2022
DOI: 10.1002/dac.5385
|View full text |Cite
|
Sign up to set email alerts
|

Energy‐aware redundancy‐aware clustering in wireless sensor networks using Spined Loach Searching Optimization

Abstract: Wireless sensor networks play dominant role in data communication in many engineering applications and faces lot of challenges in its implementation. Energy conservation is also significantly required in these systems as the sensor nodes are battery operated. Hence, the energy efficient-based technique needs to be implemented in data transmission. The most widely used methods are clustering-based data transmission and energy efficient routing detection.In clustering, the proper selection of cluster head (CH) n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 40 publications
(64 reference statements)
0
0
0
Order By: Relevance
“…Equation (6) shows the update of 𝑋 𝑖 . 𝑋 𝑖 (𝑡 + 1) = { 𝑋 𝑖 (𝑡) + 𝛼 ⨁ 𝐿𝑒𝑣𝑦 (𝜆) 𝑖𝑓 𝑓(𝑋 𝑖 (𝑡)) ≤ 𝑓(𝑉 𝑖 (𝑡 + 1)) 𝑉 𝑖 (𝑡 + 1) 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 (6) Where, fitness value is denoted as 𝑓; dot multiplication is denoted using ⨁; step size control parameter is denoted as 𝛼; random search path is denoted as 𝐿𝑒𝑣𝑦 (𝜆) that required to satisfies the equation (7).…”
Section: Guided Foragingmentioning
confidence: 99%
See 1 more Smart Citation
“…Equation (6) shows the update of 𝑋 𝑖 . 𝑋 𝑖 (𝑡 + 1) = { 𝑋 𝑖 (𝑡) + 𝛼 ⨁ 𝐿𝑒𝑣𝑦 (𝜆) 𝑖𝑓 𝑓(𝑋 𝑖 (𝑡)) ≤ 𝑓(𝑉 𝑖 (𝑡 + 1)) 𝑉 𝑖 (𝑡 + 1) 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 (6) Where, fitness value is denoted as 𝑓; dot multiplication is denoted using ⨁; step size control parameter is denoted as 𝛼; random search path is denoted as 𝐿𝑒𝑣𝑦 (𝜆) that required to satisfies the equation (7).…”
Section: Guided Foragingmentioning
confidence: 99%
“…The sensor based devices used in WSN becomes intelligent and it has various functions such as intercommunication, calculation, sensing and decision making capacity which makes the WSN is powerful based on today's requirements [5]. The sensors are operated with the battery power, therefore the capacity of computation and data transferring is limited over the network [6]. The WSN is susceptible to the malicious attacks due to its energy constraint, lack of centralized administration and open deployment [7] [8].…”
Section: Introductionmentioning
confidence: 99%