration such as S11 from -21.35dB to -36.32dB, average gain of 3dB and Impedance Bandwidth of 25.90%.Keywords
Antenna Design, FR-4, Ground Plane, Koch Snowflake, Patch, WLAN Application.- Performance Analysis of Anomalous Detection Scehmes Based on Modified Support Vector Machine and Enhanced Relevance Vector Machine
Abstract Views :156 |
PDF Views:1
Authors
Affiliations
1 Department of Computer Science, Kongunadu Arts and Science College, IN
2 Department of Information Technology, Kongunadu Arts and Science College, IN
1 Department of Computer Science, Kongunadu Arts and Science College, IN
2 Department of Information Technology, Kongunadu Arts and Science College, IN
Source
ICTACT Journal on Soft Computing, Vol 11, No 3 (2021), Pagination: 2364-2377Abstract
Anomalous transactions are common activity happening on the financial oriented transaction. Detecting those anomalous transactions from the financial transaction patterns is the most complex task which is focused in this work. In the existing work it is achieved by introducing the method namely Fuzzy Exception and Fuzzy Anomalous Rule (FEFAR). The accuracy of this existing work FEFAR found to be lesser which is resolved in the proposed research work. There are two research works has been proposed those are namely Rule Pruning based Anomalous Rule Detection Strategy (RPARD) and Lasso Regression based Improved Anomalous Detection Scheme (LR-IADS). Both of these methods attempt to find the anomalous transaction from the given input database by finding the anomalous rules. Each method differ in its methodologies, thus the accuracy of the methods would differ. The main goal of this analysis work is to compare the performance of existing and proposed methodologies based on simulation outcome. This research work aims to highlight the performance variation between the proposed and existing techniques and the best method that can offer accurate anomalous transaction detection. The analysis of the research work is carried out on matlab environment over four databases namely soil, bank, german statlog and auto mpg based on which performance outcome has been given.Keywords
Anomalous Transaction, Anomalous Rules, Accuracy, RPARD, LR-IADS, FEFAR.References
- T. Watanabe, A. Kitamura, K. Higuchi and H. Ikeda, “Intelligent Manufacturing Database Techniques for Quality and Process Design of Steel Plate”, Proceedings of IEEE Conference on Emerging Technologies and Factory Automation, pp. 596-603, 2003.
- R. Srikant and R. Agrawal, “Mining Generalized Association Rules”, Proceedings of IEEE Conference on Very Large Data Bases, pp. 407-419, 1995.
- R. Srikant and R. Agrawal, “Mining Quantitative Association Rules in Large Relational Tables”, Proceedings of IEEE Conference on Management of the Data, pp.1-12, 1996.
- G. Chen and Q. Wei, “Fuzzy Association Rules and the Extended Mining Algorithms”, Information Sciences, Vo1. l47, No. 1-4, pp. 221-228, 2002.
- H. Ishibuchi and T. Yamamoto, “Fuzzy Rule Selection by Data Mining Criteria and Genetic Algorithms”, Proceedings of Annual Conference on Genetic and Evolutionary Computation, pp. 399-406, 2002.
- Y. Hu, R. Chen and G. Tzeng, “Discovering Fuzzy Association Rules Using Fuzzy Partition Methods”, Knowledge-Based Systems, Vol. 16, No. 3, pp. 137-147, 2003.
- T. Watanabe and N. Nakayama, “Fuzzy Rule Extraction Based on the Mining Generalized Association Rules”, Proceedings of IEEE International Conference on Systems, Man and Cybernetics. Conference Theme-System Security and Assurance, pp. 2690-2695, 2003.
- M. Delgado, N. Marin, D. Sanchez and M.A. Vila, “Fuzzy Association Rules: General Model and Applications”, IEEE transactions on Fuzzy Systems, Vol 11, No. 2, pp. 214-225, 2003.
