A Hybrid Clustering Algorithm Based on Fuzzy c-Means and Improved Particle Swarm Optimization

S Chen, Z Xu, Y Tang - Arabian Journal for Science and Engineering, 2014 - Springer
Fuzzy c-means (FCM) algorithm is one of the most popular fuzzy clustering techniques.
However, it is easily trapped in local optima. Particle swarm optimization (PSO) is a …

Fuzzy logic–based jamming detection algorithm for cluster‐based wireless sensor network

KP Vijayakumar, P Ganeshkumar… - International Journal …, 2018 - Wiley Online Library
In this paper, a fuzzy logic–based jamming detection algorithm (FLJDA) is proposed to
detect the presence of jamming in downstream data communication for cluster‐based …

[PDF][PDF] Trust model for cluster head validation in underwater wireless sensor networks

N Goyal, M Dave, AK Verma - Underwater Technology, 2017 - academia.edu
In underwater wireless sensor networks (UWSNs), there are a number of sensor nodes that
perform collaborative monitoring tasks over a defined area. The sensor nodes move into a …

[PDF][PDF] DoS attacks on different layers of WSN: A review

K Kaushal, V Sahni - International Journal of Computer Applications, 2015 - Citeseer
WSNs plays an important role in many of the applications like patient health monitoring,
battlefields surveillance, traffic control, environmental observation, home automation and …

Automatic detection of jammer interference in GSM networks

A Hamdy, F Digham, OA Nasr… - … on Innovative Trends in …, 2018 - ieeexplore.ieee.org
In a cellular network, it is assumed that there is an exclusive use of spectrum by the network
operator. One of the main roles of the telecom regulatory authorities in different countries is …

[PDF][PDF] Year of Publication: 2016

K Kaushal, V Sahni - 2016 - academia.edu
Steganography is a data hiding technique which is used to prevent the data or any relevant
information from falling to the hands of an unauthorized personal. So, in order to prevent …