{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:44:16Z","timestamp":1774367056792,"version":"3.50.1"},"reference-count":21,"publisher":"Tech Science Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.32604\/iasc.2023.026832","type":"journal-article","created":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T05:57:26Z","timestamp":1654495046000},"page":"827-838","source":"Crossref","is-referenced-by-count":1,"title":["Optimized ANFIS Model for Stable Clustering in Cognitive Radio Network"],"prefix":"10.32604","volume":"35","author":[{"given":"C.","family":"Ambhika","sequence":"first","affiliation":[]},{"given":"C.","family":"Murukesh","sequence":"additional","affiliation":[]}],"member":"17807","reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1109\/TWC.2010.112310.100630","article-title":"Dogfight in spectrum: Combating primary user emulation attacks in cognitive radio systems","volume":"10","author":"Li","year":"2011","journal-title":"IEEE Transaction on Wireless Communication"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1109\/JSAC.2004.839380","article-title":"Cognitive radio: Brain-empowered wireless communications","volume":"23","author":"Haykin","year":"2005","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"ref3","series-title":"2016 8th Int. Conf. on Wireless Communications & Signal Processing (WCSP)","article-title":"A spectrum sensing data falsification countermeasure strategy in energy-efficient CRN","author":"Xu","year":"2016"},{"key":"ref4","first-page":"168","article-title":"CogMesh: A cluster-based cognitive radio network","author":"Chen","year":"2007","journal-title":"Proceedings of IEEE DySPAN"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1884","DOI":"10.1109\/LCOMM.2016.2585126","article-title":"Designing an optimal energy efficient cluster-based spectrum sensing for cognitive radio networks","volume":"20","author":"Awin","year":"2016","journal-title":"IEEE Communications Letters"},{"key":"ref6","series-title":"2012 IEEE Wireless Communications and Networking Conf. (WCNC)","first-page":"1012","article-title":"Cluster-based spectrum sensing for cognitive radios with imperfect channel to cluster-head","author":"Ben Ghorbel","year":"2012"},{"key":"ref7","series-title":"2014 IEEE Int. Conf. on Ultra-WideBand (ICUWB)","first-page":"323","article-title":"SENSIC: Mobility-aware cluster-based cooperative spectrum sensing for cognitive radio networks","author":"Caso","year":"2014"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JSAC.2016.2633698","article-title":"Clustering-based spectrum sharing strategy for cognitive radio networks","volume":"1","author":"Dai","year":"2016","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"ref9","series-title":"2014 Int. Conf. on Information Technology","first-page":"96","article-title":"SINR based clustering protocol for cognitive radio ad hoc network (CRAHN)","author":"Dutta","year":"2014"},{"key":"ref10","first-page":"1","article-title":"Q-Learning based multi-objective clustering algorithm for cognitive radio ad hoc networks","volume":"1","author":"Hossen","year":"2019","journal-title":"IEEE Access"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1055","DOI":"10.1109\/ACCESS.2017.2777867","article-title":"RL-Budget: A learning-based cluster size adjustment scheme for cognitive radio networks","volume":"6","author":"Javed","year":"2018","journal-title":"IEEE Access"},{"key":"ref12","series-title":"2011 IEEE Int. Conf. on Communications (ICC)","first-page":"63","article-title":"Robust clustering of ad-hoc cognitive radio networks under opportunistic spectrum access","author":"Li","year":"2011"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1436","DOI":"10.1109\/TMC.2012.33","article-title":"Cluster-based control channel allocation in opportunistic cognitive radio networks","volume":"11","author":"Liu","year":"2012","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"22210","DOI":"10.1109\/ACCESS.2018.2807781","article-title":"RARE: A spectrum aware cross-layer mac protocol for cognitive radio ad-hoc networks","volume":"6","author":"Mansoor","year":"2018","journal-title":"IEEE Access"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1849","DOI":"10.1007\/s11276-016-1257-4","article-title":"Diffusing-CRN k-means: An improved k-means clustering algorithm applied in cognitive radio ad hoc networks","volume":"23","author":"Benmammar","year":"2016","journal-title":"Wireless Networks"},{"key":"ref16","series-title":"2016 Twenty Second National Conference on Communication (NCC)","first-page":"10","article-title":"On robust k-hop clustering in ad-hoc cognitive radio networks","author":"Misra","year":"2016"},{"key":"ref17","series-title":"2018 2nd Int. Conf. on Telematics and Future","first-page":"452","article-title":"Load balanced clustering algorithm for cognitive radio ad hoc networks","author":"Osman","year":"2018"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1109\/MWC.2017.1600117","article-title":"Clustering and reinforcement-learning-based routing for cognitive radio networks","volume":"24","author":"Saleem","year":"2017","journal-title":"IEEE Wireless Communications"},{"key":"ref19","series-title":"2013 Tenth Int. Conf. on Wireless and Optical Communications Networks (WOCN)","first-page":"812","article-title":"Optimized cluster head selection & rotation for cooperative spectrum sensing in cognitive radio networks","author":"Sharma","year":"2013"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1007\/s00500-016-2474-6","article-title":"Particle swarm optimization algorithm: An overview","volume":"22","author":"Wang","year":"2018","journal-title":"Soft Computing"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.advengsoft.2016.01.008","article-title":"The whale optimization algorithm","volume":"95","author":"Mirjalili","year":"2016","journal-title":"Advances in Engineering Software"}],"container-title":["Intelligent Automation &amp; Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/ueditor\/files\/iasc\/TSP_IASC-35-1\/TSP_IASC_26832\/TSP_IASC_26832.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T21:28:42Z","timestamp":1733520522000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/iasc\/v35n1\/48149"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023]]}},"URL":"https:\/\/doi.org\/10.32604\/iasc.2023.026832","relation":{},"ISSN":["1079-8587"],"issn-type":[{"value":"1079-8587","type":"print"}],"subject":[],"published":{"date-parts":[[2023]]}}}