- M. Delgado, N. Marin, M.J. Martin Bautista, D. Sanchez and M.A. Vila, “Mining Fuzzy Association Rules: An Overview”, Proceedings of IEEE International Conference on Soft Computing for Information Processing and Analysis, pp. 351-373, 2006.
- E. Suzuki, “Discovering Unexpected Exceptions: A Stochastic Approach”, Proceedings of IEEE International Conference on Rough Sets, Fuzzy Sets, and Machine Discovery, pp. 225-232, 1996.
- F. Berzal, J.C. Cubero, N. Marn and M. Gamez, “Anomalous association rules”, Proceedings of IEEE International Conference on Alternative Techniques for Data Mining and Knowledge Discovery, pp. 1-8, 2004.
- M. Delgado, M.D. Ruiz and D. Sanchez, “New Approaches for Discovering Exception and Anomalous Rules”, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, Vol. 19, No.2, pp. 361-399, 2011.
- T. Watanabe and R. Fujioka, “Fuzzy Association Rules Mining Algorithm Based on Equivalence Redundancy of Items”, Proceedings of IEEE International Conference on Systems, Man, and Cybernetics, pp.1960-1965, 2012.
- E. Suzuki, “Autonomous Discovery of Reliable Exception Rules”, Proceedings of International Conference on Knowledge Discovery and Data Mining, pp. 159-176, 1997.
- M.D. Ruiz, D. Snchez, M. Delgado and M.J. Martin Bautista, “Discovering Fuzzy Exception and Anomalous Rules”, IEEE Transactions on Fuzzy Systems, Vol. 24, No. 4, pp. 930-944, 2016.
- E. Suzuki, “Data Mining Methods for Discovering Interesting Exceptions from an Unsupervised Table”, Journal of Universal Computer Science, Vol. 12, No. 6, pp. 627-653, 2006.
- E. Suzuki and J.M. Zytkow, “Unified Algorithm for Undirected Discovery of Exception Rules”, International Journal of Intelligent Systems, Vol. 20, No. 7, pp. 673-691, 2005.
- T. Zhang, W. Zhang, X.U. Wei and H.A.O. Haijing, “Multiple Instance Learning for Credit Risk Assessment with Transaction Data”, Knowledge-Based Systems, Vol. 161, pp. 65-77, 2018.
- S. Senthil Kumar and S. Mythili, “Survey on Exception Rules and Anomaly Detection”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Vol. 2, No. 6, pp.521- 525, 2017.
- S. Senthil Kumar and S. Mythili, “Accurate Fuzzy Anomalous Rule Identification Using Classification Algorithms”, Journal of Advance Research in Dynamical and Control Systems, Vol. 11, No. 5, pp. 241-262, 2019.
- S. Chen, M. Peng, H. Xiong and S. Wu, “An Anomaly Detection Method based on Lasso”, Cluster Computing, Vol. 22, No. 3, pp.5407-5419, 2019.
