Skip to main content

and
  1. No Access

    Article

    Assessing the efficacy of a novel adaptive fuzzy c-means (AFCM) based clustering algorithm for mobile agent itinerary planning in wireless sensor networks using validity indices

    Wireless Sensor Networks (WSN) are composed of small sensor nodes that either transmit their sensed data to the sink node directly or transmit it to its respective cluster head, which then transmits it to the ...

    Nidhi Kashyap, Shuchita Upadhyaya in Peer-to-Peer Networking and Applications (2024)

  2. No Access

    Chapter

    A Survey on Security Threats and Network Vulnerabilities in Internet of Things

    Internet of Things (IoT) is a group of physical objects like sensors and actuators etc. connected through the network for dynamic exchange of information for augmenting the performance of products and services...

    Harish Kumar Saini, Monika Poriye in Big Data Analytics in Intelligent IoT and … (2024)

  3. No Access

    Article

    A DNA Based Framework for Securing Information Using Asymmetric Encryption

    The current status of DNA cryptography (biological) is much far away from real scenario and can be carried out by only using chemical reactions in biological based laboratory. The present research work is an a...

    Monika Poriye, Shuchita Upadhyaya in Wireless Personal Communications (2023)

  4. No Access

    Chapter and Conference Paper

    Improvisation in Opinion Mining Using Negation Detection and Negation Handling Techniques: A Survey

    Negation handling is one of the challenges of natural language processing. Nowadays, negation detection and negation handling have significance in numerous fields like sentiment analysis, chat-bots, etc. In th...

    Kartika Makkar, Pardeep Kumar, Monika Poriye in Soft Computing: Theories and Applications (2023)

  5. No Access

    Chapter and Conference Paper

    DNA-Based Cryptography for Security in Wireless Sensor Networks

    Wireless sensor networks (WSNs) employ tiny nodes which accumulate information in various applications and security is essential for sensor network applications, such as military target movement, etc. To impar...

    Monika Poriye, Shuchita Upadhyaya in Cyber Security (2018)