A trusted MANET routing algorithm based on fuzzy logic

QM Yas, M Khalaf - International Conference on Applied Computing to …, 2019 - Springer
MANET wireless network changes network topology continuously and dynamically due to
the absence of infrastructure and central control. Typically, this network used for areas …

IBFWA: Integrated Bloom Filter in Watchdog Algorithm for hybrid black hole attack detection in MANET

VK Kollati, SK - Information Security Journal: A Global Perspective, 2017 - Taylor & Francis
In recent days, the Mobile Ad-hoc Network (MANET) has gained more attention and
popularity due to its dynamic nature. However, it is highly vulnerable to attacks due to its …

[PDF][PDF] Fuzzy based particle swarm optimization routing technique for load balancing in wireless sensor networks

S Balaji, EG Julie, M Rajaram… - International Journal of …, 2016 - academia.edu
Network lifetime improvement and uncertainty in multiple systems are the issues of wireless
sensor network routing. This paper presents fuzzy based particle swarm optimization routing …

Development of multipath resilience routing technique to improve the fault tolerance in mobile Ad-Hoc networks

S Balaji, YH Robinson - 2018 International Conference on …, 2018 - ieeexplore.ieee.org
In Mobile Ad-hoc Network (MANET), the ability to improve the fault tolerance is called the
Resilience technique. MANET has the general difficulties such as minimum amount of …

[PDF][PDF] Bandwidth and delay aware routing protocol with scheduling algorithm for multi hop mobile ad hoc networks

YH Robinson, EG Julie, S Balaji - International Journal of …, 2017 - researchgate.net
The scheduling based routing scheme is presented in this paper to avoid link failure. The
main objective of this system is to introduce a cross-layer protocol framework that integrates …

FSM based Intrusion Detection of Packet Dropping Attack using Trustworthy Watchdog Nodes

RR Chandan, PK Mishra - Recent Advances in Computer …, 2021 - ingentaconnect.com
Introduction: The proposed TWIST model aims to achieve a secure MANET by detecting and
mitigating packet dropping attack using a finite state machine based IDS model.• To …

Study and Develop an Effective Interfaces to Upload Data into Enterprise Resource Planning System

Y Harold Robinson, E Golden Julie, S Raja… - … Technologies in the …, 2022 - Springer
In today's fast-growing world, day-to-day several applications have specialized features that
new features have failed to enhance the satisfaction of the customers in web interfaces and …

[PDF][PDF] A Comparative Study on Fuzzy and Neuro-Fuzzy Enabled Cluster Based Routing Protocols for Wireless Sensor Networks

YH Robinson, EG Julie - International Journal of Computer and …, 2017 - academia.edu
(WSNs) has played a significant task in research for the recent years. Energy consumption
and data delivery in time are the major parameters with the usage of sensor nodes that are …

Study and Develop an Effective Interfaces to Upload Data into Enterprise Resource Planning System

YH Robinson, EG Julie, S Raja… - … Technologies in the …, 2021 - books.google.com
In today's fast-growing world, day-to-day several applications have specialized features that
new features have failed to enhance the satisfaction of the customers in web interfaces and …

An Overview of Computational Tools

N Kaur, S Sahay, SK Dixit - … Intelligence Applications for Software …, 2023 - taylorfrancis.com
Computational techniques is a set of bio-inspired computational methodologies and tactics
to initiate complex real-world problems for which traditional simulation methods cannot be …