- Robust Tristate Security Mechanism to Protect Against Selective Forwarding Attack and Black Hole Attack in Intra-Cluster Multi-Hop Communication
Abstract Views :96 |
PDF Views:0
Authors
A. Anitha
1,
S. Mythili
2
Affiliations
1 Department of Computer Science, Kongunadu Arts and Science College, Coimbatore, Tamil Nadu., IN
2 Department of Information Technology, Kongunadu Arts and Science College, Coimbatore, Tamil Nadu., IN
1 Department of Computer Science, Kongunadu Arts and Science College, Coimbatore, Tamil Nadu., IN
2 Department of Information Technology, Kongunadu Arts and Science College, Coimbatore, Tamil Nadu., IN
Source
International Journal of Computer Networks and Applications, Vol 10, No 3 (2023), Pagination: 443-455Abstract
Security is the most vital issue to be addressed in Wireless Sensor Networks (WSNs). The WSN dominates since it has an effectiveness of applications in numerous fields. Though it has effectiveness towards its applications likewise it is susceptible to two different kinds of attacks (i.e.) external attacks and internal attacks existence of constrained reckoning resources, low memory, inadequate battery lifetime, handling control, and nonexistence of interfere resilient packet. Handle internal attacks such as selective forwarding attacks (SFAs) and black hole attacks (BHA) are considered to be the most common security extortions in wireless sensor networks. The attacker nodes will execute mischievous activities during data communication by creating traffic load, delaying packet delivery, dropping packets selectively or dropping all packets, energy consumption, and depleting all network resources. These attacks can be handled efficiently by implementing the proposed methodology for detecting, preventing, and recovering Cluster Heads (CHs), Cluster Members (CMs), and Transient Nodes (TNs) from SFAs and BHA in intra-cluster multi-hop. It is accomplished by proposing a robust strategy for overcoming internal attacks on cluster head, cluster member, and transient node. The Fuzzy C-Means clustering is used to discover the prominent cluster head. The uncertainty entropy model is used to detect internal attacks by removing the malicious node from the transition path. The intermediate node is been selected based on the degree and dimension. The experimental results of the proposed Robust Tristate Security Mechanism (RTSSM) against SFAs and BHA are evaluated with packet delivery ratio, throughput, and packet drop and the results prove the effectiveness of the proposed methodology and it also aids in the extension of the network lifetime.Keywords
Cluster Head, Cluster Member, Intra-Cluster, Multi-Hop, Clustering, Wireless Sensor Networks, Uncertainty, Robust, Fuzzy Membership, Entropy.References
- Jayachandran J, Vimala Devi K, "A Survey on Clustering Algorithms and Proposed Architectural Framework for Border Surveillance System in Wireless Sensor Networks", International Journal of Computer Networks and Applications (IJCNA), 9(6), PP: 785-805, 2022, DOI: 10.22247/ijcna/2022/217710.
- Iqbal, U., & Mir, A. H. (2022). Secure and practical access control mechanism for WSN with node privacy. Journal of King Saud University-Computer and Information Sciences, 34(6), 3630-3646.
- Feng H, Fu W. Study of recent development about privacy and security of the internet of things. In: 2010 international conference on web information systems and mining, Sanya, China, 23 October 2010. IEEE, pp. 91–95.
- Anitha, S.Mythili, “An Approach for Detection and Prevention of Cluster Head and Cluster Member from Selective Forwarding Attacks and Black Hole Attack in Intra-Cluster Multi-Hop Communication,” Design Engineering, Vol. 2021, Issue.06, pp. 1032-1060.
- Bouarourou, Soukaina & Zannou, Abderrahim & Boulaalam, Abdelhak & Nfaoui, El Habib. (2022). Sensors Deployment in IoT Environment. 10.1007/978-3-031-01942-5_27.
- Munir, A.; Gordon-Ross, A.; Ranka, S. Multi-core Embedded Wireless Sensor Networks: Architecture and Applications. In IEEE Transactions on Parallel and Distributed Systems (TPDS); IEEE: Piscataway, NJ, USA, 2014; Volume 25, pp. 1553–1562
- Faris M, Mahmud MN, Salleh MFM, Alnoor A. Wireless sensor network security: A recent review based on state-of-the-art works. International Journal of Engineering Business Management. 2023;15.
- Tam, Nguyen & Dat, Vi & Lan, Phan & Binh, Huynh & Vinh, Le & Swami, Ananthram. (2021). Multifactorial evolutionary optimization to maximize lifetime of wireless sensor network. Information Sciences. 576. 10.1016/j.ins.2021.06.056.
- Maivizhi, Radhakrishnan & Yogesh, Palanichamy. (2021). Q-learning based routing for in-network aggregation in wireless sensor networks. Wireless Networks. 27. 1-20. 10.1007/s11276-021-02564-8.
- Lalitha, K., Thangaraja, R., Siba, K. U., Poongodi, C., & Prasad, S. A. (2017). GCCR: An efficient grid based clustering and combinational routing in wireless sensor networks. Wireless Personal Communications.
- Turgut, “Analysing Multi-hop Intra-Cluster Communication in Cluster-Based Wireless Sensor Networks”, Natural and Engineering Sciences (2019).
- Mezghani, M, “An Efficient Multi-Hops Clustering and Data Routing for WSNs based on Khalimsky IpekAbasıkeleş Shortest Paths,” Journal of Ambient and Intelligence and Humanized Computing, Vol. 10, 1275-1288, 2019.
- D.Wu, S. Gene, X. Cai, G. Zhang and F.Xue, “ A Many-Objective Optimization WSN Energy Balance Model,” KSSII Transactions on Internet and Informatiom Systems, Vol.14, No. 2, pp. 514-537, 2020.
- H. El Alami and A. Najid, “ECH: An Enhanced Clustering Hierarchy Approach To Maximize Lifetime of Wireless Sensor Networks,” IEEE Access, Vol. 7,pp. 107145-107153,2019.
- Gohar Ali, Fernando Moreira, Omar Alfandi, Babar Shah and Mohammed Ilyas, “A New Intra-Cluster Scheduling Scheme for Real-Time Flows in Wireless Sensor Networks,” Electronics 9, No.4, 2020.
- Hasan A, Khan MA, Shabir B, Munir A, Malik AW, Anwar Z, Ahmad J. Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things. Applied Sciences. 2022; 12(22):11442.
- Malik A, Khan MZ, Faisal M, Khan F, Seo J-T. An Efficient Dynamic Solution for the Detection and Prevention of Black Hole Attack in VANETs. Sensors. 2022; 22(5):189
- Ali, Haider & Tariq, Umair & Hussain, Mubashir & Lu, Liu & Panneerselvam, John & Zhai, Xiaojun. (2020). ARSH-FATI a Novel Metaheuristic for Cluster Head Selection in Wireless Sensor Networks. IEEE Systems Journal. PP. 1-12. 10.1109/JSYST.2020.2986811.
- Amutha, J. & Sharma, Sandeep & Sharma, Sanjay. (2021). Strategies based on various aspects of clustering in wireless sensor networks using classical, optimization and machine learning techniques: Review, taxonomy, research findings, challenges and future directions. Computer Science Review. 40. 100376. 10.1016/j.cosrev.2021.100376.
- Rawat, Piyush & Chauhan, Siddhartha. (2021). Clustering protocols in wireless sensor network: A survey, classification, issues, and future directions. Computer Science Review. 40. 100396. 10.1016/j.cosrev.2021.100396.
- S. Ramesh, R. Rajalakshmi, Jaiprakash Narain Dwivedi , S. Selvakanmani, Bhaskar Pant, N. Bharath Kumar , Zelalem Fissiha Demssie, Optimization of Leach Protocol in Wireless Sensor Network Using Machine Learning, Computational Intelligence and Neuroscience Volume 2022, Article ID 53932, 8 pages.
- M. Sangeetha, and A. Sabari, “Genetic optimization of hybrid clustering algorithm in mobile wireless sensor networks,” Sensor Review, vol. 38, no. 4, pp. 526-533, 2018.
- Zannou, A., Boulaalam, A., & Nfaoui, E. H. (2022). Data Flow Optimization in the Internet of Things. Statistics, Optimization & Information Computing, 10(1), 93-106. https://doi.org/10.19139/soic-2310-5070-1166. How to cite this article:
- Firas Ali Al-Juboori & Ismail, E. S. F. (2014). A modified fuzzy C-means cluster-based approach for wireless sensor network. The Mediterranean Journal of Electronics and Communications, 10(2).
- D. Hongjun, J. Zhiping and D. Xiaona, "An Entropy-based Trust Modeling and Evaluation for Wireless Sensor Networks," 2008 International Conference on Embedded Software and Systems, Chengdu, China, 2008, pp. 27-34.
- Empowered Chicken Swarm Optimization with Intuitionistic Fuzzy Trust Model for Optimized Secure and Energy Aware Data Transmission in Clustered Wireless Sensor Networks
Abstract Views :98 |
PDF Views:1
Authors
A. Anitha
1,
S. Mythili
2
Affiliations
1 Department of Computer Science, Kongunadu Arts and Science College, Coimbatore, Tamil Nadu, IN
2 Department of Information Technology, Kongunadu Arts and Science College, Coimbatore, Tamil Nadu, IN
1 Department of Computer Science, Kongunadu Arts and Science College, Coimbatore, Tamil Nadu, IN
2 Department of Information Technology, Kongunadu Arts and Science College, Coimbatore, Tamil Nadu, IN
Source
International Journal of Computer Networks and Applications, Vol 10, No 4 (2023), Pagination: 511-526Abstract
Each sensor node functions autonomously to conduct data transmission in wireless sensor networks. It is very essential to focus on energy dissipation and sensor nodes lifespan. There are many existing energy consumption models, and the problem of selecting optimized cluster head along with efficient path selection is still challenging. To address this energy consumption issue in an effective way the proposed work is designed with a two-phase model for performing cluster head selection, clustering, and optimized route selection for the secure transmission of data packets with reduced overhead. The scope of the proposed methodology is to choose the most prominent cluster head and assistant cluster head which aids in prolonging the network lifespan and also securing the inter-cluster components from selective forwarding attack (SFA) and black hole attack (BHA). The proposed methodology is Empowered Chicken Swarm Optimization (ECSO) with Intuitionistic Fuzzy Trust Model (IFTM) in Inter-Cluster communication. ECSO provides an efficient clustering technique and cluster head selection and IFTM provides a secure and fast routing path from SFA and BHA for Inter-Cluster Single-Hop and Multi-Hop Communication. ESCO uses chaos theory for local optima in cluster head selection. The IFTM incorporates reliance of neighbourhood nodes, derived confidence of nodes, estimation of data propagation of nodes and an element of trustworthiness of nodes are used to implement security in inter-cluster communication. Experimental results prove that the proposed methodology outperforms the existing approaches by increasing packet delivery ratio and throughput, and minimizing packet drop ratio and energy consumption.Keywords
Wireless Sensor Networks, Chicken Swarm Optimization, Intuitionistic Fuzzy Trust Model, Energy Aware, Security, Cluster Head, Clustering and Inter-Cluster Communication.References
- M. Jain and H. Kandwal, “A Survey on Complex Wormhole Attack in Wireless Ad Hoc Networks,” in International Conference Advances in Computing, Control, and Telecomm. Technologies (ACT ’09), pp. 555-558 (2009).
- He Z, Chen L, Li F, Jin G (2023) A fuzzy model for content-centric routing in Zigbee-based wireless sensor networks (WSNs). PLoS ONE 18(6): e0286913. https://doi.org/10.1371/journal.pone.0286913
- Sathish kumar, R., Ramesh C, “A modified method for preventing black-hole attack in mobile ad hoc networks,” in J. Eng. Appl. Sci. 11(2), 182–191 (2016)
- M. Shinde and D. C. Mehetre, “Black Hole and Selective Forwarding Attack Detection and Prevention in WSN,” in 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA), Pune, India, pp. 1-6,(2017).
- Saleh, A.; Joshi, P.; Rathore, R.S.; Sengar, S.S. Trust-Aware Routing Mechanism through an Edge Node for IoT-Enabled Sensor Networks. Sensors 2022, 22, 7820. https://doi.org/10.3390/s22207820
- Yao, Y., Chen, W., Guo, J. et al. Simplified clustering and improved intercluster cooperation approach for wireless sensor network energy balanced routing. J Wireless Com Network 2020, 131 (2020). https://doi.org/10.1186/s13638-020-01748-8
- Srinivas, T. A., S-S, M, “Black Hole and Selective Forwarding Attack Detection and Prevention in IoT in Health Care Sector: Hybrid meta-heuristic-based shortest path routing,” in Journal of Ambient Intelligence and Smart Environments, 13(2):133–156, (2021).
- C. Lai, H. Li, R. Lu and X. S. Shen, “SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks,” in Comput. Netw., vol. 57, no. 17, pp. 3492-3510, December (2013).
- El Khediri, Salim Khan, Rehanullah Nejah, Nasri Kachouri, Abdennaceur, “MW-LEACH: Low energy adaptive clustering hierarchy approach for WSN,” in IET Wireless Sensor Systems. Vol 10(4), (2020).
- Hicham Qabouche, Aicha Sahel, Abdelmajid Badri, and Ilham El Mourabit, “Novel Reliable and Dynamic Energy-Aware Routing Protocol for Large Scale Wireless Sensor Networks,” in International Journal of Electrical and Computer Engineering, ISSN: 2088-8708, Vol. 12, No. 6, Decemeber 2022, pp. 6440-6448.
- S. Srinivasa Rao, K. Chenna Keshava Reddy and S. Ravi Chand (2022), A Novel Optimization based Energy Efficient and Secured Routing Scheme using SRFIS-CWOSRR for Wireless Sensor Networks. IJEER 10(3), 644-650. DOI: 10.37397/IJEER.100338.
- Mehetre, D.C., Roslin, S.E. & Wagh, S.J, “ Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust,” in Cluster Comput 22 (Suppl 1), 1313–1328 (2019).
- Yadav R. K., & Mahapatra R. P. (2021). Energy aware optimized clustering for hierarchical routing in wireless sensor network. Computer Science Review, 41, 100417
- A. Mehbodniya, S. Bhatia, A. Mashat, M. Elangovan and S. Sengan, “Proportional fairness based energy efficient routing in wireless sensor network,” Computer Systems Science and Engineering, vol. 41, no.3, pp. 1071–1082, 2022.
- Vinodhini R., & Gomathy C. (2021). Fuzzy Based Unequal Clustering and Context-Aware Routing Based on Glow-Worm Swarm Optimization in Wireless Sensor Networks: Forest Fire Detection. Wireless Personal Communications, 118(4), 3501–3522.
- Udhayavani, M., & Chandrasekaran, M. (2019). Design of TAREEN (trust aware routing with energy efficient network) and enactment of TARF: A trust-aware routing framework for wireless sensor networks. Cluster Computing, 22(5), 11919-11927.
- Meng, X., Liu, Y., Gao, X., Zhang, H. (2014). A New Bio-inspired Algorithm: Chicken Swarm Optimization. In: Tan, Y., Shi, Y., Coello, C.A.C. (eds) Advances in Swarm Intelligence. ICSI 2014. Lecture Notes in Computer Science, Vol. 8794. Springer
- Smith, C.L., Zielinski, S.L.: The Startling Intelligence of the Common Chicken. Scientific American 310(2) (2014).
- Gehad Ismail Sayed, Alaa Tharwat and Aboul Ella Hassanien, “Chaotic dragonfly algorithm: an improved metaheuristic algorithm for feature selection” in Journal: Applied Intelligence, Volume 49, Number 1, Page 188 (2019).
- Wang, Zhenwu, Chao Qin, Benting Wan, William Wei Song, and Guoqiang Yang. “An adaptive fuzzy chicken swarm optimization algorithm.” Mathematical Problems in Engineering 2021 (2021): 1-17.
- Atanassov K.T, “Intuitionistic Fuzzy Sets” in Fuzzy Sets Syst. 1986; 20:87–96.
- Xu Z., Yager R.R, “Some Geometric Aggregation Operators Based on Intuitionistic Fuzzy Sets,” in Int. J. Gen. Syst. 2006; 35:417–433.
- Shen F., Ma X., Li Z., Xu Z., Cai D, “ An Extended Intuitionistic Fuzzy TOPSIS Method Based on a New Distance Measure with an Application to Credit Risk Evaluation,” in Inf. Sci. 2018; 428:105–119.